Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
An open show powered by community LINUX Unplugged takes the best attributes of open collaboration and turns it into a weekly show about Linux.
…
continue reading
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
Windows Weekly is about more than Windows. Veteran Microsoft insiders Paul Thurrott and Richard Campbell join Leo for a deep dive into the most valuable company in the world. From consumer to enterprise, AI to Xbox, Windows Weekly is the only Microsoft podcast you'll ever need. Records live every Wednesday at 2:00pm Eastern / 11:00am Pacific / 18:00 UTC.
…
continue reading
The talk of the Apple Community
…
continue reading
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
…
continue reading
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
The Future of Security Operations Podcast is dedicated to empowering SecOps leaders to reimagine how their teams work so they can scale their security efforts and build a team that achieves more with less.
…
continue reading

1
Nightlife Security Podcast | The Nightlife and Bar Security Resource for Security Professionals, Owners, & Operators
Nightlife Security Consultants, LLC
The Nightlife and Bar Security Industry Resource for Hospitality Security Professionals, Owners, & Operators - with Industry Expert Robert C. Smith & Host Manny Marquez.
…
continue reading
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android’s a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
…
continue reading
Interviews with Scholars of National Security about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
…
continue reading
The best-curated wisdom from founders, operators, & investors on executing at startups | Hosted by Roshan Cariappa | Head down, execute hard. 🔥 Millions of listeners seek out Bingepods (Ideabrew Studios Network content) every day. Get in touch with us to advertise, join the network or click listen to enjoy content by some of India's top audio creators. [email protected] Android | Apple
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
We Cover the Cyberspace.
…
continue reading
Interviews and fun with professionals, hackers, and everything in between.
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
…
continue reading
A podcast about all things energy, brought to you by the Australian Energy Market Operator.
…
continue reading
Welcome to covert actions and national security podcast. Welcome to covert and national security podcast. A podcast where we discuss a spectrum of activities concerning covert operations, intelligence, counterintelligence, unconventional warfare, assassination issues, espionage spy craft technology and more. Enter the operational world with Dr. Carlos
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton, Chuck Randolph, and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you sec ...
…
continue reading
The official podcast of the School of Advanced Military Studies, dedicated to bridging the gap between tactics and strategy through the study of operational art and the operational level of war.
…
continue reading
The Fragmented Podcast is the leading Android developer podcast started by Kaushik Gopal & Donn Felker. Our goal is to help you become a better Android Developer through conversation & to capture the zeitgeist of Android development. We chat about topics such as Testing, Dependency Injection, Patterns and Practices, useful libraries, and much more. We will also be interviewing some of the top developers out there. Subscribe now and join us on the journey of becoming a better Android Developer.
…
continue reading

