Insights Into Things

Follow Insights Into Things
Share on
Copy link to clipboard

A podcast network featuring deep dive discussions into Teens, Entertainment, Technology, Gaming, Politics, Industry and History.

Joseph Whalen


    • May 26, 2025 LATEST EPISODE
    • weekdays NEW EPISODES
    • 51m AVG DURATION
    • 578 EPISODES


    Search for episodes from Insights Into Things with a specific topic:

    Latest episodes from Insights Into Things

    Insights Into Technology: Episode 28 “Smish, Vish, and Deepfake Dish” (AUDIO)

    Play Episode Listen Later May 26, 2025 36:40


    Join host Joseph Whalen in Episode 28 of "Insights into Technology," as we explore the latest in cyber threats and innovations. Discover how Windows Defender was tricked by DefendNOT, an ingenious tool using an undocumented API to shut down vital security protections. We'll also dive into the recent Pwn2Own Berlin 2025 competition, where hackers walked away with over a million dollars after uncovering 28 zero-day vulnerabilities. Additionally, learn about the record-setting DDoS attack handled by Google's Project Shield and the evolving threat landscape with IoT devices. The episode also highlights the use of AI in enhancing phishing attempts targeting U.S. government officials and discusses Congress's move to diversify the cybersecurity workforce. Finally, we touch on cutting-edge developments in vulnerability management as we examine the proposed Likely Exploited Vulnerabilities (LEV) metric and its potential to reshape patch prioritization. Tune in for these topics and more on "Insights into Technology." Listen and subscribe for your weekly tech news essentials!

    Insights Into Technology: Episode 28 “Smish, Vish, and Deepfake Dish” (VIDEO)

    Play Episode Listen Later May 26, 2025 36:40


    Join host Joseph Whalen in Episode 28 of "Insights into Technology," as we explore the latest in cyber threats and innovations. Discover how Windows Defender was tricked by DefendNOT, an ingenious tool using an undocumented API to shut down vital security protections. We'll also dive into the recent Pwn2Own Berlin 2025 competition, where hackers walked away with over a million dollars after uncovering 28 zero-day vulnerabilities. Additionally, learn about the record-setting DDoS attack handled by Google's Project Shield and the evolving threat landscape with IoT devices. The episode also highlights the use of AI in enhancing phishing attempts targeting U.S. government officials and discusses Congress's move to diversify the cybersecurity workforce. Finally, we touch on cutting-edge developments in vulnerability management as we examine the proposed Likely Exploited Vulnerabilities (LEV) metric and its potential to reshape patch prioritization. Tune in for these topics and more on "Insights into Technology." Listen and subscribe for your weekly tech news essentials!

    Insights Into Technology: Episode 27 "Patch Fast, Code Nice, and Maybe Don't Use That 2012 Router" (AUDIO)

    Play Episode Listen Later May 17, 2025 24:06


    In this episode of Insights into Technology, we explore the latest cybersecurity threats and solutions shaping the tech world. Discover the implications of a groundbreaking proof of concept that shows how ransomware could potentially hide in your CPU's microcode, evading traditional security measures. We also delve into the UK's initiative for secure software development and discuss the new vulnerabilities uncovered in Intel processors that threaten data privacy. Join us as we address pressing concerns about IoT devices being turned into malicious proxies, and find out how Microsoft is introducing new features to enhance security during Teams meetings. Stay informed and prepare to safeguard your tech environment against emerging cyber threats.

    Insights Into Technology: Episode 27 "Patch Fast, Code Nice, and Maybe Don't Use That 2012 Router" (VIDEO)

    Play Episode Listen Later May 17, 2025 24:06


    In this episode of Insights into Technology, we explore the latest cybersecurity threats and solutions shaping the tech world. Discover the implications of a groundbreaking proof of concept that shows how ransomware could potentially hide in your CPU's microcode, evading traditional security measures. We also delve into the UK's initiative for secure software development and discuss the new vulnerabilities uncovered in Intel processors that threaten data privacy. Join us as we address pressing concerns about IoT devices being turned into malicious proxies, and find out how Microsoft is introducing new features to enhance security during Teams meetings. Stay informed and prepare to safeguard your tech environment against emerging cyber threats.

    Insights Into Technology: Episode 26 "Shopping, Streaming, and Screaming" (AUDIO)

    Play Episode Listen Later May 4, 2025 35:29


    Join us on this week's episode of Insights into Technology, where we unravel the chaos caused by the latest Windows security update gone wrong, and explore how Apple's AirPlay is vulnerable to attack, putting millions of devices at risk. Discover how Cloudflare is heroically defending against unprecedented DDoS assaults, and delve into the brewing tension between tech giants OpenAI and Microsoft over AI's future. Plus, learn about Mastercard's AI-powered shopping assistant that's redefining online retail. With the backdrop of these technological upheavals, we'll guide you through the current landscape of innovation and its challenges.

    Insights Into Technology: Episode 26 "Shopping, Streaming, and Screaming" (VIDEO)

    Play Episode Listen Later May 4, 2025 35:29


    Join us on this week's episode of Insights into Technology, where we unravel the chaos caused by the latest Windows security update gone wrong, and explore how Apple's AirPlay is vulnerable to attack, putting millions of devices at risk. Discover how Cloudflare is heroically defending against unprecedented DDoS assaults, and delve into the brewing tension between tech giants OpenAI and Microsoft over AI's future. Plus, learn about Mastercard's AI-powered shopping assistant that's redefining online retail. With the backdrop of these technological upheavals, we'll guide you through the current landscape of innovation and its challenges.

