Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Daily analysis of the biggest global security developments, brought to you by military specialists and The Times' renowned foreign correspondents. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
WAR ROOM: Pandemic is the first and most comprehensive program to bring the most up to the minute information on the news of the day. Stephen K. Bannon brings medical experts, politicians, business leaders, and those on the front lines for a comprehensive look at the latest news from all and provide their insider insights.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
…
continue reading
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading
We Cover the Cyberspace.
…
continue reading
The Financial Times takes you into the corridors of power to unwrap, analyse and debate British politics with a regular lineup of FT correspondents and informed commentators. New episodes available every Friday. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Podcast by Alex Wood & Robb Reck
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
Across the world, from Europe to Asia, the Americas to the Middle East, tensions are rising between nation states. Traditional alliances and alignments are constantly evolving in the 21st century. An understanding of defence and security policy and the tides of political, social and economic changes is crucial for any informed understanding of our world. 2024 sees war in Europe and Israel, and elections in major economies, including the US, the UK, Taiwan, South Africa, and many others. Insu ...
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
Journalists Carole Cadwalladr and Peter Jukes – with the help of Conservative party whistleblower Sergei Cristo – expose an alleged secret spy ring operating at the very heart of the British political system. This is the untold story of the most audacious Russian influence operation in British history. It involves honey traps, Russian agents and information warfare. Russian wealth and glamour collide with a wild west of new digital landscapes. And as Sergei tries and fails to raise the alarm ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
"Humanizing cybersecurity with candid tales from cyberspace and beyond!" Voices of the Vigilant builds and shares knowledge by engaging with diverse voices and perspectives within the cybersecurity industry.
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
Your dose of tips about all things Information Security, ICT Legislation and Risk. South African podcast.
…
continue reading
Everything seems to be accelerating: geopolitics, technology, security threats, the dispersal of information. At times, it feels like a blur. But beneath the dizzying proliferation of events, discoveries, there are deeper trends that can be grasped and understood through conversation and debate. That’s the idea behind Stop the World, the Australian Strategic Policy Institute’s podcast on international affairs and security. Each week, we cast a freeze-frame around the blur of events and bring ...
…
continue reading
The DSR Daily is a daily news podcast cover the foreign policy and national security news. Each weekday morning, Riley Fessler, Minnah Stein, and David Rothkopf will bring you the latest as covered by the best media outlets from around the world. See acast.com/privacy for privacy and opt-out information.
…
continue reading

1
The CVE Saga - Talkin’ Bout [infosec] News 2025-04-21
58:29
58:29
Play later
Play later
Lists
Like
Liked
58:29Register for upcoming webcasts & summits - https://poweredbybhis.com 00:00 - PreShow Banter™ — A Monocle and a Glass of Wine 05:36 - The CVE Saga - Talkin’ Bout [infosec] News 2025-04-21 06:43 - Story # 1: US agency extends support for cyber vulnerability database 29:08 - Story # 1b: CVE Foundation 32:35 - Story # 2: Former cybersecurity agency chi…
…
continue reading

1
Unsecurity Episode 237: HERoic Hacks Recap w/ Melissa Kjendle
32:36
32:36
Play later
Play later
Lists
Like
Liked
32:36In this episode of the Unsecurity Podcast, hosts Brad Nigh and Megan Larkins are joined by Melissa Kjendle, Assessor Manager at FRSecure, to recap our recent HERoic Hacks event. Melissa spoke at the event, highlighting the significance of inclusive and diverse perspectives in cybersecurity—particularly focusing on the growing role of women in the f…
…
continue reading

1
S34 Ep1: Threat Horizon 2027: Grasping for Control
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12Today, Steve talks about ISF's flagship foresight report "Threat Horizon 2027: Grasping for Control." In a world defined by disruption and acceleration, this report offers not just a forecast of cyber threats, but a blueprint for resilience, and Steve walks listeners through the key themes. Key Takeaways: 1 Flexibility will be key in an increasingl…
…
continue reading
WarRoom Battleground EP 756: CCP's Ties With Elite EducationBy WarRoom.org
…
continue reading

