Podcasts about Authorization

  • 770PODCASTS
  • 1,820EPISODES
  • 51mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Feb 27, 2026LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about Authorization

Show all podcasts related to authorization

Latest podcast episodes about Authorization

The John Batchelor Show
S8 Ep520: John Yoo reports that in a 6-3 decision, the Court ruled that the IEEPA does not grant the president power to impose universal tariffs without explicit Congressional authorization. 5.

The John Batchelor Show

Play Episode Listen Later Feb 27, 2026 13:32


John Yoo reports that in a 6-3 decision, the Court ruled that the IEEPA does not grant the president power to impose universal tariffs without explicit Congressional authorization. 5.1888 SCOTUS

Insight Myanmar
Authorization Pending

Insight Myanmar

Play Episode Listen Later Feb 27, 2026 134:40


Episode #493: The entry point was children. During the reform period, as the Myanmar military and other armed groups feared making concessions that would affect the battlefield, international mine action specialists sought common ground by emphasizing civilian protection."The civilians were the victims, and everybody could see that it was not a good thing to have young children being killed or wounded by the mines," says Pascal Simon, a veteran humanitarian mine action and national capacity development officer. “Everybody wants to save lives and protect civilians, in theory.”In this episode, Simon reflects on his work in Myanmar from 2016 to 2020 and the delicate process of expanding mine action education in contested space. He describes how it was importantto "try to remain open and neutral" in an attempt to focus on prevention rather than blame. Simon says this neutrality allowed mine risk education to be gradually integrated into education and social welfare networks, including in EAO-controlled areas and refugee communities in Thailand.Progress culminated at the 2019 National Mine Action Conference, which brought together civilian ministries, military representatives, international organizations, and ethnic actors, putting "the government in the leading seat" to discuss landmines as a national humanitarian issue. The workshop concluded with the need to establish a National Mine Action Authority.The proposed authority never materialized. When the 2021 military coup abruptly ended the transition period, it dismantled both the coordination infrastructure and the trust that had been built.Throughout the interview, Simon returns to the importance of trust, consistency, and neutrality, engaging with all actors. Engagement with the military, which risks legitimization, remains a critical tension for international organizations. "We have to talk to everybody, at least to try to and, of course, we have to make sure that they're not using us," Simon says.

The Irish Tech News Podcast
Unpacking the road to agentic commerce — Exploring risk, governance, and consumer protection

The Irish Tech News Podcast

Play Episode Listen Later Feb 26, 2026 48:18


In this episode of One Vision — FinTech Fuse podcast, Theodora Lau and Jas Randhawa discuss the Universal Commerce Protocol (UCP) and implications for agentic commerce. They explore the challenges of chargebacks, the need for regulatory clarity, and the importance of consumer independence in the evolving landscape of e-commerce. While adoption is likely to grow, major risks include consumer manipulation, monopolistic outcomes, and the amount of personal data agents may require (buying, browsing, health, and other patterns), increasing privacy and security concerns. Now is the time to engage with policymakers and advocate for regulatory clarity and for the well-being of consumers. 00:00 Welcome Back to One Vision + Introducing Jas Randhawa (StrategyBRIX)01:10 What Is the Universal Commerce Protocol (UCP)? The Big Picture03:27 How UCP Works: Product Cataloging for AI Shopping Agents07:05 KYA (Know Your Agent): Identity, Authorization & Trust08:58 Chargebacks in Agentic Commerce: Who's Liable When Things Go Wrong?12:02 Fraud Detection Breaks: Geolocation, New Signals & Re-Engineering Controls13:44 Agent Independence & Consumer Protection: Bias, Collusion, and Oversight Gaps21:28 Regulatory Clarity (or Lack Thereof): The ‘Wild West' Phase + T&Cs Reality28:06 Time to Get Ready: Travel Use Cases, Audit Trails, and Dispute Proof33:26 Sanctions, VPNs, and High-Velocity Agent Behavior: Financial Crime Risks37:12 Are We Too Early? Will Consumers Adopt—and at What Cost?42:59 Privacy, Data Control & The Need for Neutral Standards Bodies (Wrap-Up)47:45 Final Thoughts#AI #AgenticCommerce #UCP #Agents #Fintech Hot take:  ”The amount of information this agent now needs to have about me is shocking and it scares me a little bit because you're talking about buying patterns, browsing patterns, sleeping patterns, health pattern. For this agent to be really effective, it just needs to know everything that's in my head, right? It's gonna be very effective, but that's again, a major risk because no one's watching out for the consumer.”Hot take: “ The future of this world is unfortunately not you or me. It's a lot of these younger kids, their ecosystem is a lot different. These products are being designed for them."More about our guest 

Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Fed up with FedRAMP? How Knox Delivers Authorization in 90 Days

Federal Tech Podcast: Listen and learn how successful companies get federal contracts

Play Episode Listen Later Feb 24, 2026 26:44


Connect to John Gilroy on LinkedIn   https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com When people look back on 2025 they will see many changes in the FedRAMP process.  It looks like a new administration examined the process, got feedback from companies, and launched new initiatives to speed up the process. During today's interview, Irina Denisenko (Knox CEO) details FedRAMP's challenges and something called "FedRAMP 20x." Knox runs the largest FedRAMP-managed cloud, enabling 90-day authorizations by hosting customers' production environments. Denisenko explains the story of the origin of Knox Systems:   she was running a training company and the Air Force wanted to use her product.  It would have taken so long to complete the FedRAMP requirements that she just bought a company that was FedRAMP compliant. It is hard to believe that the process is so frustrating that fewer than 500 apps are authorized at moderate/high FedRAMP The initiative from the GSA is called FedRAMP 20x  It shifts to continuous monitoring and continuous authorization, moving from annual audits (sampled every 3 years) and monthly CVE spreadsheets to real-time, machine-readable data. What Knox offers is a tried-and-true platform that has reduced time for compliance in order to better serve federal needs. 

Rhetoriq
Unpacking the road to agentic commerce — Exploring risk, governance, and consumer protection

Rhetoriq

Play Episode Listen Later Feb 23, 2026 48:18


In this episode of One Vision — FinTech Fuse podcast, Theodora Lau and Jas Randhawa discuss the Universal Commerce Protocol (UCP) and implications for agentic commerce. They explore the challenges of chargebacks, the need for regulatory clarity, and the importance of consumer independence in the evolving landscape of e-commerce. While adoption is likely to grow, major risks include consumer manipulation, monopolistic outcomes, and the amount of personal data agents may require (buying, browsing, health, and other patterns), increasing privacy and security concerns. Now is the time to engage with policymakers and advocate for regulatory clarity and for the well-being of consumers. 00:00 Welcome Back to One Vision + Introducing Jas Randhawa (StrategyBRIX)01:10 What Is the Universal Commerce Protocol (UCP)? The Big Picture03:27 How UCP Works: Product Cataloging for AI Shopping Agents07:05 KYA (Know Your Agent): Identity, Authorization & Trust08:58 Chargebacks in Agentic Commerce: Who's Liable When Things Go Wrong?12:02 Fraud Detection Breaks: Geolocation, New Signals & Re-Engineering Controls13:44 Agent Independence & Consumer Protection: Bias, Collusion, and Oversight Gaps21:28 Regulatory Clarity (or Lack Thereof): The ‘Wild West' Phase + T&Cs Reality28:06 Time to Get Ready: Travel Use Cases, Audit Trails, and Dispute Proof33:26 Sanctions, VPNs, and High-Velocity Agent Behavior: Financial Crime Risks37:12 Are We Too Early? Will Consumers Adopt—and at What Cost?42:59 Privacy, Data Control & The Need for Neutral Standards Bodies (Wrap-Up)47:45 Final Thoughts#AI #AgenticCommerce #UCP #Agents #Fintech Hot take:  ”The amount of information this agent now needs to have about me is shocking and it scares me a little bit because you're talking about buying patterns, browsing patterns, sleeping patterns, health pattern. For this agent to be really effective, it just needs to know everything that's in my head, right? It's gonna be very effective, but that's again, a major risk because no one's watching out for the consumer.”Hot take: “ The future of this world is unfortunately not you or me. It's a lot of these younger kids, their ecosystem is a lot different. These products are being designed for them.”More about our guest

Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Fixing FedRAMP: How Automation Cuts ATO Time by 36 Weeks

Federal Tech Podcast: Listen and learn how successful companies get federal contracts

Play Episode Listen Later Feb 17, 2026 23:28


Connect to John Gilroy on LinkedIn   https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Way back in 2011, one of the goals of FedRAMP was to eliminate software redundancy. The federal government had evolved to the point where one agency would spend millions of dollars on the same application program that the agency in the same zip code had just invested heavily in. The theory proposed by luminaries like Vivek Kundra was to move to the cloud to share services. Reducing cost and improving resilience. FedRAMP was the initiative that established a safe environment for federal cloud use. Companies can comply with regulations outlined in an Authorization to Operate (ATO). Well, fifteen years later, and we are seeing the same duplication not in the application programs, but in the process to get the ATO itself. For example, FedRAMP, RMF, and agency internal policies may require specific artifacts to satisfy one or the other. During the interview, Travis Howerton paints the legacy model—static documentation, annual/3-year audits, spreadsheets. His solution is to have AI assist with documentation, which will drastically reduce compliance time; he cites an example of reducing a process from 52 weeks to 356 weeks. RegScale uses OSCAL (XML/YAML/JSON) to auto-generate RMF artifacts and integrate with SIEMs (Splunk, Elastic), Axonius, ServiceNow, and APIs. Howerton understands the limitations of many automated systems and suggests that a human is a key component after the machine language has assembled the data to make the decision.    

