Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
Twice per month, Peter House and Mike Chmielewski discuss current cyberthreats and issues. Internet Weather Report is recorded at the studios of Big Cabbage Radio in Palmer, Alaska.
…
continue reading
In this podcast, networking guru Mattias Fridström, Chief Evangelist at Arelion and industry experts discuss all things Internet, networks, cloud and connectivity.
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
…
continue reading
The podcast where we choose a subject, read a single Wikipedia article about it, and pretend we’re experts. Because this is the internet, and that’s how it works now.
…
continue reading
Internet safety, security, and digital parenting tips. You'll learn about protecting kids online (cybersafety), and general digital security and privacy (for adults as well as kids). https://DefendingDigital.com
…
continue reading
computer help free. blogtvpccareman
…
continue reading
Johnny Ball is famous for knowing many things, so who better to tell you how to keep your computer safe from online fraud. Johnny's guides contain all you need to know about internet and email security. There are four wisdom-packed episodes to download onto your computer and portable audio player.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Security Signal uncovers the signal from the noise for cybersecurity leaders, and helps them focus on important trends, threats and opportunities. Each episode translates cybersecurity complexities into actionable intelligence for executives at the helm. Security Signal helps leaders turn resilience into a competitive advantage. Follow us @CloudflareTV Explore our content hub for exclusive C-level conversations at cloudflare.tv/executive Read the full 2025 Cloudflare Security Signals report ...
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
The Pragmatic CSO podcast is a wide ranging discussion of information security topics, anchored by the 12-step Pragmatic CSO methodology to help security practitioners become more relevant in business operations.
…
continue reading
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
…
continue reading
Dive into the pulse of the Internet with This Week in NET. A weekly roundup of Cloudflare's latest news, innovations and the most impactful developments shaping the Internet. From security updates to performance breakthroughs, we deliver insights that matter to developers, businesses, and Internet enthusiasts alike. Each episode features expert analysis with special guests offering unique perspectives on today's digital challenges and evolving landscape. Follow us @CloudflareTV Read the blog ...
…
continue reading
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
Join Matthew Chapman, a Cybersecurity Expert, as he interviews colleagues and industry professionals providing information, news, and hopefully a few laughs along the way. This podcast leverages 25 plus years of working in the industry on the front lines and architecting cybersecurity solutions for some of the largest companies in the world.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading
Host Jay Benjamin will help you learn how to use a new Linux Operating System. Find out how easy it is to keep your computer safe from preying eyes. When you need answers to questions concerning a Linux operating system or why you should consider converting your current laptop or desktop computer, we will promptly get you the information needed to confidently convert your computer and make the switch to an operating system that will give you Internet freedom for many years to come. "The Linu ...
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
…
continue reading
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
…
continue reading
Here's where to find podcasts from The Nation. Political talk without the boring parts, featuring the writers, activists and artists who shape the news, from a progressive perspective.
…
continue reading
Welcome to Unshielded: A Blockchain & Data Podcast by Midnight. We’ll explore the intersection of these two dynamic fields to bring you expert perspectives and practical examples. Each episode, we discuss the importance of zero-knowledge technology and its role in building better apps and a more equitable internet. We interview industry leaders, tech innovators, and data protection advocates to shed light on the latest developments, challenges, and opportunities in the blockchain and data pr ...
…
continue reading
Insightful audio from the global tech advisory firm.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
SANS Stormcast Monday, June 16th, 2025: Katz Stealer in JPG; JavaScript Attacks; Reviving expired Discord Invites for Evil (#)
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45SANS Stormcast Monday, June 16th, 2025: Katz Stealer in JPG; JavaScript Attacks; Reviving expired Discord Invites for Evil Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://…
…
continue reading

1
SANS Stormcast Friday, June 13th, 2025: Honeypot Scripts; EchoLeak MSFT Copilot Vuln; Thunderbolt mailbox URL Vuln;
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Automated Tools to Assist with DShield Honeypot Investigations https://isc.sans.edu/diary/Automated%20Tools%20to%20Assist%20with%20DShield%20Honeypot%20Investigations%20%5BGuest%20Diary%5D/32038 EchoLeak: Zero-Click Microsoft 365 Copilot Data Leak Microsoft fixed a vulnerability in Copilot that could have been abused to exfiltrate data from Copilot…
…
continue reading

1
SANS Stormcast Friday, June 13th, 2025: Honeypot Scripts; EchoLeak MSFT Copilot Vuln; Thunderbolt mailbox URL Vuln; (#)
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43SANS Stormcast Friday, June 13th, 2025: Honeypot Scripts; EchoLeak MSFT Copilot Vuln; Thunderbolt mailbox URL Vuln; Automated Tools to Assist with DShield Honeypot Investigations https://isc.sans.edu/diary/Automated%20Tools%20to%20Assist%20with%20DShield%20Honeypot%20Investigations%20%5BGuest%20Diary%5D/32038 EchoLeak: Zero-Click Microsoft 365 Copi…
…
continue reading

