Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Where we talk and discuss what the great firewall of China is, and the ethics of it Cover art photo provided by JJ Ying on Unsplash: https://unsplash.com/@jjying
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Training of Aria Technologies products including Ericsson-LG, Lancom Systems, Star Leaf, So Connect, Jabra, xmedius, Checkpoint, NBN, iPECS2Teams
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
A great WordPress.com site
…
continue reading
Learn how to think not what to think.
…
continue reading
Stay up to date with the Go community in about 15 minutes per week
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
Join Jason Esposito and Ben Cartland as they explore the deeper questions behind Jason's sermons at Crossway Church, a "community for the curious".
…
continue reading
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
An exploration of the UAP - UFO phenomenon and the associated "high strangeness" which accompanies it from the standpoint of analysts and researchers. Fortean Winds is a collective of data and research professionals who began a project in 2020 to better understand the UFO/UAP phenomenon from the perspective of existing research and evidence. After a few years study and note taking (which you can see at our website https://www.forteanwinds.com) , we're ready to discuss our notes and insights ...
…
continue reading
Hosted by planetary scientist and astrobiologist Dr. Michael L. Wong, Strange New Worlds examines science, technology, and culture through the lens of Star Trek!
…
continue reading
A live podcast show, that’s like a morning radio show, just much better. Live from 6h00-8h00 Monday, Wednesday and Friday. Clever, funny, outrageous and sometimes very silly. Come for the guests, stay for the laughter. Also check out our other shows on The Real Network for more entertainment.
…
continue reading
Signal over noise. The Ohmbudsman Digest filters global volatility into sharp, voice-driven briefings on geopolitics, digital power, surveillance, climate, and collapse. Each episode distills the day’s tectonic shifts — from AI policy and cyber intrusions to sovereign bets, border tensions, and biofront breakthroughs. No clickbait. No hype. Just high-trust interpretation of a world reshuffling its rules. New episodes: Weekdays, under 5 minutes. Subscribe for context that cuts through the static.
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
i am not checking the PN here on SC, please contact me via email or other socials , thank you. Robert Babicz has been redefining the boundaries of electronic music since the early 1990s. His unique artistry encompasses sound, vision, emotion and spirituality. From releasing and performing acid techno as Rob Acid, to his role as a highly-sought after producer and studio wizard infusing technical perfection with deep emotion, to his striking photos, everything Robert does expresses his desire ...
…
continue reading
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
VCD Roundtable is a currently monthly Web-/Podcast where a group of VMware Cloud Director experts from VMware, Partners and Service Providers get together to discuss technical challenges, industry trends and how to build a better cloud platform.
…
continue reading
Presented by Henry K, The #1 Apple Music History Podcast Rootsland is a series that explores the story of two friends who take a musical and spiritual journey from the suburbs of Long Island to the streets of Kingston, Jamaica. Narrated by the man himself, Henry “K” Karyo, Rootsland tells musical stories of landscapes that span styles and genres, and transport the listeners to exotic locations. The story follows Henry, a disillusioned justice major at American University, and Brian, an aspir ...
…
continue reading
Join us as we explore the world of Network Engineering! In each episode, we explore new topics, talk about technology, and interview people in our industry. We peek behind the curtain and get insights into what it's like being a network engineer - and spoiler alert - it's different for everyone! For more information check out our website https://artofnetworkengineering.com | Be sure to follow us on Twitter and Instagram as well @artofneteng | Co-Host Twitter Handle: Andy @andylapteff
…
continue reading
SecurityGen
…
continue reading
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
As we all know, an educator’s career is one of prestige, respect, and authority. Just kidding. Sure, there are lesson plans and inspirational posters. Book reports and detentions. But nobody tells you it’s also parents brawling in the parking lot, students unleashing live crickets during finals, and getting evaluated for “running a tight ship” while the ceiling literally leaks onto your head. Hosted by Andrea Forcum (aka @Educator Andrea on TikTok, former high school teacher and current prof ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Though The New York Times is refraining from making an endorsement in the New York City mayoral race, it did tell its readers which candidate NOT to vote for. Bradley breaks down the implications of this unusual editorial choice. Plus, he explains his personal criteria for responding to requests for his time and advice. Discussed on today's episode…
…
continue reading

1
The Human Firewall: People-First Cybersecurity
33:03
33:03
Play later
Play later
Lists
Like
Liked
33:03Dr. Aleise McGowan, Chief Information Security Officer of BlackGirlsHack and a 20-year cybersecurity veteran, joins Ann on this week's episode of Afternoon Cyber Tea. Aleise shares how a career-defining hack early on shifted her trajectory from developer to defender, and why she believes the future of security lies in resilience, diversity, and hum…
…
continue reading

1
Forget Your Firewalls: One Shocking Truth About Your Cyber Risk
58:25
58:25
Play later
Play later
Lists
Like
Liked
58:25On the latest episode, hear a discussion about cyber risk management needing to look beyond IT. The hosts, Stanley Lee and Sean Mahoney, explore the complexities of cybersecurity, emphasizing the importance of understanding cyber risks that extend beyond traditional IT frameworks. They highlight the critical role of employee awareness and the need …
…
continue reading
Artificial Intelligence is taking over. But I don’t mean that in a Skynet kinda way. It’s simply becoming ubiquitous because companies are insisting on inserting the technology into all their products, even if it’s not useful – or not even safe. Unfortunately, the breathless reporting on dangers of AI is also getting way out of hand, including stor…
…
continue reading