1
All Things Secured | Online Privacy & Security on Odysee
All Things Secured | Online Privacy & Security
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
…
continue reading
Join the brightest SolarWinds minds and IT industry influencers, as they cut through the jargon and give you the tools you need to grow and keep your tech knowledge razor-sharp. Come with questions—leave with actionable steps and practical insights. Have ideas for future episodes or topics? Tweet us @ SolarWinds using #TechPod.
…
continue reading
🎙️ Welcome to the Microsoft Intune and Security Report Podcast🎙️ — your essential stop for the latest in Windows and Edge security! This podcast is designed to be a time-saving powerhouse, distilling the most critical updates, new features, and emerging vulnerabilities from multiple trusted sources into one convenient, ready-to-reference report. Each week, we dig deep into the data to give you a concise, actionable rundown on the security landscape, helping you stay one step ahead. So whethe ...
…
continue reading
An improved audio format version of our written content. Get your defence and security perspectives now through this podcast.
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
UNFILTERED ANSWERS TO THE QUESTIONS YOU’VE BEEN AFRAID TO ASK Dom Raso is a veteran SEAL Team Six / DEVGRU Operator, tactical and gear expert, entrepreneur, man of deep faith, father, and husband. More than a decade in military special operations, multiple combat deployments, and years as CEO of Dynamis Alliance have given him a unique perspective on tactics, personal security, fatherhood, faith – and everything in between. On each episode, Dom is asked questions from people around the world ...
…
continue reading
Cyber Security & Physical Security and Safety Information, Products and Technologies
…
continue reading
Want a peak behind the curtain into one of the best places to work in cybersecurity and the minds of the innovators behind the industry’s leading security operations platform? Tune in to The Howler podcast! Hosted by Chelsea Lowman, People Experience Specialist, and Mary Newville, People Experience Senior Manager, the culture duo connects with pack leaders on leadership insights, mental health and overall wellbeing, and how they lead their teams to advance our mission of ending cyber risk.
…
continue reading
EBC Home Hints was setup for all homeowners and buyers. The idea is to provide detailed information on home maintenance. Protect your largest investment.
…
continue reading
Historical True Crime — assassins, gangsters, mobsters and lawmen; manhunts, scandals and unexplained phenomena. Stories of the wildest and darkest chapters of America's past.
…
continue reading
Join hosts Ned Bellavance and Kyler Middleton as they dive deep into the challenges of DevOps from the perspective of seasoned practitioners. You'll hear from expert guests—technical leaders, trainers, and consultants with years of hands-on experience—discussing the nuances of DevOps. From AWS to Azure, networking to security, automation to modern cloud environments, each weekly episode equips you with the insights to confidently address tech and business challenges such as resilience, cost ...
…
continue reading
"Building the Base" - an in-depth series of conversations with top entrepreneurs, innovators, and leaders from tech, financial, industrial, and public sectors. Our special guests provide their unique perspectives on a broad selection of topics such as: shaping our future national security industrial base, the impact of disruptive technologies, how new startups can increasingly contribute to national security, and practical tips on leadership and personal development whether in government or ...
…
continue reading

1
GitLab’s CISO Josh Lemos on the pros and cons of making security practices public
47:50
47:50
Play later
Play later
Lists
Like
Liked
47:50In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Josh Lemos, CISO at GitLab. Throughout his 15-year career in security, Josh has led teams at ServiceNow, Cylance, and Square. Known for his expertise in AI-driven security strategies, Josh is also a board member with HiddenLayer. He drives innovation at GitLab …
…
continue reading

1
Ep. 029 Hospitality Security Customer Service
29:16
29:16
Play later
Play later
Lists
Like
Liked
29:16In this episode of the Nightlife Security Podcast, host Manny Marquez and Dr. Richard Bistline discuss the critical role of customer service in security operations. They explore how security personnel can enhance guest experiences by shifting from a traditional "command and control" approach to a more welcoming, proactive strategy. The conversation…
…
continue reading
By Circle Of Insight Productions
…
continue reading

1
Lazarus Strikes Again: Inside Operation SyncHole and the 1-Day Exploitation Crisis
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49In this episode, we break down the most urgent cybersecurity developments from late April 2025—including the Lazarus Group’s high-profile “Operation SyncHole” targeting South Korean industries. Discover how attackers are exploiting newly disclosed vulnerabilities faster than ever, with nearly 1 in 3 CVEs weaponized within 24 hours of publication. W…
…
continue reading

1
How to Streamline IT Operations and Enhance Security with RMM and Automation
37:26
37:26
Play later
Play later
Lists
Like
Liked
37:26Remote Monitoring and Management (RMM) solutions are quite ambitious, promising to identify the issues before they have a chance to impact your IT operations. “A good RMM offers a combination of tools for you to do this properly,” stated Elias Moura, the Head of Product Marketing at Pulseway. “You have automation to enable auto-remediation, built-i…
…
continue reading

1
the TRUTH behind how Data Brokers operate
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49Learn the secrets behind how data brokers work in this deep dive conversation between Josh and DeleteMe CEO Rob Shavell. Your data is being collected and sold without your consent and often without your knowledge. How is this possible and what can you do about it? Get 20% off DeleteMe: https://www.joindeleteme.com/allthingssecured ▶ My Experience U…
…
continue reading