1
EP58: Cloud connectivity, public internet, security standards, and enterprise networking trends
20:11
20:11
Play later
Play later
Lists
Like
Liked
20:11Misha Kuperman, Chief Reliability Officer at Zscaler is back on the podcast. In this episode he and Mattias Fridström discuss if the recent trade tariffs will impact services from Zscaler, whether people in general understand cloud connectivity, if security in the cloud is just a waste of bandwidth resources, what customers know about the public in…
…
continue reading

1
How Post-Quantum Computing (PQC) Will Save the Internet
1:03:40
1:03:40
Play later
Play later
Lists
Like
Liked
1:03:40In this unfiltered episode of Unspoken Security, host A. J. Nash explores the looming threat quantum computing poses to our digital infrastructure with experts Robert Clyde, Managing Director of Clyde Consulting and Chair of crypto-security firm CryptoQuanti, and Jamie Norton, a Board Director at ISACA with extensive cybersecurity credentials. They…
…
continue reading

1
Lawfare Daily: Phil Reitinger and Komal Bazaz Smith on Civil Society and Strengthening Internet Security
42:33
42:33
Play later
Play later
Lists
Like
Liked
42:33Global Cyber Alliance’s President and CEO Phil Reitinger and Chief Business Officer Komal Bazaz Smith discuss with Justin Sherman critical cybersecurity issues facing core internet infrastructure, including the role of small, often under-appreciated, and frequently underfunded nonprofits in keeping the internet secure and functioning. They talk abo…
…
continue reading
From December 26, 2023: The Supreme Court during World War II issued some of the most notorious opinions in its history, including the Japanese exclusion case, Korematsu v. United States, and the Nazi saboteur military commission case, Ex parte Quirin. For a fresh take on these and related cases and a broader perspective on the Supreme Court during…
…
continue reading

1
Elon Musk and Silicon Valley Drug Culture | The Time of Monsters with Jeet Heer
42:42
42:42
Play later
Play later
Lists
Like
Liked
42:42Both The New York Times and The Wall Street Journal have reported that Elon Musk, currently trying to mend a feud with his quondam political ally Donald Trump, is a heavy user of mind alternating substances ranging from Ketamine to LSD to mushrooms to cocaine. While this story has been treated as one about the foibles of one increasingly erratic po…
…
continue reading

1
Lawfare Archive: Protests, the Police, and the Press
48:20
48:20
Play later
Play later
Lists
Like
Liked
48:20From June 21, 2023: Carolyn Cole, a Pulitzer-Prize winning staff photographer for the Los Angeles Times, has covered wars and other conflicts in Afghanistan, Iraq, Israel, Kosovo, Liberia, Sudan, Nicaragua, Haiti, and the U.S.-Mexico border. Over the course of her 30 year career, she has been seriously injured on the job precisely once—when members…
…
continue reading

1
Tensions Rise with Iran, Sudan-Libya Border Clashes, Trump Creating Office of Remigration | American Prestige
37:43
37:43
Play later
Play later
Lists
Like
Liked
37:43NOTE: This episode was recorded before Israel's attack on Iran. Danny and Derek are everyday people who still believe in you. This week: the AUKUS security partnership is under review at the Pentagon (1:47); the IAEA rebukes Iran, nuclear negotiations are going nowhere, and Trump is evacuating nonessential personnel from the Middle East (5:14); in …
…
continue reading

1
Lawfare Daily: U.S. Troops on the Streets of Los Angeles
1:25:21
1:25:21
Play later
Play later
Lists
Like
Liked
1:25:21For today's episode, Lawfare Senior Editor and General Counsel Scott R. Anderson sat down with three leading legal experts on domestic military deployments: William Banks of Syracuse University College of Law, Laura Dickinson of the George Washington University Law School, and Chris Mirasola of the University of Houston Law Center. They discussed t…
…
continue reading

1
Escalation, Episode Seven: Boiling the Frog
58:28
58:28
Play later
Play later
Lists
Like
Liked
58:28Today, it’s Episode Seven of Escalation, our latest narrative series co-hosted by Lawfare Managing Editor Tyler McBrien and Ukraine Fellow Anastasiia Lapatina. Throughout the show, Nastya and Tyler trace the history of U.S.-Ukrainian relations from the time of Ukrainian independence through the present. You can listen to Escalation in its entirety,…
…
continue reading