Your Drone Questions. Answered.
YDQA: Ep 135- "What's the Difference Between a UAS Test Site and a Test Range?”

Your Drone Questions. Answered.

Play Episode Listen Later Feb 12, 2026 16:08


Are UAS test ranges and FAA test sites the same thing… or totally different?In this episode of Your Drone Questions Answered, we sit down with Jesse Steele, Range Manager at the Pendleton UAS Range, to break down the real difference between FAA-designated UAS test sites and the ranges that operate under them. You'll learn:The difference between a UAS test site and a test rangeHow COAs (Certificates of Authorization) are created and managedWhy Pendleton offers 14,000 square miles of test airspaceWhat makes this location ideal for advanced testingThe types of companies and platforms testing there (from commercial to defense)Whether the public can visit or even fly at a range like thisFrom EVTOL projects like Airbus' Vahana to large-scale testing operations and cross-country drone flights, the Pendleton range has hosted 175+ unique companies and more than 67,000 test flights.If you've ever wondered how high-level UAS testing actually works in the United States—and who makes it possible—this episode gives you a behind-the-scenes look.To learn more about the range or schedule a tour, visit pendletonuasrange.comHave a drone question you'd like answered on a future episode? Visit ydqa.io and submit it.#Drones #UAS #DroneTesting #Aviation #FAA #DroneIndustry #UAV #EVTOL #CommercialDrones #DroneTechnology

Identity At The Center
#401 - Sponsor Spotlight - PlainID

Identity At The Center

Play Episode Listen Later Feb 11, 2026 52:11


This episode is sponsored by PlainID. Visit plainid.com/idac to learn more.In this sponsored episode, Jim McDonald and Jeff Steadman talk with Gal Helemski, CTO and co-founder of PlainID, about the evolving landscape of authorization. The conversation covers the transition from traditional roles and attributes to a modern policy-based access control (PBAC) approach. Gal explains how PlainID helps organizations centralize authorization logic, improve security posture, and simplify the management of access across complex hybrid and multi-cloud environments. The discussion also touches on the importance of visibility into who has access to what and the role of standards like Cedar and Rego in the future of authorization.Connect with Gal: https://www.linkedin.com/in/gal-helemski-b9542231/Learn more about PlainID: plainid.com/idacConnect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at idacpodcast.comTimestamps:00:00 Introduction to the Sponsor Spotlight02:15 Meet Gal Helemski from PlainID05:30 The shift from RBAC to PBAC10:45 Challenges with traditional authorization methods15:20 How PlainID centralizes authorization logic22:10 Integrating with existing identity providers28:45 The role of visibility and auditing in authorization35:30 Discussion on authorization standards: Cedar and Rego42:15 Future trends in identity and access management50:00 Final thoughts and where to learn moreKeywords:IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, PlainID, Authorization, Policy-Based Access Control, PBAC, RBAC, Cybersecurity, IAM, Access Management, Gal Helemski, Identity Security

Paul's Security Weekly
Bringing Strong Authentication and Granular Authorization for GenAI - Dan Moore - ASW #369

Paul's Security Weekly

Play Episode Listen Later Feb 10, 2026 69:24


When it comes to agents and MCPs, the interesting security discussion isn't that they need strong authentication and authorization, but what that authn/z story should look like, where does it get implemented, and who implements it. Dan Moore shares the useful parallels in securing APIs that should be brought into the world of MCPs -- especially because so many are still interacting with APIs. Resources https://stackoverflow.blog/2026/01/21/is-that-allowed-authentication-and-authorization-in-model-context-protocol/ https://fusionauth.io/articles/identity-basics/authorization-models Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-369

Paul's Security Weekly TV
Bringing Strong Authentication and Granular Authorization for GenAI - Dan Moore - ASW #369

Paul's Security Weekly TV

Play Episode Listen Later Feb 10, 2026 69:24


When it comes to agents and MCPs, the interesting security discussion isn't that they need strong authentication and authorization, but what that authn/z story should look like, where does it get implemented, and who implements it. Dan Moore shares the useful parallels in securing APIs that should be brought into the world of MCPs -- especially because so many are still interacting with APIs. Resources https://stackoverflow.blog/2026/01/21/is-that-allowed-authentication-and-authorization-in-model-context-protocol/ https://fusionauth.io/articles/identity-basics/authorization-models Show Notes: https://securityweekly.com/asw-369

Application Security Weekly (Audio)
Bringing Strong Authentication and Granular Authorization for GenAI - Dan Moore - ASW #369

Application Security Weekly (Audio)

Play Episode Listen Later Feb 10, 2026 69:24


When it comes to agents and MCPs, the interesting security discussion isn't that they need strong authentication and authorization, but what that authn/z story should look like, where does it get implemented, and who implements it. Dan Moore shares the useful parallels in securing APIs that should be brought into the world of MCPs -- especially because so many are still interacting with APIs. Resources https://stackoverflow.blog/2026/01/21/is-that-allowed-authentication-and-authorization-in-model-context-protocol/ https://fusionauth.io/articles/identity-basics/authorization-models Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-369

Application Security Weekly (Video)
Bringing Strong Authentication and Granular Authorization for GenAI - Dan Moore - ASW #369

Application Security Weekly (Video)

Play Episode Listen Later Feb 10, 2026 69:24


When it comes to agents and MCPs, the interesting security discussion isn't that they need strong authentication and authorization, but what that authn/z story should look like, where does it get implemented, and who implements it. Dan Moore shares the useful parallels in securing APIs that should be brought into the world of MCPs -- especially because so many are still interacting with APIs. Resources https://stackoverflow.blog/2026/01/21/is-that-allowed-authentication-and-authorization-in-model-context-protocol/ https://fusionauth.io/articles/identity-basics/authorization-models Show Notes: https://securityweekly.com/asw-369

KuppingerCole Analysts
Analyst Chat #286: Modern Authorization Architectures & AuthZEN

KuppingerCole Analysts

Play Episode Listen Later Feb 9, 2026 42:23


Authorization is changing, moving from static roles and provisioning to dynamic, real-time, policy-based decisions. But without standardization, modern authorization quickly becomes fragmented and unmanageable. In this episode of the Analyst Chat, Matthias Reinwarth is joined by David Brossard, contributor and co-chair of the OpenID AuthZEN Working Group, and Phillip Messerschmidt, Lead Advisor at KuppingerCole, to discuss how authorization is evolving — and why AuthZEN is a critical missing standard. You’ll learn:✅ Why RBAC is still relevant, but no longer sufficient on its own✅ How ABAC and PBAC address scalability, context, and dynamic access✅ Why role explosion and authorization silos limit visibility and governance✅ How runtime, continuous authorization supports Zero Trust architectures✅ What AuthZEN standardizes — and what it deliberately does not✅ How externalized authorization improves auditability and compliance✅ Why CISOs and architects should start asking vendors for AuthZEN support✅ How AuthZEN fits into the Identity Fabric and Road to EIC vision Authentication has been standardized for years — authorization is finally catching up. Watch now to understand how AuthZEN enables scalable, future-proof authorization for modern applications, APIs, and identity fabrics.