1
Episode 4446: Truckers Celebrate President Trump’s EO Protecting English-Speaking Truckers, India’s Role In Defeating The CCP
Episode 4446: Truckers Celebrate President Trump’s EO Protecting English-Speaking Truckers, India’s Role In Defeating The CCPBy WarRoom.org
…
continue reading

1
Defensive Security Podcast Episode 304
1:02:48
1:02:48
Play later
Play later
Lists
Like
Liked
1:02:48In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss the latest trends in cybersecurity, focusing on the rise of BEC scams and the significant losses attributed to cybercrime in 2024. They explore emerging threats, including social engineering tactics and hardware vulnerabilities, particularly in management i…
…
continue reading
Episode 4445: The Elite Watch As You Flounder Financially; Electrical Blackout In EuropeBy WarRoom.org
…
continue reading
Episode 4444: Canadian elections Kick Off Today; Trump Numbers Polling Like ObamaBy WarRoom.org
…
continue reading

1
Record global rearmament plus India-Pakistan war fears
44:35
44:35
Play later
Play later
Lists
Like
Liked
44:35Wherever you look, we’re living in a world of increasing conflict and tensions. That’s certainly the conclusion of the highly respected Stockholm International Peace Research Institute (SIPRI), which found an unprecedented rise in global military spending, the steepest increase since the end of the cold war. SIPRI senior researcher Diego Lopes da S…
…
continue reading

1
Craft CMS Crisis: The 10.0-Rated RCE Flaw Every Developer Must Patch Now
14:51
14:51
Play later
Play later
Lists
Like
Liked
14:51A critical, actively exploited vulnerability (CVE-2025-32432) is wreaking havoc on Craft CMS—allowing attackers to execute arbitrary PHP code on unpatched servers with no authentication required. In this urgent episode, we break down: 💥 Why this flaw scores a perfect 10.0 CVSS—the highest severity rating possible. 🔍 How hackers are exploiting it: F…
…
continue reading

1
Policy Puppetry: How a Single Prompt Can Trick ChatGPT, Gemini & More Into Revealing Secrets
12:44
12:44
Play later
Play later
Lists
Like
Liked
12:44Recent research by HiddenLayer has uncovered a shocking new AI vulnerability—dubbed the "Policy Puppetry Attack"—that can bypass safety guardrails in all major LLMs, including ChatGPT, Gemini, Claude, and more. In this episode, we dive deep into: 🔓 How a single, cleverly crafted prompt can trick AI into generating harmful content—from bomb-making g…
…
continue reading
On the DSR Daily for Monday, we discuss Election Day in Canada, the Kremlin announcing a 3 day ceasefire in May, Catholic cardinals choosing May 7th for the conclave, and more. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The DSR Network
…
continue reading
Let's Encrypt now offers certificates with 6-day lifetimes but what does that mean for the commercial TLS trust anchor world? On this episode of Security Noise, Geoff and Skyler are joined by Principal Security Consultant Justin Bollinger to discuss new options for certificate lifetimes and the implications of the new maximum ages, good and bad. Ab…
…
continue reading

1
Fall guy: Trump’s Russia deal is aimed at ousting Zelensky
10:01
10:01
Play later
Play later
Lists
Like
Liked
10:01Despite meeting Donald Trump in the Vatican at the Pope's funeral, Volodymyr Zelensky is resisting a US peace proposal issued as an ultimatum to Kyiv and Moscow. The Times' Diplomatic Editor Roger Boyes argues that Trump's desire for a victory lap before his 100th day in office is putting the Ukrainian president in an untenable position. The World …
…
continue reading

1
The Backbone of a Nation: Why Federal Work Matters
24:49
24:49
Play later
Play later
Lists
Like
Liked
24:49Mika Cross is a workplace expert known for her work in areas like government workforce innovation, flexible work environments, employee engagement, and talent management. She has held senior roles across federal agencies, including the U.S. Office of Personnel Management (OPM) and the Department of Labor. Mika often speaks about future of work tren…
…
continue reading

