show episodes
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Geopolitics Decanted by Silverado

Silverado Policy Accelerator

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
  continue reading
 
Artwork
 
Musing On Society, Technology, and Cybersecurity | Hosted by Marco Ciappelli Let’s face it: the future is now. We live in a hybrid analog-digital society, and it’s time to stop ignoring the profound impact technology has on our lives. The line between the physical and virtual worlds? It’s no longer real — just a figment of our imagination. We’re constantly juggling convenience, privacy, freedom, security, and even the future of humanity in a precarious balancing act. There’s no better place ...
  continue reading
 
Artwork

1
Cybersecurity Where You Are (video)

Center for Internet Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
  continue reading
 
Artwork
 
Big Ideas. Simplified. Join the OrionX team and guests in lively discussions of trends and products that can impact your investment decisions and change the technology options you consider.
  continue reading
 
Artwork

1
Policy & Insights

ACCA Insights

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The latest research and opinion from ACCA’s Professional Insights. We explore the big issues impacting business, the accountancy profession and the evolving world of work. From technology to talent management, our subject matter experts and guests discuss good practice from across industries to help you stay ahead in business and your career.
  continue reading
 
Artwork

1
PANCast™

Palo Alto Networks - LIVEcommunity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Listen, Learn, Leverage! This Palo Alto Networks podcast offers insights to help you build knowledge, maximize investment, and improve your company’s cybersecurity posture.
  continue reading
 
Artwork

1
At The Boundary

Global and National Security Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
  continue reading
 
Artwork

1
Tech Policy From The Hill

Congressional Internet Caucus Academy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Congressional Internet Caucus Academy works to educate policymakers on critical Internet policy issues. With funding and logistical support from the Internet Education Foundation, the Internet Caucus Advisory Committee hosts regular debates to discuss important Internet policy issues. Since its founding, the Internet Caucus Advisory Committee has built a membership of over 200 organizations from a broad cross-section of the public interest community and the Internet industry. The Interne ...
  continue reading
 
Artwork

1
AsiaPulse

Asia Collective

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Elliott Danker hosts this Asia Collective podcast series where we take a look at what's behind the pulse of Asia right now. We discuss what governments and businesses are paying attention to around the world and especially in Asia and what businesses need to pay attention to when expanding in the region. Be a part of setting the rhythm in Asia For enquiries on collaborations and partnerships, email us at [email protected]
  continue reading
 
Artwork

1
To The Point - Cybersecurity

Forcepoint | Global Cybersecurity Leader | Security. Simplified.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
  continue reading
 
The Power of Digital Policy is a podcast that teaches you and your organization how to balance the risks and opportunities that come with operating websites, social media, mobile applications, voice assistants, AI and other channels. Through a monthly focus on individual topics, such as accessibility, cookies, copyrights, social media faux pas, data breaches, and data privacy, you will learn how to develop guardrails to maximize digital opportunity and minimize risk. Whether you work for a s ...
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork
 
Microsoft Vice Chair and President Brad Smith speaks with leaders in government, business, and culture to explore the world’s most critical challenges at the intersection of technology and society. As a 30-year veteran of an industry driven by disruption, Brad Smith hosts candid conversations with his guests that examine, reframe, and explore potential solutions to the digital issues shaping our world today, including cybersecurity, privacy, digital inclusion, environmental sustainability, a ...
  continue reading
 
Artwork

1
The Harvard EdCast

Harvard Graduate School of Education

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In the complex world of education, the Harvard EdCast keeps the focus simple: what makes a difference for learners, educators, parents, and our communities. The EdCast is a weekly podcast about the ideas that shape education, from early learning through college and career. We talk to teachers, researchers, policymakers, and leaders of schools and systems in the US and around the world — looking for positive approaches to the challenges and inequities in education. Through authentic conversat ...
  continue reading
 