    Insights Into Technology: Episode 25 "From PDFs to Patient Monitors, Nothing is Safe" (AUDIO)

    Play Episode Listen Later Apr 4, 2025 57:45


    In this week's episode of Insights into Technology, host Joseph Whalen delves into the latest cybersecurity threats and advancements. The FBI warns against using free online PDF converters due to risks of malware infections and ransomware attacks. Companies are advised to ban unsolicited converters and train employees on handling sensitive documents. We also explore the European Commission's significant $1.3 billion investment in cybersecurity and AI under the Digital Europe Program, aimed at strengthening the EU's digital infrastructure and resilience. In the healthcare sector, the FDA's increasing role in medical device cybersecurity is discussed, highlighting the need for improved security measures as more devices become vulnerable to cyber threats.

    Insights Into Technology: Episode 25 "From PDFs to Patient Monitors, Nothing is Safe" (VIDEO)

    Play Episode Listen Later Apr 4, 2025 57:45


    In this week's episode of Insights into Technology, host Joseph Whalen delves into the latest cybersecurity threats and advancements. The FBI warns against using free online PDF converters due to risks of malware infections and ransomware attacks. Companies are advised to ban unsolicited converters and train employees on handling sensitive documents. We also explore the European Commission's significant $1.3 billion investment in cybersecurity and AI under the Digital Europe Program, aimed at strengthening the EU's digital infrastructure and resilience. In the healthcare sector, the FDA's increasing role in medical device cybersecurity is discussed, highlighting the need for improved security measures as more devices become vulnerable to cyber threats.

    Insights Into Technology: Episode 24 "Signed, Sealed, Encrypted...and Still Screwed" (AUDIO)

    Play Episode Listen Later Mar 30, 2025 50:01


    In this episode of Insights into Technology, host Joseph Whalen delves into the challenges facing the tech industry today. We kick things off with a look at how cybercriminals are exploiting Microsoft's trusted signing service to disguise malware as legitimate software, highlighting the cracks in current security measures. Learn why enterprises need to recalibrate their detection algorithms to spot potentially dangerous applications. Next, we explore the significant implications of 23andMe's bankruptcy. With millions of customers' genetic data at risk, discover what this means for privacy and why consumers should act now to safeguard their information. We discuss the broader issue of genetic data commodification in the corporate world. Finally, the episode covers the FCC's probe into Chinese tech companies allegedly bypassing US bans, and how this impacts national security. We end with insights into the National Vulnerabilities Database backlog and what enterprises must do to keep up with the ever-evolving cyber threat landscape, illustrating the urgent need for adaptive and proactive security measures.

    Insights Into Technology: Episode 24 "Signed, Sealed, Encrypted...and Still Screwed" (VIDEO)

    Play Episode Listen Later Mar 30, 2025 50:01 Transcription Available


    In this episode of Insights into Technology, host Joseph Whalen delves into the challenges facing the tech industry today. We kick things off with a look at how cybercriminals are exploiting Microsoft's trusted signing service to disguise malware as legitimate software, highlighting the cracks in current security measures. Learn why enterprises need to recalibrate their detection algorithms to spot potentially dangerous applications. Next, we explore the significant implications of 23andMe's bankruptcy. With millions of customers' genetic data at risk, discover what this means for privacy and why consumers should act now to safeguard their information. We discuss the broader issue of genetic data commodification in the corporate world. Finally, the episode covers the FCC's probe into Chinese tech companies allegedly bypassing US bans, and how this impacts national security. We end with insights into the National Vulnerabilities Database backlog and what enterprises must do to keep up with the ever-evolving cyber threat landscape, illustrating the urgent need for adaptive and proactive security measures.

    No Credits Rolled Episode 15: Concord Open Beta and The Witcher 3: Hearts of Stone (AUDIO)

    Play Episode Listen Later Mar 26, 2025 42:36


    In this episode, Sam Whalen delves into the troubling news of significant layoffs at Destiny developer Bungie, affecting around 220 employees. He discusses the potential reasons behind these job cuts and their impact on the company and the gaming industry. On a lighter note, Sam explores what's in store for Xbox fans at the upcoming Gamescom 2024, highlighting the exciting line-up of games set to be showcased. Additionally, he shares his thoughts on the Concord open beta, expressing surprise at its engaging gameplay despite initial skepticism. Finally, he dives into the world of The Witcher 3, reviewing the Hearts of Stone expansion and sharing his admiration for the franchise's storytelling excellence.

    No Credits Rolled Episode 15: Concord Open Beta and The Witcher 3: Hearts of Stone (VIDEO)

    Play Episode Listen Later Mar 26, 2025 42:36 Transcription Available


    In this episode, Sam Whalen delves into the troubling news of significant layoffs at Destiny developer Bungie, affecting around 220 employees. He discusses the potential reasons behind these job cuts and their impact on the company and the gaming industry. On a lighter note, Sam explores what's in store for Xbox fans at the upcoming Gamescom 2024, highlighting the exciting line-up of games set to be showcased. Additionally, he shares his thoughts on the Concord open beta, expressing surprise at its engaging gameplay despite initial skepticism. Finally, he dives into the world of The Witcher 3, reviewing the Hearts of Stone expansion and sharing his admiration for the franchise's storytelling excellence.

    No Credits Rolled Episode 14: Marvel Rivals Preview (AUDIO)

    Play Episode Listen Later Mar 19, 2025 35:55 Transcription Available


    Join Sam Whalen in the latest episode of No Credits Rolled as he sips his morning coffee and dives into the gaming world's hottest topics. First up, a detailed commentary on Apex Legends' contentious Battle Pass changes which spurred significant community backlash, forcing Respawn to reconsider their approach. Followed by an enthusiastic preview of Marvel Rivals—an upcoming hero shooter from NetEase Games, where Sam shares his first-hand beta experience. Discover how this game might just challenge established titans with its Marvel magic and gameplay innovations. Whether you're an Apex veteran or a Marvel enthusiast, this episode has insights for everyone.

