A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
A weekly podcast about random topics spoken about by four random Linux Nerds on the interwebs. #Linux #FOSS #OpenSource
…
continue reading
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
Sea Control is CIMSEC's Flagship podcast. We focus on maritime security, history and all things naval.
…
continue reading
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the trends that truly matter. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, end-to ...
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman and Paul Robichaux, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
A behind-the-scenes look at company building from the perspective of builders themselves - this is how we operate! With host Carey Ransom.
…
continue reading
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
…
continue reading
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
Welcome to covert actions and national security podcast. Welcome to covert and national security podcast. A podcast where we discuss a spectrum of activities concerning covert operations, intelligence, counterintelligence, unconventional warfare, assassination issues, espionage spy craft technology and more. Enter the operational world with Dr. Carlos
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Stories of resilience, grit, and triumph over trauma from Veterans and First responders. Hosted by Sara Correl from "The Power of your Story." A limited series from Security Halt Media.
…
continue reading
This is the She Said Privacy / He Said Security podcast with Jodi and Justin Daniels. Like any good marriage, Jodi and Justin will debate, evaluate, and sometimes quarrel about how privacy and security impact business in the 21st century.
…
continue reading
Conversations about contemporary warfare and what it means for the future of fighting. Each episode will look at how wars are being fought around the world today, whether (and why) this is important, and what it all might mean for militaries and national security in the coming decades.
…
continue reading
Exceptional advice for using technology to streamline operations, improve marketing, gain financial security, and enjoy greater freedom. Increasingly solo lawyers can be more efficient and cost-effective than larger firms. That's because of modern technology. But you have to use it better than most lawyers do. And that's what this podcast will help you do.
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
The best in maritime security, technology, history, and international affairs from CIMSEC - your moment of power point rehab.
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
From the law enforcement and security organization you’ve never heard of comes a podcast revealing some of the greatest stories in America’s history. Hear from special agents, engineers, technicians, and others who belong to the Diplomatic Security Service as they give Americans insight into what really happened. From the terrorist bombings in East Africa to discovering bugs buried in U.S. embassy walls to dismantling a major sex trafficking network in New York City, listen along as we peel ...
…
continue reading
The Elara Edge: Expert Insights on Space Security is a thought leadership forum of military and space industry experts providing commentary and insight on the latest news developments in space security.
…
continue reading
State Secrets is a weekly interview podcast featuring Cipher Brief experts and national security leaders.
…
continue reading
The only Mental Health podcast that shares honest and authentic accounts of living with mental health issues, that's also hosted by individuals fighting the same fight you are!Providing information and resources for help with a heavy dose of humor and entertainment. Helping you find hope and the strength to fight on.
…
continue reading
American Resilience Project Founder Roger Sorkin discusses topics around energy, food security, and navigating the climate crisis. Learn more at amresproject.org.
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
IT talk with a healthy dose of empathy: Hosts Matt Yette & Matt Cozzolino draw on their combined 40+ years of infrastructure experience as they discuss the ever-changing technology landscape – from virtualization to storage, security to networking, and everything in between.
…
continue reading
The Field Notes Podcast is focused on communicating and exploring all things Field Operations at Esri. We’ll explore a variety of topics that showcase the range and use of mobile GIS technology. The ability to take your data, forms, and maps into the field using a cellphone or tablet has changed the way organizations have approached field workflows—and we want to dive into as many as possible!
…
continue reading
I was a morbidly obese heart surgeon. Throughout high school, college, med school and surgical training, I followed the U.S. dietary guidelines for both diet and exercise. Yet nothing I did kept the weight off. I just kept getting bigger and bigger. Each day in the operating theater I would split open the chests of people just like me. I knew I was heading for the operating table myself if I didn't find solutions that worked. In 2016, I finally found a way to lose 100 pounds and keep it off. ...
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
Security veterans Joe Patti and Adam Roth share cyber security insights from their virtual bar stools. Join Joe and Adam, along with a diverse lineup of industry insiders, for a view into how the professionals see the security issues that impact all of us. Tune in for engaging discussions, expert analyses, and a behind-the-scenes look into the cybersecurity world. Video on Spotify and YouTube; audio on all other podcasting platforms. Reach us at feedback@securitycocktailhour.com or @SecCockt ...
