SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
An open show powered by community LINUX Unplugged takes the best attributes of open collaboration and turns it into a weekly show about Linux.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
Windows Weekly is about more than Windows. Veteran Microsoft insiders Paul Thurrott and Richard Campbell join Leo for a deep dive into the most valuable company in the world. From consumer to enterprise, AI to Xbox, Windows Weekly is the only Microsoft podcast you'll ever need. Records live every Wednesday at 2:00pm Eastern / 11:00am Pacific / 18:00 UTC.
…
continue reading
The talk of the Apple Community
…
continue reading
A podcast made by people who love running Linux.
…
continue reading
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
…
continue reading
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
The Future of Security Operations Podcast is dedicated to empowering SecOps leaders to reimagine how their teams work so they can scale their security efforts and build a team that achieves more with less.
…
continue reading
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android’s a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Interviews with Scholars of National Security about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
…
continue reading
The best-curated wisdom from founders, operators, & investors on executing at startups | Hosted by Roshan Cariappa | Head down, execute hard. 🔥 Millions of listeners seek out Bingepods (Ideabrew Studios Network content) every day. Get in touch with us to advertise, join the network or click listen to enjoy content by some of India's top audio creators. [email protected] Android | Apple
…
continue reading
We Cover the Cyberspace.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
Interviews and fun with professionals, hackers, and everything in between.
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
…
continue reading
A podcast about all things energy, brought to you by the Australian Energy Market Operator.
…
continue reading
Welcome to covert actions and national security podcast. Welcome to covert and national security podcast. A podcast where we discuss a spectrum of activities concerning covert operations, intelligence, counterintelligence, unconventional warfare, assassination issues, espionage spy craft technology and more. Enter the operational world with Dr. Carlos
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton, Chuck Randolph, and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you sec ...
…
continue reading
The official podcast of the School of Advanced Military Studies, dedicated to bridging the gap between tactics and strategy through the study of operational art and the operational level of war.
…
continue reading
"Building the Base" - an in-depth series of conversations with top entrepreneurs, innovators, and leaders from tech, financial, industrial, and public sectors. Our special guests provide their unique perspectives on a broad selection of topics such as: shaping our future national security industrial base, the impact of disruptive technologies, how new startups can increasingly contribute to national security, and practical tips on leadership and personal development whether in government or ...
…
continue reading
The Fragmented Podcast is the leading Android developer podcast started by Kaushik Gopal & Donn Felker. Our goal is to help you become a better Android Developer through conversation & to capture the zeitgeist of Android development. We chat about topics such as Testing, Dependency Injection, Patterns and Practices, useful libraries, and much more. We will also be interviewing some of the top developers out there. Subscribe now and join us on the journey of becoming a better Android Developer.
…
continue reading
Join the brightest SolarWinds minds and IT industry influencers, as they cut through the jargon and give you the tools you need to grow and keep your tech knowledge razor-sharp. Come with questions—leave with actionable steps and practical insights. Have ideas for future episodes or topics? Tweet us @ SolarWinds using #TechPod.
…
continue reading