1
Risky Business #789 -- Apple's AirPlay vulns are surprisingly awful
1:02:31
1:02:31
Play later
Play later
Lists
Like
Liked
1:02:31On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: British retail stalwart Marks & Spencer gets cybered South Korean telco sets out to replace all its subscriber SIMs after (we assume) it lost the keymat It’s a good exploit week! Bugs in Apple Airplay, SAP webservers, Erlang SSH and CommVault backups Juice jack…
…
continue reading
Introduction President Donald Trump's attempt to end the war in Ukraine continues, but for how much longer? He has recently stated that his patience is wearing thin. Even if a meaningful ceasefire materialises, the extent to which the U.S. might provide security guarantees is still unknown. One thing that appears to be clear is that European nation…
…
continue reading

1
Embracing Change in Corporate Security: Strategies for Modernization with Ryan Schonfeld of HiveWatch
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52On this episode of the Ontic Connected Intelligence Podcast, Ryan Schoenfeld explores his transition from law enforcement to founding Hivewatch, sharing insights into modernizing corporate security operations and integrating cutting-edge technology like AI. His conversation with host Manish Mehta uncovers the challenges of transitioning from public…
…
continue reading

1
42. Putin’s Minions: The Master in Moscow (Ep 2)
39:11
39:11
Play later
Play later
Lists
Like
Liked
39:11The game is afoot, and the stakes are higher than ever. Who was the real villain in the Minions spy saga? How did a fintech tycoon become a key player in Russian espionage? And what does this case reveal about the Kremlin's increasingly brazen tactics? As the story of the Bulgarian spy ring unfolds, a web of deception and international intrigue eme…
…
continue reading
The April 2025 update highlights new content from the NAB Show and recognition as a top computer podcast by MillionPodcasts. Upcoming plans include the Road to Macstock event and possible reductions in presence on lesser-used social media platforms. Show Notes: Links: Best 40 Computer Podcasts (MacVoices came in #5!) https://www.millionpodcasts.com…
…
continue reading

1
The Silent Majority: Why 51% of Internet Traffic Is Now Bots
13:03
13:03
Play later
Play later
Lists
Like
Liked
13:03The bots have taken over—and they’re not just crawling your website. In this episode, we dig into the alarming reality that automated bots now generate over half of all internet traffic. Armed with artificial intelligence and cloaked in residential proxies, these bots are evolving beyond simple scripts into highly evasive, persistent threats target…
…
continue reading

1
MacVoices #25122: NAB Show - Saramonic's New Ultra Mic System
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12At NAB Show 2025, Saramonic introduced the Ultra 2.4 GHz wireless audio system, featuring 32-bit float recording, time code synchronization, IPX5 water resistance, and wide device compatibility. The Ultra offers exceptional range, direct app and touchscreen control, and camera presets, and optional Sony MI Shoe support for seamless digital audio. J…
…
continue reading

1
From 1,382 to 4 Million: What VeriSource Didn’t Know (or Say)
9:02
9:02
Play later
Play later
Lists
Like
Liked
9:02In this episode, we investigate the massive data breach at VeriSource Services, Inc. (VSI), a Houston-based HR outsourcing and employee benefits administrator. Initially reported as affecting fewer than 2,000 individuals, the breach has now ballooned to a confirmed 4 million affected people. We trace the timeline from the initial detection of suspi…
…
continue reading
Trump’s shutdown of Russian war crimes investigations is the focus of former US Ambassador-at-large Stephen Rapp and SpyTalk host Michael Isikoff. Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Michael Isikoff on Twitter: https://twitter.com/isikoff Follow SpyTalk on Twitter: https://twitter.com/talk_spy Subscribe to SpyTalk on …
…
continue reading

1
Actively Exploited: Commvault Web Shells, Active! mail RCE, and Brocade Code Injection Now in KEV
17:21
17:21
Play later
Play later
Lists
Like
Liked
17:21Three actively exploited vulnerabilities—CVE-2025-42599 (Qualitia Active! mail), CVE-2025-3928 (Commvault Web Server), and CVE-2025-1976 (Broadcom Brocade Fabric OS)—have been added to CISA’s KEV catalog. The Qualitia flaw is a remote stack-based buffer overflow (CVSS 9.8) allowing code execution without authentication. Commvault's vulnerability pe…
…
continue reading