…
continue reading
"Building the Base" - an in-depth series of conversations with top entrepreneurs, innovators, and leaders from tech, financial, industrial, and public sectors. Our special guests provide their unique perspectives on a broad selection of topics such as: shaping our future national security industrial base, the impact of disruptive technologies, how new startups can increasingly contribute to national security, and practical tips on leadership and personal development whether in government or ...
…
continue reading
"Secured" is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful ...
…
continue reading
Host Jon Olson, US Navy (Ret.) Interviews different experts to learn about current and historical events with a focus on national security. Topic's include: the economy, climate change, cyber security, nuclear weapons, intelligence operations, and more. New episodes released Wednesdays.
…
continue reading
Join the Intego Mac security experts for the latest Apple news, industry opinions, and a splash of security advice in our easy-to-digest, entertaining, and informative podcast series. Hosted by Kirk McElhearn and Josh Long.
…
continue reading
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
continue reading
EOD Gear IMPROVISED brings in the top people from the EOD community and the communities working with or around us.
…
continue reading
Join hosts Ned Bellavance and Kyler Middleton as they dive deep into the challenges of cloud operations from the perspective of seasoned practitioners. You'll hear from expert guests—technical leaders, trainers, and consultants with years of hands-on experience—discussing the nuances of modern cloud environments. From AWS to Azure, networking to security, automation to DevOps, each weekly episode equips you with the insights to confidently address tech and business challenges such as resilie ...
…
continue reading
"DevOps Chats" by Techstrong Group, the force behind industry-leading platforms like DevOps.com, Cloud Native Now, Security Boulevard, Techstrong.ai, DigitalCxO, and Techstrong.TV, is your premier destination for all things DevOps. Hosted by industry veterans Alan Shimel and Mitchell Ashley, this podcast series delves deep into the world of DevOps, bringing you the latest trends, innovative strategies, and insightful discussions that matter. Each episode of "DevOps Chat" is a journey through ...
…
continue reading
If you wish to know what it’s really like to make the life and death decisions portrayed in the movies by James Bond or on TV by Homeland's, Cary Matherson, then Black Spy Podcast is the show for you. If you're interested in the clandestine world of secret intelligence, espionage, counter-terrorism and national security, then this definitely your must listen Podcast! Every week, along with a different successful or famous guest who's always been interested in the secret services, ex officer, ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Space Domain Awareness Demands New “Operational Intelligence” Requirement
19:02
19:02
Play later
Play later
Lists
Like
Liked
19:02
From satellite imagery to G.P.S.-guided navigation, intelligence gathered from space has long facilitated military operations. But after space was declared a warfighting domain, intelligence agencies are now shifting their focus to supporting operations in space. For the United States Space Force, this shift is exemplified by the evolving mission c…
…
continue reading
By Circle Of Insight Productions
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Innovation, Security, and Privacy: A CIO’s Playbook for Operational Success
31:29
31:29
Play later
Play later
Lists
Like
Liked
31:29
Christina Shannon is an accomplished Chief Information Officer (CIO) in the CPG chemical manufacturing sector. With a career spanning over two decades, she transitioned from senior security leadership roles in Fortune 100 companies to executive technology leadership positions in mid-to-large-sized, private equity-owned firms. Christina's journey in…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 193: Seth Ewing, Founder and President of Operation Tabletop
56:49
56:49
Play later
Play later
Lists
Like
Liked
56:49
Send us a Text Message. Today's guest is Seth Ewing, the heart and soul behind Operation Tabletop, a nonprofit dedicated to bringing veterans together through the magic of tabletop gaming. From his roots in the Shenandoah Valley to his enlistment in the Air Force, Seth's journey is marked by resilience and a love of gaming. Discover how limited Wi-…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Texas Slim and the Beef Initiative Tackle Both Food Security & National Security #149
1:17:16
1:17:16
Play later
Play later
Lists
Like
Liked
1:17:16
What if the way we source our food is putting our health and national security at risk? Bold statement, but Texas Slim, a pivotal figure in the Beef Initiative, argues that our centralized food systems are doing just that. Join us as we reconnect with Texas Slim, who’s been on a mission across the U.S. and beyond, advocating for regenerative beef a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
What is the future of security operations with AI in 2024?