1
All Things Secured | Online Privacy & Security on Odysee
All Things Secured | Online Privacy & Security
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
Cyber Security & Physical Security and Safety Information, Products and Technologies
…
continue reading
UNFILTERED ANSWERS TO THE QUESTIONS YOU’VE BEEN AFRAID TO ASK Dom Raso is a veteran SEAL Team Six / DEVGRU Operator, tactical and gear expert, entrepreneur, man of deep faith, father, and husband. More than a decade in military special operations, multiple combat deployments, and years as CEO of Dynamis Alliance have given him a unique perspective on tactics, personal security, fatherhood, faith – and everything in between. On each episode, Dom is asked questions from people around the world ...
…
continue reading
🎙️ Welcome to the Microsoft Intune and Security Report Podcast🎙️ — your essential stop for the latest in Windows and Edge security! This podcast is designed to be a time-saving powerhouse, distilling the most critical updates, new features, and emerging vulnerabilities from multiple trusted sources into one convenient, ready-to-reference report. Each week, we dig deep into the data to give you a concise, actionable rundown on the security landscape, helping you stay one step ahead. So whethe ...
…
continue reading
An improved audio format version of our written content. Get your defence and security perspectives now through this podcast.
…
continue reading
Want a peak behind the curtain into one of the best places to work in cybersecurity and the minds of the innovators behind the industry’s leading security operations platform? Tune in to The Howler podcast! Hosted by Chelsea Lowman, People Experience Specialist, and Mary Newville, People Experience Senior Manager, the culture duo connects with pack leaders on leadership insights, mental health and overall wellbeing, and how they lead their teams to advance our mission of ending cyber risk.
…
continue reading
EBC Home Hints was setup for all homeowners and buyers. The idea is to provide detailed information on home maintenance. Protect your largest investment.
…
continue reading
Historical True Crime — assassins, gangsters, mobsters and lawmen; manhunts, scandals and unexplained phenomena. Stories of the wildest and darkest chapters of America's past.
…
continue reading
The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join one of our hosts, Alex Nehmy, Eric Johansen, and James McCarthy, each month as they speak with the biggest names and the biggest brains in cybersecurity, including CISOs, analysts, security researchers, and other industry thought lea ...
…
continue reading
By Circle Of Insight Productions
…
continue reading

1
Lazarus Strikes Again: Inside Operation SyncHole and the 1-Day Exploitation Crisis
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49In this episode, we break down the most urgent cybersecurity developments from late April 2025—including the Lazarus Group’s high-profile “Operation SyncHole” targeting South Korean industries. Discover how attackers are exploiting newly disclosed vulnerabilities faster than ever, with nearly 1 in 3 CVEs weaponized within 24 hours of publication. W…
…
continue reading

1
How to Streamline IT Operations and Enhance Security with RMM and Automation
37:26
37:26
Play later
Play later
Lists
Like
Liked
37:26Remote Monitoring and Management (RMM) solutions are quite ambitious, promising to identify the issues before they have a chance to impact your IT operations. “A good RMM offers a combination of tools for you to do this properly,” stated Elias Moura, the Head of Product Marketing at Pulseway. “You have automation to enable auto-remediation, built-i…
…
continue reading

1
the TRUTH behind how Data Brokers operate
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49Learn the secrets behind how data brokers work in this deep dive conversation between Josh and DeleteMe CEO Rob Shavell. Your data is being collected and sold without your consent and often without your knowledge. How is this possible and what can you do about it? Get 20% off DeleteMe: https://www.joindeleteme.com/allthingssecured ▶ My Experience U…
…
continue reading

1
Brex's CISO Mark Hillick on avoiding tool bloat and learning from high-severity incidents
42:05
42:05
Play later
Play later
Lists
Like
Liked
42:05In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Mark Hillick, CISO at Brex. Mark’s experience in the security industry spans more than two decades. He started out as a security engineer at Allied Irish Banks before advancing through companies like MongoDB to become Director and Head of Security at Riot Games…
…
continue reading

1
Craft CMS Crisis: The 10.0-Rated RCE Flaw Every Developer Must Patch Now
14:51
14:51
Play later
Play later
Lists
Like
Liked
14:51A critical, actively exploited vulnerability (CVE-2025-32432) is wreaking havoc on Craft CMS—allowing attackers to execute arbitrary PHP code on unpatched servers with no authentication required. In this urgent episode, we break down: 💥 Why this flaw scores a perfect 10.0 CVSS—the highest severity rating possible. 🔍 How hackers are exploiting it: F…
…
continue reading

1
Policy Puppetry: How a Single Prompt Can Trick ChatGPT, Gemini & More Into Revealing Secrets
12:44
12:44
Play later
Play later
Lists
Like
Liked
12:44Recent research by HiddenLayer has uncovered a shocking new AI vulnerability—dubbed the "Policy Puppetry Attack"—that can bypass safety guardrails in all major LLMs, including ChatGPT, Gemini, Claude, and more. In this episode, we dive deep into: 🔓 How a single, cleverly crafted prompt can trick AI into generating harmful content—from bomb-making g…
…
continue reading

