Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
…
continue reading
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Stay up to date with the Go community in about 15 minutes per week
…
continue reading
Where we talk and discuss what the great firewall of China is, and the ethics of it Cover art photo provided by JJ Ying on Unsplash: https://unsplash.com/@jjying
…
continue reading
Training of Aria Technologies products including Ericsson-LG, Lancom Systems, Star Leaf, So Connect, Jabra, xmedius, Checkpoint, NBN, iPECS2Teams
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
A great WordPress.com site
…
continue reading
5 Bytes Podcast features some of the highlights in enterprise IT for the last week as well as some useful resources for IT Pros and more!
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
Hosted by planetary scientist and astrobiologist Dr. Michael L. Wong, Strange New Worlds examines science, technology, and culture through the lens of Star Trek!
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
David Bombal interviews people in the networking world to learn about life, hacks, technology and networking and ways to improve your life!
…
continue reading
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
Every Monday, Wednesday and Friday, Michael Boldin covers the original constitution, principles of the revolution, and strategy – all with an eye on advancing liberty.
…
continue reading
A weekly podcast about life, technology, entertainment, and business in general. Things in our focus: deep tech, mental health, community initiatives, artificial intelligence, blockchain, gaming and gambling, esports, augmented reality, virtual reality, marketing, creative thinking, fintech, and many more. The talks are hosted by Zoltan "Hawkie".
…
continue reading
The CCP’s Global Ambitions
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
Join Jason Esposito and Ben Cartland as they explore the deeper questions behind Jason's sermons at Crossway Church, a "community for the curious".
…
continue reading
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
…
continue reading
We are TheCyberSoul.io, a podcast and community of tech users in various industries sharing insights to the tech world and discussing real world topics in a hacked up world. We bring together tech enthusiasts from all backgrounds to share their experiences and expertise. Our platform is a place for real conversations about the ever-changing landscape of technology in today's world.
…
continue reading
Twice per month, Peter House and Mike Chmielewski discuss current cyberthreats and issues. Internet Weather Report is recorded at the studios of Big Cabbage Radio in Palmer, Alaska.
…
continue reading
Get the perspective you won't hear or read about anywhere else from Ohio Senate President Rob McColley. A weekly feature from "On The Record with The Ohio Senate-The Views, The News, Excludes."
…
continue reading
Red Dragon Menacing - Communism Exposed(Audio)
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading

1
Internet Outage Before Major Parade Suggests China Upgraded Firewall to Tighten Controls
4:05
4:05
Play later
Play later
Lists
Like
Liked
4:05
…
continue reading
In this episode of the podcast, the hosts discuss various topics related to cybersecurity, including the rise of deepfake technology and its implications for fraud, recent law enforcement actions against ransomware groups, and the importance of cybersecurity guidance for operational technology. They also share personal updates and reflections on th…
…
continue reading

1
SANS Stormcast Tuesday, August 19th, 2025: MFA Bombing; Cisco Firewall Management Vuln; F5 Access for Android Vuln;
5:10
5:10
Play later
Play later
Lists
Like
Liked
5:10Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Ce…
…
continue reading

1
SANS Stormcast Tuesday, August 19th, 2025: MFA Bombing; Cisco Firewall Management Vuln; F5 Access for Android Vuln; (#)
5:11
5:11
Play later
Play later
Lists
Like
Liked
5:11SANS Stormcast Tuesday, August 19th, 2025: MFA Bombing; Cisco Firewall Management Vuln; F5 Access for Android Vuln; Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by “bombing” users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosyst…
…
continue reading

1
NB539: Boom Times for Arista; SonicWall Offers $200K Firewall Warranty
31:03
31:03
Play later
Play later
Lists
Like
Liked
31:03Take a Network Break! We start with critical vulnerabilities in Cisco Secure Firewall Management Center and Fortinet’s FortiSIEM. On the news front, SonicWall announces Gen8 firewalls plus a $200,000 warranty for customers that sign on to SonicWall’s Managed Protection Security Suite. IBM Cloud suffers its fourth major outage since May of this year…
…
continue reading
Why don’t we have meaningful privacy laws in the US? While we haven’t been able to pass federal privacy legislation, many states have managed to pass laws protecting our data and establishing some basic privacy rights. Vermont House Representative Monique Priestley led a Herculean effort to pass privacy legislation in her state last year. While man…
…
continue reading

1
Cisco firewall warning, Colt Telecom cyberattack, CISA’s OT request
7:49
7:49
Play later
Play later
Lists
Like
Liked
7:49Cisco warns of maximum-severity defect in firewall software UK’s Colt Telecom suffers cyberattack CISA implores OT environments to lock down critical infrastructure Huge thanks to our sponsor, Conveyor Have you been personally victimized by portal security questionnaires? Conveyor is here to help. Endless clicks, bad navigation, and expanding quest…
…
continue reading

1
Romance of the Three Kingdoms Chapter 51: Kongming Outsmarts Zhou Yu - Round One
30:37
30:37
Play later
Play later
Lists
Like
Liked
30:37All Chapters
…
continue reading

1
Romance of the Three Kingdoms Chapter 51: Kongming Outsmarts Zhou Yu - Round One
30:37
30:37
Play later
Play later
Lists
Like
Liked
30:37All Chapters
…
continue reading