1
Lawfare Daily: The Trials of the Trump Administration, April 25
1:34:17
1:34:17
Play later
Play later
Lists
Like
Liked
1:34:17In a live conversation on April 25, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Senior Editors Anna Bower, Scott Anderson, and Roger Parloff, Lawfare Legal Fellow James Pearce, and Lawfare Contributor Preston Marquis to discuss the status of the civil litigation against President Trump’s executive actions, including the arrest of …
…
continue reading

1
SAP zero-day active, another OAuth exploit, cybersecurity CEO arrested
7:21
7:21
Play later
Play later
Lists
Like
Liked
7:21SAP zero-day vulnerability under widespread active exploitation Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts Cybersecurity firm CEO charged with installing malware on hospital systems Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity control…
…
continue reading

1
Snake Oilers: LimaCharlie, Honeywell Cyber Insights, CobaltStrike and Outflank
38:50
38:50
Play later
Play later
Lists
Like
Liked
38:50In this edition of the Snake Oilers podcast, three sponsors come along to pitch their products: LimaCharlie: A public cloud for SecOps Honeywell Cyber Insights: An OT security/discovery solution Fortra’s CobaltStrike and Outflank: Security tooling for red teamers This episode is also available on Youtube. Show notes…
…
continue reading

1
Snake Oilers: LimaCharlie, Honeywell Cyber Insights, CobaltStrike and Outflank
38:50
38:50
Play later
Play later
Lists
Like
Liked
38:50In this edition of the Snake Oilers podcast, three sponsors come along to pitch their products: LimaCharlie: A public cloud for SecOps Honeywell Cyber Insights: An OT security/discovery solution Fortra’s CobaltStrike and Outflank: Security tooling for red teamers This episode is also available on Youtube. Show notes…
…
continue reading

1
Frontline special - Professor Mark Galeotti
37:41
37:41
Play later
Play later
Lists
Like
Liked
37:41In this extended Frontline conversation writer and Russia analyst, Mark Galeotti, discusses the latest developments in the war in Ukraine. The World in 10 is the Times' daily podcast dedicated to global security. Expert analysis of war, diplomatic relations and cyber security from The Times' foreign correspondents and military specialists. Watch mo…
…
continue reading

1
Lawfare Archive: The Legislative Dog That Hasn’t Barked
48:01
48:01
Play later
Play later
Lists
Like
Liked
48:01From April 11, 2022: The period after Watergate and President Nixon's resignation saw an unprecedented barrage of congressional efforts at reforming the executive branch. The period after Donald Trump's departure from office has seen no comparable spree of legislative action—at least not yet. In a recent Lawfare article, Quinta Jurecic and Andrew K…
…
continue reading
Episode 4443: Special Coverage: The Funeral Of Pope Francis Cont.By WarRoom.org
…
continue reading
Episode 4442: Special Coverage: The Funeral Of Pope FrancisBy WarRoom.org
…
continue reading

1
Frontline special - Former British Army Officer Hamish De Bretton-Gordon (EXTENDED)
32:15
32:15
Play later
Play later
Lists
Like
Liked
32:15In this extended Frontline conversation, Former British Army Officer Hamish de Bretton-Gordon discusses the latest developments in the war in Ukraine. The World in 10 is the Times' daily podcast dedicated to global security. Expert analysis of war, diplomatic relations and cyber security from The Times' foreign correspondents and military specialis…
…
continue reading

1
Hackers Breach Morocco's Social Security Database in an Unprecedented Cyberattack...Ep.21
10:12
10:12
Play later
Play later
Lists
Like
Liked
10:12- Cybersecurity in South Africa: How The Cell C and SABS Attacks Could Have Been Prevented. - Hackers Breach Morocco’s Social Security Database in an Unprecedented Cyberattack. - Kaspersky Flags Surge in Cyber Threats Across Africa in The GITEX Africa April 2025 Conference. - Google Says "Fibre Optic Should Be Considered 'Critical Infrastructure' i…
…
continue reading

