The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
“Pod Save America” cohost Tommy Vietor thought foreign policy was boring and complicated until he got the education of a lifetime working for President Obama’s National Security Council. On “Pod Save the World,” he and former deputy national security adviser Ben Rhodes break down the latest global developments and bring you behind the scenes with the people who were there. New episodes every Wednesday. Subscribe to Friends of the Pod! Your subscription makes Crooked’s work possible and gives ...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
…
continue reading
The Future of Security Operations Podcast is dedicated to empowering SecOps leaders to reimagine how their teams work so they can scale their security efforts and build a team that achieves more with less.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
A non-partisan podcast brought to you by Geopolitical Futures, an online publication founded by internationally recognized geopolitical forecaster George Friedman. Geopolitical Futures tells you what matters in international affairs and what doesn’t. Go to https://geopoliticalfutures.com/podcast for details.
…
continue reading
Carnegie Connects is our premier virtual event series hosted by Aaron David Miller. Every other week, he tackles the most pressing foreign policy issues of the day in conversations with journalists, policymakers, historians, and experts.
…
continue reading
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
…
continue reading
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Discover stories from real people who are living out their definition of a secure retirement.
…
continue reading
A weekly show that takes big ideas about civic life and democracy and turns them into action items for you.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
continue reading
Listen as Podcast host Joy Votrobek and Sr. Analyst Laurence Sanford bring you podcasts and briefs on national security with an emphasis on ”Peace through Strength.”
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
Bringing together industry leaders, innovators and global thinkers, Future Energy Insights by the World Future Energy Summit takes an in-depth look at renewable energy and sustainability. Featuring lively debate and passionate discussion, the series covers six core topics: clean energy, water scarcity, smart cities, circular economies, waste management and climate change. It shines a spotlight on the critical issues and major gamechangers shaping the sector today.
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
The United States is in the midst of a dramatic political realignment with shifting views on national security, economics, technology, and the role of government in our lives. Saagar Enjeti and Marshall Kosloff explore this with thinkers, policymakers, and more.
…
continue reading

1
Time To Take Your Cyber Medicine - Future Secured Ep 39
41:57
41:57
Play later
Play later
Lists
Like
Liked
41:57What happens when your cybersecurity team is running during a natural disaster, with no power, no cooling, and 40°C outside? In this episode, Nigel Hedges, GM – Cyber & Risk at Chemist Warehouse, joins Tom Finnigan and Jason Murrell to talk about what cyber security really looks like inside a major retail environment. With a career shaped by enterp…
…
continue reading

1
Charting the Future: U.S. Maritime Strategy in the Face of China's Rise
27:25
27:25
Play later
Play later
Lists
Like
Liked
27:25Peace Through Strength podcast with ASCF Sr. Analyst Laurence Sanford and guest Captain Peter Petrelius (U.S. Navy Retired). Captain Petrelius said there is a lack of mariners and merchant vessels. He also states that U.S. shipyards need to be updated. China is outpacing the U.S. in shipping, shipyards, and building. Please subscribe to our newslet…
…
continue reading

1
Tines’ Field CISO Matt Muller on security’s communications problem and the future of the SOC
44:39
44:39
Play later
Play later
Lists
Like
Liked
44:39In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Matt Muller, Field CISO at Tines. With over a decade of experience at companies like Material Security, Coinbase, and Inflection, Matt’s got a strong track record of scaling SecOps teams, building threat detection and mitigation programs, and driving trust and …
…
continue reading

1
Future-Proof Your Retirement with These Key Tips
52:55
52:55
Play later
Play later
Lists
Like
Liked
52:55Navigating the intricacies of Social Security can feel like deciphering a complex puzzle... But what if you had expert guides to help secure your financial future? In this episode, John Curry and April Schoen explore the vital aspects of Social Security retirement benefits, offering insights on how to maximize them for a secure retirement amidst th…
…
continue reading

1
The Future Of API Security With FireTail’s Jeremy Snyder
38:00
38:00
Play later
Play later
Lists
Like
Liked
38:00Episode Summary Jeremy Snyder is the co-founder and CEO of FireTail, a company that enables organizations to adopt AI safely without sacrificing speed or innovation. In this conversation, Jeremy shares his deep expertise in API and AI security, highlighting the second wave of cloud adoption and his pivotal experiences at AWS during key moments in i…
…
continue reading