    No Credits Rolled Episode 14: Marvel Rivals Preview (VIDEO)

    Play Episode Listen Later Mar 19, 2025 37:53


    Join Sam Whalen in the latest episode of No Credits Rolled as he sips his morning coffee and dives into the gaming world's hottest topics. First up, a detailed commentary on Apex Legends' contentious Battle Pass changes which spurred significant community backlash, forcing Respawn to reconsider their approach. Followed by an enthusiastic preview of Marvel Rivals—an upcoming hero shooter from NetEase Games, where Sam shares his first-hand beta experience. Discover how this game might just challenge established titans with its Marvel magic and gameplay innovations. Whether you're an Apex veteran or a Marvel enthusiast, this episode has insights for everyone.

    Insights Into Technology: Episode 23 "Bugs, Breaches and Bot Takeovers" (AUDIO)

    Play Episode Listen Later Mar 15, 2025 53:40


    In this episode of Insights into Technology, we delve into the world of AI, exploring its security risks and compliance challenges. Host Joseph Whalen addresses the concerns raised by Meredith Whitaker regarding agentic AI's need for extensive data access and the associated privacy vulnerabilities. We also discuss X's massive cyberattack and the implications of Sean Plancky's nomination as the head of CISA, highlighting how these events underscore significant cybersecurity vulnerabilities. The episode further explores the intricacies of human programmers in an AI-driven world, featuring insights from IBM's CEO on AI's role as a collaborative tool rather than a replacement. We round off with a fascinating historical journey of AI, from Alan Turing's groundbreaking ideas to today's deep learning models, and the impact of AI on enterprises.

    Insights Into Technology: Episode 23 "Bugs, Breaches and Bot Takeovers" (VIDEO)

    Play Episode Listen Later Mar 15, 2025 53:40


    In this episode of Insights into Technology, we delve into the world of AI, exploring its security risks and compliance challenges. Host Joseph Whalen addresses the concerns raised by Meredith Whitaker regarding agentic AI's need for extensive data access and the associated privacy vulnerabilities. We also discuss X's massive cyberattack and the implications of Sean Plancky's nomination as the head of CISA, highlighting how these events underscore significant cybersecurity vulnerabilities. The episode further explores the intricacies of human programmers in an AI-driven world, featuring insights from IBM's CEO on AI's role as a collaborative tool rather than a replacement. We round off with a fascinating historical journey of AI, from Alan Turing's groundbreaking ideas to today's deep learning models, and the impact of AI on enterprises.

    Insights Into Technology: Episode 22 "No Cyber Command, No Cyber Control" (AUDIO)

    Play Episode Listen Later Mar 11, 2025 62:05


    In this episode of 'Insights into Technology,' host Joseph Whalen delves into the week's top tech stories. Starting with a controversial directive from Defense Secretary Hegseth, the episode explores the strategic pause on U.S. Cyber Command's offensive operations against Russia and its potential implications for cybersecurity. The show also covers the imminent transition from Skype to Microsoft Teams, highlighting the benefits and challenges of this major shift. Additionally, the episode touches on Apple's legal battle against a UK government order seeking backdoor access to its encrypted iCloud storage, raising significant data privacy concerns. With expert insights and discussions on the future impact of these developments on businesses and individual users, this episode is packed with critical information for anyone interested in cybersecurity, data privacy, and technological advancements.

    Insights Into Technology: Episode 22 "No Cyber Command, No Cyber Control" (VIDEO)

    Play Episode Listen Later Mar 11, 2025 62:05


    In this episode of 'Insights into Technology,' host Joseph Whalen delves into the week's top tech stories. Starting with a controversial directive from Defense Secretary Hegseth, the episode explores the strategic pause on U.S. Cyber Command's offensive operations against Russia and its potential implications for cybersecurity. The show also covers the imminent transition from Skype to Microsoft Teams, highlighting the benefits and challenges of this major shift. Additionally, the episode touches on Apple's legal battle against a UK government order seeking backdoor access to its encrypted iCloud storage, raising significant data privacy concerns. With expert insights and discussions on the future impact of these developments on businesses and individual users, this episode is packed with critical information for anyone interested in cybersecurity, data privacy, and technological advancements.

    Insights Into Technology: Episode 21 “Hacked, Tracked, and Fact-Checked” (AUDIO)

    Play Episode Listen Later Mar 1, 2025 57:34


    In this episode of Insights into Technology, host Joseph Whalen dives into the latest tech trends impacting businesses and consumers alike. We start by exploring Apple's controversial move to disable end-to-end encryption for iCloud in the UK, responding to governmental demands for backdoor access. This decision raises significant concerns about data sovereignty and corporate compliance with varying international regulations. The episode also delves into cybersecurity, examining a recent breach involving AI-generated media manipulation within a federal agency and a significant data breach at an employee screening firm. The discussions highlight the pressing need for robust cybersecurity measures to combat media manipulation and identity theft challenges. Additionally, Joseph covers the ongoing right-to-repair movement across the U.S., emphasizing its potential to reshape corporate maintenance strategies and reduce electronic waste. Microsoft's new ad-supported Office version and Amazon's Alexa Plus service demonstrate the evolving landscape of digital services, while sparking debates about productivity, data privacy, and subscription models. Join us to gain valuable insights into how these developments might impact your tech-centric world and what steps businesses can take to navigate these changes effectively.

    Insights Into Technology: Episode 21 “Hacked, Tracked, and Fact-Checked” (VIDEO)

    Play Episode Listen Later Mar 1, 2025 57:34


    In this episode of Insights into Technology, host Joseph Whalen dives into the latest tech trends impacting businesses and consumers alike. We start by exploring Apple's controversial move to disable end-to-end encryption for iCloud in the UK, responding to governmental demands for backdoor access. This decision raises significant concerns about data sovereignty and corporate compliance with varying international regulations. The episode also delves into cybersecurity, examining a recent breach involving AI-generated media manipulation within a federal agency and a significant data breach at an employee screening firm. The discussions highlight the pressing need for robust cybersecurity measures to combat media manipulation and identity theft challenges. Additionally, Joseph covers the ongoing right-to-repair movement across the U.S., emphasizing its potential to reshape corporate maintenance strategies and reduce electronic waste. Microsoft's new ad-supported Office version and Amazon's Alexa Plus service demonstrate the evolving landscape of digital services, while sparking debates about productivity, data privacy, and subscription models. Join us to gain valuable insights into how these developments might impact your tech-centric world and what steps businesses can take to navigate these changes effectively.