1
Is Your Ego Impeding Your Career Fulfillment?
1:02:21
1:02:21
Play later
Play later
Lists
Like
Liked
1:02:21In this episode of Unspoken Security, host AJ Nash sits down with Jennifer Leggio, Chief Strategy Officer of W2 Communications, to discuss the unspoken challenges impacting career fulfillment. Jennifer shares her personal experiences with toxic work environments, imposter syndrome, and the struggle to balance ego and self-awareness. She highlights …
…
continue reading
The traditional corporate perimeter, once a simple fortress, is no longer a reliable defense. With vulnerabilities changing rapidly in a world of cloud computing and remote work, relying on outdated security models is no longer a viable strategy. This massive shift demands a new approach centered on identity, leaving many organizations wondering ho…
…
continue reading

1
Lawfare Daily: McCarthyism and Its Echoes in Modern Politics with Clay Risen
43:24
43:24
Play later
Play later
Lists
Like
Liked
43:24Lawfare Contributing Editor Renée DiResta sits down with Clay Risen to talk about his book “Red Scare: Blacklists, McCarthyism, and the Making of Modern America,” exploring the historical context of McCarthyism and its relevance to contemporary issues. They discuss the dynamics of accusation versus evidence during the Red Scare, the impact of vigil…
…
continue reading
Send Bidemi a Text Message! In this episode, host Bidemi Ologunde spoke with Tom Arnold, a cybersecurity expert, digital forensics investigator, and educator, to trace cybercrime’s rapid evolution—from early password hacks to today’s AI-powered phishing, deepfakes, and nation-state ransomware crews. Tom explained how attack typologies shape prevent…
…
continue reading

1
We All Suffer from OpenAI’s Pursuit of Scale | Tech Won't Save Us
51:18
51:18
Play later
Play later
Lists
Like
Liked
51:18Paris Marx is joined by Karen Hao to discuss how Sam Altman’s goal of scale at all costs has spawned a new empire founded on exploitation of people and the environment, resulting in not only the loss of valuable research into more inventive AI systems, but also exacerbated data privacy issues, intellectual property erosion, and the perpetuation of …
…
continue reading

1
Changing Testing using Playwright MCP with Debbie O'Brien
49:11
49:11
Play later
Play later
Lists
Like
Liked
49:11What happens when AI comes to your web testing tool? While at Build, Carl and Richard talked to Debbie O'Brien about the latest features in Playwright, including Playwright MCP, the model control plane for Playwright capabilities. Debbie talks about using Playwright MCP to buy a table. Ask your LLM what tests should be written for your web page, an…
…
continue reading

1
SANS Stormcast Thursday, June 12th, 2025: Quasar RAT; Windows 11 24H2 Delay; SMB Client Vuln PoC; Connectwise Signing Keys; KDE Telnet code exec
6:27
6:27
Play later
Play later
Lists
Like
Liked
6:27Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu/diary/Quasar%20RAT%20Delivered%20Through%20Bat%20Files/32036 Delayed Windows 11 24H2 Rollout Microsoft slightly throttled the rollout of windows…
…
continue reading

1
Toothpick flirts, Google leaks, and ICE ICE scammers
35:54
35:54
Play later
Play later
Lists
Like
Liked
35:54What do a sleazy nightclub carpet, Google’s gaping privacy hole, and an international student conned by fake ICE agents have in common? This week’s episode of the "Smashing Security" podcast obviously. Graham explains how a Singaporean bug-hunter cracked Google’s defences and could brute-force your full phone number. Meanwhile, Carole dives into a …
…
continue reading

1
SANS Stormcast Thursday, June 12th, 2025: Quasar RAT; Windows 11 24H2 Delay; SMB Client Vuln PoC; Connectwise Signing Keys; KDE Telnet code exec (#)
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28SANS Stormcast Thursday, June 12th, 2025: Quasar RAT; Windows 11 24H2 Delay; SMB Client Vuln PoC; Connectwise Signing Keys; KDE Telnet code exec Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu…
…
continue reading

1
Rational Security: The “How Many Constitutional Crises Can We Fit Into One Episode?” Edition
1:17:17
1:17:17
Play later
Play later
Lists
Like
Liked
1:17:17This week, Scott sat down with Lawfare Senior Editors Molly Reynolds and Quinta Jurecic, and Contributing Editor Chris Mirasola, to focus on the week’s big domestic news, including: “Drama Majors, Meet Major Drama.” In the glittering city of Los Angeles, the Trump administration has taken the dramatic step of calling up the California National Guar…
…
continue reading