23:09
23:09
Play later
Play later
Lists
Like
Liked
23:09
How can AI impact Cloud Security Operations? Ashish sat down with Ely Kahn, VP of Cloud Security and AI at SentinelOne to talk about the evolving landscape of cloud security and the future of Security Operations Centers (SOC). Ely spoke about the shift from centralized to decentralized SOC operations, the increasing complexity in cloud security and…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Ep. 32: Going into OT (Operational Technology) with Robert Lee
1:05:14
1:05:14
Play later
Play later
Lists
Like
Liked
1:05:14
We usually talk about information technology, but the real world runs on power, water and factories – and protecting them from attack is a whole different ballgame. Robert Lee, CEO of Dragos, gives us a fascinating introduction to Operational Technology (OT) cyber security. Listen in to learn about how Robert and colleagues secure the infrastructur…
…
continue reading
Q&A184: How can we trust FOSS? Are there any apps you shouldn't trust with FOSS? What are our privacy & security thoughts on biohacking? How do we approach uncertainy in threat modeling? How do ISPS collect data? Join our next Q&A on Patreon: https://www.patreon.com/collection/415684?view=expanded** Welcome to the Surveillance Report - featuring Te…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
D2C246: Can Service Level Objectives (SLOs) Help Keep Users Happy?
38:39
38:39
Play later
Play later
Lists
Like
Liked
38:39
Service Level Objectives (SLOs) are a set of reliability measurements for customer or user expectations of services; in other words, are people having a good experience with your application or service? Today’s Day Two Cloud explores SLOs, the relevant metrics, and how to measure them. We also talk about how SLOs are a cross-discipline objective...…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI Predators and Digital Dangers: Keeping Children Safe Online
24:29
24:29
Play later
Play later
Lists
Like
Liked
24:29
Angeline Corvaglia is the Founder of Data Girl and Friends, where she is committed to helping young people thrive in an AI-driven digital world. Her strategy encompasses three key pillars: privacy and security awareness, critical thinking skills, and balancing the benefits and risks of AI. Angeline is on a mission to equip young minds with the tool…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Risky Business #755 -- SSH 0day! Polyfill drama! Entrust crushed!
59:19
59:19
Play later
Play later
Lists
Like
Liked
59:19
On this week’s show, Patrick Gray and Adam Boileau discuss the week’s security news, including: Widely used polyfill javascript gets hijacked by its new owners MacOS supply chain disaster bullet dodged That OpenSSH remote code exec OH MY <3 Entrust gets its CA business kicked to the kerb by Google South Korean telco intentionally viruses 600k custo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode #10 - Richard Keiser, CEO and Founder of Common Energy
24:04
24:04
Play later
Play later
Lists
Like
Liked
24:04
Listen to the American Resilience Podcast conversation with Common Energy CEO Richard Keiser to learn how to accelerate the transition to clean electricity generation and transmission and how we can create the amount of clean electricity needed.By American Resilience Project
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Operation Endgame: The ultimate troll patrol. [Only Malware in the Building]
28:34
28:34
Play later
Play later
Lists
Like
Liked
28:34
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
286: Online Workspaces for Modern Law Work
41:38
41:38
Play later
Play later
Lists
Like
Liked
41:38
Modern lawyers need new workspaces optimized for remote work, virtual collaboration, and asynchronous communication. In this episode, you'll find out which two software tools are the best online workspaces and why popular cloud-based practice management software does not compete with these new options. In this episode, you will hear: Modern online …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Encore: network telescope (noun) [Word Notes]