    Insights Into Technology: Episode 20 "Scammers, Spammers, and AI Auditors - Oh My!" (AUDIO)

    Play Episode Listen Later Feb 23, 2025 53:46


    Welcome to the latest episode of Insights into Technology. Our hosts delve into the pressing issues surrounding cybersecurity vulnerabilities affecting Apple iOS and Mitel SIP phones. Discover the implications of these threats for enterprise security and the measures organizations should take to mitigate them. In another story, we explore JPMorgan Chase's decision to block Zelle payments linked to social media, a move aimed at reducing online scams but raising concerns for small businesses relying on such transactions. Additionally, the episode covers the IRS's innovative partnership with NVIDIA to leverage AI technology, enhancing the detection of complex corporate tax evasion schemes. These advancements signal a significant step forward in regulatory enforcement and tax compliance.

    Insights Into Technology: Episode 20 "Scammers, Spammers, and AI Auditors - Oh My!" (VIDEO)

    Play Episode Listen Later Feb 23, 2025 53:46


    Welcome to the latest episode of Insights into Technology. Our hosts delve into the pressing issues surrounding cybersecurity vulnerabilities affecting Apple iOS and Mitel SIP phones. Discover the implications of these threats for enterprise security and the measures organizations should take to mitigate them. In another story, we explore JPMorgan Chase's decision to block Zelle payments linked to social media, a move aimed at reducing online scams but raising concerns for small businesses relying on such transactions. Additionally, the episode covers the IRS's innovative partnership with NVIDIA to leverage AI technology, enhancing the detection of complex corporate tax evasion schemes. These advancements signal a significant step forward in regulatory enforcement and tax compliance.

    Insights Into Technology: Episode 19 “Elon, AI, and Election Security—What Could Possibly Go Wrong?” (AUDIO)

    Play Episode Listen Later Feb 15, 2025 56:33


    Welcome to Episode 19 of Insights into Technology, where we delve into the intersection of technology and security. Join host Joseph Whalen as we explore the controversial integration of Elon Musk's Department of Government Efficiency (DOGE) into federal systems, raising alarm over potential privacy violations and data breaches. We'll also discuss the unsettling trend of dismantling election security measures, leaving systems vulnerable to misinformation and foreign interference. Finally, dive into the alarming advancements in AI capabilities and the associated security risks that could transform the tech landscape forever. Tune in for a critical look at the current state of technology and its implications on privacy, security, and global trust.

    Insights Into Technology: Episode 19 “Elon, AI, and Election Security—What Could Possibly Go Wrong?” (VIDEO)

    Play Episode Listen Later Feb 15, 2025 56:33


    Welcome to Episode 19 of Insights into Technology, where we delve into the intersection of technology and security. Join host Joseph Whalen as we explore the controversial integration of Elon Musk's Department of Government Efficiency (DOGE) into federal systems, raising alarm over potential privacy violations and data breaches. We'll also discuss the unsettling trend of dismantling election security measures, leaving systems vulnerable to misinformation and foreign interference. Finally, dive into the alarming advancements in AI capabilities and the associated security risks that could transform the tech landscape forever. Tune in for a critical look at the current state of technology and its implications on privacy, security, and global trust.

    Insights Into Technology: Episode 18 "Hackers, Higgs and the End of Windows" (AUDIO)

    Play Episode Listen Later Feb 9, 2025 57:56


    In this episode of "Insights into Technology," host Joseph Whalen delves into the escalating world of cybersecurity threats with a focus on the alarming rise in credential theft. The discussion covers the intricate details of sneak thief malware and its implications for enterprise environments, as security teams brace for the top 10 MITRE attack techniques. The episode also delves into the evolving role of artificial intelligence in particle physics, exploring how AI is transforming research at the Large Hadron Collider and its potential to unlock the universe's deepest mysteries. Additionally, it touches on the ethical considerations and security challenges posed by AI in espionage activities. Finally, the episode examines Microsoft's strategic push towards Windows 11, highlighting the hardware requirements and the broader implications for users and organizations facing a significant tech upgrade.

    Insights Into Technology: Episode 18 "Hackers, Higgs and the End of Windows" (VIDEO)

    Play Episode Listen Later Feb 9, 2025 57:56


    In this episode of "Insights into Technology," host Joseph Whalen delves into the escalating world of cybersecurity threats with a focus on the alarming rise in credential theft. The discussion covers the intricate details of sneak thief malware and its implications for enterprise environments, as security teams brace for the top 10 MITRE attack techniques. The episode also delves into the evolving role of artificial intelligence in particle physics, exploring how AI is transforming research at the Large Hadron Collider and its potential to unlock the universe's deepest mysteries. Additionally, it touches on the ethical considerations and security challenges posed by AI in espionage activities. Finally, the episode examines Microsoft's strategic push towards Windows 11, highlighting the hardware requirements and the broader implications for users and organizations facing a significant tech upgrade.

    Insights Into Technology: Episode 17 "Llama Drama and Phishy Calls" (AUDIO)

    Play Episode Listen Later Feb 1, 2025 58:05 Transcription Available


    This week's episode of Insights into Technology dives into the pressing security challenges in the tech world. We explore the recent vulnerability found in Meta's Llama AI framework that highlights the critical importance of secure coding practices and serialization methods. This flaw emphasizes the potential risks when deploying AI in enterprise environments. We also delve into a sophisticated phishing attempt targeting Hack Club's founder, showcasing the intricate deception faced in today's digital communications. Discussion extends to PowerSchool's data breach, affecting thousands of school districts and spotlighting the need for comprehensive vendor security evaluations. From advanced phishing defenses to addressing supply chain vulnerabilities, we cover the latest incidents and propose strategies for enterprises to mitigate these growing cybersecurity threats. Tune in for a thorough analysis of the week's top stories and gain insights into effective security practices.