1
Shaun Walker, "The Illegals: Russia's Most Audacious Spies and Their Century-Long Mission to Infiltrate the West" (Knopf, 2025)
1:00:13
1:00:13
Play later
Play later
Lists
Like
Liked
1:00:13Shaun Walker, The Illegals (Knopf, 2025) is the definitive history of Russia’s most secret spy program, from the earliest days of the Soviet Union to Putin’s invasion of Ukraine, and a revelatory examination of how that hidden history shaped both Russia and the West. More than a century ago, the new Bolshevik government began sending Soviet citizen…
…
continue reading

1
Supply Chains Win Wars: Rare Earth Magnets with John Maslin, CEO Vulcan Elements
25:29
25:29
Play later
Play later
Lists
Like
Liked
25:29In this episode of Building the Base, Hondo Geurts and Lauren Bedula sit down with John Maslin, Co-founder and CEO of Vulcan Elements, for an insightful conversation about the critical importance of rare earth magnets to U.S. national security. Drawing from his background as a Navy Supply Corps officer and his entrepreneurial journey, Maslin offers…
…
continue reading

1
MacVoices #25121: Live! - Meta Vs. Apple Intelligence, Google Declared Monopoly...Again, Synology’s New Requirements
36:02
36:02
Play later
Play later
Lists
Like
Liked
36:02Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Eric Bolden, and Marty Jencius discuss discuss Meta blocking Apple Intelligence on iOS apps, raising concerns about AI platform restrictions and user privacy. The panel examines Google’s repeated monopoly rulings, its dominance in ad tech, and AI partnerships. Synology’s new policy requiring bra…
…
continue reading

1
Hard-Coded Havoc: The Fatal Flaws in Planet’s Network Devices
11:39
11:39
Play later
Play later
Lists
Like
Liked
11:39A wave of critical vulnerabilities in Planet Technology’s industrial switches and network management systems could let attackers hijack devices, steal data, and sabotage industrial networks—with no credentials required. In this urgent episode, we dissect: 🔓 The 5 worst flaws (CVSS 9.3+)—from hard-coded database passwords to pre-auth command injecti…
…
continue reading

1
Craft CMS Crisis: The 10.0-Rated RCE Flaw Every Developer Must Patch Now
14:51
14:51
Play later
Play later
Lists
Like
Liked
14:51A critical, actively exploited vulnerability (CVE-2025-32432) is wreaking havoc on Craft CMS—allowing attackers to execute arbitrary PHP code on unpatched servers with no authentication required. In this urgent episode, we break down: 💥 Why this flaw scores a perfect 10.0 CVSS—the highest severity rating possible. 🔍 How hackers are exploiting it: F…
…
continue reading

1
Policy Puppetry: How a Single Prompt Can Trick ChatGPT, Gemini & More Into Revealing Secrets
12:44
12:44
Play later
Play later
Lists
Like
Liked
12:44Recent research by HiddenLayer has uncovered a shocking new AI vulnerability—dubbed the "Policy Puppetry Attack"—that can bypass safety guardrails in all major LLMs, including ChatGPT, Gemini, Claude, and more. In this episode, we dive deep into: 🔓 How a single, cleverly crafted prompt can trick AI into generating harmful content—from bomb-making g…
…
continue reading

1
From Peacetime to Wartime: Is Your Cloud Secure?
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52Is your organisation still relying on outdated “peacetime” security solution strategies in the face of rapidly evolving cloud threats? Host Brad LaPorte explores answering this question with guest Ory Segal, Technical Evangelist of Cortex Cloud, Palo Alto Networks. They discuss how the dynamic nature of modern cloud environments and increasing adop…
…
continue reading

1
Bonus Episode - Pack Gives Back Ambassador Roundtable
51:22
51:22
Play later
Play later
Lists
Like
Liked
51:22In this bonus episode, pack members from around the globe share their motivation in becoming Pack Gives Back Ambassadors and why giving back is important to them along with some of the initiatives they've led for their regions so far! Interested in running with the pack? Explore careers at Arctic Wolf—one of the fastest-growing and exciting cyberse…
…
continue reading

