show episodes
 
T
The Station Chief: Insights on Global Intelligence
 
A weekly discussion about intelligence news from around the globe, featuring host Bob Knorpp and retired CIA station chief Scott Uehlinger.
 
S
Smashing Security - News and views from the world of cybersecurity, hacking, and internet threats
 
Join computer security industry veterans Graham Cluley and Carole Theriault as they chat about cybercrime, hacking and online privacy. Follow the show on Twitter at @SmashinSecurity. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
S
Smashing Security - News and views from the world of cybersecurity, hacking, and internet threats
 
Join computer security industry veterans Graham Cluley and Carole Theriault as they chat about cybercrime, hacking and online privacy. Follow the show on Twitter at @SmashinSecurity. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
.
.future
Monthly+
 
The future isn’t random. It’s the result of the choices that we make now. We’ll be talking about technologies and industries that will define the next decade and beyond. Join our host Cristina Quinn, a science and technology reporter, as she dives into everything from Minecraft to cyber warfare. You can wait for the future to happen to you or engage with it right now and ahead of the curve on .future— a branded podcast from Microsoft, produced in partnership with Gimlet Creative.
 
.
.future
Monthly+
 
The future isn’t random. It’s the result of the choices that we make now. We’ll be talking about technologies and industries that will define the next decade and beyond. Join our host Cristina Quinn, a science and technology reporter, as she dives into everything from Minecraft to cyber warfare. You can wait for the future to happen to you or engage with it right now and ahead of the curve on .future— a branded podcast from Microsoft, produced in partnership with Gimlet Creative.
 
.
.future
Monthly+
 
The future isn’t random. It’s the result of the choices that we make now. We’ll be talking about technologies and industries that will define the next decade and beyond. Join our host Cristina Quinn, a science and technology reporter, as she dives into everything from Minecraft to cyber warfare. You can wait for the future to happen to you or engage with it right now and ahead of the curve on .future— a branded podcast from Microsoft, produced in partnership with Gimlet Creative.
 
P
POSC-3511 War and Peace
Weekly+
 
This class will introduce you to the basic approaches in international relations theory to study the nature, the issues and ideologies, as well as the dynamics of war and peace in the international system. In addition to the “ conventional” (i.e., state-based) forms of warfare, you will be introduced to “ unconventional” forms (i.e., involving other actors and tactics), such as terrorism and “ cyber- warfare,” as well as to the increasingly important area of ethnic conflicts and humanitarian ...
 
G
GLOBAL IMPACT
Monthly
 
GLOBAL IMPACT, hosted by Dr. Frederick R. Lester, Chief Executive Officer of GLOBAL AFFAIRS MEDIA, will address strategic issues impacting the global community. Thought leadership will be provided that will elevate listeners' awareness and understanding of complex global issues such as geopolitics of technology and resources, globalization & immigration policy, diplomacy & peace negotiations, global health crisis, political economy of the media, impact of technology on society, humanitariani ...
 
C
Cyber Security Documentary
Daily+
 
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work.Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize i ...
 
Loading …
show series
 
There was a time when the phrase "armchair quarterback" was a put-down, but the armchair may be exactly where a new breed of competitor will be making a living or earning a scholarship. Victor Wishna explains in this month's 'A Fan's Notes.' It’s amazing, and silly, how some ’80s movies managed to predict the 21st century. Back to the Future II ...…
 
M
Monocle 24
 
After hundreds of thousands of demonstrators take to the streets of Barcelona in support of unity with Spain, we ask where the country can go from here. Plus: the Tories in crisis, cyber warfare in the Baltics and business from Milan. From Milan: Salone highlights, interviews and a daily running guide. More info.…
 
D
Defense and Security - Video
 
Please join CSIS and the United States Naval Institute (USNI) for a Maritime Security Dialogue event featuring Vice Admiral Jan Tighe, Deputy Chief of Naval Operations for Information Warfare/Director of Naval Intelligence, for a discussion on cyber warfare in the maritime domain.
 
D
Defense and Security - Audio
 
Please join CSIS and the United States Naval Institute (USNI) for a Maritime Security Dialogue event featuring Vice Admiral Jan Tighe, Deputy Chief of Naval Operations for Information Warfare/Director of Naval Intelligence, for a discussion on cyber warfare in the maritime domain.
 