KuppingerCole Analysts Videos
Analyst Chat #286: Modern Authorization Architectures & AuthZEN

KuppingerCole Analysts Videos

Play Episode Listen Later Feb 9, 2026 42:23


Authorization is changing, moving from static roles and provisioning to dynamic, real-time, policy-based decisions. But without standardization, modern authorization quickly becomes fragmented and unmanageable. In this episode of the Analyst Chat, Matthias Reinwarth is joined by David Brossard, contributor and co-chair of the OpenID AuthZEN Working Group, and Phillip Messerschmidt, Lead Advisor at KuppingerCole, to discuss how authorization is evolving — and why AuthZEN is a critical missing standard. You’ll learn:✅ Why RBAC is still relevant, but no longer sufficient on its own✅ How ABAC and PBAC address scalability, context, and dynamic access✅ Why role explosion and authorization silos limit visibility and governance✅ How runtime, continuous authorization supports Zero Trust architectures✅ What AuthZEN standardizes — and what it deliberately does not✅ How externalized authorization improves auditability and compliance✅ Why CISOs and architects should start asking vendors for AuthZEN support✅ How AuthZEN fits into the Identity Fabric and Road to EIC vision Authentication has been standardized for years — authorization is finally catching up. Watch now to understand how AuthZEN enables scalable, future-proof authorization for modern applications, APIs, and identity fabrics.

Planetary Radio: Space Exploration, Astronomy and Science
Space Policy Edition: What a NASA Authorization bill actually does

Planetary Radio: Space Exploration, Astronomy and Science

Play Episode Listen Later Feb 6, 2026 60:35


What does a NASA authorization bill actually do, and why does it matter? In this episode of Space Policy Edition, we dig into one of the most misunderstood but powerful tools Congress uses to shape the future of U.S. space exploration. Host Casey Dreier, chief of space policy at The Planetary Society, is joined by Jack Kiraly, the Society’s director of government relations, for a deep dive into how NASA authorization bills work, how they differ from appropriations, and why they can have decades-long consequences for science missions, human spaceflight, and planetary defense. The discussion also reflects on a major recent win for space advocates: Congress’s bipartisan decision to protect NASA science funding. Discover more at: https://www.planetary.org/planetary-radio/spe-what-is-a-nasa-authorization-billSee omnystudio.com/listener for privacy information.

Planetary Radio: Space Policy Edition
What a NASA Authorization bill actually does

Planetary Radio: Space Policy Edition

Play Episode Listen Later Feb 6, 2026 60:35


Chief of Space Policy Casey Dreier and Director of Government Relations Jack Kiraly break down what NASA authorization bills actually do and why these laws matter for long-term U.S. space policy, from science missions to human spaceflight and planetary defense.

Minimum Competence
Legal News for Thurs 1/29 - Review of Alex Pretti Murder, Looming Judiciary Shutdown, Google $135m Settlement and a Teacher's Failed First Amendment Appeal

Minimum Competence

Play Episode Listen Later Jan 29, 2026 7:39


This Day in Legal History: “Axis of Evil”On January 29, 2002, President George W. Bush delivered his first State of the Union address after the September 11 attacks, a speech that would shape U.S. legal and foreign policy for years to come. During the address, Bush coined the term “Axis of Evil” to describe Iran, Iraq, and North Korea, alleging these nations were actively pursuing weapons of mass destruction and supporting terrorism. The speech marked a significant rhetorical shift in the U.S. posture toward preemptive military action and helped solidify a legal framework for broad executive authority in the name of national security. Citing the 2001 Authorization for Use of Military Force (AUMF), the Bush administration would go on to justify military interventions without new Congressional declarations of war.The “Axis of Evil” framing played a critical role in building public and political support for the 2003 invasion of Iraq. Though the legal justification centered on Iraq's supposed weapons programs and ties to terrorism, both claims were later discredited, leading to intense scrutiny of the legal rationale behind the war. Domestically, the period following the speech saw rapid expansion of executive power, new surveillance authorities, and detention practices that raised constitutional concerns. Internationally, the speech signaled a departure from multilateral norms and toward unilateral action under the banner of American security interests.The legal legacy of the address continues to reverberate in debates over presidential war powers and the limits of the AUMF. Critics argue the speech set a precedent for indefinite military engagement without sufficient Congressional oversight. Supporters contend it met the urgency of a new kind of threat in the post-9/11 world. Regardless of viewpoint, the 2002 State of the Union redefined the intersection of law, war, and foreign policy in the 21st century.A preliminary review by U.S. Customs and Border Protection (CBP) into the murder of Alex Pretti by federal immigration agents in Minneapolis did not state that Pretti brandished a firearm, contradicting earlier claims by Trump officials. Pretti, a 37-year-old ICU nurse, was shot after reportedly refusing to move from the street when ordered by a customs officer. Initial official statements described Pretti as an armed threat, with the Department of Homeland Security noting he had a handgun—though it was holstered—and Trump aide Stephen Miller labeling him a “domestic terrorist” without evidence. However, video footage from the scene challenged these claims, showing an agent removing a holstered weapon from Pretti's waist before the shooting.The CBP review, based on body camera footage and internal documents, said officers attempted to move Pretti and a woman from the street and used pepper spray when they didn't comply. A struggle followed, during which a Border Patrol agent shouted “He's got a gun!” before both agents opened fire. The review, which is standard protocol, was shared with lawmakers but emphasized it contained no final conclusions. The identities and experience levels of the involved officers, particularly regarding urban crowd control, remain undisclosed. The incident has sparked national controversy and prompted a more restrained response from Trump in its aftermath.U.S. review of Alex Pretti killing does not mention him brandishing firearm | ReutersThe U.S. federal judiciary may only be able to continue full paid operations through February 4 if Congress does not pass funding legislation in time to avert a partial government shutdown. Judge Robert Conrad, who oversees the Administrative Office of the U.S. Courts, issued a memo warning of the looming shortfall, stating that while courts will remain open on February 2, they would quickly exhaust available funds by February 4. The uncertainty comes amid a broader funding standoff in Congress, where a six-bill package—including money for defense, housing, transportation, and a $9.2 billion judiciary allocation—is stalled.A key point of contention is the funding of the Department of Homeland Security (DHS), especially following the fatal shooting of U.S. citizen Alex Pretti by immigration officers. Senate Democrats are now refusing to approve DHS funding without reforms, throwing into doubt whether the broader package can pass. Although the bills had passed the Republican-controlled House and previously seemed poised for Senate approval, the Pretti incident has triggered renewed partisan gridlock.If no agreement is reached, this shutdown could affect the judiciary much sooner than the previous lapse in 2025, when courts operated for over two weeks before curtailing services. The current funding crisis threatens court staffing, case management, and broader access to justice. The memo underscores the fragile position of the courts in a prolonged budget standoff, with potential furloughs and suspended operations looming if a deal isn't struck.US judiciary may not be able to fully maintain operations past Feb. 4 in government shutdown | ReutersGoogle has agreed to pay $135 million to settle a proposed class action lawsuit accusing it of collecting Android users' cellular data without their consent. The settlement, filed in federal court in San Jose, California, still needs judicial approval. The lawsuit claimed that even when users closed Google apps, disabled location sharing, or locked their devices, Google continued to gather mobile data, which users had paid for through their carriers. Plaintiffs alleged this behavior amounted to “conversion,” a legal term referring to the unauthorized taking of someone's property for one's own use.Though Google denied any wrongdoing, it agreed to stop transferring data without user consent during Android device setup. The company will also update its Google Play terms to clearly disclose data transfers and give users simpler options to disable them. The case covers Android users dating back to November 12, 2017. If approved, users could receive up to $100 each from the settlement fund.Plaintiffs' attorneys described the agreement as the largest known payout in a conversion case, and they may seek nearly $40 million in legal fees. A trial had been set for August 2026 before the settlement was reached. Google has not commented on the resolution.Google to pay $135 million to settle Android data transfer lawsuit | ReutersGoogle to Pay $135 Million to Settle Android Phone-Data SuitA Christian substitute teacher, Kimberly Ann Polk, has lost her attempt to revive First Amendment claims against Maryland's Montgomery County Public Schools (MCPS) after refusing to use transgender students' pronouns. The Fourth Circuit Court of Appeals upheld a lower court's decision, finding Polk unlikely to succeed on claims that the district's pronoun policy violated her free speech and religious freedom rights. The court ruled she failed to show any evidence of religious hostility from the school board and did not meet the legal threshold to proceed with her constitutional claims.Polk argued that MCPS's policy, which requires staff to use names and pronouns aligned with students' gender identities and bars disclosing those identities to unsupportive parents, conflicted with her belief that gender is fixed at birth. While the court dismissed her constitutional claims, it allowed her separate Title VII claim for religious accommodation to proceed. This claim argues that MCPS violated federal civil rights law by not making space for her religious beliefs in its employment practices.The decision was split, with Judge J. Harvie Wilkinson dissenting. He called the school policy a “gross assault upon the First Amendment” and argued Polk had a valid free speech claim. The case reflects ongoing national legal tensions between employee religious rights and school policies supporting LGBTQ+ students. Notably, another federal appeals court had previously sided with a teacher in a similar dispute, signaling a potential circuit split.Christian Teacher Can't Undo Pronoun Case First Amendment Loss This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.minimumcomp.com/subscribe