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
  continue reading
 
Hosted by Meghna Chakrabarti, On Point is a unique, curiosity-driven combination of original reporting, newsmaker interviews, first-person stories, and in-depth analysis, making the world more intelligible and humane. When the world is more complicated than ever, we aim to make sense of it together. On Point is produced by WBUR.
  continue reading
 
Artwork

1
Mint Techcetra

Mint - HT Smartcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Mint Techcetra podcast is your navigator into the mesmerizing maze that is technology today. From decoding technologies, policies, enterprises, and legal decisions to sci-fi and pop culture, this podcast will cover it all. Every week hosts - Leslie D'Monte, Shouvik Das and Deepti Ahuja - will talk about important developments in tech and how they transform our lives, work and play as we know it. If you have any questions or suggestions you can reach out to the hosts on LinkedIn via their ...
  continue reading
 
Host David Brossard discusses the latest in fine-grained, policy-based authorization, and the latest developments and challenges enterprises face in their access control journey. Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect Axiomatics’ award ...
  continue reading
 
Artwork

1
Safety is Sexy

Matthew Soeth

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Online safety can be messy and nuanced, but it doesn’t mean our conversations about it need to be that way as well. Welcome to Safety is Sexy, a podcast that features content experts, technology experts, and researchers who are doing the work to create healthy online spaces. When it comes to improving online spaces, it takes all of us. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
The Canadian Podcow

Sarah Sache & Andrew Campbell

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Together, we are going to explore different issues related to the dairy industry. We will learn, understand and analyze all of this and share with you our perspective on the dairy industry, both here at home and around the world. We look forward to talking to you about all the issues that affect the industry, for example: we will analyze market trends and international trade, we will learn about new developments in research related to dairy production and dairy products, we are going to talk ...
  continue reading
 
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
  continue reading
 
Artwork

1
Cyber From The Start

Center for Strategic and International Studies

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Cyber from the Start podcast unveils the roots of today’s cybersecurity policies for critical infrastructure, surveillance, espionage, warfare and privacy. James A. Lewis interviews the people who helped lay the foundations for these policies before cybersecurity gained the mass attention it has today.
  continue reading
 
Your all in one comprehensive view of what is happening across the real estate industry -- straight from some of the industry's earliest technology adopters and foremost experts in Technology, Marketing, Government Policy, Brokerage, Capital, Construction & Cyber Security in Real Estate. The show is broken down into three parts: Part I: Introductions and what's new for each panelist and the business sector Part II: Sector Focus on the past month's most prominent news and paradigm shifts Part ...
  continue reading
 
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
  continue reading
 
Artwork

1
Caveat

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
  continue reading
 
Artwork

1
This Does Not Compute

Center for Strategic and International Studies

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This Does Not Compute features candid interviews with leaders and experts in the fields of cybersecurity, internet governance, space policy, intelligence, and other areas of technology policy.
  continue reading
 
Artwork

1
Live on Cyber

Dr. Stan Stahl and Julie Morris

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join SecureTheVillage founder and President Dr. Stan Stahl and thought leader Julie Morris as they riff on cybersecurity and privacy complexities, share actionable tips for businesses, boards, and a safer day-to-day digital experience.
  continue reading
 
Artwork

1
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
Ransomware, cyberwarfare, supply chain hacks—today’s headlines are full of dire warnings related to cybersecurity and digital transformation. But where are the solutions? LET’S CONVERGE is a podcast dedicated to exploring the ways top business and tech leaders are meeting today’s complex security challenges. Join thought leaders from Tanium, an industry innovator in security software, as they discuss the latest cyber trends and strategies with C-suite executives, CISOs, CIOs, and an array of ...
  continue reading
 
Artwork

1
Healthcare Strategies

Informa TechTarget

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A podcast for healthcare professionals seeking solutions to today’s and tomorrow’s top challenges. Hosted by the editors of Xtelligent Healthcare Media, this podcast series focuses on real-world use cases that are leading to tangible improvements in care quality, outcomes, and cost. Guests from leading provider, payer, government, and other organizations share their approaches to transforming healthcare in a meaningful and lasting way.
  continue reading
 
