POPULARITY
Categories
In this edition of the Wide World of Cyber podcast Patrick Gray talks to SentinelOne's Steve Stone and Alex Stamos about how foreign adversaries are targeting security vendors, including them. From North Korean IT workers to Chinese supply chain attacks, SentinelOne and its competitors are constantly fending off sophisticated hacking campaigns. This edition of the Wide World of Cyber was recorded in front of a live audience in San Francisco, with Patrick attending via Zoom. The Wide World of Cyber podcast series is a wholly sponsored co-production between SentinelOne and Risky Business Media. This episode is also available on Youtube. Show notes
Fred Wilmot, CEO and co-founder of Detecteam, and Sebastien Tricaud, CTO and co-founder, bring a candid and critical take on cybersecurity's detection and response problem. Drawing on their collective experience—from roles at Splunk, Devo, and time spent in defense and offensive operations—they raise a core question: does any of the content, detections, or tooling security teams deploy actually work?The Detecteam founders challenge the industry's obsession with metrics like mean time to detect or respond, pointing out that these often measure operational efficiency—not true risk readiness. Instead, they propose a shift in thinking: stop optimizing broken processes and start creating better ones.At the heart of their work is a new approach to detection engineering—one that continuously generates and validates detections based on actual behavior, environmental context, and adversary tactics. It's about moving away from one-size-fits-all IOCs toward purpose-built, context-aware detections that evolve as threats do.Sebastien highlights the absurdity of relying on static, signature-based detection in a world of dynamic threats. Adversaries constantly change tactics, yet detection rules often sit unchanged for months. The platform they've built breaks detection down into a testable, iterative process—closing the gap between intel, engineering, and operations. Teams no longer need to rely on hope or external content packs—they can build, test, and validate detections in minutes.Fred explains the benefit in terms any CISO can understand: this isn't just detection—it's readiness. If a team can build a working detection in under 15 minutes, they beat the average breakout time of many attackers. That's a tangible advantage, especially when operating with limited personnel.This conversation isn't about a silver bullet or more noise—it's about clarity. What's working? What's not? And how do you know? For organizations seeking real impact in their security operations—not just activity—this episode explores a path forward that's faster, smarter, and grounded in reality.Learn more about Detecteam: https://itspm.ag/detecteam-21686Note: This story contains promotional content. Learn more.Guests: Fred Wilmot, Co-Founder & CEO, Detecteam | https://www.linkedin.com/in/fredwilmot/Sebastien Tricaud, Co-Founder & CTO, Detecteam | https://www.linkedin.com/in/tricaud/ResourcesLearn more and catch more stories from Detecteam: https://www.itspmagazine.com/directory/detecteamWebinar: Rethink, Don't Just Optimize: A New Philosophy for Intelligent Detection and Response — An ITSPmagazine Webinar with Detecteam | https://www.crowdcast.io/c/rethink-dont-just-optimize-a-new-philosophy-for-intelligent-detection-and-response-an-itspmagazine-webinar-with-detecteam-314ca046e634Learn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, fred wilmot, sebastien tricaud, detecteam, detection, cybersecurity, behavior, automation, red team, blue team, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Now in its 18th year, the Verizon Business DBIR is one of the industry's longest standing and leading reports on the current cybersecurity landscape. This year's report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and examines the average amounts paid and amount of time to patch vulnerabilities, among many other findings. Segment Resources: - https://www.verizon.com/about/news/2025-data-breach-investigations-report - https://www.verizon.com/business/resources/reports/dbir This segment is sponsored by Verizon Business! To read the full Verizon Business 2025 Data Breach Investigations Report, please visit https://securityweekly.com/verizonrsac. Over the past two decades, the browser has evolved from a simple web rendering engine to the primary gateway through which users interact with the internet, be it for work, leisure or transactions. In other words, browsers are becoming the new endpoint. Yet, despite the exponential growth of browser-native attacks, traditional security solutions continue to focus on endpoint and network, leaving a large gaping hole when it comes to browser security. SquareX has started the Year of Browser Bugs (YOBB), a yearlong initiative to draw attention to the lack of security research and rigor in what remains one of the most understudied attack vectors - the browser. Learn more about SquareX's Browser Detection and Response solution at https://securityweekly.com/squarexrsac Last Mile Reassembly Attacks: https://www.sqrx.com/lastmilereassemblyattacks Polymorphic Extensions technical blog: https://labs.sqrx.com/polymorphic-extensions-dd2310006e04 There is a growing overlap between endpoint and cloud environments, creating new security challenges. ThreatLocker has recently released innovative solutions designed to protect organizations operating in this space. These include Cloud Control, Cloud Detect, Patch Management, and other advanced security tools tailored to bridge the gap between endpoint and cloud protection. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlockerrsac to learn more about them! Jason Mical, Field CTO, discusses Devo and Detecteam's integrated solution, which proactively improves security posture by identifying and closing detection gaps. The integration combines Devo's comprehensive threat detection, investigation, and response capabilities with Detecteam's autonomic detection lifecycle platform to continuously validate and improve detection capabilities based on real-world attack scenarios. Solution demo: https://www.devo.com/interactive-demos/devo-detecteam-engineering-confidence-in-threat-detection/ This segment is sponsored by Devo . Visit https://securityweekly.com/devorsac to learn more about them! While the value of identity security remains largely untapped, SailPoint's latest Horizons of Identity Security report reveals that organizations with mature identity programs can bend their identity security-to-value curve and recognize disproportionately higher returns. These programs unlock new value pools and can help address emerging challenges, such as securing machine and AI agent identities. The 2024-25 Horizons of Identity Security report: https://www.sailpoint.com/identity-library/horizons-identity-security-3 Take the identity security maturity assessment: https://www.sailpoint.com/identity-security-adoption Learn more about SailPoint's Customer Experience Portfolio: https://www.sailpoint.com/customer-success/customer-experience-portfolio This segment is sponsored by SailPoint. Visit https://securityweekly.com/sailpointrsac to learn more about them! Identity has long been the soft underbelly of cybersecurity—but with AI, non-human identities (NHIs), and autonomous agents on the rise, it's now front and center for security teams, the C-suite, and boardrooms alike. Adversaries aren't just hacking systems anymore—they're hijacking identities to slip through the cracks and move undetected in systems. For too long, identity security was treated as interchangeable with IAM—but that mindset is exactly what left critical gaps exposed. Listen to our interview with Hed Kovetz as he unpacks why identity has become today's most urgent battleground in cyber. He'll what you can do about it with an identity security playbook that gives you the upper hand. https://resources.silverfort.com/identity-security-playbook/home https://www.silverfort.com/blog/shining-the-spotlight-on-the-rising-risks-of-non-human-identities/ This segment is sponsored by Silverfort. Visit https://securityweekly.com/silverfortrsac to learn more about Silverfort's IDEAL approach to identity security! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-405
Beverly Hills Precious Metals Exchange - Buy Gold & Silver https://themelkshow.com/gold/ Speak with Gold Expert Andrew Sorchini…Tell Him Mel K Sent You! Order Mel's New Book: Americans Anonymous: Restoring Power to the People One Citizen at a Time https://themelkshow.com/book Dr. Zelenko Immunity Protocols https://zstacklife.com/MelK We The People must stand strong, stay united, resolute, calm, and focus on the mission. We at www.themelkshow.com want to thank all our amazing patriot pals for joining us on this journey, for your support of our work, and for your faith in this biblical transition to greatness. We love what we do and are working hard to keep on top of everything to help this transition along peacefully and with love. Please help us amplify our message: Like, Comment & Share! The Show's Partners Page: https://themelkshow.com/partners/ Consider Making A Donation: https://themelkshow.com/donate/ Another way to get involved and find ways to become active in the community is to come meet Mel and many amazing truth warriors at our upcoming live in-person speaking events. Together we are unstoppable. We look forward to seeing you. God Wins! https://themelkshow.com/events/ Remember to mention Mel K for great discounts on all these fun and informative events. See you there! Our Website www.TheMelKShow.com Support Patriots With MyPillow Go to https://www.mypillow.com/melk Use offer code “MelK” to support both MyPillow and The Mel K Show Mel K Superfoods Supercharge your wellness with Mel K Superfoods Use Code: MELKWELLNESS and Save Over $100 off retail today! https://themelkshow.com/partners/ Healthy Hydration: https://themelkshow.com/partners/ Patriot Mobile Support your values, your freedom and the Mel K Show. Switch to Patriot Mobile for Free. Use free activation code MELK https://themelkshow.com/partners/ HempWorx The #1 selling CBD brand. Offering cutting edge products that run the gamut from CBD oils and other hemp products to essential oils in our Mantra Brand, MDC Daily Sprays which are Vitamin and Herb combination sprays/ https://themelkshow.com/partners/ Dr. Zelenko Immunity Protocols https://zstacklife.com/MelK The Wellness Company - Emergency Medical Kits: https://themelkshow.com/partners/ Dr. Jason Dean and BraveTV bring you the most innovative and cutting edge science in Nutrition with Nano-Particle Detoxification, The Full Moon Parasite Protocol and Clot Shot Defense. https://themelkshow.com/partners/ Dr. Stella Immanuel, MD. Consult with a renowned healthcare provider! Offering Telehealth Services & Supplements. Use offer code ‘MelK' for 5% Off https://themelkshow.com/partners/ Rumble (Video) - The Mel K Show: https://rumble.com/c/TheMelKShow Twitter: https://twitter.com/MelKShow Twitter (Original): https://twitter.com/originalmelk TRUTH Social: https://truthsocial.com/@themelkshow Instagram: https://www.instagram.com/themelkshow/ CloutHub: https://app.clouthub.com/#/users/u/TheMelKShow Mel K Show Video Platform (Subscription): https://www.themelkshow.tv Bitchute: https://www.bitchute.com/channel/Iw2kiviwZpwx/ Podbean: https://themelkshow.podbean.com/ Gab: https://gab.com/MelKShow GETTR: https://www.gettr.com/user/themelkshow Locals.com: https://melk.locals.com/ Banned Video: https://banned.video/channel/the-mel-k-show Brighteon: https://www.brighteon.com/channels/themelkshow
Now in its 18th year, the Verizon Business DBIR is one of the industry's longest standing and leading reports on the current cybersecurity landscape. This year's report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and examines the average amounts paid and amount of time to patch vulnerabilities, among many other findings. Segment Resources: - https://www.verizon.com/about/news/2025-data-breach-investigations-report - https://www.verizon.com/business/resources/reports/dbir This segment is sponsored by Verizon Business! To read the full Verizon Business 2025 Data Breach Investigations Report, please visit https://securityweekly.com/verizonrsac. Over the past two decades, the browser has evolved from a simple web rendering engine to the primary gateway through which users interact with the internet, be it for work, leisure or transactions. In other words, browsers are becoming the new endpoint. Yet, despite the exponential growth of browser-native attacks, traditional security solutions continue to focus on endpoint and network, leaving a large gaping hole when it comes to browser security. SquareX has started the Year of Browser Bugs (YOBB), a yearlong initiative to draw attention to the lack of security research and rigor in what remains one of the most understudied attack vectors - the browser. Learn more about SquareX's Browser Detection and Response solution at https://securityweekly.com/squarexrsac Last Mile Reassembly Attacks: https://www.sqrx.com/lastmilereassemblyattacks Polymorphic Extensions technical blog: https://labs.sqrx.com/polymorphic-extensions-dd2310006e04 There is a growing overlap between endpoint and cloud environments, creating new security challenges. ThreatLocker has recently released innovative solutions designed to protect organizations operating in this space. These include Cloud Control, Cloud Detect, Patch Management, and other advanced security tools tailored to bridge the gap between endpoint and cloud protection. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlockerrsac to learn more about them! Jason Mical, Field CTO, discusses Devo and Detecteam's integrated solution, which proactively improves security posture by identifying and closing detection gaps. The integration combines Devo's comprehensive threat detection, investigation, and response capabilities with Detecteam's autonomic detection lifecycle platform to continuously validate and improve detection capabilities based on real-world attack scenarios. Solution demo: https://www.devo.com/interactive-demos/devo-detecteam-engineering-confidence-in-threat-detection/ This segment is sponsored by Devo . Visit https://securityweekly.com/devorsac to learn more about them! While the value of identity security remains largely untapped, SailPoint's latest Horizons of Identity Security report reveals that organizations with mature identity programs can bend their identity security-to-value curve and recognize disproportionately higher returns. These programs unlock new value pools and can help address emerging challenges, such as securing machine and AI agent identities. The 2024-25 Horizons of Identity Security report: https://www.sailpoint.com/identity-library/horizons-identity-security-3 Take the identity security maturity assessment: https://www.sailpoint.com/identity-security-adoption Learn more about SailPoint's Customer Experience Portfolio: https://www.sailpoint.com/customer-success/customer-experience-portfolio This segment is sponsored by SailPoint. Visit https://securityweekly.com/sailpointrsac to learn more about them! Identity has long been the soft underbelly of cybersecurity—but with AI, non-human identities (NHIs), and autonomous agents on the rise, it's now front and center for security teams, the C-suite, and boardrooms alike. Adversaries aren't just hacking systems anymore—they're hijacking identities to slip through the cracks and move undetected in systems. For too long, identity security was treated as interchangeable with IAM—but that mindset is exactly what left critical gaps exposed. Listen to our interview with Hed Kovetz as he unpacks why identity has become today's most urgent battleground in cyber. He'll what you can do about it with an identity security playbook that gives you the upper hand. https://resources.silverfort.com/identity-security-playbook/home https://www.silverfort.com/blog/shining-the-spotlight-on-the-rising-risks-of-non-human-identities/ This segment is sponsored by Silverfort. Visit https://securityweekly.com/silverfortrsac to learn more about Silverfort's IDEAL approach to identity security! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-405