Packet Pushers - Full Podcast Feed
PP094: Understanding OAuth and Reducing Authorization Risks

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Jan 27, 2026 70:04


OAuth is a widely used authorization (not authentication) protocol that lets a resource owner grant access to a resource using access tokens. These tokens define access attributes, including scope and length of time. OAuth can be used to grant access to human and non-human entities (for example, AI agents). OAuth is increasingly being abused by... Read more »

Packet Pushers - Fat Pipe
PP094: Understanding OAuth and Reducing Authorization Risks

Packet Pushers - Fat Pipe

Play Episode Listen Later Jan 27, 2026 70:04


OAuth is a widely used authorization (not authentication) protocol that lets a resource owner grant access to a resource using access tokens. These tokens define access attributes, including scope and length of time. OAuth can be used to grant access to human and non-human entities (for example, AI agents). OAuth is increasingly being abused by... Read more »

UBC News World
Stop Overpaying: The Medical Billing Errors Nobody Really Warns You About

UBC News World

Play Episode Listen Later Jan 27, 2026 6:07


Half of all healthcare claims get denied, and most never get fixed—leaving you stuck with the bill. Authorization traps, coding disasters, and timing mistakes create a system designed to confuse you into paying for errors you never made.Learn more: https://healthlockplus.com/business&al=12-FDC HealthLock Plus City: Franklin Address: 612 West Main Street Website: https://healthlockplus.com/business&al=12-fdc Phone: +1 816 668 7965 Email: jim@shugart.com

TrustedSec Security Podcast
8.8 - Navigating Authorization with a Copilot

TrustedSec Security Podcast

Play Episode Listen Later Jan 26, 2026 31:25


Data security relies on clarity around authorization controls and assets, but AI tools can risk exposure sensitive information as they are increasingly being integrated into everything we use. In this episode of Security Noise, Geoff is joined by Principal Security Consultant Drew Kirkpatrick as they dive into the use of LLMs such as Microsoft Copilot at organizations and its implications for data security and authorization. They explore the importance of data classification policies and the potential risks associated with using AI tools at work. The conversation also touches on the effectiveness of data leak protection controls and the need for a review process for agent deployment. What's the agent doing behind the scenes and is it connecting to other agents? About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.

The Daily Scoop Podcast
Congress tees up spending package to extend TMF authorization through September

The Daily Scoop Podcast

Play Episode Listen Later Jan 21, 2026 5:32


A new congressional spending bill could offer a lifeline to reauthorize the Technology Modernization Fund, which expired last month and froze nearly $200 million in unused funds. Congressional appropriators released the final slew of fiscal 2026 spending bills Tuesday, allocating more than $1 trillion to federal agencies and extending various laws or programs. Among the extensions is the reauthorization of the TMF through FY2026, or Sept. 30. It comes just over a month after authorization of the innovation funding vehicle expired Dec. 12. TMF was created in 2017 to fund technology projects across the government, but the bill that made it also set an expiration date that only Congress can extend. Lawmakers failed to move forward with standalone legislation to reauthorize the fund last month, and efforts to include it in larger spending packages also fell flat. Trade groups and IT industry experts were disappointed at the time, telling FedScoop in previous interviews that the expiration was not representative of the issue's typical bipartisan support. Some pinned the blame on procedural hurdles in Congress, including the 43-day-long government shutdown that pushed various nonfunding priorities toward the end of the year. Rep. Nancy Mace, R-S.C., introduced bills in the last three Congresses to reauthorize TMF beyond 2025, but they did not make it out of the Senate, where they have at times faced pushback from congressional appropriators. Members of the so-called Department of Government Efficiency embedded in the Social Security Administration potentially exposed personally identifiable information via a third-party server, the Department of Justice said in a court filing that also revealed coordination between DOGE and an advocacy group seeking “evidence of voter fraud.” A lawsuit filed last February by the AFL-CIO and other labor groups against the SSA sought to cut off DOGE's access to sensitive data housed in agency systems. In March, the U.S. District Court for the District of Maryland issued a temporary restraining order to limit that access. But after an SSA records review of the agency's “former DOGE Team for audit and litigation purposes,” the DOJ said in a filing dated Friday that “communications, use of data, and other actions” were found to be “potentially outside of SSA policy and/or noncompliant” with the court's order. One of those instances involved DOGE's sharing of data via a third-party Cloudflare server — a system that is “not approved for storing SSA data and when used in this manner is outside SSA's security protocols,” the DOJ wrote. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast  on Apple Podcasts, Soundcloud, Spotify and YouTube.

Beau of The Fifth Column
Let's talk about Trump's authorization to go after Greenland and Iran....

Beau of The Fifth Column

Play Episode Listen Later Jan 18, 2026 4:23


Let's talk about Trump's authorization to go after Greenland and Iran....

Best of Nerds for Yang
The 60-Day Coup: How America Accidentally Gave Presidents a Blank Check for War

Best of Nerds for Yang

Play Episode Listen Later Jan 5, 2026 42:59


Hello nerds.It's been a while since I sat down and did what Nerds for Humanity was originally built for. Not shorts. Not algorithms. Not rage bait. But long-form, structural analysis of how power actually works in this country, and why things that feel shocking in the moment are often the predictable outcome of rules written decades ago.This livestream was about Trump's military operation in Venezuela. But not in the way cable news framed it.I wasn't interested in relitigating whether Trump is reckless, authoritarian, or dangerous. If you're reading this Substack, you already know where you land on that. The more important question is this.How was he able to do it?How was a single president able to order a major military operation against a sovereign country, deploy massive air and naval assets, seize the country's leader from its capital, and then inform Congress afterward?The uncomfortable truth is that Trump didn't invent some new authoritarian power. He exploited one that has been sitting in plain sight for more than fifty years.And worse, he did so largely within the mechanics of existing law.The law that was supposed to stop thisIn 1973, in the shadow of Vietnam, Congress passed the War Powers Resolution. Its purpose was simple. Presidents were not supposed to be able to drag the country into war on their own.The law created two central guardrails.First, the president must notify Congress within 48 hours of introducing US forces into hostilities.Second, unless Congress authorizes the action, those hostilities must end within 60 days, with an additional 30-day period allowed for withdrawal.At the time, this seemed reasonable. Military action moved slowly. Wars took time to prepare. You could not overthrow a government in a weekend. The assumption was that Congress would have ample opportunity to intervene before anything irreversible happened.As I said on the livestream,“At that time in 1973 the thinking was well, surely no one can invade a country and capture the head of state inside of 48 hours. They would need weeks to prepare for it.”That assumption is now dangerously obsolete.We are using 1973 traffic laws for modern warfareOne analogy I used resonated with a lot of people.Trying to govern modern warfare with the War Powers Resolution is like applying 1970s traffic rules to autonomous flying cars.The law was written for an era of B-52 bombers, carrier groups, and weeks-long mobilizations. It was not written for drones, cyber operations, special forces insertions, precision strikes, and operations capable of destabilizing or decapitating a regime in days or even hours.Today, a president can dramatically alter another country's political reality before Congress has even finished debating whether the notification email landed in the right inbox.The time-based trigger is the flaw. It assumes time equals restraint. That is no longer true.As I put it during the stream,“This time-based system is flawed. It doesn't work for a world where you can basically destabilize and replace a regime in a few hours.”Trump didn't invent this powerIt is tempting to treat Trump as a unique aberration. He isn't.Modern presidents of both parties have steadily expanded executive war-making authority.George H. W. Bush built up a massive military force in the Gulf before Congress voted, and then received authorization shortly before the 1991 Gulf War began.George W. Bush secured a separate 2002 Authorization for Use of Military Force to invade Iraq, and the post-9/11 era normalized expansive readings of both congressional authorizations and Article II authority.The Obama administration conducted extensive drone campaigns and the Libya intervention without a formal declaration of war, arguing that certain operations did not meet the War Powers Resolution's definition of “hostilities.”Every modern president has pushed the envelope. Trump simply sprinted through it.As I said on the livestream,“This has been a loophole that's been used by many presidents. We just relied on them to exercise judgment and honor the office. That honor code is clearly gone.”A system that relies on voluntary restraint is not a system. It is a gamble.Language laundering: from war to “kinetic action”One of the most revealing shifts has been linguistic.Presidents learned that if you do not call something a war, you do not need a declaration of war.So we get euphemisms.“Kinetic action.”“Law enforcement operation.”“Targeted strike.”As I pointed out,“They don't want to say we are conducting warfare. If you don't call it a war, then you don't need a declaration of war.”This is how large-scale military action against a sovereign state becomes a “police-like operation.”If another country flew dozens of military aircraft into Washington, DC and seized the US president, we would call it an act of war without hesitation. Euphemisms only work when we are the ones using them.The public justifications kept shiftingThe administration's public rationale for the Venezuela operation evolved quickly.Initial statements emphasized fentanyl and drug trafficking. Analysts and critics noted that available trafficking data does not identify Venezuela as a significant fentanyl source, which raised questions about that justification.Subsequent messaging emphasized cocaine trafficking and broader security threats, but those claims were also contested.What became clearer over time was that the operation was aimed at exerting decisive pressure on the Maduro regime itself.As I said during the livestream,“What some messaging from inside Trump's orbit suggested was that this was really about regime change.”Trump later publicly discussed American oil companies entering Venezuela, reclaiming seized assets, and modernizing infrastructure as part of a post-Maduro arrangement.If that sounds familiar, it should.“That sounds a little colonial to me.”Because it does.The moral high ground is not abstractEvery time the US violates the sovereignty of another nation under contested legal theories, it weakens the norms it relies on to restrain other powers.As one viewer put it during the livestream,“I'm afraid the US just gave a license to Russia to take Ukraine and China to take Taiwan.”You cannot argue that international law matters only when it constrains other countries. Either it restrains power, or it doesn't.Trump's actions did not just affect Venezuela. They further eroded America's standing in a world already drifting toward a more unstable multipolar order.This is bigger than TrumpOne of my core arguments, and the reason this livestream mattered, is simple.Trump will not be the last president to exploit this structure.Even if Trump disappears tomorrow, the authority remains.History shows that presidents, particularly lame ducks, often become more willing to take foreign risks once electoral constraints disappear.As I said,“We can't rely on Trump or any president. Every president eventually realizes how much power this office has.”This is not about stopping one man. It is about fixing a system that assumes good faith in an era where bad faith is a governing strategy.How the law could actually be fixedThe War Powers Resolution does not need cosmetic reform. It needs modernization aligned with modern warfare.I outlined several possible approaches.First, scale-based triggers. Certain actions should automatically require prior authorization, regardless of duration, such as the use of specific aircraft types, large troop deployments, or major munitions thresholds.Second, target-based triggers. Actions aimed at heads of state, national command infrastructure, or critical civilian systems should never fall under a post-hoc notification model.Third, funding enforcement. If authorization is not granted, funding freezes. No money, no mission.As I argued,“Sometimes the US will have to use force. But introducing liabilities for the whole country should not be determined by one branch alone.”In corporate governance, CEOs cannot acquire companies without board approval. Presidents should not be able to remake countries without congressional consent.A simple test for candidatesThe good news is that this is a fixable problem.Congress can change this law.And elections create leverage.As I said on the livestream,“Now is a great time to ask every candidate one simple question. Do you support updating the War Powers Resolution?”Not a detailed proposal. Not a legal dissertation. Just whether they believe the current system is acceptable.If a candidate believes any president should have a 60-day blank check to wage war, they should say so plainly.The uncomfortable truthI said this near the end of the stream, and it bears repeating.“This is a known vulnerability in the system. It's just time to patch the bug.”We like to tell ourselves that American democracy is protected by norms, traditions, and good people.But systems that rely on virtue instead of constraints always fail eventually.Trump did not invent this power. He stress-tested it.And it failed.Support the channelIf you found this analysis useful and want Nerds for Humanity to keep doing long-form work like this, consider supporting the channel directly.You can become a YouTube channel member to help cover operating costs and get a shout-out on every livestream.Thanks for sticking with the long version.Bye nerds. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit nerdsforhumanity.substack.com