    Insights Into Technology: Episode 17 "Llama Drama and Phishy Calls" (VIDEO)

    Play Episode Listen Later Feb 1, 2025 61:06


    This week's episode of Insights into Technology dives into the pressing security challenges in the tech world. We explore the recent vulnerability found in Meta's Llama AI framework that highlights the critical importance of secure coding practices and serialization methods. This flaw emphasizes the potential risks when deploying AI in enterprise environments. We also delve into a sophisticated phishing attempt targeting Hack Club's founder, showcasing the intricate deception faced in today's digital communications. Discussion extends to PowerSchool's data breach, affecting thousands of school districts and spotlighting the need for comprehensive vendor security evaluations. From advanced phishing defenses to addressing supply chain vulnerabilities, we cover the latest incidents and propose strategies for enterprises to mitigate these growing cybersecurity threats. Tune in for a thorough analysis of the week's top stories and gain insights into effective security practices.

    No Credits Rolled Episode 13: Dying Light 2 (AUDIO)

    Play Episode Listen Later Jan 29, 2025 33:02


    In this episode, host Sam Whalen delves into the controversial price hike of Xbox Game Pass and its implications for gamers. He explores whether the service still holds value despite rising costs and the exclusion of day-one releases from the standard tier. Sam also discusses the ongoing challenges faced by Rocksteady's "Suicide Squad: Kill the Justice League" following another delay in its content release. He reflects on its development hurdles and the future of the studio. Additionally, the episode highlights Sweden's unique approach to recognizing video games as part of its cultural heritage, spotlighting titles like Minecraft, Candy Crush, and Goat Simulator that have left a significant mark on Swedish culture.

    No Credits Rolled Episode 13: Dying Light 2 (VIDEO)

    Play Episode Listen Later Jan 29, 2025 31:44 Transcription Available


    In this episode, host Sam Whalen delves into the controversial price hike of Xbox Game Pass and its implications for gamers. He explores whether the service still holds value despite rising costs and the exclusion of day-one releases from the standard tier. Sam also discusses the ongoing challenges faced by Rocksteady's "Suicide Squad: Kill the Justice League" following another delay in its content release. He reflects on its development hurdles and the future of the studio. Additionally, the episode highlights Sweden's unique approach to recognizing video games as part of its cultural heritage, spotlighting titles like Minecraft, Candy Crush, and Goat Simulator that have left a significant mark on Swedish culture.

    Insights Into Technology: Episode 16 "AI, Lies and Cyber Spies" (VIDEO)

    Play Episode Listen Later Jan 24, 2025 65:18


    In episode 16 of Insights into Technology, host Joseph Whelan dives into the week's top tech news, uncovering the complexities and controversies surrounding cybersecurity and AI developments. In a rapidly evolving digital landscape, the episode explores the implications of political decisions, such as Kristi Noem's stance on disinformation and the administration's impact on the Cybersecurity and Infrastructure Security Agency (CISA). The discussion also delves into the world of cyber threats, as Hewlett Packard Enterprise investigates a potential data breach and Zendesk faces vulnerabilities exploited for phishing attacks. With a focus on enterprise security, the episode examines how businesses can adapt to changing cybersecurity challenges. Finally, the episode touches on groundbreaking innovations and regulatory dynamics, highlighting the tension between innovation and regulation in AI development. From AI-powered pricing scrutiny by the FTC to massive private sector investments in AI infrastructure under Trump's administration, the podcast navigates the critical intersections of technology, policy, and enterprise risk.

    Insights Into Technology: Episode 16 "AI, Lies and Cyber Spies" (AUDIO)

    Play Episode Listen Later Jan 24, 2025 61:38 Transcription Available


    In episode 16 of Insights into Technology, host Joseph Whelan dives into the week's top tech news, uncovering the complexities and controversies surrounding cybersecurity and AI developments. In a rapidly evolving digital landscape, the episode explores the implications of political decisions, such as Kristi Noem's stance on disinformation and the administration's impact on the Cybersecurity and Infrastructure Security Agency (CISA). The discussion also delves into the world of cyber threats, as Hewlett Packard Enterprise investigates a potential data breach and Zendesk faces vulnerabilities exploited for phishing attacks. With a focus on enterprise security, the episode examines how businesses can adapt to changing cybersecurity challenges. Finally, the episode touches on groundbreaking innovations and regulatory dynamics, highlighting the tension between innovation and regulation in AI development. From AI-powered pricing scrutiny by the FTC to massive private sector investments in AI infrastructure under Trump's administration, the podcast navigates the critical intersections of technology, policy, and enterprise risk.

    Insights Into Technology: Episode 15 "Cyber Hygiene and Meta's Purge" (AUDIO)

    Play Episode Listen Later Jan 18, 2025 55:01 Transcription Available


    In this episode of Insights into Technology, we delve into the booming enrollment in CISA's cyber hygiene program, highlighting the significant 201% increase and its impact on the cybersecurity landscape. Discover how critical infrastructure sectors are embracing proactive measures to mitigate vulnerabilities and enhance security postures. We also explore the rise of FunkSec, a new ransomware group utilizing AI-generated malware, posing a unique threat with their low ransom demands and innovative use of technology. Learn about the implications of such AI-driven tactics on enterprise security and the increasing risks in the cybersecurity realm. Lastly, we discuss Meta's recent performance-based workforce adjustments and President Biden's executive order to expand AI infrastructure with a focus on data centers and clean energy. Understand the potential shifts in enterprise computing and the ongoing evolution of AI in the tech industry.