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18
Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.By N2K Networks
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Overcoming Healthcare Barriers: Amanda Decker's Metabolic Health Approach #150
59:45
59:45
Play later
Play later
Lists
Like
Liked
59:45
Amanda Decker, an experienced nurse practitioner, is revolutionizing metabolic health. She shares her journey from childhood obesity and psoriasis to discovering low carb lifestyle benefits. Decker discusses challenges implementing this approach in traditional healthcare, where medication is often prioritized over lifestyle changes. Her determinati…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 370: Jedda Wignall on Managed Device Attestation
1:20:59
1:20:59
Play later
Play later
Lists
Like
Liked
1:20:59
Trust is a subject we regularly discuss with our guests. How do we trust our users, how do we trust the software they want to run, how do we trust the devices they are on. In the modern world where you can’t believe everything a computer or mobile device is telling you about itself, how do we make sure that the devices we are managing and granting …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Should Chinese Drones Be Banned in the U.S.? UAV Expert Dr. Caitlin Lee of RAND Corporation Explores Both Sides of the Question
36:42
36:42
Play later
Play later
Lists
Like
Liked
36:42
Text the ATB Team! We'd love to hear from you! 🎙️ Join us on "At the Boundary" as Dr. Caitlin Lee breaks down the "Countering CCP Drones Act" currently being considered in Congress. This legislation would ban drones from the Chinese-owned technology company, DJI, from operating in the U.S., which would have a massive impact on the personal and prof…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 194: From memes to Community Impact: The Lowercase Dooms Block Party's Mission
43:10
43:10
Play later
Play later
Lists
Like
Liked
43:10
Send us a Text Message. How did a casual joke in a group chat evolve into the lowercase dooms block party, an event with a profound mission? Join us as we sit down with Luke Cavanaugh, Travis Thompson, and Kevin "BK" Shears from Snake Farm to uncover the origins of this community-driven initiative. This episode sheds light on how the block party ai…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 6 : Floyd "Shad" Meshad, from the Battlefield to Advocacy
31:24
31:24
Play later
Play later
Lists
Like
Liked
31:24
What drives a man from the path to priesthood to the heart of a war zone? Join us as we sit down with Floyd "Shad" Meshad, a remarkable figure whose journey defies all expectations. From his early days in a devout Catholic family in Birmingham, Alabama, to his transformative role as one of the first mental health officers in Vietnam, Shad's story i…
…
continue reading
Episode 184: Local accounts on Windows just got more difficult to create, a new red flag about Telegram security, updates from Mullvad, a ton of data breaches, and more! Support us on Patreon Support us on Liberapay Monero: 46iGe5D49rpgH4dde32rmyWifMjw5sHy7V2mD9sXGDJgSWmAwQvuAuoD9KcLFKYFsLGLpzXQs1eABRShm1RZRnSy6HgbhQD Timestamps Sources 00:00 Intro…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Conspiracy Theories - Or an epithet to hide used to hide inconvenient truths? (Part 2)
1:03:19
1:03:19
Play later
Play later
Lists
Like
Liked
1:03:19
Conspiracy Theories - Or an epithet to hide used to hide inconvenient truths? (Part 2) Black Spy Podcast Season 15, Episode 0007 This week's Black Spy Podcast continues looking into the phenomenon of conspiracy theories and asks the question, are the powers that be attempting to fool us by labelling issues of covert manipulation or control, as theo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 159: Do You Need a Home Lab?