A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.
  continue reading
 
Loading …
show series
 
In episode 141 of Cybersecurity Where You Are, Tony Sager is joined by Phyllis Lee, VP of SBP Content Development at the Center for Internet Security®(CIS®); and Julie Haney, Computer Scientist & Human-Centered Cybersecurity Researcher at the National Institute of Standards and Technology (NIST). Together, they use a human-centered understanding of…
  continue reading
 
In our latest Trump session—a series of regular briefings exploring the impact of U.S. policy shifts on global business—our partners reveal how market participants are responding to developments—and how businesses and investors can succeed in this rapidly evolving environment.By A&O Shearman
  continue reading
 
Send us a text CRECo.ai Presents: The Real Estate Roundtable: Your all-in-one comprehensive view of what's happening across the real estate industry -- straight from some of the industry's earliest technology adopters and foremost experts. Join the Roundtable hosts as they discuss commercial market growth amid residential market slowdown, MLS chang…
  continue reading
 
Text the ATB Team! We'd love to hear from you! In this episode of At the Boundary, GNSI Senior Director Jim Cardoso speaks with Dr. Jeff Rogg, Senior Research Fellow at the Global and National Security Institute, about his new book The Spy in the State: The History of American Intelligence. Drawing on both history and current events, they explore t…
  continue reading
 
In a live conversation on June 27, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Legal Fellow James Pearce and Lawfare Senior Editors Anna Bower and Roger Parloff to discuss the Supreme Court’s ruling on nationwide injunctions in the birthright citizenship case, the whistleblower complaint about Emil Bove’s actions as deputy attorne…
  continue reading
 
Scattered Spider Update The threat actor known as Scattered Spider is in the news again, this time focusing on airlines. But the techniques used by Scattered Spider, social engineering, are still some of the most dangerous techniques used by various threat actors. https://cloud.google.com/blog/topics/threat-intelligence/unc3944-proactive-hardening-…
  continue reading
 
This week, we’re diving into the unseen battlefield of Machine Identity and AI Agent Security—as autonomous systems grow more powerful, securing their digital identities may be the next global security imperative. Elliott speaks with Gal Zror, Security Research Director, CyberArk They explore how identity-first security strategies must evolve to ac…
  continue reading
 
⸻ Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com _____________________________ This Episode’s Sponsors BlackCloak provides concierge cybersecurity protection to corporate executives and high-net-worth individuals to protect against hacking, reputational loss, financial loss, and the impacts of a corpora…
  continue reading
 
From March 19, 2020: What can the president do in a national emergency? What limits what the president can do? What authorizes the president to do all those things he can do in a national emergency? Is the president abusing, misusing, using appropriately, or under-using emergency powers during the coronavirus crisis? And what are the logical end po…
  continue reading
 
From December 5, 2015: The show this week features Natan Sachs, a Fellow in Foreign Policy at the Brookings Institution, who recently published an article in Foreign Affairs on anti-solutionism as strategy in the Israel-Palestine conflict. During his conversation with Lawfare Editor-in-Chief Ben Wittes, Sachs argues that the apparent absence of a l…
  continue reading
 
Lawfare Legal Fellow Mykhailo Soldatenko sits down with Eric Ciaramella, Senior Fellow at the Carnegie Endowment for International Peace, and Samuel Charap, Senior Political Scientist at Rand Corporation, to discuss the key issues in the Ukraine-Russia talks. They chat about the national interests of the interested parties, whether a negotiated set…
  continue reading
 
Open-VSX Flaw Puts Developers at Risk A flaw in the open-vsx extension marketplace could have let to the compromise of any extension offered by the marketplace. https://blog.koi.security/marketplace-takeover-how-we-couldve-taken-over-every-developer-using-a-vscode-fork-f0f8cf104d44 Bluetooth Vulnerability Could Allow Eavesdropping A vulnerability i…
  continue reading
 