Now in its 18th year, the Verizon Business DBIR is one of the industry's longest standing and leading reports on the current cybersecurity landscape. This year's report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and examines the average amounts paid and amount of time to patch vulnerabilities, among many other findings. Segment Resources: - https://www.verizon.com/about/news/2025-data-breach-investigations-report - https://www.verizon.com/business/resources/reports/dbir This segment is sponsored by Verizon Business! To read the full Verizon Business 2025 Data Breach Investigations Report, please visit https://securityweekly.com/verizonrsac. Over the past two decades, the browser has evolved from a simple web rendering engine to the primary gateway through which users interact with the internet, be it for work, leisure or transactions. In other words, browsers are becoming the new endpoint. Yet, despite the exponential growth of browser-native attacks, traditional security solutions continue to focus on endpoint and network, leaving a large gaping hole when it comes to browser security. SquareX has started the Year of Browser Bugs (YOBB), a yearlong initiative to draw attention to the lack of security research and rigor in what remains one of the most understudied attack vectors - the browser. Learn more about SquareX's Browser Detection and Response solution at https://securityweekly.com/squarexrsac Last Mile Reassembly Attacks: https://www.sqrx.com/lastmilereassemblyattacks Polymorphic Extensions technical blog: https://labs.sqrx.com/polymorphic-extensions-dd2310006e04 There is a growing overlap between endpoint and cloud environments, creating new security challenges. ThreatLocker has recently released innovative solutions designed to protect organizations operating in this space. These include Cloud Control, Cloud Detect, Patch Management, and other advanced security tools tailored to bridge the gap between endpoint and cloud protection. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlockerrsac to learn more about them! Jason Mical, Field CTO, discusses Devo and Detecteam's integrated solution, which proactively improves security posture by identifying and closing detection gaps. The integration combines Devo's comprehensive threat detection, investigation, and response capabilities with Detecteam's autonomic detection lifecycle platform to continuously validate and improve detection capabilities based on real-world attack scenarios. Solution demo: https://www.devo.com/interactive-demos/devo-detecteam-engineering-confidence-in-threat-detection/ This segment is sponsored by Devo . Visit https://securityweekly.com/devorsac to learn more about them! While the value of identity security remains largely untapped, SailPoint's latest Horizons of Identity Security report reveals that organizations with mature identity programs can bend their identity security-to-value curve and recognize disproportionately higher returns. These programs unlock new value pools and can help address emerging challenges, such as securing machine and AI agent identities. The 2024-25 Horizons of Identity Security report: https://www.sailpoint.com/identity-library/horizons-identity-security-3 Take the identity security maturity assessment: https://www.sailpoint.com/identity-security-adoption Learn more about SailPoint's Customer Experience Portfolio: https://www.sailpoint.com/customer-success/customer-experience-portfolio This segment is sponsored by SailPoint. Visit https://securityweekly.com/sailpointrsac to learn more about them! Identity has long been the soft underbelly of cybersecurity—but with AI, non-human identities (NHIs), and autonomous agents on the rise, it's now front and center for security teams, the C-suite, and boardrooms alike. Adversaries aren't just hacking systems anymore—they're hijacking identities to slip through the cracks and move undetected in systems. For too long, identity security was treated as interchangeable with IAM—but that mindset is exactly what left critical gaps exposed. Listen to our interview with Hed Kovetz as he unpacks why identity has become today's most urgent battleground in cyber. He'll what you can do about it with an identity security playbook that gives you the upper hand. https://resources.silverfort.com/identity-security-playbook/home https://www.silverfort.com/blog/shining-the-spotlight-on-the-rising-risks-of-non-human-identities/ This segment is sponsored by Silverfort. Visit https://securityweekly.com/silverfortrsac to learn more about Silverfort's IDEAL approach to identity security! Show Notes: https://securityweekly.com/esw-405
If you're wondering how much leisure time we got out of watching The Leisure Hive, have a listen and find out!