Slava Mayer - Authorization  NEW
Slava Mayer - Authorization 001 2026 DONATE 4441 `` 1144`` 0653``0293 MONOBANK

Slava Mayer - Authorization NEW

Play Episode Listen Later Dec 25, 2025 66:57


Slava Mayer - Authorization 001 2026

RunAs Radio
Zero Trust in 2026 with Michele Bustamante

RunAs Radio

Play Episode Listen Later Dec 17, 2025 41:09


How is zero-trust security evolving? Michele Leroux Bustamante discusses the challenges CISOs face today in controlling access to infrastructure, authenticating and authorizing users, and managing the ongoing evolution of an organization's dependencies. The conversation digs into the variety of stacks available to address various elements of an organization's security requirements. Michele also talks about the NIST Cybersecurity Framework as a starting point for understanding the security elements your organization needs to focus on and improve—security is a continuum, not a destination!LinksAzure EntraAuth0DuendeKeyCloakNIST Cybersecurity FrameworkOpen Policy AgentPolicy ServerDefender for CloudAzure API ManagementAzure Front DoorRecorded October 29, 2025

Trust Issues
EP 21 - When attackers log in: Pausing for perspective in the age of instant answers

Trust Issues

Play Episode Listen Later Dec 16, 2025 43:50


In this episode of Security Matters, host David Puner welcomes back David Higgins, senior director in CyberArk's Field Technology Office, for a timely conversation about the evolving cyber threat landscape. Higgins explains why today's attackers aren't breaking in—they're logging in—using stolen credentials, AI-powered social engineering, and deepfakes to bypass traditional defenses and exploit trust.The discussion explores how the rise of AI is eroding critical thinking, making it easier for even seasoned professionals to fall for convincing scams. Higgins and Puner break down the dangers of instant answers, the importance of “never trust, always verify,” and why zero standing privilege is essential for defending against insider threats. They also tackle the risks of shadow AI, the growing challenge of misinformation, and how organizations can build a culture of vigilance without creating a climate of mistrust.Whether you're a security leader, IT professional, or just curious about the future of digital trust, this episode delivers actionable insights on identity security, cyber hygiene, and the basics that matter more than ever in 2026 and beyond.

McKnight's Newsmakers Podcast
Rewriting the rules of authorization with automated, physician-built AI

McKnight's Newsmakers Podcast

Play Episode Listen Later Dec 16, 2025 18:05


If you're navigating rising managed care penetration, paperwork burdens, mounting denials, and shrinking margins, this is a must-listen on how clinically guided AI can reduce burden, protect patient care and maintain financial stability. Hosted by Simplecast, an AdsWizz company. See https://pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jordan Is My Lawyer
December 4, 2025: The Truth About Somalis in Minnesota, What We Know About Hegseth's Authorization a Follow-Up Strike, Trump Voids Biden's Autopen Actions, and More.

Jordan Is My Lawyer

Play Episode Listen Later Dec 4, 2025 52:29


SUBSCRIBE TO JORDAN'S FREE NEWSLETTER. PEACE TALKS: Want Jordan's advice on how to navigate relationships amid the polarizing political climate? ⁠SUBMIT YOUR DILEMMA HERE⁠. Get the facts, without the spin. UNBIASED offers a clear, impartial recap of US news, including politics, elections, legal news, and more. Hosted by lawyer Jordan Berman, each episode provides a recap of current political events plus breakdowns of complex concepts—like constitutional rights, recent Supreme Court rulings, and new legislation—in an easy-to-understand way. No personal opinions, just the facts you need to stay informed on the daily news that matters. If you miss how journalism used to be, you're in the right place. In today's episode: What We Know About the Follow-Up Strike on the Alleged Drug Boat in the Caribbean (1:12) Trump Threatens to Void All Biden Actions Signed With Autopen, But Can He? (13:42) ICE to Target Somali Migrants in Minnesota Amid Accusations of Fraud; Here's What We Know (~21:27) White House Launches New 'Media Bias' Webpage (~44:13) Quick Hitters: Dell Family Donates $6.25B to Trump Accounts, New DoD Inspector General Report on Hegseth's Signal Chat, Trump Pardons Democratic Representative (~47:29) Rumor Has It: Did the DOJ Spend Nearly $1M in Overtime Pay for Agents to Redact Epstein Files? Does Kamala Harris Want the Voting Age Lowered to 16? (~50:02) Critical Thinking Segment (~53:01) SUBSCRIBE TO JORDAN'S FREE NEWSLETTER. Watch this episode on YouTube. Follow Jordan on Instagram and TikTok. All sources for this episode can be found here.  Learn more about your ad choices. Visit podcastchoices.com/adchoices

Bill Handel on Demand
Insurers Promise to Ease Authorization Burden | ‘Trump Accounts' for Kids

Bill Handel on Demand

Play Episode Listen Later Dec 4, 2025 26:00 Transcription Available


(December 04, 2025) Insurers promise to ease authorization burden after UnitedHealthcare CEO’s murder… Here’s what happened. How to claim ‘Trump Accounts’ for kids after $6BIL contribution. Ultra-Orthodox Conscription bill threatens crisis for Israel’s government. Even affluent American’s don’t feel wealthy.See omnystudio.com/listener for privacy information.