C
Cybersecurity and Technology - Audio
 
Please join CSIS and the United States Naval Institute (USNI) for a Maritime Security Dialogue event featuring Vice Admiral Jan Tighe, Deputy Chief of Naval Operations for Information Warfare/Director of Naval Intelligence, for a discussion on cyber warfare in the maritime domain.
 
C
Cybersecurity and Technology - Video
 
Please join CSIS and the United States Naval Institute (USNI) for a Maritime Security Dialogue event featuring Vice Admiral Jan Tighe, Deputy Chief of Naval Operations for Information Warfare/Director of Naval Intelligence, for a discussion on cyber warfare in the maritime domain.
 
A
AI Today Podcast: Artificial Intelligence Insights, Experts, and Opinion
 
AI Today Podcast #002: Should We Be Scared of AI? For a more in-depth and detailed report of the topics discussed in this podcast, download our FREE research report: Download Processing... Subscribe to download Send Download Link To: Download jQuery(function($){ var sname = localStorage.getItem("email_lock_name"); var semail = localStorage.getI ...…
 
Long before cyber criminals were stealing ATM passwords, phone phreaks were tapping into the telephone system. Their motivation was not monetary, but the thrill of defeating a complex, invisible network. Today “hacking” can apply to cyberwarfare, biological tinkering, or even geoengineering. Often it has negative connotations, but the original ...…
 
Despite being more than 8,000 kilometres away from the action, the UK is on edge after North Korea's latest missile launch.Prime Minister Theresa May says they are not ruling out cyber warfare or military action at this point.Her comments come after a North Korean missile was fired over north Japan, before crashing into the sea.UK correspondent ...…
 
Where armies once fought with bullets and bombs, they now engage in clandestine, invisible warfare. In 2010 a virus was discovered that would change the world’s perception of cyber warfare forever. Dubbed Stuxnet, this malicious piece of code has a single focus- to stop to development of Iran’s nuclear program. Part one of this three part serie ...…
 
Where armies once fought with bullets and bombs, they now engage in clandestine, invisible warfare. In 2010 a virus was discovered that would change the world’s perception of cyber warfare forever. Dubbed Stuxnet, this malicious piece of code has a single focus- to stop to development of Iran’s nuclear program. Part one of this three part serie ...…
 
A
Another Think Coming with Mac King
 
Another Think Coming apologizes for the way this episode may leave listeners feeling. An assessment of the present and future threats of cyber-crime, cyber-terrorism and cyber-warfare from one of the good guys on the front lines of those battles should do little to allay ones fears for their and our digital privacy and security. Security Scorec ...…
 
"I'll tell you what I know for a fact: [...] in the last couple of years, social media has been a very important element in any election around the world, in any political process around the world and in the past year [...] security researchers have uncovered that there are many ways to subvert digital and social media, by creating Twitter bots ...…
 
Published on 16 Jun 2017. For years, cyberattacks on a global scale were the stuff of fiction; they have now become reality. And if the NSA isn’t safe then no one is safe. This week, we decode a potential existential threat to modern civilization with Dee Smith, CEO of Strategic Insight Group, and Kowsik Guruswamy, CTO of Menlo Security. In ‘Th ...…
 
B
Business and Philosophy
 
Software engineers have a skill set that can be applied to solve problems outside of a codebase. Analytical skills can be used to evaluate investment opportunities. Creative thinking can be used to build businesses. Communication skills can be used to build and enhance relationships. John Sonmez is a software engineer who created the Simple Pro ...…
 
P
Podcast – Software Engineering Daily
 
Software engineers have a skill set that can be applied to solve problems outside of a codebase. Analytical skills can be used to evaluate investment opportunities. Creative thinking can be used to build businesses. Communication skills can be used to build and enhance relationships. John Sonmez is a software engineer who created the Simple Pro ...…
 
What Russia may lack in modern traditional military assets, it more than compensates through its ability to wage tactical cyberattacks and ultimately the potential for cyberwarfare. That’s the opinion of Dr. Steven Miner, professor and Director of the Contemporary History Institute at Ohio University. Russia’s military hardware is deteriorating ...…
 
I
International Security In The 21st Century
 
This episode of the International Security in the 21st Century will analyse the threats that Cyber Warfare poses to International Security. This episode will; Provide a broad introduction to cyber warfare with case studies, Discuss the theoretical threats that Cyber Warfare poses to the International Community, Debate the impact that fake news ...…
 
This is not another episode about preventing and responding to the NotPetya ransomware. There are countless articles about those topics. We are discussing the bigger picture today. In this episode, NotPetya, Windows, and Ransomware, we discuss what happened in the case but also what does all of this really mean in the big picture of cyber attac ...…
 