1
What Vibe Coding, MCP, and Slopsquatting Reveal About the Future of AI Development
24:55
24:55
Play later
Play later
Lists
Like
Liked
24:55Join us as we explore the transformative changes in software development and cybersecurity due to AI. We discuss new terminology like ‘vibe coding’ — a novel, behavior-focused development approach, and ‘MCP’ (Model Context Protocol) — an open standard for AI interfaces. We also address the concept of ‘slopsquatting,’ a new type of threat involving …
…
continue reading

1
Bovril, Deranged, Crocodilus, Cartier, Jinx, Conti, Scattered Spider, Josh Marpet... - SWN #482
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10Bovril, Deranged Hookworm, Crocodilus, Cartier, Jinx, Conti, Scattered Spider, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-482
…
continue reading
Google issues an emergency patch for a Chrome zero-day. A new malware campaign uses fake DocuSign CAPTCHA pages to trick users into installing a RAT. A high-severity Splunk vulnerability allows non-admin users to access and modify critical directories. Experts warn congress that Chinese infiltrations are preparations for war. Senators look to stren…
…
continue reading

1
Should Europe Fear Russia? George Friedman and Antonia Colibasanu from the Balkans
48:15
48:15
Play later
Play later
Lists
Like
Liked
48:15The U.S. decision to recuse itself from European security has created something of a crisis on the continent. America wants European countries to pick up their own defense spending and focus on their own region, following Vladimir Putin's 2022 invasion of Ukraine. So what’s the feeling in Europe about the risks countries there face from Russia? How…
…
continue reading

1
AIs, MCPs, and the Acutal Work that LLMs Are Generating - ASW #333
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
…
continue reading

1
556 | Steve Teles: Are the Abundance Agenda and Populism Incompatible?
39:17
39:17
Play later
Play later
Lists
Like
Liked
39:17Abundance vs. Populism Polling: Poll: Democratic voters prefer "populism" over "abundance" REALIGNMENT NEWSLETTER: https://therealignment.substack.com/ PURCHASE BOOKS AT OUR BOOKSHOP: https://bookshop.org/shop/therealignment Email Us: [email protected] Steve Teles, Johns Hopkins University Professor and Niskanen Center Senior Fellow, returns…
…
continue reading
Memecoins were born as internet pranks – worthless by design, traded for laughs. But now they are buying real power and a digital joke just slipped past the velvet rope, straight into the Oval Office. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading
An international law enforcement operation dismantles AVCheck. Trump’s 2026 budget looks to cut over one thousand positions from CISA. Cyber Command’s defensive wing gains sub-unified command status. A critical vBulletin vulnerability is actively exploited. Acreed takes over Russian markets as credential theft kingpin. Qualcomm patches three active…
…
continue reading

1
Build your own pen testing tools and master red teaming tactics | Ed Williams
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Ed Williams, Vice President of EMEA Consulting and Professional Services (CPS) at TrustWave, shares his two decades of pentesting and red teaming experience with Cyber Work li…
…
continue reading

1
From Deep Sea to Deep Policy: What's Fueling the Modern Energy Race?
37:18
37:18
Play later
Play later
Lists
Like
Liked
37:18Text the ATB Team! We'd love to hear from you! In this episode of At the Boundary, Dr. Andrew Whiskeyman sits down with Milo McBride of the Carnegie Endowment for International Peace to explore one of the most consequential issues in global security today: the race for critical minerals and the future of energy transition. From solar and battery in…
…
continue reading

1
Pwnagotchi: The AI Pet That Hunts Your Network Credentials
35:24
35:24
Play later
Play later
Lists
Like
Liked
35:24What happens when you cross a Tamagotchi with a Wi-Fi hacking tool? You get the Pwnagotchi—a pocket-sized device that "feeds" on Wi-Fi handshakes and learns from its environment. In this episode, Jayden Troffler and Cameron Birkland join the crew to demonstrate how this deceptively cute device can passively capture encrypted Wi-Fi credentials from …
…
continue reading

1
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409
1:38:33
1:38:33
Play later
Play later
Lists
Like
Liked
1:38:33Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
…
continue reading