    Insights Into Technology: Episode 15 "Cyber Hygiene and Meta's Purge" (VIDEO)

    Play Episode Listen Later Jan 18, 2025 57:57


    In this episode of Insights into Technology, we delve into the booming enrollment in CISA's cyber hygiene program, highlighting the significant 201% increase and its impact on the cybersecurity landscape. Discover how critical infrastructure sectors are embracing proactive measures to mitigate vulnerabilities and enhance security postures. We also explore the rise of FunkSec, a new ransomware group utilizing AI-generated malware, posing a unique threat with their low ransom demands and innovative use of technology. Learn about the implications of such AI-driven tactics on enterprise security and the increasing risks in the cybersecurity realm. Lastly, we discuss Meta's recent performance-based workforce adjustments and President Biden's executive order to expand AI infrastructure with a focus on data centers and clean energy. Understand the potential shifts in enterprise computing and the ongoing evolution of AI in the tech industry.

    Insights Into Technology: Episode 14 "CyberTrust or Bust" (AUDIO)

    Play Episode Listen Later Jan 12, 2025 50:15 Transcription Available


    In Episode 14 of Insights into Technology, host Joseph Whalen delves into the revolutionary rollout of Cybertrust labels set for 2025. This initiative aims to enhance consumer confidence by certifying smart devices with rigorous cybersecurity standards. Listeners will learn about the implications for IoT safety, as the average U.S. household juggles 21 connected devices, presenting high risks for cyber attacks. The episode also covers recent cybersecurity incidents, including a significant breach at the U.S. Treasury attributed to Chinese state-sponsored hackers, highlighting vulnerabilities within federal systems. Additionally, Whalen discusses the legal challenges faced by T-Mobile following a massive data breach, emphasizing the importance of robust cybersecurity practices for large corporations. Explore the tensions between rising cybersecurity measures and existing vulnerabilities, the economic impact on consumers, and the broader geopolitical implications of state-sponsored cyber operations in this engaging and informative episode.

    Insights Into Technology: Episode 14 "CyberTrust or Bust" (VIDEO)

    Play Episode Listen Later Jan 12, 2025 52:49 Transcription Available


    In Episode 14 of Insights into Technology, host Joseph Whalen delves into the revolutionary rollout of Cybertrust labels set for 2025. This initiative aims to enhance consumer confidence by certifying smart devices with rigorous cybersecurity standards. Listeners will learn about the implications for IoT safety, as the average U.S. household juggles 21 connected devices, presenting high risks for cyber attacks. The episode also covers recent cybersecurity incidents, including a significant breach at the U.S. Treasury attributed to Chinese state-sponsored hackers, highlighting vulnerabilities within federal systems. Additionally, Whalen discusses the legal challenges faced by T-Mobile following a massive data breach, emphasizing the importance of robust cybersecurity practices for large corporations. Explore the tensions between rising cybersecurity measures and existing vulnerabilities, the economic impact on consumers, and the broader geopolitical implications of state-sponsored cyber operations in this engaging and informative episode.

    Insights Into Technology: Episode 13 "U.S. Under CyberSeige and the Year in Review" (AUDIO)

    Play Episode Listen Later Jan 4, 2025 57:04 Transcription Available


    This episode explores pressing cybersecurity issues, highlighting the alarming breaches in U.S. telecommunications attributed to inadequate security measures and federal mandates complicating the scenario. Joseph Whelan discusses the implications of these breaches and the cyclical blame game between telecoms and the government, accentuating the need for better cybersecurity practices. Additionally, the episode delves into major incidents involving companies like Cisco and the U.S. Treasury Department, showcasing the vulnerabilities within public-facing resources and trusted third-party services. The conversation shifts towards the complexities surrounding data security, emphasizing the pressing need for stringent access controls and the ongoing challenges enterprises face in securing their infrastructures. Furthermore, the podcast takes a closer look at technological advancements in AI and the regulatory shifts in cybersecurity measures, analyzing their impact on various industries. This comprehensive review provides insights into the evolving landscape of technology and cybersecurity, urging listeners to reconsider their approach to data protection and risk management.

    Insights Into Technology: Episode 13 "U.S. Under CyberSeige and the Year in Review" (VIDEO)

    Play Episode Listen Later Jan 4, 2025 60:03


    This episode explores pressing cybersecurity issues, highlighting the alarming breaches in U.S. telecommunications attributed to inadequate security measures and federal mandates complicating the scenario. Joseph Whelan discusses the implications of these breaches and the cyclical blame game between telecoms and the government, accentuating the need for better cybersecurity practices. Additionally, the episode delves into major incidents involving companies like Cisco and the U.S. Treasury Department, showcasing the vulnerabilities within public-facing resources and trusted third-party services. The conversation shifts towards the complexities surrounding data security, emphasizing the pressing need for stringent access controls and the ongoing challenges enterprises face in securing their infrastructures. Furthermore, the podcast takes a closer look at technological advancements in AI and the regulatory shifts in cybersecurity measures, analyzing their impact on various industries. This comprehensive review provides insights into the evolving landscape of technology and cybersecurity, urging listeners to reconsider their approach to data protection and risk management.

    Insights Into Technology: Episode 12 "UnitedHealth Takes Another Hit" (AUDIO)

    Play Episode Listen Later Dec 21, 2024 49:53 Transcription Available


    In this episode of Insights into Technology, host Joseph Whalen dives into the week's top tech news stories. First, explore the implications of UnitedHealth's AI-driven insurance claims chatbot being exposed online, raising cybersecurity concerns and public trust issues. Next, discover how the U.S. Supreme Court's decision not to hear an ISP challenge paves the way for New York's $15 broadband law, potentially reshaping internet access across the country and closing the digital divide. Finally, learn about Seagate's groundbreaking 32TB hard drive using heat-assisted magnetic recording (HAMR) technology, marking a significant leap in data storage capacity and efficiency for enterprises and cloud computing.