Good Evening: The Show Begins in Kashmir with Alarms That India and Pakistan Are Determined Adversaries. 1862 SKETCH OF KASHMIR VALLEY FROM SOLEIMANS SEAT TO THE NISHAT BAGH CBS EYE ON THE WORLD WITH JOHN BATCHELOR FIRST HOUR 9-915 1/2: #KASHMIR: TERROR AND GUNFIRE. BILL ROGGIO, FDD. HUSAIN HAQQANI, HUDSON 915-930 2/2: #KASHMIR: TERROR AND GUNFIRE. BILL ROGGIO, FDD. HUSAIN HAQQANI, HUDSON 930-945 1/2 #UKRAINE: CRIMEA JAW-JAW. JOHN HARDIE, BILL ROGGIO, FDD. 945-1000 2/2 #UKRAINE: CRIMEA JAW-JAW. JOHN HARDIE, BILL ROGGIO, FDD. SECOND HOUR 10-1015 #INDIA VANCE AND POTUS SUPPORT MODI. SADANAND DHUME, WSJ 1015-1030 #PRC: JIMMY LAI'S FATE. MARK SIMON, GORDON CHANG 1030-1045 #DPRK: BOLDER. GREG SCARLATOIU 1045-1100 #PRC:MASS LAYOFFS. @GORDONGCHANG, GATESTONE, NEWSWEEK, THE HILL THIRD HOUR 1100-1115 #NEWWORLDREPORT: BRAZIL AND BRICS AMBITION. JOSEPH HUMIRE @JMHUMIRE @SECUREFREESOC. ERNESTO ARAUJO, FORMER FOREIGN MINISTER REPUBLIC OF BRAZIL. #NEWWORLDREPORTHUMIRE 1115-1130 #NEWWORLDREPORT: ARGENTINA AWAKENS. JOSEPH HUMIRE @JMHUMIRE @SECUREFREESOC. ERNESTO ARAUJO, FORMER FOREIGN MINISTER REPUBLIC OF BRAZIL. #NEWWORLDREPORTHUMIRE 1130-1145 #LEBANON: HEZBOLLAH REMAINS DANGEROUS. DAVID DAOUD, BILL ROGGIO, FDD 1145-1200 #GAZA: BRIDGET TOOMEY, BILL ROGGIO, FDD. NOT ERASABLE. FOURTH HOUR 12-1215 #YEMEN: RESIDENT HOUTHIS, RELENTLESS US NAVY. BRIDGET TOOMEY, BILL ROGGIO, FDD 1215-1230 #IRAQ: M. SADR SITS OUT THE NOVEMBER ELECTION BAGDAD. BRIDGET TOOMEY, BILL ROGGIO, FDD 1230-1245 #CA: HIGH SPEED FAILURE. BILL WHELAN, HOOVER 1245-100 AM #UN: HUMAN RIGHTS AGITPROP. PETER BERKOWITZ, HOOVER INSTITUTION
A 15-minute podcast of Bible teaching, Monday - Friday, by the President and Editor of the Sword of the Lord Publishers, Dr. Shelton Smith.
This explosive monologue connects the dots between escalating international threats and domestic political corruption. From China allegedly aiding Houthi rebels in targeting U.S. Navy ships, to illegal foreign donations flooding Democratic fundraising platforms like ActBlue, to judicial efforts blocking Trump's executive orders on election integrity—this is a sweeping indictment of what the host calls a unified front between the Democratic Party and America's enemies. With evidence of foreign interference, judicial obstruction, and shocking voter fraud revelations in key swing states like Arizona and Michigan, the episode asks: Are we funding our own demise, and can the Republic survive it?
A 15-minute podcast of Bible teaching, Monday - Friday, by the President and Editor of the Sword of the Lord Publishers, Dr. Shelton Smith.
A 15-minute podcast of Bible teaching, Monday - Friday, by the President and Editor of the Sword of the Lord Publishers, Dr. Shelton Smith.
A 15-minute podcast of Bible teaching, Monday - Friday, by the President and Editor of the Sword of the Lord Publishers, Dr. Shelton Smith.
We're talking Space Prawns this time, as we look at the not-so Invisible Enemy.
We’re talking Space Prawns this time, as we look at the not-so Invisible Enemy. The post Doctor Who Adversaries – The Invisible Enemy first appeared on NEOZAZ.
#Londinium90AD: Gaius & Germanicus admire how POTUS is handling adversaries and allies by emphasizing tribute. Michael Vlahos. Friends of History Debating Society. @Michalis_Vlahos 1872 EXCAVATION ROMAN FORUM
Book a personal astrology reading with Rux: https://writteninthestars-astrology.com/products/1h-live-video-consultationTimestamps for each sign:00:00:00 Intro00:13:43 Aries00:18:36 Taurus00:22:10 Gemini00:25:51 Cancer00:29:53 Leo00:33:21 Virgo 00:37:38 Libra00:40:45 Scorpio00:44:22 Sagittarius 00:50:01 Capricorn00:55:09 Aquarius01:00:07 PiscesAll episodes follow Western Tropical astrology.