NATO summits are usually dry and wonky affairs. This one was different. To unpack what was said, what wasn’t, and what actually matters, host Cliff May is joined by his FDD colleagues RADM (Ret.) Mark Montgomery and Bradley Bowman to discuss alliance politics, military power projection, strategic signaling, and more.…
  continue reading
 
This week, Scott sat down with his Lawfare colleagues Benjamin Wittes and Natalie Orpett, and University of Virginia School of Law professor Ashley Deeks, to talk through the week’s big national security news, including: “Bracing for Fallout.” In a surprise move, President Trump joined Israel’s military campaign against Iran over the weekend, using…
  continue reading
 
Text the ATB Team! We'd love to hear from you! In this urgent special episode of At the Boundary, GNSI Research Fellow Dr. Arman Mahmoudian offers in-depth, real-time analysis of the rapidly escalating conflict between Iran and Israel, which has now drawn in the United States. Following a U.S. and Israeli joint strike on Iran’s nuclear facilities, …
  continue reading
 
Most cybersecurity roadmaps don’t plan for 20-year-old firmware, but that’s the reality of operational technology (OT). In this episode, Cassie Crossley, Vice President of Supply Chain Security in the Global Cybersecurity & Product Security Office at Schneider Electric, offers a behind-the-scenes look at what it takes to secure industrial systems, …
  continue reading
 
Max Smeets, Co-Director of Virtual Routes and Senior Researcher at ETH Zurich, joins Lawfare’s Jonathan Cedarbaum and Justin Sherman to discuss his recently released book “Ransom War: How Cybercrime Became a Threat to National Security.” They discuss the history of ransomware (including the term itself), how the threats have evolved over the years,…
  continue reading
 
This week on Caveat, Dave and Ben sit down with Andy Boyd, former Director of the CIA’s Center for Cyber Intelligence (CCI) and now an operating partner at AE Industrial Partners, a private equity firm focused on national security and aerospace. With decades of experience leading cyber operations at one of the most secretive U.S. intelligence agenc…
  continue reading
 
"Are we entitled to have our jobs for a lifetime in the AI age?" That’s the question this week’s episode of Techcetra opens with, as Shouvik Das and Leslie D’Monte talks about the growing instability in Big Tech employment. They examine the troubling pattern of layoffs at firms like Microsoft and Google. Is AI genuinely reshaping work, or simply re…
  continue reading
 
NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 Citrix patched a memory overflow vulnerability leading to unintended control flow and denial of service. https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 Remote code execution in CentOS Web Panel - CVE-2025-48703 An arbitrary file upload vulnerab…
  continue reading
 
In this episode of the Security Repo Podcast, Manoj Viswanathan shares his unconventional journey into cybersecurity, from a personal phishing incident to mastering Capture The Flag (CTF) competitions and interning at Toshiba. The conversation dives deep into the community-driven value of groups like BurbSec, the practical benefits of hands-on expe…
  continue reading
 
⸻ Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com Title: Bridging Worlds: How Technology Connects — or Divides — Our Communities Guest: Lawrence Eta Global Digital AI Thought Leader | #1 International Best Selling Author | Keynote Speaker | TEDx Speaker | Multi-Sector Executive | Community & Smart Cities…
  continue reading
 
In the wake of controversy over OpenAI’s restrictive nondisclosure agreements, a bipartisan group of senators has introduced the AI Whistleblower Protection Act. In this episode, Lawfare Research Director Alan Rozenshtein spoke with Charlie Bullock, Senior Research Fellow at the Institute for Law & AI and co-author of a new Lawfare article on the b…
  continue reading
 
Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each scans than they used to, but the average length of passwords did not change. https://isc.sans.edu/diary/Quick%20Pass…
  continue reading
 
How do you get more from GitHub in your work routine? Richard chats with April Yoho about how sysadmins can take advantage of more GitHub features to make better quality scripts and more! April discusses the capabilities of GitHub Copilot to assist administrators in comprehending the intricacies of source management, including branching and merging…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play