1
How Hollywood Alienated Middle America—And What’s Next | Nick Searcy
58:53
58:53
Play later
Play later
Lists
Like
Liked
58:53
…
continue reading

1
How Hollywood Alienated Middle America—And What’s Next | Nick Searcy
58:53
58:53
Play later
Play later
Lists
Like
Liked
58:53
…
continue reading
…
continue reading
…
continue reading

1
Trump Announces Federal Crime Crackdown Will Target Chicago Next After DC
3:37
3:37
Play later
Play later
Lists
Like
Liked
3:37
…
continue reading

1
Central Banks Do Not Prevent Financial Crises or Control Inflation
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34
…
continue reading

1
‘Godfather of AI’ Warns Superintelligent Machines Could Replace Humanity
4:22
4:22
Play later
Play later
Lists
Like
Liked
4:22
…
continue reading

1
Trump Announces Federal Crime Crackdown Will Target Chicago Next After DC
3:37
3:37
Play later
Play later
Lists
Like
Liked
3:37
…
continue reading

1
Chinese Woman Gets 15 Years for Role in Conspiracy to Import Drugs to US
5:02
5:02
Play later
Play later
Lists
Like
Liked
5:02
…
continue reading

1
Chinese Woman Gets 15 Years for Role in Conspiracy to Import Drugs to US
5:02
5:02
Play later
Play later
Lists
Like
Liked
5:02
…
continue reading

1
China Tightens Rare Earth Management With New Regulations
4:54
4:54
Play later
Play later
Lists
Like
Liked
4:54
…
continue reading
…
continue reading

1
Central Banks Do Not Prevent Financial Crises or Control Inflation
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34
…
continue reading
…
continue reading
…
continue reading

1
US Sanctions China Terminals, Hong Kong-Based Companies, Other Foreign Entities Over Iran Oil
3:25
3:25
Play later
Play later
Lists
Like
Liked
3:25
…
continue reading

1
China Tightens Rare Earth Management With New Regulations
4:54
4:54
Play later
Play later
Lists
Like
Liked
4:54
…
continue reading

1
‘Godfather of AI’ Warns Superintelligent Machines Could Replace Humanity
4:22
4:22
Play later
Play later
Lists
Like
Liked
4:22
…
continue reading

1
US Sanctions China Terminals, Hong Kong-Based Companies, Other Foreign Entities Over Iran Oil
3:25
3:25
Play later
Play later
Lists
Like
Liked
3:25
…
continue reading
…
continue reading
🥩 Meatspace 🇺🇸 Going to GopherCon in NYC? Meet other Cup'o'Gophers there! 🇺🇸 Interested in a SF meetup? Fill out the poll 🇷🇺 Let's GoConf, Sept 12 @ Moscow, Russia GopherJS 1.19 with generics released Interview with Grant Nelson, Episode 53 Proposals Accepted: x/tools/go/analysis/structtag: stricter JSON tag checking Previous mention: Episode 117 N…
…
continue reading

1
Beyond the smoke screen. [Research Saturday]
22:22
22:22
Play later
Play later
Lists
Like
Liked
22:22This week, we are joined by Dr. Renée Burton, VP of Infoblox Threat Intel, who is discussing their work on VexTrio, a notorious traffic distribution system (TDS) involved in digital fraud. The VexTrio investigation uncovers a massive global ad fraud and scam operation powered by just 250 virtual machines, tying it directly to named individuals and …
…
continue reading

1
Week in Review: Celebrating 5 years of Cyber Security Headlines
45:50
45:50
Play later
Play later
Lists
Like
Liked
45:50Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino. This is our milestone edition, celebrating five years of the daily Cyber Security Headlines news podcast. Our guests today will be the CSH reporters themselves, reflecting on some stories from this week as well as their favorite stories from th…
…
continue reading
The FTC warns one country’s “online safety” may be another’s “censorship.” A new bipartisan bill aims to reduce barriers to federal cyber jobs. MURKY PANDA targets government, technology, academia, legal, and professional services in North America. MITRE updates their hardware weaknesses list. Customs and Border Protection conducts a record number …
…
continue reading

1
HN793: A Deep Dive Into High-Performance Switch Memory
1:34:35
1:34:35
Play later
Play later
Lists
Like
Liked
1:34:35Today’s episode is all about high-performance memory in switches. We dig into the differences among TCAM, SRAM, DRAM, and HBM, and all the complex tradeoffs that go into allocating memory resources to networking functions. If you’ve ever had to select a Switching Database Manager template or done similar operations on a switch, this is your... Read…
…
continue reading

1
Senator Kyle Koehler Talks High Tech Manufacturing, Property Taxes, and Education Funding
28:57
28:57
Play later
Play later
Lists
Like
Liked
28:57Ohio is home to the high tech jobs of the future. From manufacturing to oil and gas to military applications, Senator Kyle Koehler joins the President's Podcast to talk about the bright future for people looking for quality careers. He also talks about the next step in the General Assembly's effort to reign-in property taxes.…
…
continue reading

1
TNO039: Demystifying AI Adoption for Networkers (Sponsored)
58:49
58:49
Play later
Play later
Lists
Like
Liked
58:49On today’s Total Network Operations we talk through the adoption of AI in network operations with John Capobianco, Head of DevRel at Selector. Selector is the sponsor of today’s episode. John walks us through his career journey as a network engineer, and describes the moment where he realized that AI was going to change how... Read more »…
…
continue reading