1
Agentic workflows and AI firewalls, so pretty much cancelling ourselves out
13:59
13:59
Play later
Play later
Lists
Like
Liked
13:59Don't forget to visit cupogo dot dev, where you can find links to all the things! 🤖 Ezo Saleh - How We Built Rock-Solid Agentic Orchestration with Go 🔥 Anubis 🥨 Godump - pretty printer 🪳 gcassert 💧 isLitOrSingle ★ Support this podcast on Patreon ★By Jonathan Hall & Shay Nehmad
…
continue reading
In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a recent cyber attack on WestJet that disrupted their internal systems. They explore the implications of such attacks on customer trust and the importance of business continuity and disaster preparedness in the airline industry. The conversa…
…
continue reading

1
Did a 13-Year-Old Just Outsmart the School Firewall?
38:28
38:28
Play later
Play later
Lists
Like
Liked
38:28You ever discover something about your teacher that made your teenage brain short-circuit? Yeah, me too. So this week, I dove headfirst into the teacher lore rabbit hole, because nothing says professional development like finding out your music teacher once chucked a desk at a kid. Oh, and remember the DARE program? Apparently, not everyone took it…
…
continue reading

1
Fault Lines and Firewalls: Friday’s Global Pressure Points
6:29
6:29
Play later
Play later
Lists
Like
Liked
6:29Today’s Ohmbudsman Digest Podcast maps the seismic pressures cracking through politics, tech, and geopolitics: • Apple patches a zero-day iPhone bug exploited in global spyware attacks. • A lone survivor walks away from a fatal Air India crash. • China launches the AG600 amphibious aircraft for strategic deployments. • Cuba’s students revolt over s…
…
continue reading
In this powerful bonus episode of Rootsland, we explore how artificial intelligence might become humanity's greatest ally—or its most dangerous adversary—depending on who raises it. After facing betrayal from the reggae community over his Peter Tosh investigation, our host Henry K discovers an unexpected partnership with Replit's CEO Amjad Masad, l…
…
continue reading

1
LIVE from P&T: What Do We Agree On?
1:00:26
1:00:26
Play later
Play later
Lists
Like
Liked
1:00:26While the news dwells on everything that divides us, Spencer Greenberg went the other way — he did a study of 195 issues to discover what unites us — and came to a conclusion that, in his words, "just blew my mind." Americans actually agree on a ton of things. The social entrepreneur, mathematician and host of the podcast Clearer Thinking joined Br…
…
continue reading

1
Beyond the Firewall | Episode 6 - Curiosity, Risk & Reinvention. The Real Growth Formula
1:04:59
1:04:59
Play later
Play later
Lists
Like
Liked
1:04:59In this episode of Beyond the Firewall, Erez Zevulunov and Ryan Morris discuss the critical themes of business transformation, innovation, and the importance of adapting to market changes. They explore how companies can navigate the challenges of evolving business models, the significance of fresh perspectives, and the necessity of continuous innov…
…
continue reading

1
Strictly Cyber EP 2 - Cyber security and people - Your Human Firewall
45:02
45:02
Play later
Play later
Lists
Like
Liked
45:02In this episode, we're shifting the focus from technology to people. When it comes to cyber security, your team can be your biggest asset. We'll break down why human error is one of the greatest risks to your business and how building a strong security culture is key to keeping your business safe. We'll also discuss a real life example of a situati…
…
continue reading

1
CYFIRMA Research: Firewalls and Frontlines- The India-Pakistan Cyber Battlefield Crisis
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47As tensions between India and Pakistan escalated in early 2025, the conflict spilled into cyberspace. In the wake of the April 22nd Kashmir attack and India’s Operation Sindoor, dozens of hacktivist groups launched a wave of digital assaults — from DDoS attacks and defacements to claimed data breaches — targeting critical infrastructure and governm…
…
continue reading

1
VCD Roundtable: Ep. 54 – On vDefend Firewall, IDS & IPS, and Advanced Threat Protection
28:21
28:21
Play later
Play later
Lists
Like
Liked
28:21Ep. 54 of the VCD Roundtable explores vDefend Firewall, IDS/IPS, and ATP – focusing on licensing, use cases, and tips for CSPs. Updates to licensing allows overage-based use for vDefend Firewall, removing the need for a three-year commit. The episode highlights vDefend ATP’s value through microsegmentation for tenant workload protection and IDS/IPS…
…
continue reading
some peaktime feelingsBy Robert Babicz
…
continue reading

1
NB528: IP Fabric Adds Firewall Rule Simulation; Extreme Networks Debuts Agentic AI in Platform ONE
27:43
27:43
Play later
Play later
Lists
Like
Liked
27:43Take a Network Break! We begin with a Red Alert for critical vulnerabilities Kubernetes Gardener. Up next, a threat actor has been squatting on unused CNAME records to distribute malware and spam, and IP Fabric rolls out a new firewall rule simulation capability to let administrators test the effect of firewall rules on traffic patterns.... Read mo…
…
continue reading