1
Snake Oilers: LimaCharlie, Honeywell Cyber Insights, CobaltStrike and Outflank
38:50
38:50
Play later
Play later
Lists
Like
Liked
38:50In this edition of the Snake Oilers podcast, three sponsors come along to pitch their products: LimaCharlie: A public cloud for SecOps Honeywell Cyber Insights: An OT security/discovery solution Fortra’s CobaltStrike and Outflank: Security tooling for red teamers This episode is also available on Youtube. Show notes…
…
continue reading

1
612: 25 Years of LinuxFest Northwest
1:06:30
1:06:30
Play later
Play later
Lists
Like
Liked
1:06:30We're live from LinuxFest Northwest 2025. We're joined by guests from the audience, try our hand at Linux trivia and share our experiences from the best fest in the West. Sponsored By: Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Manage…
…
continue reading

1
41. Putin’s Minions: How Russia Spies (Ep 1)
37:45
37:45
Play later
Play later
Lists
Like
Liked
37:45What do a fading seaside hotel, a self-proclaimed Q, and an eyelash champion have in common? They're all part of a bizarre Russian spy ring operating in the UK. But beneath the absurdity lies a serious threat. What were these "Minions" really up to? And how close did they come to compromising Western security? This is the story of a group of Bulgar…
…
continue reading

1
MacVoices #25120: Live! - Tim Cook's Influence, Apple's Sports App, Meta's Redaction Fail
25:04
25:04
Play later
Play later
Lists
Like
Liked
25:04The panel of Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Marty Jencius, and Eric Bolden discuss Tim Cook’s strategic influence in securing tariff exemptions, highlighting his low-key leadership style focused on Apple’s interests. They explore updates to Apple’s Sports app, praising its clean interface and new sharing features. The convers…
…
continue reading

1
TNO026: Gain Confidence in AI for NetOps with Juniper Networks (Sponsored)
53:58
53:58
Play later
Play later
Lists
Like
Liked
53:58Confidence in a new technology is one of the greatest barriers to adoption of that technology. If you don’t believe it will improve your NetOps, why would you adopt it? This is especially true of AI products. On today’s show, we’re joined by Bob Friday, Chief AI Officer of Mist/Juniper to make the case for... Read more »…
…
continue reading
Former CIA officer Frank Snepp shares a stunning spy story of the Vietnam War’s chaotic end with host Jeff Stein Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Michael Isikoff on Twitter: https://twitter.com/isikoff Follow SpyTalk on Twitter: https://twitter.com/talk_spy Subscribe to SpyTalk on Substack https://www.spytalk.co/ T…
…
continue reading

1
OAuth Phishing and Microsoft 365: The Hidden Threats SMBs Can't Ignore
13:54
13:54
Play later
Play later
Lists
Like
Liked
13:54In this episode, we dissect the real-world challenges of securing Microsoft 365 environments—especially for small and medium-sized businesses—amid rising threats and licensing limitations. From Reddit frustrations to official Microsoft documentation, we explore the harsh truth: many essential security features, like alerting on suspicious logins, r…
…
continue reading
Welcome to EBC Home Hints. I have created these podcasts to help all homeowners understand your home and how to maintain it. Welcome.By Paul Rochette
…
continue reading

1
115 - Gemini in Android Studio, Enhancing Safety and Security, and more!
10:18
10:18
Play later
Play later
Lists
Like
Liked
10:18Welcome to Now in Android, your ongoing guide to what's new and notable in the world of Android development. In this episode, we’ll cover Android 16 beta 3, Gemini in Android Studio for Business and Multimodal, Android XR, Media and Camera updates, and much more. Resources: Samsung's One UI 7 → https://goo.gle/42Ubuvv Quality Tiers → https://goo.gl…
…
continue reading

1
Why Outlook Is Eating Your CPU — And What Microsoft Says About It
12:17
12:17
Play later
Play later
Lists
Like
Liked
12:17Microsoft has acknowledged a serious issue affecting users of classic Outlook for Windows: CPU usage spikes up to 50% just from typing emails. First appearing in builds released since November 2024, this bug is now hitting users across several update channels—including Current, Monthly Enterprise, and Insider—leading to power drain, sluggish perfor…
…
continue reading
Apple hit with important security updates last week - we’ll tell you a bit about those. Also - we’ll look at simple steps for protecting your privacy on your Mac. First though - how does one hack a crosswalk? It’s way easier than it should be. We’ll tell you more on this edition of The Checklist, brought to you by SecureMac. Check out our show note…
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses hybrid multi-cloud networking strategy.By Enterprise Management Associates + APMdigest
…
continue reading