ITSPmagazine | Technology. Cybersecurity. Society
AI, Quantum, and the Changing Role of Cybersecurity | ISC2 Security Congress 2025 Coverage with Jon France, Chief Information Security Officer at ISC2 | On Location with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 3, 2025 26:22


What Security Congress Reveals About the State of CybersecurityThis discussion focuses on what ISC2 Security Congress represents for practitioners, leaders, and organizations navigating constant technological change. Jon France, Chief Information Security Officer at ISC2, shares how the event brings together thousands of cybersecurity practitioners, certification holders, chapter leaders, and future professionals to exchange ideas on the issues shaping the field today.  Themes That Stand OutAI remains a central point of attention. France notes that organizations are grappling not only with adoption but with the shift in speed it introduces. Sessions highlight how analysts are beginning to work alongside automated systems that sift through massive data sets and surface early indicators of compromise. Rather than replacing entry-level roles, AI changes how they operate and accelerates the decision-making path. Quantum computing receives a growing share of focus as well. Attendees hear about timelines, standards emerging from NIST, and what preparedness looks like as cryptographic models shift.  Identity-based attacks and authorization failures also surface throughout the program. With machine-driven compromises becoming easier to scale, the community explores new defenses, stronger controls, and the practical realities of machine-to-machine trust. Operational technology, zero trust, and machine-speed threats create additional urgency around modernizing security operations centers and rethinking human-to-machine workflows.  A Place for Every Stage of the CareerFrance describes Security Congress as a cross-section of the profession: entry-level newcomers, certification candidates, hands-on practitioners, and CISOs who attend for leadership development. Workshops explore communication, business alignment, and critical thinking skills that help professionals grow beyond technical execution and into more strategic responsibilities.  Looking Ahead to the Next CongressThe next ISC2 Security Congress will be held in October in the Denver/Aurora area. France expects AI and quantum to remain key themes, along with contributions shaped by the call-for-papers process. What keeps the event relevant each year is the mix of education, networking, community stories, and real-world problem-solving that attendees bring with them.The ISC2 Security Congress 2025 is a hybrid event taking place from October 28 to 30, 2025 Coverage provided by ITSPmagazineGUEST:Jon France, Chief Information Security Officer at ISC2 | On LinkedIn: https://www.linkedin.com/in/jonfrance/HOST:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comFollow our ISC2 Security Congress coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/isc2-security-congress-2025Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageISC2 Security Congress: https://www.isc2.orgNIST Post-Quantum Cryptography Standards: https://csrc.nist.gov/projects/post-quantum-cryptographyISC2 Chapters: https://www.isc2.org/chaptersWant to share an Event Briefing as part of our event coverage? Learn More

Identity At The Center
#389 - Sponsor Spotlight - Aembit

Identity At The Center

Play Episode Listen Later Dec 3, 2025 53:32


This episode is sponsored by Aembit. Visit aembit.io/idac to learn more.Jeff and Jim welcome David Goldschlag, CEO and Co-founder of Aembit, to discuss the rapidly evolving world of non-human access and workload identity. With the rise of AI agents in the enterprise, organizations face a critical challenge: how to secure software-to-software connections without relying on static, shared credentials.David shares his unique background, ranging from working on The Onion Router (Tor) at the Naval Research Lab to the DIVX rental system, and explains how those experiences inform his approach to identity today. The conversation covers the distinction between human and non-human access, the risks of using user credentials for AI agents, and why we must shift from managing secrets to managing access policies.This episode explores real-world use cases for AI agents in financial services and retail, the concept of hybrid versus autonomous agents, and practical advice for identity practitioners looking to get ahead of the agentic AI wave.Visit Aembit: https://aembit.io/idacConnect with David: https://www.linkedin.com/in/davidgoldschlagConnect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at idacpodcast.comTimestamps00:00 - Intro00:51 - Pronunciation of Aembit and the extra 'E'01:56 - David's background: From NSA to Enterprise Security04:58 - The meaning behind the name Aembit06:00 - David's history with The Onion Router (Tor)10:00 - Differentiating Non-Human Access from Workforce IAM11:39 - The security risks of AI Agents using human credentials14:15 - Manage Access, Not Secrets16:00 - Use Cases: Financial Analysts and Retail24:00 - Hybrid Agents vs. Autonomous Agents30:38 - Will we have agentic versions of ourselves?36:45 - How Identity Practitioners can handle the AI wave38:33 - Measuring success and ROI for workload identity43:20 - A blast from the past: DIVX and Circuit City52:15 - ClosingKeywordsIDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Aembit, David Goldschlag, Non-human access, Workload Identity, AI Agents, Machine Identity, Cybersecurity, IAM, InfoSec, Tor, DIVX, Zero Trust, Secrets Management, Authentication, Authorization

Redefining CyberSecurity
AI, Quantum, and the Changing Role of Cybersecurity | ISC2 Security Congress 2025 Coverage with Jon France, Chief Information Security Officer at ISC2 | On Location with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Dec 3, 2025 26:22


What Security Congress Reveals About the State of CybersecurityThis discussion focuses on what ISC2 Security Congress represents for practitioners, leaders, and organizations navigating constant technological change. Jon France, Chief Information Security Officer at ISC2, shares how the event brings together thousands of cybersecurity practitioners, certification holders, chapter leaders, and future professionals to exchange ideas on the issues shaping the field today.  Themes That Stand OutAI remains a central point of attention. France notes that organizations are grappling not only with adoption but with the shift in speed it introduces. Sessions highlight how analysts are beginning to work alongside automated systems that sift through massive data sets and surface early indicators of compromise. Rather than replacing entry-level roles, AI changes how they operate and accelerates the decision-making path. Quantum computing receives a growing share of focus as well. Attendees hear about timelines, standards emerging from NIST, and what preparedness looks like as cryptographic models shift.  Identity-based attacks and authorization failures also surface throughout the program. With machine-driven compromises becoming easier to scale, the community explores new defenses, stronger controls, and the practical realities of machine-to-machine trust. Operational technology, zero trust, and machine-speed threats create additional urgency around modernizing security operations centers and rethinking human-to-machine workflows.  A Place for Every Stage of the CareerFrance describes Security Congress as a cross-section of the profession: entry-level newcomers, certification candidates, hands-on practitioners, and CISOs who attend for leadership development. Workshops explore communication, business alignment, and critical thinking skills that help professionals grow beyond technical execution and into more strategic responsibilities.  Looking Ahead to the Next CongressThe next ISC2 Security Congress will be held in October in the Denver/Aurora area. France expects AI and quantum to remain key themes, along with contributions shaped by the call-for-papers process. What keeps the event relevant each year is the mix of education, networking, community stories, and real-world problem-solving that attendees bring with them.The ISC2 Security Congress 2025 is a hybrid event taking place from October 28 to 30, 2025 Coverage provided by ITSPmagazineGUEST:Jon France, Chief Information Security Officer at ISC2 | On LinkedIn: https://www.linkedin.com/in/jonfrance/HOST:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comFollow our ISC2 Security Congress coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/isc2-security-congress-2025Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageISC2 Security Congress: https://www.isc2.orgNIST Post-Quantum Cryptography Standards: https://csrc.nist.gov/projects/post-quantum-cryptographyISC2 Chapters: https://www.isc2.org/chaptersWant to share an Event Briefing as part of our event coverage? Learn More

The New Stack Podcast
All About Cedar, an Open Source Solution for Fine-Tuning Kubernetes Authorization

The New Stack Podcast

Play Episode Listen Later Dec 2, 2025 16:13


Kubernetes has relied on role-based access control (RBAC) since 2017, but its simplicity limits what developers can express, said Micah Hausler, principal engineer at AWS, on The New Stack Makers. RBAC only allows actions; it can't enforce conditions, denials, or attribute-based rules. Seeking a more expressive authorization model for Kubernetes, Hausler explored Cedar, an authorization engine and policy language created at AWS in 2022 and later open-sourced. Although not designed specifically for Kubernetes, Cedar proved capable of modeling its authorization needs in a concise, readable way. Hausler highlighted Cedar's clarity—nontechnical users can often understand policies at a glance—as well as its schema validation, autocomplete support, and formal verification, which ensures policies are correct and produce only allow or deny outcomes.Now onboarding to the CNCF sandbox, Cedar is used by companies like Cloudflare and MongoDB and offers language-agnostic tooling, including a Go implementation donated by StrongDM. The project is actively seeking contributors, especially to expand bindings for languages like TypeScript, JavaScript, and Python.Learn more from The New Stack about Cedar:Ceph: 20 Years of Cutting-Edge Storage at the Edge The Cedar Programming Language: Authorization SimplifiedJoin our community of newsletter subscribers to stay on top of the news and at the top of your game.  Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