1:35:08
1:35:08
Play later
Play later
Lists
Like
Liked
1:35:08
The boys return to talk about home labs. Why you need one, why you don't, and what we use ours for. ==== Special Thanks to Our Patrons! ==== https://thelinuxcast.org/patrons/ ===== Follow us 🐧🐧 ====== MERCH - https://shop.thelinuxcast.org Discord - https://discord.gg/62RPDBMH8W Odysee - https://odysee.com/$/invite/@thelinuxcast:4 Mastodon- https://…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Sea Control 532 - Coalition Naval Operations during the Korean War with Dr. Ian Bowers and Dr. Deborah Sanders
33:33
33:33
Play later
Play later
Lists
Like
Liked
33:33
Links Coalition Navies During the Korean War: Understanding Combined Operations, edited by Ian Bowers, Routledge, 2024. Sea Control 231 – Not So Disruptive After All with Dr. Ian Bowers and Dr. Sarah Kirchberger, CIMSEC, March 11, 2021.By Dr. Deborah Sanders, Dr. Ian Bowers, Jared Samuelson
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Sea Control 532 – Coalition Naval Operations during the Korean War with Dr. Ian Bowers and Dr. Deborah Sanders
By Jared Samuelson Dr. Ian Bowers and Dr. Deborah Sanders join us to discuss coalition navy operations during the Korean war. Ian is Senior Research Scientist at the Norwegian Institute for Defence Studies. Deborah is a Professor of Contemporary conflict and strategy at the Defence Studies Department at the Defence Academy of the United Kingdom. … …
…
continue reading
When former Google CEO Eric Schmidt launched the bipartisan Special Competitive Studies Project – known as SCSP - in 2021, he did it with the intention of bringing together the best and brightest minds in technology to make recommendations that would strengthen America’s long-term competitiveness in an increasingly complex world – a world where tec…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 158: Is Linux Mint Really That Good? - Linux User Group 6/27/24
1:54:33
1:54:33
Play later
Play later
Lists
Like
Liked
1:54:33
The second LUG for this month is in the books. If you'd like to join in for either of the LUGs next month, join the Discord server for more info! https://discord.gg/yAH4w8tZ2k https://thelinuxcast.org/contact https://patreon.com/thelinuxcast Thanks to all of my patrons! https://thelinuxcast.org/patrons…
…
continue reading
In this episode, Geoff and Skyler are joined by special guests Keith Koehne and Matt Miller from Paradigm Cyber Ventures to discuss their mission to integrate cybersecurity into high school industrial tech education. Through this program, teachers at high schools around the U.S. are trained to deliver an in-depth cybersecurity curriculum to their s…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Checklist 381 - Kaspersky Ban, the Change Hack, and Virtual Bugs
18:12
18:12
Play later
Play later
Lists
Like
Liked
18:12
On this edition of The Checklist by SecureMac: The Commerce Department is kicking Kaspersky out of the U.S. Another shoe has dropped in the Change Healthcare hack And an Apple Vision Pro bug to unleash virtual bugs Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checklist@Securemac.com…
…
continue reading
Overview A look into CISA’s Known Exploited Vulnerability Catalogue is on our minds thisweek, plus we look at vulnerability updates for gdb, Ansible, CUPS, libheif,Roundcube, the Linux kernel and more. This week in Ubuntu Security Updates 175 unique CVEs addressed [USN-6842-1] gdb vulnerabilities (01:10) 6 CVEs addressed in Xenial ESM (16.04 ESM), …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hands-On IT – Worklets and the Automox Community, E06
12:47
12:47
Play later
Play later
Lists
Like
Liked
12:47
Dive into the world of IT tech with the Hands-On IT podcast, hosted by Landon Miles. Each episode uncovers the intricacies of IT technologies, real-life use cases, and practical guidance on their application. Tune in for your weekly dose of tech trends, user-friendly tutorials, and innovative solutions to transform your IT experience. This podcast …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Can the FBI Stop Proud Boy Plots This Time?
35:23
35:23
Play later
Play later
Lists
Like
Liked
35:23
Reuters reporter Aram Roston with Jeff Stein on the Proud Boys resurgence. Aram Roston https://twitter.com/aramroston https://www.reuters.com/authors/aram-roston/ Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow SpyTalk on Twitter: https://twitter.com/talk_spy Subscribe to SpyTalk on Substack https://www.spytalk.co/ Take our liste…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Risky Biz Soap Box: Why AI shouldn't really change your security controls
35:29
35:29
Play later
Play later
Lists
Like
Liked
35:29
This is a sponsored Soap Box edition of the Risky Business podcast. Abhishek Agrawal is the CEO and co-founder of Material Security, an email security company that locks down cloud email archives. Attackers have been raiding mailspools since hacking has existed, and with those mailspools now in the cloud with services like o365 and Google Workspace…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Selena Larson on e-crime matching nation state hackers; Disinfo before the Supreme Court