Adversaries and allies alike have been ripping off the United States with “asymmetrical tariffs” for decades. Now, Trump is fighting back. “Whatever a particular country tariffs us, we reciprocate and just mirror image them. In other words, it's their choice, not ours,” VDH says. On this edition of “Victor Davis Hanson: In His Own Words,” Victor Davis Hanson explains the history behind tariffs and how other countries have taken advantage of America's no-tariff policy for years. “It was all predicated in the postwar period. We were so affluent, so powerful—Europe, China, Russia were in shambles—that we had to take up the burdens of reviving the economy by taking great trade deficits,” Victor Davis Hanson says. We can't afford to remain neutral in the trade war that's been happening for decades. “If tariffs are so destructive of their economies, why is China booming?” Victor Davis Hanson asks. If you can't get enough of Victor Davis Hanson from The Daily Signal, subscribe to his official YouTube channel: https://www.youtube.com/@victordavishanson7273 He's also the host of “The Victor Davis Hanson Show,” available wherever you prefer to watch or listen. Links to the show and exclusive content are available on his website: https://victorhanson.com/ Learn more about your ad choices. Visit megaphone.fm/adchoices
Comprehensive coverage of the day's news with a focus on war and peace; social, environmental and economic justice. Trump tariffs spark worldwide reaction as Trump targets allies, adversaries, and uninhabited islands Bill to cap insulin price in California unanimously passes committee, after earlier version was vetoed by Governor Newsom Republicans block Senator Padilla resolution to limit use of tariffs to offset tax cuts Trump administration threatens to hold back funding to public schools that don't eliminate DEI practices Deportations could shrink nation's health care workforce, per research letter in Journal of American Medical Association The post Trump tariffs spark responses from allies and adversaries of US; bill to cap insulin prices in CA unanimously passes key committee – April 3, 2025 appeared first on KPFA.
Sermon 4 of 22 in Series through Mark 1-9
Tariffs on Imported Cars: Donald Trump announced a 25% tariff on imported cars, which he described as the beginning of "liberation day" in America. The discussion covers the complexities and potential impacts of tariffs, including their use as leverage in foreign policy and economic strategy. Ted Cruz supports using tariffs to secure borders and as a tool against countries like China but expresses concerns about long-term economic impacts on American consumers. Pro-Hamas Radicals and Student Visas: The podcast discusses the revocation of student visas for individuals involved in pro-Hamas protests. Ted Cruz emphasizes that while American citizens have First Amendment rights, foreign students on visas do not, and the government has no obligation to allow individuals who support anti-American activities to stay in the country. Foreign Money in Universities: The episode highlights concerns about the large amounts of foreign money, particularly from adversarial nations, flowing into American universities. Ted Cruz discusses the potential for this money to influence American education and politics, advocating for transparency and penalties for universities accepting funds from hostile nations. Please Hit Subscribe to this podcast Right Now. Also Please Subscribe to the 47 Morning Update with Ben Ferguson and the Ben Ferguson Show Podcast Wherever You get You're Podcasts. Thanks for Listening #seanhannity #hannity #marklevin #levin #charliekirk #megynkelly #tucker #tuckercarlson #glennbeck #benshapiro #shapiro #trump #sexton #bucksexton#rushlimbaugh #limbaugh #whitehouse #senate #congress #thehouse #democrats#republicans #conservative #senator #congressman #congressmen #congresswoman #capitol #president #vicepresident #POTUS #presidentoftheunitedstatesofamerica#SCOTUS #Supremecourt #DonaldTrump #PresidentDonaldTrump #DT #TedCruz #Benferguson #Verdict #justicecorrupted #UnwokeHowtoDefeatCulturalMarxisminAmericaYouTube: https://www.youtube.com/@VerdictwithTedCruzSee omnystudio.com/listener for privacy information.
Welcome back to Make It So: A Star Trek Legacy Podcast. Baz Greenland sets sail from Make It So, with one last voyage on the USS Enterprise as he talks Romulans with co-host, Geoff Owen. They discuss why they are TNG's best adversary, explore the portrayal of Romulans across all Star Trek shows, and do a deep dive into four specially selected Romulan episodes from The Next Generation; The Neutral Zone (s1), The Defector (s3), Face of the Enemy (s6) and Timescape (s6). Host / Editor Baz Greenland Co-Host Geoff Owen Executive Producer Tony Black Find Make It So at www.Linktr.ee/Makeitso Film Stories: Bluesky: @filmstoriespodnet.bsky.social Instagram: @Filstoriesmagazineuk Website: www.Filmstories.co.uk Join our Film Stories Discord: https://discord.gg/U4bDzXNyvG Learn more about your ad choices. Visit megaphone.fm/adchoices
We're talking Key To Time this time, and a story, with characters, we actually disagree on.
We’re talking Key To Time this time, and a story, with characters, we actually disagree on. The post Doctor Who Adversaries – Shrivenzales first appeared on NEOZAZ.