1
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Eyal Benishti, Chris Peluso, Chad Alessi, Tony Anscombe, Karl Van den Bergh, Nick Carroll - ESW #409
1:38:33
1:38:33
Play later
Play later
Lists
Like
Liked
1:38:33Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
…
continue reading

1
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409
1:38:33
1:38:33
Play later
Play later
Lists
Like
Liked
1:38:33Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
…
continue reading

1
Invasion of Privacy: The Hidden Camera Dilemma
20:17
20:17
Play later
Play later
Lists
Like
Liked
20:17Ever worried about hidden cameras in Airbnb rentals? You’re not alone! In this episode, we explore the unsettling rise of hidden cameras in personal spaces, the inadequacy of current laws, and practical tips to detect surveillance devices. Join hosts Tom Eston, Scott Wright, and Kevin Johnson as they share insights and discuss the implications of v…
…
continue reading

1
Brandon Karpf: A sailor of the 21st century. [Transitioning service member] [Career Notes]
11:27
11:27
Play later
Play later
Lists
Like
Liked
11:27Please enjoy this encore of Career Notes. Lieutenant in the US Navy and Skillbridge Fellow at the CyberWire, Brandon Karpf, knew he wanted to join the military at a young age. He achieved that through the US Naval Academy where he was a member of the men’s heavyweight rowing team. Commissioned as a cryptologic warfare officer, Brandon was sent to M…
…
continue reading

1
Triofox and the key to disaster. [Research Saturday]
22:26
22:26
Play later
Play later
Lists
Like
Liked
22:26This week, we are joined by John Hammond, Principal Security Researcher at Huntress, who is sharing his PoC and research on "CVE-2025-30406 - Critical Gladinet CentreStack & Triofox Vulnerability Exploited In The Wild." A critical 9.0 severity vulnerability (CVE-2025-30406) in Gladinet CentreStack and Triofox is being actively exploited in the wild…
…
continue reading

1
The Evolution of Patch Management with Eric Schultze
24:02
24:02
Play later
Play later
Lists
Like
Liked
24:02Join us for a stroll down patch memory lane! Ivanti's Chris Goettl invites an old colleague to the show -- Eric Schultze, a former software development leader at Amazon, Microsoft, and Shavlik Technologies -- to look back on the early days of Patch Tuesday and how patch management has evolved over the decades since. Join the conversation online on …
…
continue reading

1
Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland... - SWN #481
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-481
…
continue reading
SentinelOne suffers a global service outage. A major DDoS attack hits a Russian internet provider. U.S. banking groups urge the SEC to scrap cybersecurity disclosure rules. Australia mandates reporting of ransomware payments. Researchers uncover a new Browser-in-the-Middle (BitM) attack targeting Safari users. A Florida health system pays over $800…
…
continue reading

1
UL NO. 482 | STANDARD EDITION: AI Finds an 0-Day!, Postman Leaking Secrets, High Agency Mental Model, My Unified Entity Context Video, Github MCP Leaks Private Repos, Google vs. OpenAI vs. Apple on AI ...
31:33
31:33
Play later
Play later
Lists
Like
Liked
31:33AI Finds an 0-Day!, Postman Leaking Secrets, High Agency Mental Model, My Unified Entity Context Video, Github MCP Leaks Private Repos, Google vs. OpenAI vs. Apple on AI Vision, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member to unlock the full version and many other exclusive…
…
continue reading

1
Mic Drop: A former North Korean IT worker speaks
12:09
12:09
Play later
Play later
Lists
Like
Liked
12:09For years, North Korea has quietly dispatched an army of IT workers overseas—not to innovate, but to infiltrate. Disguised as freelancers, they apply for jobs, breach systems, and wire stolen funds back to Pyongyang. This week, a rare conversation with one of them—a defector—about the regime’s digital underworld, and the personal toll of escaping i…
…
continue reading

1
Human-Centric Approaches to Smart Buildings
42:47
42:47
Play later
Play later
Lists
Like
Liked
42:47This episode will explore human-centric design in smart buildings. As technology reshapes the spaces we use, the focus is shifting towards ensuring that our built spaces enhance human well-being, productivity, and connectivity. During this podcast, we will discuss how smart buildings will be increasingly expected to adapt to human needs. We’ll expl…
…
continue reading
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
…
continue reading