1
World-leaders in Cryptography: Jonathan Katz
1:01:14
1:01:14
Play later
Play later
Lists
Like
Liked
1:01:14Jonathan was a professor in the Department of Computer Science at the University of Maryland. He is now a Senior Staff Research Scientist at Google, with a core focus on cryptography and cybersecurity. Jonathan received his BS degree in mathematics and chemistry from MIT in 1996, and, in 2002, completed a PhD in computer science from Columbia Unive…
…
continue reading

1
Lawfare Archive: The Spymasters with Chris Whipple
52:02
52:02
Play later
Play later
Lists
Like
Liked
52:02From September 16, 2020: What is the proper relationship between the CIA director and the president? How should directors handle arguably illegal orders? How important is the director's role as the nation's honest broker of information during times of crisis? To get at these questions, David Priess sat down with Chris Whipple, a documentary filmmak…
…
continue reading
Episode 4441: CCP Infiltration In America; Truth Behind The Deportation NumbersBy WarRoom.org
…
continue reading
WarRoom Battleground EP 755: The Lords Of Easy Money Three Years LaterBy WarRoom.org
…
continue reading

1
Week in Review: Secure by Design departure, Microsoft’s security report, LLMs outrace vulnerabilities
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Bethany De Lude, CISO emeritus, The Carlyle Group Thanks to our show sponsor, Dropzone AI Alert investigation is eating up your security team’s day—30 to 40 minutes per alert adds up fast. Dropzone AI‘s SOC Analyst transforms this rea…
…
continue reading

1
7MS #672: Tales of Pentest Pwnage – Part 70
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07Today’s a fun tale of pentest pwnage where we leveraged a WinRM service ticket in combination with the shadow credentials attack, then connected to an important system using evil-winrm and make our getaway with some privileged Kerberos TGTs! I also share an (intentionally) vague story about a personal struggle I could use your thoughts/prayers/vibe…
…
continue reading

1
Lazarus Strikes Again: Inside Operation SyncHole and the 1-Day Exploitation Crisis
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49In this episode, we break down the most urgent cybersecurity developments from late April 2025—including the Lazarus Group’s high-profile “Operation SyncHole” targeting South Korean industries. Discover how attackers are exploiting newly disclosed vulnerabilities faster than ever, with nearly 1 in 3 CVEs weaponized within 24 hours of publication. W…
…
continue reading

1
Thomas Rid joins the show: AI consciousness, TP-Link's China connection, trust in hardware security
1:33:42
1:33:42
Play later
Play later
Lists
Like
Liked
1:33:42Three Buddy Problem - Episode 43: Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism. We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national s…
…
continue reading
Episode 4440: Empty Vatican; Meetings And Death In MoscowBy WarRoom.org
…
continue reading
Episode 4439: Trump Time Magazine Deal With It; Stopping The Hurricane Of SpenindigBy WarRoom.org
…
continue reading

1
OAuth Phishing and Microsoft 365: The Hidden Threats SMBs Can't Ignore
13:54
13:54
Play later
Play later
Lists
Like
Liked
13:54In this episode, we dissect the real-world challenges of securing Microsoft 365 environments—especially for small and medium-sized businesses—amid rising threats and licensing limitations. From Reddit frustrations to official Microsoft documentation, we explore the harsh truth: many essential security features, like alerting on suspicious logins, r…
…
continue reading

1
Witkoff lands in Moscow - a bomb goes off
10:26
10:26
Play later
Play later
Lists
Like
Liked
10:26As Donald Trump’s envoy Steve Witkoff arrives in Moscow for talks to end the war in Ukraine, a car bomb has killed a high-ranking Russian general, Yaroslav Moskalik. After a string of similar bombings during the course of the war, defence analyst Nick Drummond examines how it was possible, and whether this is a shift to a new guerrilla campaign by …
…
continue reading