The 'X' Zone Radio Show
Rob McConnell Interviews - DR. RICHARD RUHLING - The National Defense Authorization Act

The 'X' Zone Radio Show

Play Episode Listen Later Nov 28, 2025 41:23 Transcription Available


Dr. Richard Ruhling was board-certified in internal medicine and had training in cardiology before teaching at Loma Linda University as Assistant Professor of Health Science, 1974-78. He has a Master's Degree in Public Health. After leaving the university, he developed Total Health Seminar designed to help people reverse cardiovascular disease with diet and exercise. In recent years he has authored books available on Amazon.com "Why You Shouldn't Ask Your Doctor," "America in Prophecy" and an ebook, "The Fall of America" available on his website, http://RichardRuhling.com covering topics of current events, Bible prophecy and patriotism.Become a supporter of this podcast: https://www.spreaker.com/podcast/the-x-zone-radio-tv-show--1078348/support.Please note that all XZBN radio and/or television shows are Copyright © REL-MAR McConnell Meda Company, Niagara, Ontario, Canada – www.rel-mar.com. For more Episodes of this show and all shows produced, broadcasted and syndicated from REL-MAR McConell Media Company and The 'X' Zone Broadcast Network and the 'X' Zone TV Channell, visit www.xzbn.net. For programming, distribution, and syndication inquiries, email programming@xzbn.net.We are proud to announce the we have launched TWATNews.com, launched in August 2025.TWATNews.com is an independent online news platform dedicated to uncovering the truth about Donald Trump and his ongoing influence in politics, business, and society. Unlike mainstream outlets that often sanitize, soften, or ignore stories that challenge Trump and his allies, TWATNews digs deeper to deliver hard-hitting articles, investigative features, and sharp commentary that mainstream media won't touch.These are stories and articles that you will not read anywhere else.Our mission is simple: to expose corruption, lies, and authoritarian tendencies while giving voice to the perspectives and evidence that are often marginalized or buried by corporate-controlled media

Bad Faith
Episode 529 Promo - Authorization to Lead

Bad Faith

Play Episode Listen Later Nov 24, 2025 7:44


Subscribe to Bad Faith on Patreon to instantly unlock this episode and our entire premium episode library: http://patreon.com/badfaithpodcast An all-star activist panel has been assembled to answer Briahna's questions about the strategy and efficacy of contemporary direct actions. Medea Benjamin, co-founder of feminist anti-war organization code pink, Palestinian activist Hazami Barmada, who staged last week's viral "Thanksgiving" demonstration outside of Union Station in DC featuring demonstrators dressed as Trump, Netanyahu, & other war criminals; and Aru Shiney-Ajay, executive director of the Sunrise Movement, all bring their expertise and courage to the question of how direct action can fill the role historically played by organized labor, and how the left can exploit mass protests to greater effect. Subscribe to Bad Faith on YouTube for video of this episode. Find Bad Faith on Twitter (@badfaithpod) and Instagram (@badfaithpod). Produced by Armand Aviram. Theme by Nick Thorburn (@nickfromislands).

The Tiberius Show
Authorization Expert - Damien WhoKnows

The Tiberius Show

Play Episode Listen Later Nov 12, 2025 30:01


This week, Tiberius Boy sits down with Damien — supervisor in a hospital authorization department, former restaurant worker, food truck guy, physical therapy assistant, and current podcaster. (Yes… all of that. We checked. He's real.)We talk about:    What “authorizations” even means in a hospital (spoiler: without it, you can't get care).    Why health insurance makes everything harder than it needs to be.    Why he calls the healthcare system “a necessary evil.”    How it feels telling someone, “You can't get the treatment you need,” even when it's life or death.    What skills you need if you want to work in medical approvals (hint: empathy, Microsoft Excel, and being able to talk to people without freaking out).    Why he thinks health care should not depend on how rich you are or where you work.#TheTiberiusShow #Healthcare #PodcastLife #AuthorizationDept #MathCorners #HeartOfALion #KidsInMedia #StayInSchool #RemainRoamReturnBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-tiberius-show--3352195/support.

Pippin church of Christ
Bible Teaching of Bible Authorization

Pippin church of Christ

Play Episode Listen Later Nov 9, 2025 33:54


Bible Teaching of Bible Authorization - Col. 3:17

Louisiana Considered Podcast
Xavier U. lays off 46 amid 100th anniversary; $510M capital bond authorization on New Orleans ballot

Louisiana Considered Podcast

Play Episode Listen Later Nov 6, 2025 24:29


As Xavier University of Louisiana was in final preparations for its homecoming and 100th anniversary celebration, the university announced the layoff of 46 full-time workers, citing the need to ensure its long-term health.President of Xavier University, Reynold Verret, joins us for more on the 100th anniversary and the current moment the school finds itself in.On November 15, voters in Orleans Parish will be asked to approve a $510 million capital bond authorization. The half a billion dollars will go toward infrastructure, water and drainage and affordable housing. The President and CEO of the Bureau of Governmental Research, Rebecca Mowbray, joins us to explain what this means for the taxpaying residents. Today's episode of Louisiana Considered was hosted by Bob Pavlovich. Our managing producer is Alana Schreiber. We get production support from Garrett Pittman and our assistant producer, Aubry Procell.You can listen to Louisiana Considered Monday through Friday at noon and 7 p.m. It's available on Spotify, the NPR App and wherever you get your podcasts. ----Louisiana Considered wants to hear from you!  Please fill out our pitch line to let us know what kinds of story ideas you have for our show. And while you're at it, fill out our listener survey! We want to keep bringing you the kinds of conversations you'd like to listen to.Louisiana Considered is made possible with support from our listeners. Thank you!

Ophthalmology Journal
The CorNeat Everpatch and the Process of FDA Authorization

Ophthalmology Journal

Play Episode Listen Later Nov 6, 2025 29:28


On September 5, 2025, the FDA issued a recall for the CorNeat EverPatch. Dr. Emily Schehlein is joined by Dr. Thomas V. Johnson to discuss his study on the early exposure and surgical revision rates of the CorNeat EverPatch. Later, Dr. Henry Jampel explains the difference between FDA clearance and FDA approval for medical devices. Dr. Johnson coauthored the Ophthalmology article, "Early Postoperative Conjunctival Complications Leading to Exposure of Surgically Implanted CorNeat EverPatch Devices." Dr. Jampel cowrite the accompanying Commentary, "The CorNeat Everpatch and the Process of FDA Authorization." Dr. Henry Jampel is an Associate Editor for Ophthalmology and the Editor-in-Chief for Ophthalmology Glaucoma. Dr. Thomas V. Johnson is an Associate Editor for Ophthalmology Science. Early Postoperative Conjunctival Complications Leading to Exposure of Surgically Implanted CorNeat EverPatch Devices. Kanter, Jacob et al. Ophthalmology, Volume 132, Issue 7, 799 – 814. The CorNeat Everpatch and the Process of FDA Authorization. Jampel, Risa; Jampel, Henry. Ophthalmology, Volume 132, Issue 7, 815 – 816. The Academy's BCSC is your trusted source of clinical knowledge. The 2025-2026 edition includes a major revision to Section 8: External Disease and Cornea. Updates include a new interactive case study on Fuchs endothelial corneal dystrophy and cataracts, as well as 15 new videos of surgical procedures. Advance order Section 8 today at aao.org/BCSC.

Drivetime with DeRusha
The DeRush-Hour Headlines & reaction to the Minneapolis teachers strike authorization vote

Drivetime with DeRusha

Play Episode Listen Later Oct 28, 2025 38:19


5pm Hour: Jason talks about today's layoffs at Target and with representatives from the Minneapolis teachers union about their strike authorization vote - are their asks realistic? Listeners aren't so sure.