P
Podcast – Software Engineering Daily
 
At Coinbase, security is more important than anything else. Coinbase is a company that allows for storage and exchange of cryptocurrencies. Protecting banking infrastructure is difficult, but in some ways the stakes are higher with Coinbase, because bitcoin is fundamentally unregulated. If a hacker were able to syphon all of the money out of Co ...…
 
B
Blockchain – Software Engineering Daily
 
At Coinbase, security is more important than anything else. Coinbase is a company that allows for storage and exchange of cryptocurrencies. Protecting banking infrastructure is difficult, but in some ways the stakes are higher with Coinbase, because bitcoin is fundamentally unregulated. If a hacker were able to syphon all of the money out of Co ...…
 
R
Rational Radio Daily with Steele and Ungar
 
Russia's meddling in the 2016 election was a huge escalation in cyber warfare. Morgan Wright, an expert on cybersecurity strategy and cyberterrorism, talks about the increasing threat of cyber warfare and the importance of cybersecurity. Tracy Sefl, a Democratic communications strategist, compares her experiences conducting opposition research ...…
 
Robert Eckman, Chief Information Security Officer, MCPc; Ryan MacFarlane, Supervisory Special Agent, Cleveland Division Cyber Squad 1, FBI; and Pete Moore, Ph.D., M.A. Hanna Professor of Political Science, Case Western Reserve University, discuss the threats of cyber warfare and what can be done to prevent future cyberattacks in a conversation ...…
 
Apache Kafka is an open-source distributed streaming platform. Kafka was originally developed at LinkedIn, and the creators of the project eventually left LinkedIn and started Confluent, a company that is building a streaming platform based on Kafka. Kafka is very popular, but is not easy to deploy and operationalize. That is why Confluent has ...…
 
T.L. Williams joins me to talk about his new fictional spy thriller "Zero Day: China's Cyber Wars" which explores the national security issue of Cyberwarfare against the Homeland.Find our more about (Terry) T.L. Williams at http://www.tl-williams.com/.
 
P
Podcast – Software Engineering Daily
 
Airbnb is a company that is driven by design. New user interfaces are dreamed up by designers and implemented for web, iOS, and Android. This implementation process takes a lot of resources, but it used to take even more before the company started using React Native. React Native allows Airbnb to reuse components effectively. React Native works ...…
 
J
JavaScript – Software Engineering Daily
 
Airbnb is a company that is driven by design. New user interfaces are dreamed up by designers and implemented for web, iOS, and Android. This implementation process takes a lot of resources, but it used to take even more before the company started using React Native. React Native allows Airbnb to reuse components effectively. React Native works ...…
 
President Donald Trump Speech in Poland - Rush Limbaugh said one of the best Presidential Speeches of all time A Reaganesque speech, you will not hear this on the Drive By FAKE NEWS, but you can here it here. President Donald Trump delivers a speech at Krasinski Square at the Royal Castle, Thursday, July 6, 2017, in Warsaw, Poland. By ROGER KIM ...…
 
In this episode we discuss the inevitable technology shifts that will be impacting our future, the second industrial revolution, the importance of having an open mind, critical thinking and seeking disconfirming evidence, we explore how to ask better questions (and why it’s so important that you do), and talk about some of the biggest technolog ...…
 
Phil Edwards, Andy Blume and Daniel Olivares are back in the studio with this week's look at all things Geek. Special Guest: Jessica Reesby. Show Notes: http://geeksinterrupted.fm/204 Questions, Comments, Feedback and Suggestions are all welcome. Website - http://geeksinterrupted.fm Facebook - https://facebook.com/GeeksInterrupted Twitter - htt ...…
 
In today's podcast we hear that the current Petya/Nyetya/NotPetya outbreak down deep doesn't look like ransomware, but a wiper, and a nasty one at that—probably a cyber warfare campaign. How are these three things alike: shipping, manufacturing, and Big Law? The ShadowBrokers are back, and WikiLeaks' Vault7 disgorges what looks like a creepy st ...…
 
It's the last episode of our first season! We're taking a break for a few weeks to prepare a bigger, better, shinier second season of In Tech Today. In the meantime, we discuss the Petya cyberattack this week, which brough Ukraine and much of Europe to its knees. What was it, how did it spread, and where did it come from? We also ask if cyberwa ...…
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login