1
MacVoices #25119: NAB Show - DJI's Latest Gimbles and Mic System
20:53
20:53
Play later
Play later
Lists
Like
Liked
20:53At NAB Show 2025, Donovan Davis, Product Specialist for Osmo for DJI showcases the Osmo Mobile 7 gamble with a new tracking module that works with any app, built-in tripod, lighting controls, and 10-hour battery life. The DJI Mic Mini offers compact wireless audio with Bluetooth and receiver options. The RS-4 Mini gimbal supports both smartphones a…
…
continue reading

1
Trojan Map App: Spyware Targets Russian Soldiers via Alpine Quest
9:14
9:14
Play later
Play later
Lists
Like
Liked
9:14A newly discovered Android spyware campaign is targeting Russian military personnel by weaponizing a popular mapping app. Disguised as a cracked version of Alpine Quest Pro, this trojanized app delivers Android.Spy.1292.origin—a powerful surveillance tool that steals data, tracks location in real-time, and downloads secondary payloads to extract co…
…
continue reading

1
Blue Shield Breach: 4.7 Million Health Records Leaked via Google Analytics
8:47
8:47
Play later
Play later
Lists
Like
Liked
8:47Blue Shield of California has confirmed a data breach affecting 4.7 million members—caused not by hackers, but by a misconfigured Google Analytics setup. Sensitive health information was inadvertently exposed to Google’s ad platforms between April 2021 and January 2024. In this episode, we break down what went wrong, what data was leaked, and what …
…
continue reading

1
$16.6 Billion Lost: The True Cost of Cybercrime in America
8:48
8:48
Play later
Play later
Lists
Like
Liked
8:48Cybercrime in the U.S. has reached new, record-breaking heights. In this episode, we dive deep into the FBI's 2024 Internet Crime Complaint Center (IC3) report — a comprehensive look at the economic and human toll of cybercrime in America. With $16.6 billion in reported losses, a 33% increase year-over-year, and 859,532 complaints filed, the data p…
…
continue reading

1
Telegram Exposed: The Super App Enabling Cyber Crime
53:28
53:28
Play later
Play later
Lists
Like
Liked
53:28In episode 36, Josh welcomes renowned intelligence systems expert Stephen Arnold to shine a light on one of the most underestimated threats in cybersecurity today—Telegram. Known to most as a simple messaging app, Telegram is quietly operating as a “super app” for cyber crime. From crypto laundering and hamster games masking gambling platforms, to …
…
continue reading

1
WW 929: The Blue Screen of Soup - Agent Store, Oblivion Remastered, Ubuntu 25.04
2:17:50
2:17:50
Play later
Play later
Lists
Like
Liked
2:17:50It's Week D, do you know where your preview update is? 23H2 is out - 24H2, not so much! No surprises in the new features list, but are more new features on the way? Windows New text actions in Click to Do - Practice in Reading Coach and Read with Immersive Reader - in Dev and Beta (24H2) Find cloud-based (OneDrive-based) photos using Semantic searc…
…
continue reading

1
MacVoices #25118: TV+ Talk - TV+ Talk Is Back!
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Apple TV+ earns two Peabody nominations for powerful documentaries “Bread and Roses” and “The Last of the Sea Women,” but hosts Chuck Joiner and Charlotte Henry express frustration over Apple’s poor promotion of its content. They praise Apple’s overall documentary quality yet note how many shows go under the radar. The conversation also covers the …
…
continue reading

1
AI explained: Introduction to Reed Smith's AI Glossary
14:56
14:56
Play later
Play later
Lists
Like
Liked
14:56Have you ever found yourself in a perplexing situation because of a lack of common understanding of key AI concepts? You're not alone. In this episode of "AI explained," we delve into Reed Smith's new Glossary of AI Terms with Reed Smith guests Richard Robbins, director of applied artificial intelligence, and Marcin Krieger, records and e-discovery…
…
continue reading