1
From Peacetime to Wartime: Is Your Cloud Secure?
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52Is your organisation still relying on outdated “peacetime” security solution strategies in the face of rapidly evolving cloud threats? Host Brad LaPorte explores answering this question with guest Ory Segal, Technical Evangelist of Cortex Cloud, Palo Alto Networks. They discuss how the dynamic nature of modern cloud environments and increasing adop…
…
continue reading

1
Bonus Episode - Pack Gives Back Ambassador Roundtable
51:22
51:22
Play later
Play later
Lists
Like
Liked
51:22In this bonus episode, pack members from around the globe share their motivation in becoming Pack Gives Back Ambassadors and why giving back is important to them along with some of the initiatives they've led for their regions so far! Interested in running with the pack? Explore careers at Arctic Wolf—one of the fastest-growing and exciting cyberse…
…
continue reading

1
Snake Oilers: LimaCharlie, Honeywell Cyber Insights, CobaltStrike and Outflank
38:50
38:50
Play later
Play later
Lists
Like
Liked
38:50In this edition of the Snake Oilers podcast, three sponsors come along to pitch their products: LimaCharlie: A public cloud for SecOps Honeywell Cyber Insights: An OT security/discovery solution Fortra’s CobaltStrike and Outflank: Security tooling for red teamers This episode is also available on Youtube. Show notes…
…
continue reading

1
612: 25 Years of LinuxFest Northwest
1:06:30
1:06:30
Play later
Play later
Lists
Like
Liked
1:06:30We're live from LinuxFest Northwest 2025. We're joined by guests from the audience, try our hand at Linux trivia and share our experiences from the best fest in the West. Sponsored By: Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Manage…
…
continue reading

1
41. Putin’s Minions: How Russia Spies (Ep 1)
37:45
37:45
Play later
Play later
Lists
Like
Liked
37:45What do a fading seaside hotel, a self-proclaimed Q, and an eyelash champion have in common? They're all part of a bizarre Russian spy ring operating in the UK. But beneath the absurdity lies a serious threat. What were these "Minions" really up to? And how close did they come to compromising Western security? This is the story of a group of Bulgar…
…
continue reading

1
MacVoices #25120: Live! - Tim Cook's Influence, Apple's Sports App, Meta's Redaction Fail
25:04
25:04
Play later
Play later
Lists
Like
Liked
25:04The panel of Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Marty Jencius, and Eric Bolden discuss Tim Cook’s strategic influence in securing tariff exemptions, highlighting his low-key leadership style focused on Apple’s interests. They explore updates to Apple’s Sports app, praising its clean interface and new sharing features. The convers…
…
continue reading

1
TNO026: Gain Confidence in AI for NetOps with Juniper Networks (Sponsored)
53:58
53:58
Play later
Play later
Lists
Like
Liked
53:58Confidence in a new technology is one of the greatest barriers to adoption of that technology. If you don’t believe it will improve your NetOps, why would you adopt it? This is especially true of AI products. On today’s show, we’re joined by Bob Friday, Chief AI Officer of Mist/Juniper to make the case for... Read more »…
…
continue reading
Former CIA officer Frank Snepp shares a stunning spy story of the Vietnam War’s chaotic end with host Jeff Stein Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Michael Isikoff on Twitter: https://twitter.com/isikoff Follow SpyTalk on Twitter: https://twitter.com/talk_spy Subscribe to SpyTalk on Substack https://www.spytalk.co/ T…
…
continue reading