High winds and fire danger are heading to Oklahoma.The legislature wants to crack down on “foreign adversaries” in our state.Childcare organizations are raising concerns over new state rules.You can find the KOSU Daily wherever you get your podcasts, you can also subscribe, rate us and leave a comment.You can keep up to date on all the latest news throughout the day at KOSU.org and make sure to follow us on Facebook, Blue Sky and Instagram at KOSU Radio.This is The KOSU Daily, Oklahoma news, every weekday.
We're back to another classic this time, as head off to the streets and sewers of Victorian London.
We’re back to another classic this time, as head off to the streets and sewers of Victorian London. The post Doctor Who Adversaries – The Talons of Weng Chiang first appeared on NEOZAZ.
Trump takes Russia's side, the White House seizes control over the press pool, and post-Roe America brings echoes of the real-life stories that inspired The Handmaid's Tale
Former FBI Agent Eric Reese joins Forhad to discuss his career, the evolving problem of insider threats, nation-state adversaries, and offers his thoughts on protecting your organization. Connect to Eric on LinkedIn: www.linkedin.com/in/ericreesestrider/Learn more about Strider Technologies at https://www.striderintel.com/. Send your comments and/or questions to info@integrasintel.com. We want to hear from you.Please subscribe to our podcast and follow us on social media: LinkedIn: https://www.linkedin.com/company/integras-intelligence-inc.Facebook: https://www.facebook.com/integrasintelInstagram: https://www.instagram.com/integras_intel/Twitter: https://twitter.com/integrasintelYoutube: https://www.youtube.com/channel/UCIBx0BlZB_u1qolio6LPbsA#security #integrasintelligence #duediligence #privateinvestigators #investigationinsiders #podcast#privateinvestigations #backgroundchecks #litigationsupport #employmentscreening #riskmanagement#executiveprotection #securityassessment
THEME : HOW TO UNLOCK CLOSED DOORS Scriptural References: Revelation 3:7-8 1 Chronicles 16:9 2 Corinthians 2:12 Acts 2:12 Luke 11:5 Matthew 7:7-8 Luke 11:52 Acts 16:25-26 Types of Doors: Open Doors (2 Corinthians 2:12, Acts 2:12) Open Doors with Adversaries (1 Corinthians 2:12) Closed Doors (Luke 11:5) Closed and Guarded Doors Ways to Open Closed Doors: Obtain the Right Key (Knowledge) (Revelation 3:7-8, Luke 11:52) Knocking (Matthew 7:7-8) Fasting and prayer Serving with your gift Giving Supernatural Power (Acts 16:25-26)
Christopher asks, 'why didn't adversaries to Rome (especially on the Italian peninsula) see the methods by which Rome consistently recovered from defeat and tried to emulate them?' Join us on Patron patreon.com/ancientwarfarepodcast
DOGE is hacking America This Ad-Tech company is powering surveillance of US military personnel Apple and Google take down malicious mobile apps from their app stores Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines
Former chief of staff to Vice President Pence Marc Short weighs in on President Trump's latest tariff threats, and Elon Musk's efforts with his DOGE team to shrink government and gain access to sensitive data. Plus, Citi equity strategist says Uber is poised for more upside following its earnings report this month. And, the CEO of Accenture Song discusses the two ads the company created for the Super Bowl, and whether any ads really gain traction with viewers.
This time, we're caught by the Mandrels (ouch!) And it sure was painful.
This time, we’re caught by the Mandrels (ouch!) And it sure was painful. The post Doctor Who Adversaries – Mandrels first appeared on NEOZAZ.
Cyberattacks targeting critical infrastructure have made more headlines in recent years, sparking concern about how these systems are protected. Adversaries are taking aim at older technologies that are both essential to everyday life and difficult to secure. Our guest for this episode is Greg Bell, chief strategy officer at Corelight. Before he co-founded the network security firm, Greg spent most of his career working in the National Laboratory system, part of the U.S. Department of Energy. He brings his perspective and expertise to this conversation about energy sector threats, the adversaries behind them, and the unique challenges that utility organizations face in detecting and defending against cyberattacks. There is a scary side to energy sector threats — but there is also an optimistic side. Adam, Cristian, and Greg discuss everything from the history of critical infrastructure threats to the attacks they're seeing today, the complications of securing energy systems, and collaborative efforts to improve defense. Key to these efforts are partnerships like the one between CrowdStrike and Corelight, which work together to improve network threat detection and response. Come for the comprehensive look at energy sector threats and stay for Cristian's energy sector puns in this episode of the Adversary Universe podcast.