1
How to Think About Solutions in Gaza and Sudan
44:46
44:46
Play later
Play later
Lists
Like
Liked
44:46Earlier this week, thousands of Palestinians stormed an aid distribution site in Gaza, underlining the ongoing humanitarian crisis there and prompting the question: Why isn’t the world doing more? Martin Griffiths served as the undersecretary-general for humanitarian affairs and emergency relief coordinator at the United Nations from 2021 until 202…
…
continue reading

1
When "out of the box" becomes "out of control."
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08Children’s DNA in criminal databases. ASUS routers get an unwanted houseguest. New APT41 malware uses Google Calendar for command-and-control. Interlock ransomware gang deploys new Trojan. Estonia issues arrest warrant for suspect in massive pharmacy breach. The enemy within the endpoint. New England hospitals disrupted by cyberattack. Tim Starks f…
…
continue reading

1
Diplomacy or War: The Trump Administration and Iran
47:45
47:45
Play later
Play later
Lists
Like
Liked
47:45While the Trump administration was eager to jettison the Obama-era Iran nuclear deal in its first term, it now seems serious about negotiating another agreement in its second. And Iran, though wary of that seriousness and fearful of U.S. military action, appears willing to give negotiations a chance. What are the prospects for success and the appet…
…
continue reading

1
No More Compliance Theater: Meet Real Security Compliance with Adam Brennick
1:19:31
1:19:31
Play later
Play later
Lists
Like
Liked
1:19:31Is it time to rethink SOC 2? (Spoiler: Adam thinks so—and he’s got the receipts.) In this insightful episode of Security & GRC Decoded, Adam Brennick, Director of Security Risk & Compliance at Cockroach Labs, joins Raj to challenge the status quo of SOC 2, compliance culture, and how GRC teams should operate in a modern, engineering-driven world. W…
…
continue reading

1
From Turkey to Israel: US Imperatives in the Middle East | ClubGPF Preview with George Friedman and Hilal Khashan
8:42
8:42
Play later
Play later
Lists
Like
Liked
8:42It’s hard to find a region facing as much widespread turmoil as the Middle East, both historically and in the modern world. As Geopolitical Futures’ contributing analyst Hilal Khashan predicts, the Middle East will continue to oscillate between established and rising regional powers, with more turbulent times ahead. Hilal joined George Friedman for…
…
continue reading

1
Live from CISO XC DFW: Unfiltered Lessons in Modern Cybersecurity
21:29
21:29
Play later
Play later
Lists
Like
Liked
21:29Sponsor: HivePro (www.hivepro.com) EP67: Threat Exposure Clarity, CISO Certification Origins & Startup Security Strategy Live from CISO XC DFW, this episode of The Professional CISO Show features two powerhouse conversations. First, David Malicoat sits down with Critt Golden of Hive Pro to demystify Continuous Threat Exposure Management (CTEM) and …
…
continue reading
We discuss what it takes to build worker power from scratch and how these efforts can reshape not only our workplaces, but democracy itself. Jaz’s civic action toolkit recommendations are: Organize a union in your workplace Train at Inside Organizer School Jaz Brisack is a union organizer and cofounder of the Inside Organizer School, as well as the…
…
continue reading

1
Australia decides 2025: national security priorities
46:25
46:25
Play later
Play later
Lists
Like
Liked
46:25How is the re-elected Labor Government expected to approach national security and foreign policy in its new term of office? Can Australia strike a sustainable balance between its alliance with the United States and its complex relationship with China? Is the future of the AUKUS agreement secure? What more can the government do to strengthen Austral…
…
continue reading

1
555 | Gary Gerstle & Noam Maggor: The Realignment, Post-Neoliberalism, and the Birth of a New Political Order
1:12:46
1:12:46
Play later
Play later
Lists
Like
Liked
1:12:46Post-Neoliberalism Conference: Beyond Neoliberalism REALIGNMENT NEWSLETTER: https://therealignment.substack.com/ PURCHASE BOOKS AT OUR BOOKSHOP: https://bookshop.org/shop/therealignment Email Us: [email protected] Historians Gary Gerstle and Noam Maggor, organizers of the Beyond Neoliberalism conference, join The Realignment. Marshall, Noam,…
…
continue reading