44:14
44:14
Play later
Play later
Lists
Like
Liked
44:14
When studying cyberoperations, it’s easy to become enamored with state-backed hackers. Russian and Chinese operations have done much to shape our understanding of how power is exercised online, but it’s not clear that the intense attention dedicated to such operations is well-placed. Amid the current epidemic of ransomware, criminal hacking groups …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Impact of an 'Always On' Mentality on Mental Health w/ Michael Kennedy
32:13
32:13
Play later
Play later
Lists
Like
Liked
32:13
In this episode of the Unsecurity Podcast, the guys sit down with Michael Kennedy of Ostra to discuss burnout and share their personal experiences and strategies for preventing and managing work-related stress. Please send any questions, comments, or feedback to unsecurity@protonmail.com. About FRSecure https://frsecure.com/ FRSecure is a mission-d…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Mandiant's Approach to Securely Using AI Solutions
32:00
32:00
Play later
Play later
Lists
Like
Liked
32:00
Mandiant Consultants Trisha Alexander, Muhammed Muneer, and Pat McCoy join host Luke McNamara to discuss Mandiant's recently launched services for securing AI. They discuss how organizations can proactively approach securing the implementation of AI workloads, red-team and test these security controls protecting generative AI models in production, …
…
continue reading
By Jared Samuelson Dr. Bec Strating and Dr. Joanne Wallis join the program to discuss Australian security and their new book, Girt By Sea: Re-Imagining Australia’s Security. Bec is the director of La Trobe Asia and a professor in politics and international relations at La Trobe University. Joanne is a professor of international security at … Contin…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Microsoft's Security Stumble and AD Modernization Insights: The Practical 365 Podcast S4 E22
1:00:50
1:00:50
Play later
Play later
Lists
Like
Liked
1:00:50
On the Practical 365 podcast this week, Rich Dean and I tackle a hot topic that's got the tech world buzzing - Microsoft's alleged security misstep that may have paved the way for the SolarWinds hack. We also chat with Julian Stephan from Quest Software, who shares some valuable insights on Active Directory modernization. Want to stay up to date on…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Sea Control 531 - Girt by Sea with Dr. Bec Strating and Dr. Joanne Wallis
31:36
31:36
Play later
Play later
Lists
Like
Liked
31:36
Links 1. Girt By Sea: Re-Imagining Australia’s Security, by Rebecca Strating and Joanne Wallis, La Trobe University Press, 2024. 2. Sea Control 430 - Australian Constabulary Missions with Sean Andrews, CIMSEC, May 11, 2023. 3. Sea Control 508 - Australian Capabilities in the Littoral with Jennifer Parker and Peter Jones, CIMSEC, April 6, 2024. 4. S…
…
continue reading
Apple drops one of its financial services that it only introduced last year. More countries can now participate in Apple's self-service repair program. Installed Chrome browser extensions could be more dangerous than Google is letting on. And in a new white paper, Apple declares its dedication to long-range privacy and security using some "squishy"…
…
continue reading
This week Joe and Dave share some interesting follow up from a few episodes ago where Dave shared his love for baby grand pianos and how scammers we're using that to lure people into traps. Listener George wrote in to share about a show on UK Channel 4, called "The Piano," it's a music competition where visitors play a public piano in a train stati…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EPISODE 34: IS YOUR RISK MANAGEMENT TOAST?
46:09
46:09
Play later
Play later
Lists
Like
Liked
46:09
This Episode we are joined by Michael Walford-Williams, a consultant specialising in operational resilience and third-party risk management. His consultancy Westbourne Consultancy Limited sees him working for various clients providing risk management services for the financial service industry. In this episode, we look at how risk appetite evolves …
…
continue reading
Q&A183: Does the rise of RCS change our opinions on SMS? Aside from data removal and package managers, what are some helpful automations? What's the best workflow for VPN split tunneling? Join our next Q&A on Patreon: https://www.patreon.com/collection/415684?view=expanded** Welcome to the Surveillance Report - featuring Techlore & The New Oil to k…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Ep. 33: Surviving an Identity Crisis with Venkat Raghavan
56:49
56:49
Play later
Play later
Lists
Like
Liked
56:49
Your digital identity is more than just your username and password. In fact, as AI continues to evolve, how we define identity online is changing, and so is how we prove who we are. In this episode, we delve into the future of digital identity with Venkat Raghavan, the CEO of Stack Identity and a seasoned expert in the field. Venkat breaks down the…
…
continue reading