1
OAuth Phishing and Microsoft 365: The Hidden Threats SMBs Can't Ignore
13:54
13:54
Play later
Play later
Lists
Like
Liked
13:54In this episode, we dissect the real-world challenges of securing Microsoft 365 environments—especially for small and medium-sized businesses—amid rising threats and licensing limitations. From Reddit frustrations to official Microsoft documentation, we explore the harsh truth: many essential security features, like alerting on suspicious logins, r…
…
continue reading
Welcome to EBC Home Hints. I have created these podcasts to help all homeowners understand your home and how to maintain it. Welcome.By Paul Rochette
…
continue reading

1
115 - Gemini in Android Studio, Enhancing Safety and Security, and more!
10:18
10:18
Play later
Play later
Lists
Like
Liked
10:18Welcome to Now in Android, your ongoing guide to what's new and notable in the world of Android development. In this episode, we’ll cover Android 16 beta 3, Gemini in Android Studio for Business and Multimodal, Android XR, Media and Camera updates, and much more. Resources: Samsung's One UI 7 → https://goo.gle/42Ubuvv Quality Tiers → https://goo.gl…
…
continue reading

1
Why Outlook Is Eating Your CPU — And What Microsoft Says About It
12:17
12:17
Play later
Play later
Lists
Like
Liked
12:17Microsoft has acknowledged a serious issue affecting users of classic Outlook for Windows: CPU usage spikes up to 50% just from typing emails. First appearing in builds released since November 2024, this bug is now hitting users across several update channels—including Current, Monthly Enterprise, and Insider—leading to power drain, sluggish perfor…
…
continue reading
Apple hit with important security updates last week - we’ll tell you a bit about those. Also - we’ll look at simple steps for protecting your privacy on your Mac. First though - how does one hack a crosswalk? It’s way easier than it should be. We’ll tell you more on this edition of The Checklist, brought to you by SecureMac. Check out our show note…
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses hybrid multi-cloud networking strategy.By Enterprise Management Associates + APMdigest
…
continue reading

1
MacVoices #25119: NAB Show - DJI's Latest Gimbles and Mic System
20:53
20:53
Play later
Play later
Lists
Like
Liked
20:53At NAB Show 2025, Donovan Davis, Product Specialist for Osmo for DJI showcases the Osmo Mobile 7 gamble with a new tracking module that works with any app, built-in tripod, lighting controls, and 10-hour battery life. The DJI Mic Mini offers compact wireless audio with Bluetooth and receiver options. The RS-4 Mini gimbal supports both smartphones a…
…
continue reading

1
Trojan Map App: Spyware Targets Russian Soldiers via Alpine Quest
9:14
9:14
Play later
Play later
Lists
Like
Liked
9:14A newly discovered Android spyware campaign is targeting Russian military personnel by weaponizing a popular mapping app. Disguised as a cracked version of Alpine Quest Pro, this trojanized app delivers Android.Spy.1292.origin—a powerful surveillance tool that steals data, tracks location in real-time, and downloads secondary payloads to extract co…
…
continue reading

1
Blue Shield Breach: 4.7 Million Health Records Leaked via Google Analytics
8:47
8:47
Play later
Play later
Lists
Like
Liked
8:47Blue Shield of California has confirmed a data breach affecting 4.7 million members—caused not by hackers, but by a misconfigured Google Analytics setup. Sensitive health information was inadvertently exposed to Google’s ad platforms between April 2021 and January 2024. In this episode, we break down what went wrong, what data was leaked, and what …
…
continue reading

1
$16.6 Billion Lost: The True Cost of Cybercrime in America
8:48
8:48
Play later
Play later
Lists
Like
Liked
8:48Cybercrime in the U.S. has reached new, record-breaking heights. In this episode, we dive deep into the FBI's 2024 Internet Crime Complaint Center (IC3) report — a comprehensive look at the economic and human toll of cybercrime in America. With $16.6 billion in reported losses, a 33% increase year-over-year, and 859,532 complaints filed, the data p…
…
continue reading