Identity At The Center
#381 - Beyond Human: Taming the Wild West of Non-Human Identities with Steve Rennick

Identity At The Center

Play Episode Listen Later Oct 27, 2025 74:36


In this episode, Jim McDonald and Jeff Steadman are joined by Steve Rennick, Senior Leader for IAM Architecture at Ciena, for a wide-ranging discussion on the most pressing topics in identity today.The conversation kicks off with a practical look at vendor demos, sharing best practices for cutting through the slideware and getting to the heart of a product's capabilities. From there, they dive deep into the complex world of Non-Human Identities (NHI). Steve shares his practitioner's perspective on why NHIs are such a hot topic, the challenges of managing them, and the risks they pose when left unchecked.The discussion covers:Why traditional IAM approaches fail for non-human identities.The importance of visibility and creating a standardized process for NHI creation.The debate around terminology: NHI vs. machine identity vs. service accounts.The reasons for NHI's current prominence, including threat actors shifting focus away from MFA-protected human accounts.Practical, actionable advice for getting a handle on legacy service accounts.The emerging challenge of IAM for AI and the complexities of managing agentic AI.The critical role of authorization and the future of policy-based access control.Whether you're struggling with service account sprawl, preparing for an AI-driven future, or just want to run more effective vendor demos, this episode is packed with valuable insights.Connect with Steve: https://www.linkedin.com/in/steven-rennick/ARIA (Agent Relationship-Based Identity & Authorization) LinkedIn Post from Patrick Parker: https://www.linkedin.com/posts/patrickparker_ai-agent-authorization-activity-7335265428774031360-braE/Connect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at http://idacpodcast.comCHAPTER TIMESTAMPS:00:00:10 - Introduction & The Art of the Vendor Demo00:08:02 - Steve Rennick's Take on Vendor Demos00:12:39 - Formal Introduction: Steve Rennick00:14:45 - Recapping the Identiverse Squabble Game Show00:17:22 - The Hot Topic of Non-Human Identities (NHI)00:22:22 - Is NHI a Joke or a Serious Framework?00:26:41 - The Controversy Around the Term "NHI"00:30:24 - How to Simplify NHI for Practitioners00:34:06 - First Steps for Getting a Handle on NHI00:37:20 - Can Active Directory Be a System of Record for NHI?00:45:08 - Why is NHI a Hot Topic Right Now?00:51:19 - The Challenge of Cleaning Up Legacy NHIs00:58:00 - IAM for AI: Managing a New Breed of Identity01:03:33 - The Future is Authorization01:06:22 - The Zero Standing Privilege Debate01:10:39 - Favorite Dinosaurs and OutroKEYWORDS:NHI, Non-Human Identity, Machine Identity, Service Accounts, Vendor Demos, IAM for AI, Agentic AI, Authorization, Zero Trust, Zero Standing Privilege, Secrets Management, IAM Strategy, Cybersecurity, Identity and Access Management, Steve Rennick, Ciena, IDAC, Identity at the Center, Jeff Steadman, Jim McDonald

Autoline Daily - Video
AD #4165 - UAW To Hold VW Strike Authorization Vote; Ford's Q3 Net Profit Soars 174%; U.S. Mines Enough Critical Minerals to End Imports

Autoline Daily - Video

Play Episode Listen Later Oct 24, 2025 11:21


- Ford's Q3 Net Profit Soars 174% - Ford Avoids $2.5 Billion In ZEV Credit Purchases - UAW To Hold VW Strike Authorization Vote - Tavares Says Musk Could Walk Away from Auto Industry - U.S. Mines Enough Critical Minerals and Rare Earths to End Imports - Rivian Cuts 600 Jobs - Rivian Pays $250 Million To Settle IPO Lawsuit - Sunwoda Unveils 1,000-Km Solid-State Battery - Porsche Details Cayenne Electric's High-Voltage System

Autoline Daily
AD #4165 - UAW To Hold VW Strike Authorization Vote; Ford's Q3 Net Profit Soars 174%; U.S. Mines Enough Critical Minerals to End Imports

Autoline Daily

Play Episode Listen Later Oct 24, 2025 11:06 Transcription Available


- Ford's Q3 Net Profit Soars 174% - Ford Avoids $2.5 Billion In ZEV Credit Purchases - UAW To Hold VW Strike Authorization Vote - Tavares Says Musk Could Walk Away from Auto Industry - U.S. Mines Enough Critical Minerals and Rare Earths to End Imports - Rivian Cuts 600 Jobs - Rivian Pays $250 Million To Settle IPO Lawsuit - Sunwoda Unveils 1,000-Km Solid-State Battery - Porsche Details Cayenne Electric's High-Voltage System

KAZU - Listen Local Podcast
Santa Cruz Union to vote on strike authorization, legal help for unaccompanied immigrant youth

KAZU - Listen Local Podcast

Play Episode Listen Later Oct 20, 2025 1:46


Santa Cruz Union members will vote on a strike authorization. And, a new California law guarantees legal counsel for unaccompanied immigrant youth.

Orthos: Straight Talk with James D. Gailliard
Mercy in the Moment: Character in Dark Places (1 Samuel 24) // Raw and Real: Life Lessons from a Messy Life (8AM)

Orthos: Straight Talk with James D. Gailliard

Play Episode Listen Later Oct 19, 2025 39:56


In one of the darkest caves of David's life, we find one of the clearest revelations of character. This powerful message explores how godly character isn't forged in the spotlight but in the shadows—when no one's watching, and when the opportunity to compromise is greatest.In this sermon, Pastor James D. Gailliard teaches from 1 Samuel 24, where David has a chance to take revenge on Saul but chooses mercy instead. Through this text, we're challenged to:

Orthos: Straight Talk with James D. Gailliard
Mercy in the Moment: Character in Dark Places (1 Samuel 24) // Raw and Real: Life Lessons from a Messy Life (10AM)

Orthos: Straight Talk with James D. Gailliard

Play Episode Listen Later Oct 19, 2025 42:35


In one of the darkest caves of David's life, we find one of the clearest revelations of character. This powerful message explores how godly character isn't forged in the spotlight but in the shadows—when no one's watching, and when the opportunity to compromise is greatest.In this sermon, Pastor James D. Gailliard teaches from 1 Samuel 24, where David has a chance to take revenge on Saul but chooses mercy instead. Through this text, we're challenged to:

The Kevin Jackson Show
Mind-Blowing Destruction of Leftism - Ep 25-404

The Kevin Jackson Show

Play Episode Listen Later Oct 9, 2025 38:40


25% of Leftists are on medication. Unbelievable. But if you think that's scary, understand 75% of them are UNTREATED!Information about the crooked Democrats is coming at us fast and furiously. And don't expect it to change.Comey is being arraigned today. We will discuss that more in a bit.Understand that the Jack Smith development doesn't help Comey at all. Kash Patel on Jack Smith evidencePut this information. Subpoenaed 8 Senators. Put it in a lockbox. Put in a vault. Prohibited access. Authorization of AG and FBI Director.Knew where to look. Buried. Wormholed.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

The Tech Trek
From POC to Production: Enterprise Agents Explained

The Tech Trek

Play Episode Listen Later Sep 18, 2025 50:13


Alex Salazar, co-founder and CEO of Arcade.dev, joins the show to unpack the realities of building enterprise agents. Conceptually simple but technically hard, agents are reshaping how companies think about workflow automation, security, and human-in-the-loop design. Alex shares why moving from proof-of-concept to production is so challenging, what playbooks actually work, and how enterprises can avoid wasting time and money as this technology accelerates faster than any previous wave.Key TakeawaysEnterprise agents aren't chatbots—they're workflow systems that can take secure, authorized actions.The real challenge isn't just building demos but getting to production-grade consistency and accuracy.Mid-market companies face the steepest climb: limited budgets, limited ML expertise, but the same competitive pressure.Success starts with finding low-risk, high-impact opportunities and narrowing scope as much as possible.Authorization is the biggest blocker today; delegated OAuth models are key to unlocking real agent functionality.Timestamped Highlights02:02 — Why agents are “just advanced workflow software” but harder to trust than traditional apps04:53 — The gap between glorified chatbots and real enterprise agents that take action09:58 — From cloud mistrust to wire transfers: how comfort with automation evolves14:00 — Chaos at every tier: startups, enterprises, and why the mid-market struggles most26:21 — The playbook: how to pick use cases, narrow scope, and carry pilots all the way to prod34:38 — Breaking down agent authorization and why most RAG systems fail in practice42:09 — Adoption at double speed: what makes this AI wave different from internet and cloudA Thought That Stuck“An agent isn't an agent until it can take action. If all it does is talk, it's just a chatbot.” — Alex SalazarCall to ActionIf this episode gave you a clearer lens on enterprise agents, share it with a colleague who needs to hear it. And don't miss future conversations—follow The Tech Trek on Apple Podcasts, Spotify, or wherever you listen.

Headlines
8/16/25 – Shiur 524 – Steal with a Click? The Halachic Ethics of Downloading Music, Seforim, and Media without authorization

Headlines

Play Episode Listen Later Aug 14, 2025 54:41


Can you own intellectual property? Can it be stolen if it's not tangible and there's no act of theft? Do you have to pay for enjoyment? Dina D'Malcusa Dina Aveida M'Daas And much more..... with Rabbi Yosef Dovid Josilowsky – Dayan, Beis HaVaad – 10:10 with Rabbi Chaim Jachter – Rav of Sha'arei Orah in Teaneck, Dayan on the Elizabeth Beis Din – 32:39 מראי מקומות