1
Part 2: Solving the Top 10 Problems with Vulnerability Management
38:32
38:32
Play later
Play later
Lists
Like
Liked
38:32Once again, we're back with all the answers. Traditional vulnerability management comes with many pitfalls, and we're counting down the solutions to all the problems you might be running into. Ivanti's Chris Goettl and Robert Waters break down the back five on our list: a periodic approach to remediation, poor prioritization, lack of business conte…
…
continue reading

1
April 25: More Court Setbacks for Trump Admin
14:27
14:27
Play later
Play later
Lists
Like
Liked
14:27On the DSR Daily for Friday, we break down the mounting number of court setbacks for the administration, an investigation into ActBlue, Trump’s statement that “Crimea will stay with Russia,” and more. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The DSR Network
…
continue reading

1
Innovators in Cryptography and Blockchain: Maciej Zurawski
1:13:38
1:13:38
Play later
Play later
Lists
Like
Liked
1:13:38Maciej Zurawski is technology entrepreneur and blockchain specialist with over 25 years of experience in commercial software development, R&D and business leadership. He is currently the CEO at Redeem Technologies, and serves as the Executive Director of Blockchain Scotland - the principal industry association advancing commercial blockchain adopti…
…
continue reading

1
Reform on the march? Our local elections guide
39:51
39:51
Play later
Play later
Lists
Like
Liked
39:51Ahead of England’s local elections next week, the Political Fix team pick the races to watch and what’s at stake for the main parties, as voters head to the polls to elect 1,600-odd councillors, six mayors and one new MP. Host Lucy Fisher is joined by podcast regulars Miranda Green and Anna Gross, plus the FT’s Northern correspondent Jennifer Willi…
…
continue reading

1
Why Outlook Is Eating Your CPU — And What Microsoft Says About It
12:17
12:17
Play later
Play later
Lists
Like
Liked
12:17Microsoft has acknowledged a serious issue affecting users of classic Outlook for Windows: CPU usage spikes up to 50% just from typing emails. First appearing in builds released since November 2024, this bug is now hitting users across several update channels—including Current, Monthly Enterprise, and Insider—leading to power drain, sluggish perfor…
…
continue reading

1
Priviso Live Episode 32 The Cellphone Debate
11:27
11:27
Play later
Play later
Lists
Like
Liked
11:27Are you an Apple or Android fan? And which should you be, if you are concerned about security? Lyn and Stephen discuss. #Priviso #PrivisoLive #Security #InformationSecurity #iOS #AndroidBy Anthony Olivier
…
continue reading

1
Lawfare Daily: Cybersecurity Challenges and Opportunities
32:03
32:03
Play later
Play later
Lists
Like
Liked
32:03For today's episode, Lawfare Foreign Policy Editor Daniel Byman interviewed Michael Sulmeyer, who was the top Defense official for all aspects of cyber policy in the Biden administration. Sulmeyer discusses the cyber threat landscape, different roles and missions, how Artificial Intelligence might be leveraged, and the key role of allies in cyberde…
…
continue reading

1
Russian army map malware, edge tech attack report, Commvault flaw
8:12
8:12
Play later
Play later
Lists
Like
Liked
8:12Russian army targeted by Android malware hidden in mapping app Attackers hit security device defects hard in 2024 Critical Commvault Command Center flaw warning Huge thanks to our sponsor, Dropzone AI Alert investigation is eating up your security team's day—30 to 40 minutes per alert adds up fast. Dropzone AI's SOC Analyst transforms this reality …
…
continue reading

1
Priviso Live Episode 32: The Cellphone Debate
10:22
10:22
Play later
Play later
Lists
Like
Liked
10:22Are you Apple or Android? And which should you be, if you are concerned about security? Lyn and Stephen discuss. #Priviso #PrivisoLive #Security #InformationSecurity #iOS #AndroidBy Anthony Olivier
…
continue reading
Donald Trump's defence secretary Pete Hegseth shared classified information on an unsecured group chat - not once but twice, according to new details that emerged this week. But the real turbulence shaking the Pentagon isn’t just about loose digital lips. It’s deeper: a toxic mix of internal rivalries, leadership clashes, and a crumbling sense of m…
…
continue reading