1
Telegram Exposed: The Super App Enabling Cyber Crime
53:28
53:28
Play later
Play later
Lists
Like
Liked
53:28In episode 36, Josh welcomes renowned intelligence systems expert Stephen Arnold to shine a light on one of the most underestimated threats in cybersecurity today—Telegram. Known to most as a simple messaging app, Telegram is quietly operating as a “super app” for cyber crime. From crypto laundering and hamster games masking gambling platforms, to …
…
continue reading

1
WW 929: The Blue Screen of Soup - Agent Store, Oblivion Remastered, Ubuntu 25.04
2:17:50
2:17:50
Play later
Play later
Lists
Like
Liked
2:17:50It's Week D, do you know where your preview update is? 23H2 is out - 24H2, not so much! No surprises in the new features list, but are more new features on the way? Windows New text actions in Click to Do - Practice in Reading Coach and Read with Immersive Reader - in Dev and Beta (24H2) Find cloud-based (OneDrive-based) photos using Semantic searc…
…
continue reading

1
MacVoices #25118: TV+ Talk - TV+ Talk Is Back!
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Apple TV+ earns two Peabody nominations for powerful documentaries “Bread and Roses” and “The Last of the Sea Women,” but hosts Chuck Joiner and Charlotte Henry express frustration over Apple’s poor promotion of its content. They praise Apple’s overall documentary quality yet note how many shows go under the radar. The conversation also covers the …
…
continue reading

1
AI explained: Introduction to Reed Smith's AI Glossary
14:56
14:56
Play later
Play later
Lists
Like
Liked
14:56Have you ever found yourself in a perplexing situation because of a lack of common understanding of key AI concepts? You're not alone. In this episode of "AI explained," we delve into Reed Smith's new Glossary of AI Terms with Reed Smith guests Richard Robbins, director of applied artificial intelligence, and Marcin Krieger, records and e-discovery…
…
continue reading
Luciano is forced to leave the United States and return to Sicily. But, he immediately makes plans to set up a base of operations near the U.S. With the help of Meyer Lansky, Luciano organizes a meeting in Havana, Cuba to discuss the mafia’s future and deal with troublesome associates. Luciano discovers that controlling his criminal family from afa…
…
continue reading

1
Brian Masaru Hayashi, "Asian American Spies: How Asian Americans Helped Win the Allied Victory" (Oxford UP, 2021)
1:11:58
1:11:58
Play later
Play later
Lists
Like
Liked
1:11:58Spies deep behind enemy lines; double agents; a Chinese American James Bond; black propaganda radio broadcasters; guerrilla fighters; pirates; smugglers; prostitutes and dancers as spies; and Asian Americans collaborating with Axis Powers. All these colorful individuals form the story of Asian Americans in the Office of Strategic Services (OSS), th…
…
continue reading

1
40. Iran vs Israel: Mossad Assassinates Iranian Mastermind (Ep 2)
51:07
51:07
Play later
Play later
Lists
Like
Liked
51:07The future of warfare is already here, and it's more terrifying than we imagined. How did Israel deploy a remote-controlled robotic gun to assassinate a high-profile target? What does this operation reveal about the rise of AI-assisted killings? And are we prepared for a world where drones and robots can kill without human intervention? In 2020, th…
…
continue reading

1
MacVoices #25117: Live! - Shutterstock Sells, ChatGPT Remembers, Online Service Security
30:24
30:24
Play later
Play later
Lists
Like
Liked
30:24The MacVoices Live! panel of Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Eric Bolden, Marty Jencius, and Web Bixby explores the implications of Shutterstock licensing its content for AI avatar training, raising concerns about usage rights and fair compensation for contributors. They discuss ChatGPT’s new memory feature, privacy in AI-base…
…
continue reading

1
On-Premises Pain, Copilot Curiosity, and a Glimpse into Global Secure Access: Practical 365 Podcast S04E38
1:02:49
1:02:49
Play later
Play later
Lists
Like
Liked
1:02:49Steve Goodman and Paul Robichaux dissect the latest Microsoft news, focusing on the sting of rising on-premises licensing costs. The team also explores Copilot Studio and the Model Context Protocol (MCP). Plus, Steve Goodman and Bastiaan Verdonk interview Microsoft's Janice Ricketts, to unravel the complexities of Global Secure Access (GSA) and Zer…
…
continue reading