Michael Pack is a documentary filmmaker and the president of Palladium Pictures. During Donald Trump's first presidency, he led the U.S. Agency for Global Media (USAGM), which oversees America's state-funded news networks, including Voice of America.“The budget is something like $900 million,” he says. “It's only a mid-sized government agency, but it's one of the largest broadcasters in the world. They're broadcasting over 70 languages to hundreds of millions of people a week. So it's really a potent tool, and it's designed to promote American ideas and values abroad.”In this episode, we discuss his recent films, the future of media, and how the U.S. government can better leverage public diplomacy as a tool against its adversaries.“We could do nothing better, really, than to knock [China's internet] firewall down. I think if people in China had a chance to hear the range of ideas out there, it would change the country more than almost anything else. And it's not expensive,” he says.Views expressed in this video are opinions of the host and the guest, and do not necessarily reflect the views of The Epoch Times.
1/2: #Nuclear Weapon Arsenal: Two saber-rattling adversaries and What is to be done? Peter Huessy, National Institute of Deterrent Studies. 1925
2/2: #Nuclear Weapon Arsenal: Two saber-rattling adversaries and What is to be done? Peter Huessy, National Institute of Deterrent Studies. 1917
PREVIEW - STRATEGIC WEAPONS Colleague Peter Huessy reviews the US strategic weapons capabilities and needs in the face of two adversaries, Russia and China. More details later. 1955 NUCLEAR AIR TO AIR ROCKET GENIE.
This battle is going on and on - with new enemies joining the mix. Maybe Thunderclan can reach out to an old enemy to be a new ally? Book: Warriors, Series 3: Power of Three #4: Eclipse Support us on Ko-fi! WCWITCast Ko-fi Follow us on BlueSky! WCWITCast Follow us on Instagram! WCWITCast What We Are Reading (Not Sponsored): Welcome to St. Hell: My Trans Teen Misadventure by Lewis Hancox Cat Fact Sources: Foxboro man is thankful to his cat Garfield for saving his remaining leg, and likely his life - WHDH 7News Foxboro Man Says His Cat, Garfield, May Have Saved His Life – NBC Boston Music: The following music was used for this media project: Happy Boy Theme by Kevin MacLeod Link: https://incompetech.filmmusic.io/song/3855-happy-boy-theme License: http://creativecommons.org/licenses/by/4.0/
We're donning our disco wigs and heading off to Skaro to take our penultimate look at a Dalek tale.
This is a free preview of a paid episode. To hear more, visit www.public.newsThe mainstream story about Joe Biden has long been that he would bring “adult supervision or gravitas” to political life, notes investigative journalist Peter Schweizer. As someone who had served on the Senate Foreign Relations Committee, Biden ostensibly offered a “greater understanding of politics…. Joe Biden has made a career off that. When he ran against Donald Trump in 2020, he tried to make the case that the adults are back in town.”In truth, says Schweizer in a new interview with Public, Biden was a pioneer in “offshoring his corruption.” As soon as he became Vice President, Biden's son Hunter and his brother James “started doing deals, not in Tokyo, not in London, but in Ukraine, Russia and China.Haven't other political leaders made money by having family members sell access to them? Sure, say Schweizer. The difference with Biden was both the scale of the influence peddling, and that it happened with so many enemies of the United States.“The Biden family has taken in tens of millions of dollars. The people who send him millions of dollars with nothing discernible being given in return are directly tied to the spy apparatus of China. All the people involved had ties to Chinese intelligence. And there's no discernible evidence that Hunter Biden brought anything of value to the table other than his name and his connections to his father and his father's political power.”And the millions from China appear to have changed Biden's behavior.
Recorded Future - Inside Threat Intelligence for Cyber Security
Former NASA astronaut Ed Lu used to worry about asteroids crashing into earth. Now, he's turned his attention to an even more pressing problem – the weaponization of space debris — and officials say it may have already happened.
"PREVIEW: PANAMA CANAL: Colleague Joseph Humire outlines the national security concerns of leaving Panama in the hands of those who have sold critical infrastructure to U.S. adversaries, chiefly the PRC. More to follow." 1910 Panama Canal Zone
PREVIEW - NORTH KOREA Colleague Mary Kissel discusses the adversaries -- the Axis of Resistance -- that the Marco Rubio State Department will inherit from the Biden administration, and what is to be done about the rogue state North Korea. More details tonight. 1951 Koraa War
We're struggling to stay invested this time, as we enter the Warriors Gate.
Just hours after a federal court blocked Albertsons plan to merge with rival Kroger, Albertsons has backed out of the deal and is filing a lawsuit. It would have been a $25 billion merger, which the Federal Trade Commission viewed as hurting competition. We dig in to the latest developments. Also on this morning’s show: how two wine regions in France are adapting to changing tastes and a changing climate.