1
The Barkley Marathons - The Immortal Horizon
1:02:26
1:02:26
Play later
Play later
Lists
Like
Liked
1:02:26https://www.thebeliever.net/the-immortal-horizon/ The Barkley Marathons is an ultramarathon trail race held each year in Frozen Head State Park in Morgan County, Tennessee, United States. Described as "The Race That Eats Its Young", it is known for its extreme difficulty, purposefully difficult application process, and many strange traditions, havi…
…
continue reading

1
Your Car Is Spying On You What It’s Collecting and Who It’s Telling
42:45
42:45
Play later
Play later
Lists
Like
Liked
42:45I used to think of my car as just a tool to get from point A to point B. But after this conversation, I can’t help but see it as something else entirely, a powerful data collection device that knows far more about me than I realized. From where I go and who I text to how I drive and even what’s on my phone, today’s vehicles are gathering a staggeri…
…
continue reading

1
Lawfare Daily: Christina Knight on AI Safety Institutes
38:53
38:53
Play later
Play later
Lists
Like
Liked
38:53Christina Knight, Machine Learning Safety and Evals Lead at Scale AI and former senior policy adviser at the U.S. AI Safety Institute (AISI), joins Kevin Frazier, the AI Innovation and Law Fellow at Texas and a Senior Editor at Lawfare, to break down what it means to test and evaluate frontier AI models as well as the status of international effort…
…
continue reading

1
Saturday’s "No Kings" Day of Defiance, plus Report from LA | Start Making Sense
38:17
38:17
Play later
Play later
Lists
Like
Liked
38:17With tanks rolling down the street in DC on Saturday and troops being deployed to LA, it’s never been more important to come together in nonviolent action to exercise our First Amendment right to peaceful protest. That’s what the organization Indivisible says about Saturday’s National Day of Defiance – the nationwide “No Kings” protests. Ezra Levin…
…
continue reading

1
SANS Stormcast Wednesday, June 11th, 2025: Microsoft Patch Tuesday; Acrobat Patches
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58Microsoft Patch Tuesday Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20June%202025/32032 Adobe Vulnerabilities Adobe relea…
…
continue reading

1
The Case for Telemetry with Liz Fong-Jones
32:17
32:17
Play later
Play later
Lists
Like
Liked
32:17How can modern telemetry solutions help you? While at NDC in Melbourne, Richard chatted with Liz Fong-Jones of Honeycomb about her approach to educating leadership on creating great telemetry solutions for organizations. Liz discusses the importance of being able to answer questions about reliability issues without causing problems, as opposed to r…
…
continue reading

1
Peter's Trip to Chicago's "Mini-Hacker Camp"
21:30
21:30
Play later
Play later
Lists
Like
Liked
21:30Peter House just returned from a trip to Chicago. He was there for a "Hacker Mini-Camp," basically a week of presentations and learning. There were two presentations that he thought were relatable to us here in the valley. One was that three hundred North Korean citizens were employed as remote IT workers using only 70 stolen US identities. These w…
…
continue reading

1
SANS Stormcast Wednesday, June 11th, 2025: Microsoft Patch Tuesday; Acrobat Patches (#)
6:59
6:59
Play later
Play later
Lists
Like
Liked
6:59SANS Stormcast Wednesday, June 11th, 2025: Microsoft Patch Tuesday; Acrobat Patches Microsoft Patch Tuesday Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today. https://isc.sans.edu/dia…
…
continue reading

1
Escalation, Episode Six: Nothing Else Matters
57:50
57:50
Play later
Play later
Lists
Like
Liked
57:50Today, it’s Episode Six of Escalation, our latest narrative series co-hosted by Lawfare Managing Editor Tyler McBrien and Ukraine Fellow Anastasiia Lapatina. Throughout the show, Nastya and Tyler trace the history of U.S.-Ukrainian relations from the time of Ukrainian independence through the present. You can listen to Escalation in its entirety, a…
…
continue reading

1
Lawfare Daily: Censorship, Civilizational Allies, and Codes of Practice
57:17
57:17
Play later
Play later
Lists
Like
Liked
57:17Lawfare Contributing Editor Renée DiResta sits down with Daphne Keller, Director of the Program on Platform Regulation at Stanford University's Cyber Policy Center; Dean Jackson, Contributing Editor at Tech Policy Press and fellow at American University's Center for Security, Innovation, and New Technology; and Joan Barata, Senior Legal Fellow at T…
…
continue reading

1
How the Low Culture of 1999 Predicted Modern America | American Prestige
54:21
54:21
Play later
Play later
Lists
Like
Liked
54:21In this week’s episode, Danny speaks with journalist Ross Benes about his book 1999: The Year Low Culture Conquered America and Kickstarted Our Bizarre Times. They discuss the connection between the Telecommunications Act of 1996 and “trash culture”, what makes the instantiation of reality TV in 1999 unique and how early reality shows foreshadowed …
…
continue reading