1
The Second Scam: FBI Warns of IC3 Impersonators Targeting Fraud Victims
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26The FBI has issued a stark warning about a growing scam targeting individuals who’ve already been victimized. In this episode, we unpack how fraudsters are impersonating employees of the FBI's Internet Crime Complaint Center (IC3), promising to help victims recover lost funds — only to scam them again. We’ll break down: How the scam works and why i…
…
continue reading
Kevin English and Tom Rice from SHI join the pod this week to talk about Value Added Resellers and their role in the Apple Ecosystem. Ever wonder how the models work for these folks? We’re here to tell you. Hosts: Tom Bridge - @[email protected] Marcus Ransom - @marcusransom Guests: Tom Rice - LinkedIn Kevin English - LinkedIn Links: https…
…
continue reading

1
416: Interview with Carl Richell, Founder of System76 (COSMIC Desktop, Pop!_OS, & more)
1:13:04
1:13:04
Play later
Play later
Lists
Like
Liked
1:13:04video: https://youtu.be/uK-4VcuBjfM We sat down with Carl Richell, CEO of System76, for an in-depth conversation about the company's mission, the future of Pop!_OS, and the development of their new Rust-based COSMIC desktop environment. From open-source hardware to the philosophy behind building a Linux-focused ecosystem—this is one interview you w…
…
continue reading

1
MacVoices #25116: Live! - Contact Identification Responsibility, An Apple Store Surge, The Meta Trial
22:09
22:09
Play later
Play later
Lists
Like
Liked
22:09A mix of national security, tech glitches, and policy debates drives this discussion with Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Eric Bolden, Marty Jencius, and Web Bixby, starting with a case where iPhone contact merging was blamed for a classified information leak. The group questions the logic behind that defense and dives into ho…
…
continue reading

1
What’s Hot in AI Security at RSA Conference 2025?
24:14
24:14
Play later
Play later
Lists
Like
Liked
24:14Send us a text What’s really hot at RSA Conference 2025? MLSecOps Community Manager Madi Vorbrich sits down with Protect AI Co‑Founder Daryan “D” Dehghanpisheh for a rapid rundown of must‑see sessions, booth events, and emerging AI‑security trends—from GenAI agents to zero‑trust AI and million‑model scans. Use this episode to build a bullet‑proof R…
…
continue reading

1
39. Iran vs Israel: Inside the Shadow War (Ep 1)
51:05
51:05
Play later
Play later
Lists
Like
Liked
51:05How do Israeli and Iranian intelligence fight each other? Who's the man behind the Iranian nuclear programme? And what is the Mossad operation aimed at slowing it down? Listen as Gordon Corera and David McCloskey look into the shadow war between Iran and Israel and the Israeli attempts to slow down the Iranian nuclear programme. -------------------…
…
continue reading
Fedora 42 and Ubuntu 25.04 are here—We break down what's new, what stands out, and what we love most about each release. Sponsored By: Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Management: 1Password Extended Access Management is a de…
…
continue reading

1
Paul M. McGarr, "Spying in South Asia: Britain, the United States, and India's Secret Cold War" (Cambridge UP, 2024)
1:05:30
1:05:30
Play later
Play later
Lists
Like
Liked
1:05:30Spying in South Asia: Britain, the United States, and India's Secret Cold War (Cambridge UP, 2024) is the first comprehensive history of India's secret Cold War. It examines interventions made by the intelligence and security services of Britain and the United States in post-colonial India and their strategic, political, and socio-cultural impact o…
…
continue reading
Knowing the flow of how a packet gets from one end to the other is one of the most important pieces of advice given by today’s guest, Mark Prosser. He shares his journey in the IT industry, his thoughts on Ops vs. design, and the differences between working in a telco NOC and the enterprise... Read more »…
…
continue reading