    Insights Into Technology: Episode 12 "UnitedHealth Takes Another Hit" (VIDEO)

    Play Episode Listen Later Dec 21, 2024 53:01


    In this episode of Insights into Technology, host Joseph Whalen dives into the week's top tech news stories. First, explore the implications of UnitedHealth's AI-driven insurance claims chatbot being exposed online, raising cybersecurity concerns and public trust issues. Next, discover how the U.S. Supreme Court's decision not to hear an ISP challenge paves the way for New York's $15 broadband law, potentially reshaping internet access across the country and closing the digital divide. Finally, learn about Seagate's groundbreaking 32TB hard drive using heat-assisted magnetic recording (HAMR) technology, marking a significant leap in data storage capacity and efficiency for enterprises and cloud computing.

    Insights Into Technology: Episode 11 "The Salt Typhoon Saga and CMMC" (AUDIO)

    Play Episode Listen Later Dec 13, 2024 52:21 Transcription Available


    In this riveting episode of Insights into Technology, host Joseph Whalen delves into the ongoing "Salt Typhoon" cyber espionage saga, exploring the sophisticated tactics employed by China-linked cyber actors to breach U.S. telecom infrastructures. As national security hangs in the balance, Whalen highlights the urgent need for robust encryption and rapid response strategies. The discussion extends to the introduction of CMMC 2.0, as organizations brace for heightened security standards set to protect government data and critical U.S. infrastructure. Join us as we assess the stakes of global cyber conflicts and investigate if legislative measures can keep up with advancing threats.

    Insights Into Technology: Episode 11 "The Salt Typhoon Saga and CMMC" (VIDEO)

    Play Episode Listen Later Dec 13, 2024 55:16


    In this riveting episode of Insights into Technology, host Joseph Whalen delves into the ongoing "Salt Typhoon" cyber espionage saga, exploring the sophisticated tactics employed by China-linked cyber actors to breach U.S. telecom infrastructures. As national security hangs in the balance, Whalen highlights the urgent need for robust encryption and rapid response strategies. The discussion extends to the introduction of CMMC 2.0, as organizations brace for heightened security standards set to protect government data and critical U.S. infrastructure. Join us as we assess the stakes of global cyber conflicts and investigate if legislative measures can keep up with advancing threats.

    Insights Into Technology: Episode 10 "Lost Logs and a Look at NIST Frameworks" (AUDIO)

    Play Episode Listen Later Dec 7, 2024 65:08


    In this episode, we dive into critical tech news of the week. Learn why Cloudflare's recent log loss incident highlights the vulnerabilities in large-scale data management and how mobile apps are secretly targeting millions. Discover the implications of Rockstar 2FA's phishing attacks on Microsoft 365 users and unravel the ongoing challenges with legacy system vulnerabilities. We also discuss how nation-state espionage is influencing cybersecurity measures in light of recent attacks on U.S. telecommunications. To wrap up, we provide insights into Intel's recent leadership transition amid financial challenges and its impact on the semiconductor market. Join us for a comprehensive overview of the intersections between technology, security, and corporate strategy.

    Insights Into Technology: Episode 10 "Lost Logs and a Look at NIST Frameworks" (VIDEO)

    Play Episode Listen Later Dec 7, 2024 65:08 Transcription Available


    In this episode, we dive into critical tech news of the week. Learn why Cloudflare's recent log loss incident highlights the vulnerabilities in large-scale data management and how mobile apps are secretly targeting millions. Discover the implications of Rockstar 2FA's phishing attacks on Microsoft 365 users and unravel the ongoing challenges with legacy system vulnerabilities. We also discuss how nation-state espionage is influencing cybersecurity measures in light of recent attacks on U.S. telecommunications. To wrap up, we provide insights into Intel's recent leadership transition amid financial challenges and its impact on the semiconductor market. Join us for a comprehensive overview of the intersections between technology, security, and corporate strategy.

    Insights Into Technology: Episode 9 "Microsoft 362? And a look at Industry Specific Frameworks" (AUDIO)

    Play Episode Listen Later Nov 29, 2024 51:45 Transcription Available


    In this episode of Insights into Technology, our host, Joseph Whalen, takes us through this week's tech news highlights, focusing on the major Microsoft 365 outage that left many businesses in disarray. We discuss how Microsoft's internal update created chaos and what this means for the reliability of critical cloud infrastructure as companies increasingly rely on digital solutions. Also, we delve into the recent troubles with Microsoft's Windows 11 updates, particularly affecting gaming, and how this has raised questions about the importance of compatibility testing in tech development. The episode further explores a significant data breach affecting major insurers Geico and Travelers, illustrating the ongoing struggles and financial implications businesses face with cybersecurity breaches. Another key topic includes the security vulnerabilities found in Palo Alto Network's firewalls, compromising organizations' defenses. Finally, we highlight international efforts against cybercrime, showcasing a successful Interpol operation that led to over a thousand arrests, marking a pivotal step in global cyber security enforcement. Join us for an in-depth look at these issues and more, as we provide insights and discuss how businesses can better prepare and react to such challenges in the tech landscape.

    Insights Into Technology: Episode 9 "Microsoft 362? And a look at Industry Specific Frameworks" (VIDEO)

    Play Episode Listen Later Nov 29, 2024 56:16 Transcription Available


    In this episode of Insights into Technology, our host, Joseph Whalen, takes us through this week's tech news highlights, focusing on the major Microsoft 365 outage that left many businesses in disarray. We discuss how Microsoft's internal update created chaos and what this means for the reliability of critical cloud infrastructure as companies increasingly rely on digital solutions. Also, we delve into the recent troubles with Microsoft's Windows 11 updates, particularly affecting gaming, and how this has raised questions about the importance of compatibility testing in tech development. The episode further explores a significant data breach affecting major insurers Geico and Travelers, illustrating the ongoing struggles and financial implications businesses face with cybersecurity breaches. Another key topic includes the security vulnerabilities found in Palo Alto Network's firewalls, compromising organizations' defenses. Finally, we highlight international efforts against cybercrime, showcasing a successful Interpol operation that led to over a thousand arrests, marking a pivotal step in global cyber security enforcement. Join us for an in-depth look at these issues and more, as we provide insights and discuss how businesses can better prepare and react to such challenges in the tech landscape.

    Insights Into Technology: Episode 8 "CISA Shakeups and a Deep Dive Into Cybersecurity Frameworks" (AUDIO)

    Play Episode Listen Later Nov 24, 2024 41:58


    In Episode 8 of Insights into Technology, host Joseph Whalen delves into the top security threats businesses may face in 2025 according to Google's forecast. Highlighting AI's duality in cybersecurity both as a tool and a threat, the episode explores how state-sponsored cyberattacks and ransomware are evolving. Furthermore, the podcast examines the significant leadership transition at CISA amidst increasing cybersecurity challenges, particularly focusing on recent attacks by Chinese state-sponsored hackers. Whalen ponders on the implications of this change during such critical times. The episode also evaluates vulnerabilities within essential infrastructure like the water systems, emphasizing the dire need for improved cybersecurity measures. Discover how regulatory approaches by the DOJ might reshape Google's dominant position in the tech industry. Tune in for an insightful journey through today's critical cybersecurity landscape and hear about Microsoft's new security initiative post-CrowdStrike incident.

    Insights Into Technology: Episode 8 "CISA Shakeups and a Deep Dive Into Cybersecurity Frameworks" (VIDEO)

    Play Episode Listen Later Nov 24, 2024 41:58 Transcription Available


    In Episode 8 of Insights into Technology, host Joseph Whalen delves into the top security threats businesses may face in 2025 according to Google's forecast. Highlighting AI's duality in cybersecurity both as a tool and a threat, the episode explores how state-sponsored cyberattacks and ransomware are evolving. Furthermore, the podcast examines the significant leadership transition at CISA amidst increasing cybersecurity challenges, particularly focusing on recent attacks by Chinese state-sponsored hackers. Whalen ponders on the implications of this change during such critical times. The episode also evaluates vulnerabilities within essential infrastructure like the water systems, emphasizing the dire need for improved cybersecurity measures. Discover how regulatory approaches by the DOJ might reshape Google's dominant position in the tech industry. Tune in for an insightful journey through today's critical cybersecurity landscape and hear about Microsoft's new security initiative post-CrowdStrike incident.

    No Credits Rolled Episode 12: Nintendo Direct June 2024, Rise of the Ronin, Valorant (AUDIO)

    Play Episode Listen Later Nov 17, 2024 39:00


    Welcome to Episode 12 of No Credits Rolled, hosted by Sam Whalen. Despite E3's absence, the gaming world is buzzing with announcements, and this episode dives into the highlights of the latest Nintendo Direct. From the unexpected reveal of The Legend of Zelda: Echoes of Wisdom, featuring Zelda as the protagonist, to the long-awaited gameplay of Metroid Prime 4 Beyond, Nintendo fans have a lot to look forward to. We also explore remakes like Dragon Quest 1-3 and Donkey Kong Country Returns HD, and exciting collections like the Marvel vs. Capcom Fighting Collection. In the second half, Sam reviews Rise of the Ronin, an action RPG from Koei Tecmo's Team Ninja, sharing insights on its combat mechanics and historical backdrop. The episode wraps up with a discussion on the console beta of Valorant, exploring its gameplay dynamics and how it compares to other shooters. Join us for a comprehensive look at the latest in gaming!

    No Credits Rolled Episode 12: Nintendo Direct June 2024, Rise of the Ronin, Valorant (VIDEO)

    Play Episode Listen Later Nov 17, 2024 39:00 Transcription Available


    Welcome to Episode 12 of No Credits Rolled, hosted by Sam Whalen. Despite E3's absence, the gaming world is buzzing with announcements, and this episode dives into the highlights of the latest Nintendo Direct. From the unexpected reveal of The Legend of Zelda: Echoes of Wisdom, featuring Zelda as the protagonist, to the long-awaited gameplay of Metroid Prime 4 Beyond, Nintendo fans have a lot to look forward to. We also explore remakes like Dragon Quest 1-3 and Donkey Kong Country Returns HD, and exciting collections like the Marvel vs. Capcom Fighting Collection. In the second half, Sam reviews Rise of the Ronin, an action RPG from Koei Tecmo's Team Ninja, sharing insights on its combat mechanics and historical backdrop. The episode wraps up with a discussion on the console beta of Valorant, exploring its gameplay dynamics and how it compares to other shooters. Join us for a comprehensive look at the latest in gaming!

    Insights Into Teens: Episode 7 "Fake Fines and Real Risks" (AUDIO)

    Play Episode Listen Later Nov 9, 2024 59:54 Transcription Available


    In this week's episode of Insights into Technology, host Joseph Whalen delves into the dramatic tech news making headlines. We kick off with a staggering story from Russia, where a court has slapped Google with an astronomical fine of 20 undecillion rubles. This unprecedented penalty raises questions about the complexities of international tech regulations and the ongoing battle between sovereign nations and global tech giants. Next, we explore the digital battlefield of disinformation. U.S. agencies have exposed a Russian-backed campaign using fake videos to influence American elections, highlighting the growing challenge of combating foreign interference and the role of AI in detecting misinformation. We then shift focus to cybersecurity threats as Chinese hackers exploit vulnerabilities in Microsoft 365 through the Quad 7 botnet. Discover the implications for home and enterprise security and the measures organizations must take to safeguard their networks. In a surprising turn, we examine Microsoft's delayed release of a controversial feature that aims to capture user activity on Windows PCs. Privacy concerns and public outcry have led to multiple postponements, sparking a debate on the balance between innovation and security. Lastly, we touch on the ethical and practical dimensions of AI in technology. From the potential of AI-driven cybersecurity advancements to the risks posed by consumer apps with embedded malware, we navigate the complex landscape of emerging tech and its impact on global trust and regulation. Join us for these stories and more as we explore the evolving intersection of technology, politics, and ethics.

    Claim Insights Into Things

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel