Podcasts about Black hat

  • 1,191PODCASTS
  • 2,994EPISODES
  • 50mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jul 30, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Black hat

Show all podcasts related to black hat

Latest podcast episodes about Black hat

Weird Darkness: Stories of the Paranormal, Supernatural, Legends, Lore, Mysterious, Macabre, Unsolved
THE MAN IN THE BLACK HAT: Luck, Death, and the Grey Eyed Stranger

Weird Darkness: Stories of the Paranormal, Supernatural, Legends, Lore, Mysterious, Macabre, Unsolved

Play Episode Listen Later Jul 30, 2025 582:25


A gambler with a run of good luck receives a free car from a mysterious man with gray eyes. As his winnings pile up, the gray‑eyed stranger reappears again and again, even after the gambler witnesses him commit murder. It's a chiller from Sleep No More! | #RetroRadio EP0476Join the DARKNESS SYNDICATE: https://weirddarkness.com/syndicateCHAPTERS & TIME STAMPS (All Times Approximate)…00:00:00.000 = Show Open00:01:30.028 = CBS Radio Mystery Theater, “Graven Image” (September 06, 1976)00:45:33.445 = Radio City Playhouse, “Blind Vengeance” (March 21, 1949)01:14:50.442 = Ripley's Believe It Or Not, “Strange Vigil” (1930) ***WD01:15:51.501 = Sam Spade, “Prodigal Panda Caper” (December 29, 1950) ***WD01:44:45.271 = The Sealed Book, “Death Spins a Web” (April 01, 1945) ***WD02:14:07.119 = The Shadow, “The Laughing Corpse” (March 10, 1940) ***WD02:39:48.766 = Sleep No More, “Over the Hill” and “The Man in the Black Hat” (December 05, 1956) ***WD03:03:08.645 = BBC Spine Chillers, “The Light of the Moon” (1984)03:17:05.922 = Strange Wills, “Emily” (August 31, 1946)03:46:46.558 = Strange, “Flying Dutchman” (1955) ***WD03:59:44.311 = Suspense, “Singing Walls” (September 02, 1943)04:29:19.384 = Tales of the Frightened, “White House” (December 20, 1957) ***WD04:33:39.410 = The Saint, “Christmas Eve Problems” (December 24, 1950)05:03:05.399 = Theater Five, “All Bright Young Ones” (October 12, 1964)05:24:06.434 = The Unexpected, “Revenge” (1948) ***WD05:38:52.106 = Dark Venture, “Chase” (August 03, 1946) ***WD (LQ)06:07:11.642 = The Weird Circle, “Burial of Roger Malvin” (October 22, 1944)06:34:16.694 = The Whistler, “Till Death Do Us Part” (July 30, 1944) ***WD07:01:49.673 = Witch's Tale, “Troth of Death” (May 29, 1933)07:25:13.650 = X Minus One, “The Seventh Order” (May 08, 1956)07:53:24.377 = ABC Mystery Time, “Death Walked In” (1956-1957) ***WD08:17:25.579 = Strange Adventure, “A Savage Honor” (1945) ***WD08:20:40.223 = Appointment With Fear, “And The Deep Shuddered” (November 20, 1945) ***WD08:46:23.888 = Beyond The Green Door, “James Neal And Bowler” (1966)08:49:56.610 = Boston Blackie, “The Ghost of Flo Newton” (May 28, 1947)09:15:03.289 = Box 13, “Speed To Burn” (June 26, 1949)09:41:33.885 = Show Close(ADU) = Air Date Unknown(LQ) = Low Quality***WD = Remastered, edited, or cleaned up by Weird Darkness to make the episode more listenable. Audio may not be pristine, but it will be better than the original file which may have been unusable or more difficult to hear without editing.Weird Darkness theme by Alibi Music LibraryABOUT WEIRD DARKNESS: Weird Darkness is a true crime and paranormal podcast narrated by professional award-winning voice actor, Darren Marlar. Seven days per week, Weird Darkness focuses on all thing strange and macabre such as haunted locations, unsolved mysteries, true ghost stories, supernatural manifestations, urban legends, unsolved or cold case murders, conspiracy theories, and more. On Thursdays, this scary stories podcast features horror fiction along with the occasional creepypasta. Weird Darkness has been named one of the “Best 20 Storytellers in Podcasting” by Podcast Business Journal. Listeners have described the show as a cross between “Coast to Coast” with Art Bell, “The Twilight Zone” with Rod Serling, “Unsolved Mysteries” with Robert Stack, and “In Search Of” with Leonard Nimoy.= = = = ="I have come into the world as a light, so that no one who believes in me should stay in darkness." — John 12:46= = = = =WeirdDarkness® is a registered trademark. Copyright ©2025, Weird Darkness.= = = = =#TrueCrime #Paranormal #ScienceFiction #OldTimeRadio #OTR #OTRHorror #ClassicRadioShows #HorrorRadioShows #VintageRadioDramas #SuspenseRadioClassics #1940sRadioHorror #OldRadioMysteryShows #CreepyOldRadioShows #TrueCrimeRadio #SupernaturalRadioPlays #GoldenAgeRadio #EerieRadioMysteries #MacabreOldTimeRadio #NostalgicThrillers #ClassicCrimePodcast #RetroHorrorPodcast #WeirdDarkness #WeirdDarknessPodcast #RetroRadio #ClassicRadioCUSTOM WEBPAGE: https://weirddarkness.com/WDRR0476

ITSPmagazine | Technology. Cybersecurity. Society
Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Conversation with Sean Metcalf | Redefining CyberSecurity with Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 30, 2025 31:48


⬥GUEST⬥Sean Metcalf, Identity Security Architect at TrustedSec | On LinkedIn: https://www.linkedin.com/in/seanmmetcalf/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥EPISODE NOTES⬥Sean Metcalf, a frequent speaker at conferences like Black Hat, DEF CON, and RSAC, brings a sharp focus to identity security—especially within Microsoft environments like Active Directory and Entra ID. In this episode, he walks through the practical and tactical role of honeypots and deception in detecting intrusions early and with higher fidelity.While traditional detection tools often aim for broad coverage, honeypots flip the script by offering precise signal amidst the noise. Metcalf discusses how defenders can take advantage of the attacker's need to enumerate systems and accounts after gaining access. That need becomes an opportunity to embed traps—accounts or assets that should never be touched unless someone is doing something suspicious.One core recommendation: repurpose old service accounts with long-lived passwords and believable naming conventions. These make excellent bait for Kerberoasting attempts, especially when paired with service principal names (SPNs) that mimic actual applications. Metcalf outlines how even subtle design choices—like naming conventions that fit organizational patterns—can make a honeypot more convincing and effective.He also draws a distinction between honeypots and deception technologies. While honeypots often consist of a few well-placed traps, deception platforms offer full-scale phantom environments. Regardless of approach, the goal remains the same: attackers shouldn't be able to move around your environment without tripping over something that alerts the defender.Importantly, Metcalf emphasizes that alerts triggered by honeypots are high-value. Since no legitimate user should interact with them, they provide early warning with low false positives. He also addresses the internal politics of deploying these traps, from coordinating with IT operations to ensuring SOC teams have the right procedures in place to respond effectively.Whether you're running a high-end deception platform or just deploying free tokens and traps, the message is clear: identity is the new perimeter, and a few strategic tripwires could mean the difference between breach detection and breach denial.⬥SPONSORS⬥LevelBlue: https://itspm.ag/attcybersecurity-3jdk3ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Inspiring Post: https://www.linkedin.com/posts/activity-7353806074694541313-xzQl/Article: The Art of the Honeypot Account: Making the Unusual Look Normal: https://www.hub.trimarcsecurity.com/post/the-art-of-the-honeypot-account-making-the-unusual-look-normalArticle: Trimarc Research: Detecting Kerberoasting Activity: https://www.hub.trimarcsecurity.com/post/trimarc-research-detecting-kerberoasting-activityArticle: Detecting Password Spraying with Security Event Auditing: https://www.hub.trimarcsecurity.com/post/trimarc-research-detecting-password-spraying-with-security-event-auditing⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast: 

ITSPmagazine | Technology. Cybersecurity. Society
Black Hat 2025: More Buzzwords, Same Breaches? | What's Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year's Hacker Conference | An ITSPmagazine Webinar: On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 30, 2025 60:22


In this thought leadership session, ITSPmagazine co-founders Sean Martin and Marco Ciappelli moderate a dynamic conversation with five industry leaders offering their take on what will dominate the show floor and side-stage chatter at Black Hat USA 2025.Leslie Kesselring, Founder of Kesselring Communications, surfaces how media coverage is shifting in real time—no longer driven solely by talk submissions but now heavily influenced by breaking news, regulation, and public-private sector dynamics. From government briefings to cyberweapon disclosures, the pressure is on to cover what matters, not just what's scheduled.Daniel Cuthbert, member of the Black Hat Review Board and Global Head of Security Research at Banco Santander, pushes back on the hype. He notes that while tech moves fast, security research often revisits decades-old bugs. His sharp observation? “The same bugs from the ‘90s are still showing up—sometimes discovered by researchers younger than the vulnerabilities themselves.”Michael Parisi, Chief Growth Officer at Steel Patriot Partners, shifts the conversation to operational risk. He raises concern over Model-Chained Prompting (MCP) and how AI agents can rewrite enterprise processes without visibility or traceability—especially alarming in environments lacking kill switches or proper controls.Richard Stiennon, Chief Research Analyst at IT-Harvest, offers market-level insights, forecasting AI agent saturation with over 20 vendors already present in the expo hall. While excited by real advancements, he warns of funding velocity outpacing substance and cautions against the cycle of overinvestment in vaporware.Rupesh Chokshi, SVP & GM at Akamai Technologies, brings the product and customer lens—framing the security conversation around how AI use cases are rolling out fast while security coverage is still catching up. From OT to LLMs, securing both AI and with AI is a top concern.This episode is not just about placing bets on buzzwords. It's about uncovering what's real, what's noise, and what still needs fixing—no matter how long we've been talking about it.___________Guests:Leslie Kesselring, Founder at Cyber PR Firm Kesselring Communications | On LinkedIn: https://www.linkedin.com/in/lesliekesselring/“This year, it's the news cycle—not the sessions—that's driving what media cover at Black Hat.”Daniel Cuthbert, Black Hat Training Review Board and Global Head of Security Research for Banco Santander | On LinkedIn: https://www.linkedin.com/in/daniel-cuthbert0x/“Why are we still finding bugs older than the people presenting the research?”Richard Stiennon, Chief Research Analyst at IT-Harvest | On LinkedIn: https://www.linkedin.com/in/stiennon/“The urge to consolidate tools is driven by procurement—not by what defenders actually need.”Michael Parisi, Chief Growth Officer at Steel Patriot Partners | On LinkedIn: https://www.linkedin.com/in/michael-parisi-4009b2261/“Responsible AI use isn't a policy—it's something we have to actually implement.”Rupesh Chokshi, SVP & General Manager at Akamai Technologies | On LinkedIn: https://www.linkedin.com/in/rupeshchokshi/“The business side is racing to deploy AI—but security still hasn't caught up.”Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Badlands Media
DEFCON ZERQ EP. 003: FIRST ARREST - HUNTED BECOME THE HUNTERS - 2020 COUP - NUCLEAR THREAT

Badlands Media

Play Episode Listen Later Jul 30, 2025 136:30 Transcription Available


In Episode 3 of DEFCON ZERQ, Alpha Warrior and Josh Reid take listeners on a rapid-fire ride through a series of headlines and intel drops, highlighting the shifting global narrative and signs of elite panic. From explosions in Crimea and the Philippines to chatter around Obama and discussions of military tribunals, the hosts tie together media cues, deep state fear, and high-level movements. They revisit the 2020 election as a military-captured operation, consider the implications of a potential first arrest, and ask why the push for fear, especially nuclear fear, is rising now. With references to optics, comms, and counter-narratives, Alpha and Josh weave through topics like Project Looking Glass, the White Hat vs. Black Hat dynamic, and a surge in global resignations and deaths. Grounded in current events and decoded messaging, this episode frames the moment as one where the hunters truly become the hunted.

Cyber Security Headlines
Telecom Orange hacked, $2.4M Bitcoin seized from Chaos, Scattered Spider's tactics evolve

Cyber Security Headlines

Play Episode Listen Later Jul 30, 2025 6:43


Critical Authentication Flaw Identified in Base44 Vibe Coding Platform French telecom giant Orange discloses cyberattack FBI seizes $2.4M in Bitcoin from new Chaos ransomware operation Huge thanks to our sponsor, Dropzone AI What if your SOC could investigate every single alert without burning out your team? That's exactly what Dropzone AI does. They're the leader in autonomous security investigations, and companies like Zapier and Fortune 500s are already on board. Their AI works alongside your analysts, handling the routine so humans can be strategic. See them at BlackHat in Startup City, booth 6427. Or experience it yourself—dropzone.ai has a self-guided demo ready for you.  

Redefining CyberSecurity
Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Conversation with Sean Metcalf | Redefining CyberSecurity with Sean Martin

Redefining CyberSecurity

Play Episode Listen Later Jul 30, 2025 31:48


⬥GUEST⬥Sean Metcalf, Identity Security Architect at TrustedSec | On LinkedIn: https://www.linkedin.com/in/seanmmetcalf/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥EPISODE NOTES⬥Sean Metcalf, a frequent speaker at conferences like Black Hat, DEF CON, and RSAC, brings a sharp focus to identity security—especially within Microsoft environments like Active Directory and Entra ID. In this episode, he walks through the practical and tactical role of honeypots and deception in detecting intrusions early and with higher fidelity.While traditional detection tools often aim for broad coverage, honeypots flip the script by offering precise signal amidst the noise. Metcalf discusses how defenders can take advantage of the attacker's need to enumerate systems and accounts after gaining access. That need becomes an opportunity to embed traps—accounts or assets that should never be touched unless someone is doing something suspicious.One core recommendation: repurpose old service accounts with long-lived passwords and believable naming conventions. These make excellent bait for Kerberoasting attempts, especially when paired with service principal names (SPNs) that mimic actual applications. Metcalf outlines how even subtle design choices—like naming conventions that fit organizational patterns—can make a honeypot more convincing and effective.He also draws a distinction between honeypots and deception technologies. While honeypots often consist of a few well-placed traps, deception platforms offer full-scale phantom environments. Regardless of approach, the goal remains the same: attackers shouldn't be able to move around your environment without tripping over something that alerts the defender.Importantly, Metcalf emphasizes that alerts triggered by honeypots are high-value. Since no legitimate user should interact with them, they provide early warning with low false positives. He also addresses the internal politics of deploying these traps, from coordinating with IT operations to ensuring SOC teams have the right procedures in place to respond effectively.Whether you're running a high-end deception platform or just deploying free tokens and traps, the message is clear: identity is the new perimeter, and a few strategic tripwires could mean the difference between breach detection and breach denial.⬥SPONSORS⬥LevelBlue: https://itspm.ag/attcybersecurity-3jdk3ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Inspiring Post: https://www.linkedin.com/posts/activity-7353806074694541313-xzQl/Article: The Art of the Honeypot Account: Making the Unusual Look Normal: https://www.hub.trimarcsecurity.com/post/the-art-of-the-honeypot-account-making-the-unusual-look-normalArticle: Trimarc Research: Detecting Kerberoasting Activity: https://www.hub.trimarcsecurity.com/post/trimarc-research-detecting-kerberoasting-activityArticle: Detecting Password Spraying with Security Event Auditing: https://www.hub.trimarcsecurity.com/post/trimarc-research-detecting-password-spraying-with-security-event-auditing⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast: 

ITSPmagazine | Technology. Cybersecurity. Society
ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Booth #1933 | A ThreatLocker Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with John Lilliston

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 29, 2025 17:51


ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Booth #1933 | A ThreatLocker Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with John LillistonJoin ITSP Magazine's Marco Ciappelli and Sean Martin as they preview ThreatLocker's exciting Black Hat 2025 presence with Detect Product Director John Lilliston. Discover upcoming major announcements, hands-on hacking demos, and how ThreatLocker's default deny approach is revolutionizing enterprise cybersecurity through comprehensive zero trust implementation.As Black Hat USA 2025 approaches, cybersecurity professionals are gearing up for one of the industry's most anticipated events. ITSP Magazine's Marco Ciappelli and Sean Martin recently sat down with John Lilliston, ThreatLocker's Detect Product Director, to preview what promises to be an exciting showcase of zero trust innovation at booth 1933.ThreatLocker has become synonymous with the "default deny" security approach, a philosophy that fundamentally changes how organizations protect their digital assets. Unlike traditional security models that allow by default and block known threats, ThreatLocker's approach denies everything by default and allows only approved applications, network communications, and storage operations. This comprehensive strategy operates across application, network, and storage levels, creating what Lilliston describes as a "hardened system that stops adversaries in their tracks."The company's rapid growth reflects the industry's embrace of zero trust principles, moving beyond buzzword status to practical, enterprise-ready solutions. Lilliston, who joined ThreatLocker in February after evaluating their products from the enterprise side, emphasizes how the platform's learning mode and ring fencing capabilities set it apart from competitors in the application control space.At Black Hat 2025, ThreatLocker will demonstrate their defense-in-depth strategy through their Detect product line. While their primary zero trust controls rarely fail, Detect provides crucial monitoring for applications that must run in enterprise environments but may have elevated risk profiles. The system can automatically orchestrate responses to threats, such as locking down browsers exhibiting irregular behavior that might indicate data exfiltration attempts.Visitors to booth 1933 can expect hands-on demonstrations and on-demand hacking scenarios that showcase real-world applications of ThreatLocker's technology. The company is preparing major announcements that CEO Danny Houlihan will reveal during the event, promising game-changing developments for both the organization and its client base.ThreatLocker's Black Hat agenda includes a welcome reception on Tuesday, August 5th, from 7-10 PM at the Mandalay Bay Complex, and Houlihan's presentation on "Simplifying Cybersecurity" on Thursday, August 7th, from 10:15-11:05 AM at Mandalay Bay J.The convergence of practical zero trust implementation, cutting-edge threat detection, and automated response capabilities positions ThreatLocker as a key player in the evolving cybersecurity landscape, making their Black Hat presence essential viewing for security professionals seeking comprehensive protection strategies.Keywords: Black Hat 2025, zero trust security, cybersecurity conference, ThreatLocker, default deny strategy, endpoint protection, application control, threat detection, enterprise security, network security, cybersecurity solutions, security automation, malware prevention, cyber threats, information security, security platform, Black Hat USA, cybersecurity innovation, managed detection response, security operationsLearn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content.Learn more.Guests:John LillistonCybersecurity Director | Threat Detection & Response | SOC Leadership | DFIR | EDR/XDR Strategy | GCFA, GISP | https://www.linkedin.com/in/john-lilliston-4725217b/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerThreatLocker® Welcome Reception | Don't gamble with your security! Join us at Black Hat for a lively Welcome Reception hosted by ThreatLocker®. Meet our Cyber Hero® Team and dive into discussions on the latest advancements in ThreatLocker®Endpoint Security. It's a great opportunity to connect and learn together! ‍‍Time: 7PM - 10PM | Location: Mandalay Bay Complex RSVP below and we'll send you a confirmation email with all the details.[ Welcome Reception RSVP ]Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

CISO Tradecraft
#243 - Navigating Hacker Summer Camp in 2025

CISO Tradecraft

Play Episode Listen Later Jul 29, 2025 26:31


Navigating Hacker Summer Camp: A Comprehensive Guide Join host G Mark Hardy on this episode of CSO Tradecraft as he provides a detailed guide on what to expect at Hacker Summer Camp, a series of significant cybersecurity events including DEFCON, Black Hat, and BSides Las Vegas. G Mark shares historical insights, tips for first-timers, and personal anecdotes from his extensive experience attending these events over the years. Learn about the origins, key activities, and networking opportunities that make these conferences pivotal in the cybersecurity community. Stay tuned for practical advice on planning your visit and making the most out of your Hacker Summer Camp experience. Transcripts: https://docs.google.com/document/d/1Y-MenErnVCzUga4xu20ZIz8hT9xsGSJD   Chapters 00:00 Introduction to Hacker Summer Camp 01:29 History and Significance of DEFCON 02:50 Spot the Fed and Early DEFCON Experiences 05:31 The Evolution of Black Hat 09:34 The Birth and Growth of BSides 11:19 Tips for Attending Hacker Summer Camp 19:57 Networking and Participation Strategies 25:31 Conclusion and Final Thoughts

Cyber Security Headlines
Russian flights grounded, Naval group breach, dating app exposed

Cyber Security Headlines

Play Episode Listen Later Jul 29, 2025 8:07


Hacktivist attack grounds Russian flights Naval group denies breach, hackers beg to differ  Dating app breach exposes thousands of women's pictures Huge thanks to our sponsor, Dropzone AI Let me tell you about Dropzone AI—they're revolutionizing how security teams work. Companies like CBTS and Zapier use their AI to investigate alerts automatically, freeing up analysts for the work that really matters. We're talking 40-minute investigations done in 3 minutes. You can meet the Dropzone team at BlackHat in Startup City, or just head to dropzone.ai for a self-guided demo. Trust me, this is the future of security operations.

Destination Linux
429: Open Source AI, End of Clear Linux, & the Security Scoop with Sandfly

Destination Linux

Play Episode Listen Later Jul 28, 2025 74:49


video: https://youtu.be/abgTchtrH0k On this episode of Destination Linux, we are joined by security expert Craig Rowland returns for the “Sandfly Security Scoop,” explaining how the stealthy BPFdoor back‑door evades firewalls and sharing tips for DEF CON and Black Hat attendees. We also unpack listener feedback about phone‑addiction myths and mindful smartphone use. Then we discuss Moonshot's open‑source Kimi AI model that tackles two‑million‑character prompts and beats proprietary LLM benchmarks, sparking a wider chat about open AI guardrails and Linux's role under the hood. Later, there's some bittersweet news that Intel is discontinuing its performance‑tuned Clear Linux distro, prompting nostalgia and debate over rolling vs. hybrid releases. Our tip of the week highlights a crowd‑sourced Linux guide that demystifies getting started with Ubuntu especially for network engineers. Forum Discussion Thread (https://destinationlinux.net/forum) Download as MP3 (https://aphid.fireside.fm/d/1437767933/32f28071-0b08-4ea1-afcc-37af75bd83d6/17fb8c1f-d90d-4b20-ae21-255561ec5c8b.mp3) Support the show by becoming a patron at tuxdigital.com/membership (https://tuxdigital.com/membership) or get some swag at tuxdigital.com/store (https://tuxdigital.com/store) Hosted by: Ryan (DasGeek) = dasgeek.net (https://dasgeek.net) Jill Bryant = jilllinuxgirl.com (https://jilllinuxgirl.com) Michael Tunnell = michaeltunnell.com (https://michaeltunnell.com) Chapters: 00:00:00 Intro 00:02:18 Community Feedback 00:10:20 Sandfly Security Scoop 00:23:15 Defcon VS Blackhat 00:29:31 OpenSource AI Kimi 00:47:38 Clear Linux OS & Intel's future 01:03:49 Community Tip and Trick 01:09:13 Support the Show 01:12:43 Outro 01:13:07 Post Show Links: Community Feedback https://destinationlinux.net/comments (https://destinationlinux.net/comments) https://destinationlinux.net/forum (https://destinationlinux.net/forum) Sandfly Security Scoop https://destinationlinux.net/sandfly (https://destinationlinux.net/sandfly) https://sandflysecurity.com/blog/sandfly-5-5-ai-powered-analysis-advanced-bpfdoor-detection-and-smarter-scanning (https://sandflysecurity.com/blog/sandfly-5-5-ai-powered-analysis-advanced-bpfdoor-detection-and-smarter-scanning) Defcon VS Blackhat https://defcon.org/ (https://defcon.org/) https://www.blackhat.com/ (https://www.blackhat.com/) OpenSource AI Kimi https://www.kimi.com/ (https://www.kimi.com/) https://huggingface.co/spaces/Jhawley/moonshotai-Kimi-K2-Instruct (https://huggingface.co/spaces/Jhawley/moonshotai-Kimi-K2-Instruct) Clear Linux OS & Intel's future https://community.clearlinux.org/t/all-good-things-come-to-an-end-shutting-down-clear-linux-os/10716 (https://community.clearlinux.org/t/all-good-things-come-to-an-end-shutting-down-clear-linux-os/10716) https://news.itsfoss.com/clear-linux-os-discontinued/ (https://news.itsfoss.com/clear-linux-os-discontinued/) https://www.omglinux.com/intel-clear-linux-os-discontinued-2025/ (https://www.omglinux.com/intel-clear-linux-os-discontinued-2025/) Community Tip and Trick https://rikosintie.github.io/Ubuntu4NetworkEngineers/CH02-Install-Tools/ (https://rikosintie.github.io/Ubuntu4NetworkEngineers/CH02-Install-Tools/) Support the Show https://tuxdigital.com/membership (https://tuxdigital.com/membership) https://store.tuxdigital.com/ (https://store.tuxdigital.com/)

Cyber Security Headlines
NASCAR announces breach, Plankey for CISA, 365 Admin outage

Cyber Security Headlines

Play Episode Listen Later Jul 28, 2025 8:25


NASCAR announces data breach following March cyberattack Plankey appears to be on track to lead CISA Microsoft investigates another outage affecting 365 admin center Huge thanks to our sponsor, Dropzone AI Today's sponsor is Dropzone AI, the leader in AI-powered SOC automation. Major companies like Zapier and UiPath are using Dropzone to give their security teams superpowers. Imagine your analysts focusing on real threats while AI handles every routine investigation—in minutes, not hours. If you're heading to BlackHat, stop by their booth in Startup City. But you don't have to wait—check out their self-guided demo at dropzone.ai and see why Fortune 500s are making the switch. Find the stories behind the headlines at CISOseries.com.

Security Unfiltered
Zero Trust Architecture: The Future of Cybersecurity

Security Unfiltered

Play Episode Listen Later Jul 28, 2025 50:16 Transcription Available


Send us a textCybersecurity expert Bob Kochan from Beyond Identity discusses the evolution of security from network defense to identity-first approaches. He shares insights on how AI is transforming security operations while creating new threat vectors, emphasizing the need for phishing-resistant authentication solutions in today's threat landscape.• Traditional security focused on network layers, but SaaS adoption exposed vulnerable identity systems• Zero Trust architecture must start with device-level security and extend through the entire authentication chain• AI will augment rather than replace security professionals, making systems-thinkers 10x more effective• Government agencies are often driving cybersecurity innovation faster than private industry• Security solutions must prioritize usability or users will inevitably find workarounds• Legacy MFA solutions are insufficient against modern attack methods like phishing and deepfakes• Security should be designed into systems from the start rather than bolted on as "security through configuration"• Nation-state funded threat actors have created their own innovation ecosystem rivaling private sector development• Beyond Identity offers phishing-resistant authentication that eliminates password vulnerabilitiesCheck us out at beyondidentity.com or visit us at our booth at Black Hat this year.00:00 The Entrepreneurial Spirit02:35 Passion and Problem-Solving in Startups05:12 The Evolution of Cybersecurity07:49 AI's Impact on Security10:19 The Role of Engineers in Cybersecurity12:51 AI and the Future of Cybersecurity15:16 Research and AI Tools in Cybersecurity22:05 The Impact of AI on EmploymentDigital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods.Listen on: Apple Podcasts SpotifySupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast

ITSPmagazine | Technology. Cybersecurity. Society
Bots, APIs, and Runtime Risk: What Exposures Are Driving AI Security Innovation in 2025 | An Akamai Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Rupesh Chokshi

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 25, 2025 21:47


Ahead of Black Hat USA 2025, Sean Martin and Marco Ciappelli sit down once again with Rupesh Chokshi, Senior Vice President and General Manager of the Application Security Group at Akamai, for a forward-looking conversation on the state of AI security. From new threat trends to enterprise missteps, Rupesh lays out three focal points for this year's security conversation: protecting generative AI at runtime, addressing the surge in AI scraper bots, and defending the APIs that serve as the foundation for AI systems.Rupesh shares that Akamai is now detecting over 150 billion AI scraping attempts—a staggering signal of the scale and sophistication of machine-to-machine activity. These scraper bots are not only siphoning off data but also undermining digital business models by bypassing monetization channels, especially in publishing, media, and content-driven sectors.While AI introduces productivity gains and operational efficiency, it also introduces new and uncharted risks. Agentic AI, where autonomous systems operate on behalf of users or other systems, is pushing cybersecurity teams to rethink their strategies. Traditional firewalls aren't enough—because these threats don't behave like yesterday's attacks. Prompt injection, toxic output, and AI-generated hallucinations are some of the issues now surfacing in enterprise environments, with over 70% of organizations already experiencing AI-related incidents.This brings the focus to the runtime. Akamai's newly launched Firewall for AI is purpose-built to detect and mitigate risks in generative AI and LLM applications—without disrupting performance. Designed to flag issues like toxic output, remote code execution, or compliance violations, it operates with real-time visibility across inputs and outputs. It's not just about defense—it's about building trust as AI moves deeper into decision-making and workflow automation.CISOs, says Rupesh, need to shift from high-level discussions to deep, tactical understanding of where and how their organizations are deploying AI. This means not only securing AI but also working hand-in-hand with the business to establish governance, drive discovery, and embed security into the fabric of innovation.Learn more about Akamai: https://itspm.ag/akamailbwcNote: This story contains promotional content. Learn more.Guests:Rupesh Chokshi, SVP & General Manager, Application Security, Akamai | https://www.linkedin.com/in/rupeshchokshi/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
From Black Hat to Black Sabbath / Ozzy: AI Agents and Guitars (again!) + Entry Level Cybersecurity Jobs, Robots Evolution, and the Weekly Recap You Didn't Expect | Random and Unscripted Weekly Update with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 25, 2025 49:44


ITSPmagazine Weekly Update | From Black Hat to Black Sabbath / Ozzy: AI Agents and Guitars (again!) + Entry Level Cybersecurity Jobs, Robots Evolution, and the Weekly Recap You Didn't Expect  -  On Marco & Sean's Random & Unscripted Podcast  __________________Marco Ciappelli and Sean Martin are back with another random and unscripted weekly recap—from pre-Black Hat buzz and AI agents to vintage wood guitars, talent gaps, and Glen Miller debates. This week's reflection hits tech, music, and philosophy in all the right ways. Tune in, ramble with us, and subscribe. __________________Full Blog Article This week's recap was a ride.Sean and I kicked things off with the big news: we're officially consistent. Weekly recap number… I lost count. But we're doing it. We covered what ITSPmagazine's been working on, what we've been publishing, and where our minds are wandering lately (spoiler: everywhere).Black Hat USA 2025 is just around the corner, and we're deep into prep mode. I even bought a paper map. Why? I don't know. But we've got some great pre-event conversations already out—like our annual chat with Black Hat GM Steve Wylie, plus briefings with Dropzone AI (get ready for “agentic automation” to be the next big buzzword) and Akamai (yes, bots and APIs again, but with a solid strategy twist).We also talked about a fantastic episode Sean did on resonance and reinvention—featuring Cindy, a luthier in NYC who builds custom guitars using century-old beams from historic buildings. The pickups even use the old nails. Music and wood with a past life. It's beautiful stuff.Speaking of stories, I officially closed down the Storytelling podcast. But don't worry—I'm still telling stories. I've just shifted focus to “Redefining Society and Technology,” my newsletter and podcast series where I explore how humans and tech evolve together. This week's edition tackled the merging of humans and machines as a new species. Isaac Asimov meets Andy Clark.We also got a bit philosophical about AI and jobs. If machines take over the “easy” roles, where do humans begin? Are we cutting off our own training paths?Sean's episode with John Solomon dug into the cybersecurity hiring crisis—challenging the idea that we have a “talent gap.” The real issue? We're not hiring or nurturing people properly.Oh, and I finally released my long-overdue interview with Michael Sheldrick from Global Citizen. Music. Social impact. Doing good. It's all there. I'm honored to support even a small piece of what he's building.And yes… Ozzy. RIP. Music never dies.So if you're into random reflections with meaning, tech with humanity, and stories that don't always follow the rules—subscribe, share, and join the ride.See you in Vegas. Or the future. Or somewhere in between.________________ KeywordsBlack Hat USA 2025, ITSPmagazine recap, Marco Ciappelli, Sean Martin, cybersecurity podcast, AI in cybersecurity, agentic automation, Dropzone AI, Akamai APIs, HITRUST security, Global Citizen, Michael Sheldrick, storytelling podcast, Redefining Society, Andy Clark, Isaac Asimov, human-machine evolution, cybersecurity talent gap, custom guitar NYC, Ozzy tributeHosts links:

ITSPmagazine | Technology. Cybersecurity. Society
Dropzone AI Brings Agentic Automation to Black Hat USA 2025 | A DROP ZONE AI Pre Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Edward Wu Founder/CEO at Dropzone AI

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 23, 2025 20:07


As Black Hat USA 2025 approaches, the cybersecurity world is buzzing with innovation—and Dropzone AI is right at the center of it. With roots in Seattle and a mission to bring true intelligence into the security operations center (SOC), the Dropzone AI team is gearing up for a packed week in Las Vegas, from BSides to the AI Summit, and finally at Startup City (booth #6427).Founded by Edward Wu, former Head of AI/ML at ExtraHop Networks, Dropzone AI was built on a key realization: the last thing SOCs need is another flood of alerts. Instead, they need help processing and acting on them. That's where Dropzone comes in—offering an AI-powered security analyst that doesn't just detect threats, but investigates, correlates, and takes action.During a recent pre-event chat with ITSPmagazine's Sean Martin and Marco Ciappelli, Edward explained the core philosophy behind the platform. Unlike hype-driven claims of “fully autonomous SOCs,” Dropzone takes a practical, tiered approach to automation. Their agentic AI system performs full investigations, determines the nature of alerts (true vs. false positives), and recommends or executes containment actions depending on risk tolerance and policy.The tech has found particular traction with lean security teams, or those expanding toward 24/7 coverage without adding headcount. Rather than replacing humans, the platform augments them—freeing analysts from the drudgery of low-priority alert triage and giving them space to focus on strategic work. As Edward put it, “Nobody wants to be a tier-one analyst forever.” Dropzone helps make sure they don't have to be.The platform integrates across existing security stacks and data sources, drawing from threat intel, logs, and endpoint signals to build a full picture of every alert. Security teams retain full control, with human-in-the-loop decision-making remaining the standard in most use cases. However, for low-risk assets and off-hours scenarios, some customers are already authorizing autonomous action.With conversations at Black Hat expected to revolve around the reality of AI in production—not just the vision—Dropzone is entering the perfect arena. From demonstrating real-world impact to sharing insights on agentic design and trust boundaries, their presence will resonate with everyone from analysts to CISOs.Whether you're building out your SOC, questioning your MDR provider, or simply overwhelmed with alert fatigue, this may be your signal. Dropzone AI isn't selling buzzwords. They're delivering results. Visit them at Startup City, booth #6427, and see for yourself what the future of alert triage and SOC efficiency looks like—one investigation at a time. Note: This story contains promotional content. Learn more.Guests:Edward Wu, Founder/CEO at Dropzone AI On LinkedIn: https://www.linkedin.com/in/edwardxwu/DROPZONE AI: https://itspm.ag/dropzoneai-641Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesVisit the DROPZONE Website to learn more: https://itspm.ag/dropzoneai-641Learn more and catch more stories from Dropzone on ITSPmagazine: https://www.itspmagazine.com/directory/dropzoneaiLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Out of the Woods: The Threat Hunting Podcast
S3 Ep37: Be Effective, Not Just Subjective

Out of the Woods: The Threat Hunting Podcast

Play Episode Listen Later Jul 23, 2025 54:26


*Intel-Driven Threat Hunting Workshop: Analyzing Malware Behaviors July 31, 2025 | 11:00 AM - 1:00 PM ET Sign Up: https://intel471.com/resources/webinars/intelligence-driven-threat-hunting-workshop-analyzing-malware-behaviors *Meet with Intel 471 at Black Hat 2025 at Booth #5742 More info & events: https://intel471.com/lp/black-hat-usa-2025 ---------- Top Headlines: Microsoft Security Blog | Disrupting active exploitation of on-premises SharePoint vulnerabilities HackMag | Malware LameHug Utilizes LLM to Generate Commands on Infected Machines Catalyst | LARVA-208's New Campaign Targets Web3 Developers TechCrunch | A surveillance vendor was caught exploiting a new SS7 attack to track people's phone locations ---------- Stay in Touch! Twitter: https://twitter.com/Intel471Inc LinkedIn: https://www.linkedin.com/company/intel-471/ YouTube: https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg Discord: https://discord.gg/DR4mcW4zBr Facebook: https://www.facebook.com/Intel471Inc/

ITSPmagazine | Technology. Cybersecurity. Society
Black Hat USA 2025: AI, Investment, and the Expanding Scope of Cybersecurity | Our Traditional Pre-Event Kick-Off Conversation with Steve Wylie | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 22, 2025 26:51


As Black Hat USA 2025 approaches, General Manager Steve Wylie joins Sean Martin and Marco Ciappelli for the annual pre-conference conversation to highlight what's new—and what's next—for one of cybersecurity's most iconic events. This year's themes and expansions signal a strong return to growth, technical depth, and strategic investment.AI Everywhere—from Training to the Show FloorArtificial intelligence emerges as the dominant force across the agenda. From the main stage to the training rooms, Black Hat is packed with AI-related content designed to meet the rising demand for education and clarity. New this year is a comprehensive lineup of instructor-led AI courses and expanded AI tool showcases in the Arsenal and Arsenal Labs programs. As Wylie notes, three of the four Spotlight competition finalists—FireTail, Keep Aware, and Twine Security—are AI-driven solutions, underscoring the technology's influence on innovation.Investor Energy and Startup MomentumCybersecurity investment is back. That momentum is reflected in the expanded Innovators and Investors Summit and the largest-ever Startup Zone on the show floor, now hosting more than 80 companies. This year's program builds on last year's debut and aims to connect entrepreneurs, investors, and CISOs in a more targeted and collaborative setting.Expanding the Audience: New Summits and KeynotesTo better serve cybersecurity leaders across sectors, Black Hat has introduced new summits tailored to financial services and supply chain security. These gatherings offer strategic-level insights for professionals who don't typically engage in technical briefings. Meanwhile, the keynote lineup includes prominent voices from both public and private sectors—such as Miko Hyppönen, Nicole Perlroth, and Chris Inglis—offering grounded perspectives in a time of uncertainty.Interactive Additions and Community GrowthAttendees can expect hands-on experiences like a new drone hacking zone and an expanded hardware lab area. A Career Development Zone also debuts this year, offering sessions designed to help attendees build or pivot their cybersecurity careers.___________Guest: Steve Wylie, Vice President, Cybersecurity Market at Informa Tech and General Manager at Black Hat | On LinkedIn: https://www.linkedin.com/in/swylie650/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

SEO Is Not That Hard
Best of : Understanding Blackhat - PBN's

SEO Is Not That Hard

Play Episode Listen Later Jul 21, 2025 7:13 Transcription Available


Send us a textDangerous shortcuts rarely lead to lasting success in SEO. In this revealing episode, I pull back the curtain on Private Blog Networks (PBNs) – one of the most controversial black hat SEO techniques still in use today.Drawing from my 20+ years of experience building and monetizing websites, I explain exactly what PBNs are, how they operate, and why they continue to tempt SEO practitioners looking for quick ranking improvements. While I don't condemn those who venture into black hat territory, I share my personal philosophy of building for the long term rather than risking everything on techniques that violate Google's terms of service.We explore the mechanics of how PBNs are created, typically using expired domains with existing backlink profiles, and why they can indeed provide short-term ranking boosts. But the real value comes in understanding the significant risks: Google's increasingly sophisticated detection systems, the potential for devastating penalties, and the substantial costs of maintaining these networks properly.For those who purchase links from third parties, I provide practical advice on how to identify PBN links before they harm your site. Look for websites featuring disconnected content topics filled with outbound links to unrelated industries – these are classic signs you're dealing with a risky link network that could eventually trigger manual or algorithmic penalties.Whether you're curious about black hat techniques or simply want to protect your website from risky backlinks, this episode equips you with essential knowledge for navigating the complex world of SEO. Subscribe now and share this episode with anyone who might be tempted by shortcuts in their search ranking journey – you might just save them from a future Google penalty!SEO Is Not That Hard is hosted by Edd Dawson and brought to you by KeywordsPeopleUse.com Help feed the algorithm and leave a review at ratethispodcast.com/seo You can get your free copy of my 101 Quick SEO Tips at: https://seotips.edddawson.com/101-quick-seo-tipsTo get a personal no-obligation demo of how KeywordsPeopleUse could help you boost your SEO and get a 7 day FREE trial of our Standard Plan book a demo with me nowSee Edd's personal site at edddawson.comAsk me a question and get on the show Click here to record a questionFind Edd on Linkedin, Bluesky & TwitterFind KeywordsPeopleUse on Twitter @kwds_ppl_use"Werq" Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/

ITSPmagazine | Technology. Cybersecurity. Society
ITSPmagazine Weekly Update | From AI Agents to Tape Mixes, to Guitars and Black Hat Buzzwords and much more with Marco & Sean | Random and Unscripted Weekly Update with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 18, 2025 22:21


ITSPmagazine Weekly Update | From AI Agents to Tape Mixes, to Guitars and Black Hat Buzzwords and much more with Marco & Sean's Random & Unscripted Podcast ⸻ In this weekly unscripted update, Marco Ciappelli and Sean Martin catch up on their latest stories, from AI agents replacing SOC analysts to mixtape nostalgia and vintage guitars made from NYC history. They also tease big things coming at Black Hat USA and reflect on why collaboration is core to ITSPmagazine. ⸻ In this week's Random and Unscripted episode, Marco Ciappelli and Sean Martin return with another lively behind-the-scenes update from the ITSPmagazine world. As always, the conversation flows unpredictably—from music and nostalgia to cybersecurity, AI, and everything in between. Marco kicks off the episode by confessing he saw ASIS live—twice—and is now on a mission for the perfect mod haircut. Sean follows with an unexpected review of an avant-garde opera at Lincoln Center, which explores humanity's attempt to extend life through technology. That sets the stage for deeper reflection on AI, with both co-founders digging into the role of AI agents in cybersecurity operations. Sean recaps his recent contributor-led newsletters on threat intelligence and AI-powered SOC roles. Marco, meanwhile, teases the next chapter in his “Robbie the Robot” newsletter series, which will explore the merger of humans and machines. The episode also spotlights a series of published interviews: a brand story with Greg and John from White Knight Labs, Marco's conversation with Ken Munro wrapping up Infosecurity Europe 2025, and an episode with Abadesi from the Women in Cybersecurity track—discussing how diverse teams build better tech. Sean also drops new Music Evolves episodes, including a conversation with Summer McCoy of the Mixtape Museum and a new story on Carmine Guitars, where vintage NYC wood is repurposed into one-of-a-kind instruments. That sparks a philosophical reflection from Marco on the contrast between analog warmth and digital impermanence. As the episode winds down, Marco and Sean turn their attention to Black Hat USA 2025. With sponsorships nearly sold out, they encourage companies to claim one of the last remaining spots. They also preview an upcoming live webinar where they'll debate the event's inevitable buzzwords with industry peers. As always, the tone is informal, curious, and community-driven. If you want the inside scoop on what's shaping the stories and strategies at ITSPmagazine—this is the episode to hear. ⸻ Keywords: cybersecurity, AI agents, threat intelligence, SOC analyst, mixtape museum, custom guitars, Black Hat USA 2025, ITSPmagazine, analog vs digital, diversity in tech, robotic automation, newsletter strategy, editorial collaboration, pen testing, brand storytelling, tech culture, cybersecurity events, operational technology, digital transformation, music and techHosts links:

Out of the Woods: The Threat Hunting Podcast
S3 Ep36: Paste and Persist

Out of the Woods: The Threat Hunting Podcast

Play Episode Listen Later Jul 16, 2025 40:00


*Intel-Driven Threat Hunting Workshop: Analyzing Malware Behaviors July 31, 2025 | 11:00 AM - 1:00 PM ET Sign Up: https://intel471.com/resources/webinars/intelligence-driven-threat-hunting-workshop-analyzing-malware-behaviors *Meet with Intel 471 at Black Hat 2025 at Booth #5742 More info & events: https://intel471.com/lp/black-hat-usa-2025 ---------- Top Headlines: The DFIR Report | KongTuke FileFix Leads to New Interlock RAT Variant BleepingComputer | Google Gemini flaw hijacks email summaries for phishing CISA | CISA Adds One Known Exploited Vulnerability to Catalog Unit 42 | Evolving Tactics of SLOW#TEMPEST: A Deep Dive Into Advanced Malware Techniques ---------- Stay in Touch! Twitter: https://twitter.com/Intel471Inc LinkedIn: https://www.linkedin.com/company/intel-471/ YouTube: https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg Discord: https://discord.gg/DR4mcW4zBr Facebook: https://www.facebook.com/Intel471Inc/

Autonomous IT
CISO IT – The Automation Imperative, E10

Autonomous IT

Play Episode Listen Later Jul 15, 2025 10:59


In this episode of Automox's CISO IT Podcast, host Jason Kikta returns from Black Hat and DEF CON in Las Vegas to discuss one of the most talked-about IT events of the summer, and what it truly reveals about automation in IT. Contrary to popular fearmongering, Jason argues that the incident isn't a cautionary tale against automation but a clear call for more thoughtful automation.Jason breaks down why automation, when paired with rigorous testing and strategic controls, is critical to modern IT and cybersecurity success. He challenges listeners to rethink what IT efficiency really means—not job cuts, but freeing teams to tackle the backlog and do more meaningful work. He wraps with a personal challenge: find and automate one tedious task this week using tools like Automox, Okta workflows, or your own scripts.This episode originally aired September 12, 2024 

Microsoft Threat Intelligence Podcast
Tips from Grifter and Lintile for Attending Hacker Summer Camp

Microsoft Threat Intelligence Podcast

Play Episode Listen Later Jul 9, 2025 93:18


In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo is joined by Grifter, the legendary Black Hat NOC lead, and Lintile, host of Hacker Jeopardy, to go behind the scenes of DEF CON and Black Hat. They unpack the chaos of managing the world's most hostile networks, share advice for first-time attendees, and explore the vibrant hacker community that thrives on connection, contests, and lifelong friendships. The conversation also covers how to submit compelling CFP abstracts, why live events matter, and the controlled mayhem that defines Hacker Jeopardy each year in Las Vegas.  Heading to Black Hat? Join us at booth #2246 where we will be recording new episodes, and request to attend the VIP Mixer. We'll also be hosting the BlueHat podcast, our friends from GitHub, and experts from our incident response team.  In this episode you'll learn:       Why skipping talks at DEF CON to join contests and villages can be more valuable  Tips for crafting compelling CFP abstracts that stand out among 1,000+ submissions  The importance of connection and niche technical discussions in the hacker community    Some questions we ask:      What advice would you give to someone who has never been to DEF CON?  How does the team plan traps and misdirection in Hacker Jeopardy questions?  What do you think the community should focus on getting out of DEF CON?  Resources:   View Sherrod DeGrippo on LinkedIn     Related Microsoft Podcasts:                    Afternoon Cyber Tea with Ann Johnson  The BlueHat Podcast  Uncovering Hidden Risks        Discover and follow other Microsoft podcasts at microsoft.com/podcasts   Get the latest threat intelligence insights and guidance at Microsoft Security Insider  The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  

SEO Is Not That Hard
Best of : Cloaking - a Blackhat story

SEO Is Not That Hard

Play Episode Listen Later Jul 4, 2025 12:34 Transcription Available


Send us a textPulling back the curtain on one of SEO's most controversial techniques, this episode dives deep into website cloaking—showing search engines different content than what human visitors see. While firmly acknowledging this as a black hat approach I no longer practice or recommend, I explain why understanding these techniques creates more well-rounded SEO professionals who can identify manipulation.What exactly happens when websites serve different versions of content based on who's visiting? I break down the technical mechanics of cloaking, from user agent detection to sophisticated IP verification systems that aim to fool Google. You'll learn how cloakers distinguish between genuine Googlebot crawlers and competitors trying to uncover their tactics, complete with a fascinating historical perspective from the wild west days of SEO circa 2008-2009.The episode provides practical knowledge for those curious about detecting cloaking, with specific browser plugin suggestions that let you view websites as if you were Googlebot. This knowledge isn't about encouraging risky tactics but rather understanding the digital landscape fully. Whether you're an SEO professional looking to deepen your technical knowledge or simply curious about the mechanics behind search manipulation, this episode provides valuable context about why sustainable, white hat approaches ultimately build more valuable digital assets than shortcuts. Ready to understand the smoke and mirrors of black hat SEO without getting burned? This episode delivers the perfect balance of technical insight and ethical perspective.SEO Is Not That Hard is hosted by Edd Dawson and brought to you by KeywordsPeopleUse.com Help feed the algorithm and leave a review at ratethispodcast.com/seo You can get your free copy of my 101 Quick SEO Tips at: https://seotips.edddawson.com/101-quick-seo-tipsTo get a personal no-obligation demo of how KeywordsPeopleUse could help you boost your SEO and get a 7 day FREE trial of our Standard Plan book a demo with me nowSee Edd's personal site at edddawson.comAsk me a question and get on the show Click here to record a questionFind Edd on Linkedin, Bluesky & TwitterFind KeywordsPeopleUse on Twitter @kwds_ppl_use"Werq" Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 4.0 Licensehttp://creativecommons.org/licenses/by/4.0/

The Film Stage Show
The B-Side Ep. 165 – Mission Impossible

The Film Stage Show

Play Episode Listen Later Jul 3, 2025 153:51


Welcome to The B-Side! Here we sometimes talk about movie stars! We sometimes talk about movie directors! Today, we talk about both! Specifically, the B-Sides of the Mission: Impossible franchise. It's just Conor and I today folks, waxing poetic on Tom Cruise's legendary franchise and the B-Sides that we were inspired to discuss. We've chosen one for each of the Mission movies. It's also July 3rd on the day this episode is published, so happy 63rd birthday Tom Cruise! For the first Mission: Impossible, we speak on The Avengers from 1998. An adaptation of the popular British television series from the ‘60s, director Jeremiah S. Chechik's film was dismantled in post-production, slashed to ribbons following bad test screenings. The final product runs well under ninety minutes and is hard to understand. It sits on the other end of blockbusters in the ‘90s adapted from hit televisions from yesteryear. We also discuss the last five films Sean Connery made (animated film Sir Billi not included), as well as the ones he turned down. For Mission: Impossible II, we chose another John Woo American motion picture: Paycheck, starring Ben Affleck and The Avengers star Uma Thurman. This is a true B-Side, and the beginning of Affleck's now-infamous lost half-decade as a fledgling movie star. For Mission: Impossible III, we return to television inspiration. In honor of director J.J. Abrams, Conor and I go long on No Man's Land, one of the first produced screenwriting credits of Dick Wolf, who would go on to create the, ahem, Law & Order universe of shows. This Charlie Sheen/ D.B Sweeney vehicle walked so Point Break and The Fast and the Furious could run. There's chatter about David Ayer, that scene from Fire in the Sky, and how Charlie Sheen is always better when he plays the villain. For Ghost Protocol, we debate the Brad Bird B-Side Tomorrowland. We discuss libertarianism (for like two minutes) and the misbegotten message of the George Clooney blockbuster. For Rogue Nation we honor the Hitchcock homage of the opening and discuss one of Hitch's most underrated films: Topaz. Truly a can't-miss picture, which spurns a talk about the ideal Hitchcock leading man. For Fallout, there's Michael Mann's Blackhat. We appreciate the still underseen hacker epic, and make the claim that Chris Hemsworth is the best movie star of the original Avengers (Marvel this time, not British) not named Robert Downey Jr. For Dead Reckoning Part 1, Conor goes long on Hayao Miyazaki's Lupin III: The Castle of Cagliostro, from the little yellow car to the action to the animation. And, finally, for The Final Reckoning, we celebrate John Sturges' Ice Station Zebra. The second act of the final film in the series is a reimagining of sorts of the 1968 submarine epic, with way more stunts and underwater photography. There's also mention of the Billy Crystal 1997 Oscars opening, this lovely promo for the Albert Brooks movie Mother (ok it's not mentioned I just love it), and the Oliver Stone episode of the Light the Fuse podcast.

The B-Side: A Film Stage Podcast
Ep. 165 – Mission: Impossible

The B-Side: A Film Stage Podcast

Play Episode Listen Later Jul 3, 2025 153:51


Welcome to The B-Side! Here we sometimes talk about movie stars! We sometimes talk about movie directors! Today, we talk about both! Specifically, the B-Sides of the Mission: Impossible franchise. It's just Dan and Conor today folks, waxing poetic on Tom Cruise's legendary franchise and the B-Sides that we were inspired to discuss. We've chosen one for each of the Mission movies. It's also July 3rd on the day this episode is published, so happy 63rd birthday Tom Cruise! For the first Mission: Impossible, we speak on The Avengers from 1998. An adaptation of the popular British television series from the ‘60s, director Jeremiah S. Chechik's film was dismantled in post-production, slashed to ribbons following bad test screenings. The final product runs well under ninety minutes and is hard to understand. It sits on the other end of blockbusters in the ‘90s adapted from hit televisions from yesteryear. We also discuss the last five films Sean Connery made (animated film Sir Billi not included), as well as the ones he turned down. For Mission: Impossible II, we chose another John Woo American motion picture: Paycheck, starring Ben Affleck and The Avengers star Uma Thurman. This is a true B-Side, and the beginning of Affleck's now-infamous lost half-decade as a fledgling movie star. For Mission: Impossible III, we return to television inspiration. In honor of director J.J. Abrams, Conor and I go long on No Man's Land, one of the first produced screenwriting credits of Dick Wolf, who would go on to create the, ahem, Law & Order universe of shows. This Charlie Sheen/ D.B Sweeney vehicle walked so Point Break and The Fast and the Furious could run. There's chatter about David Ayer, that scene from Fire in the Sky, and how Charlie Sheen is always better when he plays the villain. For Ghost Protocol, we debate the Brad Bird B-Side Tomorrowland. We discuss libertarianism (for like two minutes) and the misbegotten message of the George Clooney blockbuster. For Rogue Nation we honor the Hitchcock homage of the opening and discuss one of Hitch's most underrated films: Topaz. Truly a can't-miss picture, which spurns a talk about the ideal Hitchcock leading man. For Fallout, there's Michael Mann's Blackhat. We appreciate the still underseen hacker epic, and make the claim that Chris Hemsworth is the best movie star of the original Avengers (Marvel this time, not British) not named Robert Downey Jr. For Dead Reckoning Part 1, Conor goes long on Hayao Miyazaki's Lupin III: The Castle of Cagliostro, from the little yellow car to the action to the animation. And, finally, for The Final Reckoning, we celebrate John Sturges' Ice Station Zebra. The second act of the final film in the series is a reimagining of sorts of the 1968 submarine epic, with way more stunts and underwater photography. There's also mention of the Billy Crystal 1997 Oscars opening, this lovely promo for the Albert Brooks movie Mother (ok it's not mentioned I just love it), and the Oliver Stone episode of the Light the Fuse podcast. Listen here and subscribe at thefilmstage.com/pod. Be sure to give us a follow on Bluesky at @tfsbside.bsky.social. Enjoy!

POST Wrestling w/ John Pollock & Wai Ting
SAMPLE: “Under the Black Hat” | BOOK CLUB

POST Wrestling w/ John Pollock & Wai Ting

Play Episode Listen Later Jun 23, 2025 27:23


A 27-minute sample of this month's edition of Book Club from John Pollock & Neal Flanagan.The two discuss Jim Ross' second collaboration with Paul O'Brien, detailing his time at WWE as its lead announcer and head of talent relations.Plus, they chat about Original Sin by Jake Tapper & Alex ThompsonFor the full show, consider joining the Double Double or Espresso tier at the POST Wrestling CaféNEXT MONTH: Say Hello to the Bad Guys by Marc Raimondi Photo Courtesy: Simon & Schuster Bluesky: https://bsky.app/profile/postwrestling.comX: http://www.twitter.com/POSTwrestlingInstagram: http://www.instagram.com/POSTwrestlingFacebook: http://www.facebook.com/POSTwrestlingYouTube: http://www.youtube.com/POSTwrestlingSubscribe: https://postwrestling.com/subscribePatreon: http://postwrestlingcafe.comForum: https://forum.postwrestling.comDiscord: https://postwrestling.com/discordMerch: https://Chopped-Tees.com/POSTwrestlingOur Sponsors:* Check out Progressive: https://www.progressive.comAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Mike Boyle Restaurant Show Podcast
Or A High Mountain Ranger?? Jun 22, 2025 - HR. 2

Mike Boyle Restaurant Show Podcast

Play Episode Listen Later Jun 22, 2025 40:21


The Black Hat contest continues with calls about YOUR choice for vacation!! No Home Rule in Douglas county...Mike talks with former Castle Rock Mayor Randy Reed sharing concerns about the new Douglas County Home Rule Charter being voted on, and then finishes up with his Alaskan road Trip!!! Israel Thanks Pres. Trump! Keep Informed!! www.mikeboyle.com See omnystudio.com/listener for privacy information.

POST Wrestling w/ John Pollock & Wai Ting
AEW Grand Slam Mexico 6/18/25 Review | RAD

POST Wrestling w/ John Pollock & Wai Ting

Play Episode Listen Later Jun 19, 2025 57:18


John Pollock & Wai Ting review AEW Grand Slam Mexico, a 2 1/2 -hour special event featuring MJF vs. Místico and The Death Riders & Young Bucks vs. Swerve, Ospreay & The Opps. 

@BEERISAC: CPS/ICS Security Podcast Playlist
Inside OT Penetration Testing: Red Teaming, Risks, and Real-World Lessons for Critical Infrastructure with Justin Searle

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 18, 2025 54:21


Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Inside OT Penetration Testing: Red Teaming, Risks, and Real-World Lessons for Critical Infrastructure with Justin SearlePub date: 2025-06-16Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, host Aaron Crow sits down with OT security expert Justin Searle, Director of ICS Security at InGuardians, for a deep dive into the ever-evolving world of OT and IT cybersecurity.  With over 25 years of experience, ranging from hands-on engineering and water treatment facilities to red-team penetration testing on critical infrastructures such as airports and power plants, Justin brings a wealth of insight and real-world anecdotes. This episode unpacks what it really takes to assess and secure operational technology environments. Whether you're a C-suite executive, a seasoned cyber pro, or brand new to OT security, you'll hear why network expertise, cross-team trust, and careful, collaborative engagement with engineers are so crucial when testing high-stakes environments. Aaron and Justin also discuss how the industry has matured, the importance of dedicated OT cybersecurity teams, and why practical, people-first approaches make all the difference, especially when lives, reliability, and national infrastructure are on the line. Get ready for actionable advice, hard-earned lessons from the field, and a candid look at both the progress and the ongoing challenges in protecting our most critical systems.   Key Moments:  05:55 Breaking Into Cybersecurity Without Classes 09:26 Production Environment Security Testing 13:28 Credential Evaluation and Light Probing 14:33 Firewall Misconfiguration Comedy 19:14 Dedicated OT Cybersecurity Professionals 20:50 "Prioritize Reliability Over Latest Features" 24:18 "IT-OT Convergence Challenges" 29:04 Patching Program and OT Security 32:08 Complexity of OT Environments 35:45 Dress-Code Trust in Industry 38:23 Legacy System Security Challenges 42:15 OT Cybersecurity for IT Professionals 43:40 "Building Rapport with Food" 47:59 Future OT Cyber Risks and Readiness 51:30 Skill Building for Tech Professionals   About the Guest :  Justin Searle is the Director of ICS Security at InGuardians, specializing in ICS security architecture design and penetration testing.  He led the Smart Grid Security Architecture group in the creation of NIST Interagency Report 7628 and played critical roles in the Advanced Security Acceleration Project for the Smart Grid (ASAP-SG), National Electric Sector Cybersecurity Organization Resources (NESCOR), and Smart Grid Interoperability Panel (SGIP).     Justin has taught hacking techniques, forensics, networking, and intrusion detection courses for multiple universities, corporations, and security conferences.  His current courses at SANS and Black Hat are among the world's most attended ICS cybersecurity courses.  Justin is currently a Senior Instructor for the SANS Institute and a faculty member at IANS. In addition to electric power industry conferences, he frequently presents at top international security conferences such as Black Hat, DEFCON, OWASP, HITBSecConf, Brucon, Shmoocon, Toorcon, Nullcon, Hardware.io, and AusCERT.     Justin leads prominent open-source projects, including The Control Thing Platform, Samurai Web Testing Framework (SamuraiWTF), and Samurai Security Testing Framework for Utilities (SamuraiSTFU).  He has an MBA in International Technology and is a CISSP and SANS GIAC certified Incident Handler (GCIH), Intrusion Analyst (GCIA), Web Application Penetration Tester (GWAPT), and GIAC Industrial Control Security Professional (GICSP)   How to connect Justin:  https://www.controlthings.io https://www.linkedin.com/in/meeas/ Email: justin@controlthings.io Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast    To be a guest or suggest a guest/episode, please email us at info@protectitall.co   Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

POST Wrestling w/ John Pollock & Wai Ting
WWE Raw 6/16/25 Review | REWIND-A-RAW

POST Wrestling w/ John Pollock & Wai Ting

Play Episode Listen Later Jun 17, 2025 53:48


John Pollock and Wai Ting review WWE Raw with an unfortunate Liv Morgan injury, the return of Bill Goldberg, and the last opening round matches of the K/QOTR.Plus: Jey Uso vs. Bronson Reed vs. Sheamus vs. Rusev in the KOTR tournament, Asuka vs. Stephanie Vaquer vs. Raquel Rodriguez vs. Ivy Nile in the QOTR tournament, and Bayley calls out Becky Lynch. The XL Edition continues at POSTwrestlingCafe.com with News of the Day and Feedback, ad-free and timestamped. Today's stories:Jon Moxley & AEW sued over 2023 incident G1 Climax announcementsTripleMania Regia resultsFriday Night SmackDown ratings NXT & AEW Grand Slam Mexico lineups  POST Wrestling Café Schedule:Thursday: Book Club - Under the Black Hat by Jim RossSaturday: Collision Course FREE Shows:Tuesday: upNXTWednesday: Pollock & Thurston Wednesday: Rewind-A-Dynamite (XL in the Café)Friday: Rewind-A-SmackDown (XL in the Café)Photo Courtesy: WWE Rewind-A-Raw Theme by Colby John: https://soundcloud.com/colbyjohnBluesky: https://bsky.app/profile/postwrestling.comX: http://www.twitter.com/POSTwrestlingInstagram: http://www.instagram.com/POSTwrestlingFacebook: http://www.facebook.com/POSTwrestlingYouTube: http://www.youtube.com/POSTwrestlingSubscribe: https://postwrestling.com/subscribePatreon: http://postwrestlingcafe.comForum: https://forum.postwrestling.comDiscord: https://postwrestling.com/discordMerch: https://Chopped-Tees.com/POSTwrestlingOur Sponsors:* Check out Progressive: https://www.progressive.comAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Harold's Old Time Radio
Sleep No More 56-12-05 (04) Over the Hill - Man in the Black Hat

Harold's Old Time Radio

Play Episode Listen Later Jun 17, 2025 24:22


Sleep No More 56-12-05 (04) Over the Hill - Man in the Black Hat

Small Efforts - with Sean Sun and Andrew Askins
Black Hat deadline madness, AI-powered content tactics, and the auth provider dilemma

Small Efforts - with Sean Sun and Andrew Askins

Play Episode Listen Later Jun 12, 2025 44:22


Plastic Posse Podcast
Episode 118: Martin Kovac's New Façade Kit + Black Hat Scale Models + Inspiration & Overcoming Fear

Plastic Posse Podcast

Play Episode Listen Later Jun 11, 2025 159:20


Send us a textScott, TJ, and Grant fly a shortened route today as Jensen and JB are engaged elsewhere.We interview Stewart Rolfe, AKA Black Hat Scale Models and what an engaging conversation. Stewart talks to his motivations, his emphasis on traditional scratch building, and our mutual support for the Annual Model Officers' Mess 48 in 48 Event benefitting Model For Heroes.We also catch up with our Favorite Uncle, tearing him away from his latest project at the bench, and talk about his new Facade kit produced in conjunction with Faustus for RT Diorama. Martin gets into a lot of detail regarding the design and manufacturing of this new product, and hints that this might not be the only kit to be released...? We also discuss what Inspires us to initiate a project, to dive into something and pick that dusty model out of the stash and get going on it, and TJ leads us into a pep talk / discussion on overcoming fear and sharing our work with our peers, even at the best model shows in the world, and why this is a great idea! If you would like to become a Posse Outrider, and make a recurring monthly donation of $ 1 and up, visit us at www.patreon.com/plasticpossepodcast .Plastic Posse Podcast on Facebook: https://www.facebook.com/PlasticPossePlastic Posse Group on Facebook: https://www.facebook.com/groups/302255047706269Plastic Posse Podcast MERCH! : https://plastic-posse-podcast.creator-spring.com/Plastic Posse Podcast on YouTube:https://www.youtube.com/channel/UCP7O9C8b-rQx8JvxFKfG-KwOrion Paintworks (TJ): https://www.facebook.com/orionpaintworksJB-Closet Modeler (JB): https://www.facebook.com/closetmodelerThree Tens' Modelworks (Jensen): https://www.facebook.com/ThreeTensModelWorksRT Diorama: https://rt-diorama.de/Black Hat Scale Models YouTube: https://www.youtube.com/@BlackHatScaleModelsSPONSORS:Tankraft: https://tankraft.com/AK Interactive: https://ak-interactive.com/Tamiya USA: https://www.tamiyausa.com/Support the showSupport the show

Innovation in Compliance with Tom Fox
The Critical Importance of Mobile Application Security: Insights from Subho Halder

Innovation in Compliance with Tom Fox

Play Episode Listen Later Jun 10, 2025 27:59


Innovation comes in many areas, and compliance professionals need to not only be ready for it but also embrace it. Join Tom Fox, the Voice of Compliance, as he visits with top innovative minds, thinkers, and creators in the award-winning Innovation in Compliance podcast. In this episode, host Tom Fox visits Subho Halder, the CEO & Co-Founder of Appknox, to discuss the often-overlooked yet crucial topic of mobile application security in the corporate compliance world. Halder shares his extensive background in mobile app security, including developing the first mobile malware and presenting at prestigious conferences like Black Hat and DEF CON. The conversation covers the evolving market need for specialized mobile app security tools, the unique challenges faced by mobile applications compared to web applications, and the critical importance of integrating security early in the development lifecycle—a concept known as the ‘left shift' approach. Halder also explores AI-powered cyberattacks and how Appknox is utilizing AI to develop defensive strategies. The discussion highlights regulatory blind spots in the US regarding mobile security, the challenges of managing mobile app security in large multinational corporations, and best practices for ensuring robust mobile app security. Key highlights: Market Need and Opportunity for AppKnox Appknox Security Assessment of Perplexity's Android App Regulatory Blind Spots in US Cybersecurity Frameworks Engaging with Large Multinational Companies AI-Powered Cyber Attacks and Defensive Strategies Importance of the Left Shift Approach in Mobile App Security Resources: Subho Halder on LinkedIn Appknox Appknox Resources Page Appknox Blog: Is Perplexity AI Safe to Use? Security Flaws in the Android App Tom Fox Instagram Facebook YouTube Twitter LinkedIn

New Books in Economics
John Horn, "Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success" (MIT Press, 2023)

New Books in Economics

Play Episode Listen Later Jun 1, 2025 105:13


Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success (MIT Press, 2023) offers a roadmap to help leaders predict, understand, and react to their competitors' moves. It is a valuable tool to help companies stay ahead of their competitors when the competition is intensifying. To make the right choice when a competitor is working hard to prevent it is difficult. This book demystifies the process. For organizations developing systematic tools to effectively predict competitor behavior, this book provides a powerful, fact-based approach to building insight into A must-read for anyone seeking to better understand their competitors. This book shares proven methods for thinking like the competition and understand why they act the way they do. The keys are cognitive empathy and an approach that focuses on why competitors behave as they do. The book presents a systematic approach to competitive intelligence that starts with frameworks that get inside a competitor's mindset, predict their reactions and assess their actions. The book stresses the importance of collecting forward-looking, predictive data; explains how to use war games, Black Hat exercises, mock negotiations, and premortems to build competitive insight; and makes the case for creating a dedicated competitive insight function within the organization. Reading this book will enable you to anticipate how competitors will react to moves you make. It ingeniously applies lessons from archaeologists, paleontologists, NICU nurses, and homicide detectives to better gather and analyze information when it is not possible to ask direct questions; Alfred Marcus, Edson Spencer Professor of Strategy and Technology University of Minnesota Carlson School of Management. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/economics

New Books Network
John Horn, "Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success" (MIT Press, 2023)

New Books Network

Play Episode Listen Later May 31, 2025 105:13


Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success (MIT Press, 2023) offers a roadmap to help leaders predict, understand, and react to their competitors' moves. It is a valuable tool to help companies stay ahead of their competitors when the competition is intensifying. To make the right choice when a competitor is working hard to prevent it is difficult. This book demystifies the process. For organizations developing systematic tools to effectively predict competitor behavior, this book provides a powerful, fact-based approach to building insight into A must-read for anyone seeking to better understand their competitors. This book shares proven methods for thinking like the competition and understand why they act the way they do. The keys are cognitive empathy and an approach that focuses on why competitors behave as they do. The book presents a systematic approach to competitive intelligence that starts with frameworks that get inside a competitor's mindset, predict their reactions and assess their actions. The book stresses the importance of collecting forward-looking, predictive data; explains how to use war games, Black Hat exercises, mock negotiations, and premortems to build competitive insight; and makes the case for creating a dedicated competitive insight function within the organization. Reading this book will enable you to anticipate how competitors will react to moves you make. It ingeniously applies lessons from archaeologists, paleontologists, NICU nurses, and homicide detectives to better gather and analyze information when it is not possible to ask direct questions; Alfred Marcus, Edson Spencer Professor of Strategy and Technology University of Minnesota Carlson School of Management. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/new-books-network

New Books in Systems and Cybernetics
John Horn, "Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success" (MIT Press, 2023)

New Books in Systems and Cybernetics

Play Episode Listen Later May 31, 2025 105:13


Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success (MIT Press, 2023) offers a roadmap to help leaders predict, understand, and react to their competitors' moves. It is a valuable tool to help companies stay ahead of their competitors when the competition is intensifying. To make the right choice when a competitor is working hard to prevent it is difficult. This book demystifies the process. For organizations developing systematic tools to effectively predict competitor behavior, this book provides a powerful, fact-based approach to building insight into A must-read for anyone seeking to better understand their competitors. This book shares proven methods for thinking like the competition and understand why they act the way they do. The keys are cognitive empathy and an approach that focuses on why competitors behave as they do. The book presents a systematic approach to competitive intelligence that starts with frameworks that get inside a competitor's mindset, predict their reactions and assess their actions. The book stresses the importance of collecting forward-looking, predictive data; explains how to use war games, Black Hat exercises, mock negotiations, and premortems to build competitive insight; and makes the case for creating a dedicated competitive insight function within the organization. Reading this book will enable you to anticipate how competitors will react to moves you make. It ingeniously applies lessons from archaeologists, paleontologists, NICU nurses, and homicide detectives to better gather and analyze information when it is not possible to ask direct questions; Alfred Marcus, Edson Spencer Professor of Strategy and Technology University of Minnesota Carlson School of Management. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/systems-and-cybernetics

New Books in Business, Management, and Marketing
John Horn, "Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success" (MIT Press, 2023)

New Books in Business, Management, and Marketing

Play Episode Listen Later May 31, 2025 105:13


Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success (MIT Press, 2023) offers a roadmap to help leaders predict, understand, and react to their competitors' moves. It is a valuable tool to help companies stay ahead of their competitors when the competition is intensifying. To make the right choice when a competitor is working hard to prevent it is difficult. This book demystifies the process. For organizations developing systematic tools to effectively predict competitor behavior, this book provides a powerful, fact-based approach to building insight into A must-read for anyone seeking to better understand their competitors. This book shares proven methods for thinking like the competition and understand why they act the way they do. The keys are cognitive empathy and an approach that focuses on why competitors behave as they do. The book presents a systematic approach to competitive intelligence that starts with frameworks that get inside a competitor's mindset, predict their reactions and assess their actions. The book stresses the importance of collecting forward-looking, predictive data; explains how to use war games, Black Hat exercises, mock negotiations, and premortems to build competitive insight; and makes the case for creating a dedicated competitive insight function within the organization. Reading this book will enable you to anticipate how competitors will react to moves you make. It ingeniously applies lessons from archaeologists, paleontologists, NICU nurses, and homicide detectives to better gather and analyze information when it is not possible to ask direct questions; Alfred Marcus, Edson Spencer Professor of Strategy and Technology University of Minnesota Carlson School of Management. Learn more about your ad choices. Visit megaphone.fm/adchoices

New Books in Technology
John Horn, "Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success" (MIT Press, 2023)

New Books in Technology

Play Episode Listen Later May 31, 2025 105:13


Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success (MIT Press, 2023) offers a roadmap to help leaders predict, understand, and react to their competitors' moves. It is a valuable tool to help companies stay ahead of their competitors when the competition is intensifying. To make the right choice when a competitor is working hard to prevent it is difficult. This book demystifies the process. For organizations developing systematic tools to effectively predict competitor behavior, this book provides a powerful, fact-based approach to building insight into A must-read for anyone seeking to better understand their competitors. This book shares proven methods for thinking like the competition and understand why they act the way they do. The keys are cognitive empathy and an approach that focuses on why competitors behave as they do. The book presents a systematic approach to competitive intelligence that starts with frameworks that get inside a competitor's mindset, predict their reactions and assess their actions. The book stresses the importance of collecting forward-looking, predictive data; explains how to use war games, Black Hat exercises, mock negotiations, and premortems to build competitive insight; and makes the case for creating a dedicated competitive insight function within the organization. Reading this book will enable you to anticipate how competitors will react to moves you make. It ingeniously applies lessons from archaeologists, paleontologists, NICU nurses, and homicide detectives to better gather and analyze information when it is not possible to ask direct questions; Alfred Marcus, Edson Spencer Professor of Strategy and Technology University of Minnesota Carlson School of Management. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/technology

New Books in Economic and Business History
John Horn, "Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success" (MIT Press, 2023)

New Books in Economic and Business History

Play Episode Listen Later May 31, 2025 105:13


Inside the Competitor's Mindset: How to Predict Their Next Move and Position Yourself for Success (MIT Press, 2023) offers a roadmap to help leaders predict, understand, and react to their competitors' moves. It is a valuable tool to help companies stay ahead of their competitors when the competition is intensifying. To make the right choice when a competitor is working hard to prevent it is difficult. This book demystifies the process. For organizations developing systematic tools to effectively predict competitor behavior, this book provides a powerful, fact-based approach to building insight into A must-read for anyone seeking to better understand their competitors. This book shares proven methods for thinking like the competition and understand why they act the way they do. The keys are cognitive empathy and an approach that focuses on why competitors behave as they do. The book presents a systematic approach to competitive intelligence that starts with frameworks that get inside a competitor's mindset, predict their reactions and assess their actions. The book stresses the importance of collecting forward-looking, predictive data; explains how to use war games, Black Hat exercises, mock negotiations, and premortems to build competitive insight; and makes the case for creating a dedicated competitive insight function within the organization. Reading this book will enable you to anticipate how competitors will react to moves you make. It ingeniously applies lessons from archaeologists, paleontologists, NICU nurses, and homicide detectives to better gather and analyze information when it is not possible to ask direct questions; Alfred Marcus, Edson Spencer Professor of Strategy and Technology University of Minnesota Carlson School of Management. Learn more about your ad choices. Visit megaphone.fm/adchoices

False Start - College Football Podcast
Episode 179: Greg Sankey wears the black hat, Kirby Smart is big mad, Is Dan Lanning slipping?, What about the Matt Rhule pop year?

False Start - College Football Podcast

Play Episode Listen Later May 29, 2025 58:27


Reach out to Cody and Buhler to tell them what's up!Somebody has to be the villain of college football.For the time being, it is SEC commissioner Greg Sankey.By being willing to wear the black hat, it may keep us distracted from what is really going on.John Buhler (Lead Writer, FanSided.com) did his best to keep this wild and crazy episode of False Start on the tracks with Cody Williams (Content Director, FanSided.com) out and about doing alleged bachelor party things a few miles away from him in and around Atlanta.Buhler touched on Sankey, Kirby Smart being big mad over big money, Dan Lanning losing recruits and if the Matt Rhule pop year is going to happen in the middle of a cornfield.False Start is like a kernel, you never know when it is going to be popping off!

Autonomous IT
CISO IT – RSA 2025: Identity Is the New Threat Vector, E19

Autonomous IT

Play Episode Listen Later May 29, 2025 11:12


RSA 2025 revealed a shift: identity is now a primary threat vector in cloud security. In this episode, Jason Kikta breaks down the key takeaways from the conference—why identity has overtaken malware, how threat actors exploit service accounts and IDPs, and what this means for modern defense strategies. Plus, Jason shares observations on the evolving risk landscape and whether Black Hat will follow RSA's lead.Whether you're a CISO, CTO, or security architect, this episode is your briefing on where the industry is headed.

Talking Billions with Bogumil Baranowski
Who You Can Trust? White Hat Capitalism: Dave Nadig on Finding Purpose in Finance

Talking Billions with Bogumil Baranowski

Play Episode Listen Later May 12, 2025 67:00


How a 30-year ETF veteran learned to prioritize human flourishing over profit maximizationGuest: Dave Nadig - 30-year veteran of the ETF industry, financial blogger, and advocate for pro-flourishing capitalismKey Moments:[03:13] Dave shares how his childhood on a farm shaped his financial mindset, developing a scarcity mentality from growing up poor that led him to finance and money management.[04:38] Dave explains his "Black Hat vs. White Hat" concept in finance - distinguishing between those who prioritize human flourishing (White Hats) versus those focused primarily on profit maximization (Black Hats).[07:01] Discussion of the Mad Magazine "Spy vs. Spy" cartoons as inspiration for his Black Hat/White Hat framework.[09:53] Dave emphasizes that people in the "Black Hat" business aren't necessarily evil, but have made different choices about their priorities.[15:50] Conversation about passive investing and its evolution from the 1980s through today, with Dave sharing his personal journey working at Wells Fargo on the first target date funds.[19:19] Dave reflects on becoming "a hard convert back to passive investing" after failing as an active fund manager.[20:14] Discussion of passive investing's impact on market dynamics, particularly how fund flows affect top equities and bond markets.[26:22] Examination of how capital formation now happens primarily in private markets, not public ones.[32:23] Dave shares his fascination with consciousness and the brain, discussing Dr. Ian McGillchrist's work on left brain/right brain dynamics.[34:47] Dave explores how meditation helps investors develop metacognitive awareness and recognize when their perception differs from reality.[38:39] Discussion of Dave's experiences at Zen Mountain Monastery and how meditation creates space to explore one's own thought processes.[44:52] Dave's emotional connection to flying, from childhood fascination to earning his pilot's license, and the devastating impact of losing it due to epilepsy.[53:49] Reflection on how most investors focus too much on narrow details while neglecting broader context and asset allocation decisions.[55:54] Dave shares how he uses AI tools like Perplexity to streamline research and Claude to assist with data analysis and coding tasks.[01:01:04] Discussion of how AI will continue to evolve, with the current state being "the worst it's ever going to be."[01:05:15] Dave's definition of success: having control over his own time rather than financial wealth.Podcast Program – Disclosure StatementBlue Infinitas Capital, LLC is a registered investment adviser and the opinions expressed by the Firm's employees and podcast guests on this show are their own and do not reflect the opinions of Blue Infinitas Capital, LLC. All statements and opinions expressed are based upon information considered reliable although it should not be relied upon as such. Any statements or opinions are subject to change without notice.Information presented is for educational purposes only and does not intend to make an offer or solicitation for the sale or purchase of any specific securities, investments, or investment strategies. Investments involve risk and unless otherwise stated, are not guaranteed.Information expressed does not take into account your specific situation or objectives, and is not intended as recommendations appropriate for any individual. Listeners are encouraged to seek advice from a qualified tax, legal, or investment adviser to determine whether any information presented may be suitable for their specific situation. Past performance is not indicative of future performance.

Risky Business News
Sponsored: What really goes down on Blackhat wifi networks

Risky Business News

Play Episode Listen Later May 11, 2025 15:35


In this Risky Bulletin sponsor interview James Pope, Director of Technical Enablement, talks to Tom Uren about his experience running networks and security centres at Black Hat conferences around the world. Pope talks about the challenges of running a SOC at a hacker conference, how conference networks around the world have a different character and talks about all the weird and wonderful security snafus he has found. Show notes

BarCode
Worldwide Security

BarCode

Play Episode Listen Later May 7, 2025 44:22


In this conversation, Dr. Fred Heiding discusses theintersection of cybersecurity and AI threats, sharing insights from his research at Harvard's Belfer Center. He emphasizes the importance of collaboration in cybersecurity, the risks of isolationism, and the need for more technical talent in policy-making. The discussion also covers national cybersecurity strategies and the challenges of implementing effectiveframeworks. In this conversation, Fred Heiding discusses the critical need for technical expertise in policy-making, emphasizing the importance of quantifying cybersecurity risks for effective decision-making. He highlights globalstrategies, particularly Japan's approach to cybersecurity for vulnerable populations, and the necessity of measuring the impact of cybersecurity initiatives. The discussion also touches on personal insights, including Heiding's love for surfing and the idea of a cybersecurity-themed bar, showcasing a blend of professional and personal perspectives. 00:00 - Introduction to Cybersecurity and AI Threats04:46 - Fred Heiding's Journey in Cybersecurity07:57 - National Cybersecurity Strategies: A GlobalPerspective10:56 - The Risks of Isolationism in Cybersecurity13:44 - Collaboration in Cybersecurity: Challenges andOpportunities16:40 - The Role of Academia in Cybersecurity Frameworks19:29 - Bridging the Gap: Technical Talent in Policy Making22:33 - Future Directions in Cybersecurity Education27:53 - The Need for Technical Expertise in Policy Making29:00 - Quantifying Risk in Cybersecurity33:39 - Global Strategies in Cybersecurity37:04 - Measuring Impact of Cybersecurity Strategies40:24 - Personal Insights and Downtime42:29 - The Concept of a Cybersecurity-Themed BarSYMLINKS[LinkedIn] - linkedin.com/in/fheidingDr. Heiding is a research fellow at both the Harvard KennedySchool's Belfer Center for Science and International Affairs and the Harvard John A. Paulson School of Engineering and Applied Sciences. His work focuses on AI-enhanced cyberattacks, cybersecurity policy, and global cybercrimemitigation. He also collaborates with the World Economic Forum's Centre for Cybersecurity and teaches at Harvard Business School.[ Fred Heiding – Personal Website] -  https://www.fredheiding.com/Dr. Heiding's personal website outlines his mission todevelop defense systems resilient against superintelligent AI attacks. It features his research on AI-driven phishing tools, cybersecurity strategies, and the intersection of AI and human factors in security.[Black Hat] - https://www.blackhat.comAn internationally recognized cybersecurity conference where experts and researchers, including Dr. Fred Heiding, present cutting-edge research on information security. Black Hat is known for its focus on deep technical content and real-world relevance.[DEF CON] - https://defcon.orgOne of the world's largest and most notable hacker conventions, often held annually in Las Vegas. It showcases critical findings and demonstrations in cybersecurity, where researchers like Dr. Heiding share their insights.[IEEE Access] - https://ieeeaccess.ieee.orgA multidisciplinary, open-access journal of the IEEE that features research from all fields of engineering and technology. Dr. Heiding's work has been published here, underlining its technical credibility.[Harvard Business Review] - https://hbr.orgA leading publication on business strategy and practice, affiliated with Harvard University. Dr. Heiding's research featured here likely emphasizes the intersection of technology, security, and organizational impact.[Harvard Kennedy School] - https://www.hks.harvard.eduA graduate school of public policy and government at Harvard University where Dr. Heiding teaches and conducts policy-relevant cybersecurity research.

Passwort - der Podcast von heise security
Security-News von ChoiceJacking bis Slopsquatting

Passwort - der Podcast von heise security

Play Episode Listen Later May 7, 2025 118:25


"Zumindest wird es nicht langweilig", könnte das April-Fazit aus IT-Security-Sicht lauten. Und den beiden "Passwort"-Hosts fällt es erneut leicht, spannende Sicherheitsgeschichten zu erzählen. Unter anderem geht es um eine neue Form der Supply-Chain-Attacke, die KI-Halluzinationen von Softwarebibliotheken ausnutzt. Aber auch eine trickreiche Umgehung der USB-Sperre von Mobilgeräten stellt Co-Host Christopher vor - und Sylvester ärgert sich über unvollständige Sicherheitsflicken beim Security-Appliance-Hersteller Fortinet. Einig sind sich beide allerdings wieder bei ihrem Dauerbrenner: Eine nun beschlossene Änderung in der WebPKI findet beider Beifall. - ChoiceJacking-Vortrag auf der BlackHat: https://i.blackhat.com/Asia-25/Asia-25-Draschbacher-Watch-Your-Phone.pdf - Offener Brief der EFF in der Causa Krebs: https://www.eff.org/press/releases/eff-leads-prominent-security-experts-urging-trump-administration-leave-chris-krebs - ckus (In-)Security Appliance Bingo: cku.gt/appbingo25 - Slopsquatting-Paper „We Have a Package for You“: https://arxiv.org/abs/2406.10279 - OpenCVE-Installationsanleitung: https://docs.opencve.io/deployment/ - Folgt uns im Fediverse: @christopherkunz@chaos.social @syt@social.heise.de Mitglieder unserer Security Community auf heise security PRO hören alle Folgen bereits zwei Tage früher. Mehr Infos: https://pro.heise.de/passwort

ITSPmagazine | Technology. Cybersecurity. Society
RSAC 2025 Coverage is done! It's a wrap, we are good to go, but The Musings Are Just Getting Started | An RSAC Conference 2025 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 3, 2025 5:12


RSAC 2025 is a wrap. The expo floor is closed, the conversations have ended, and the gear is packed — but the reflections are just beginning. Throughout the week, Sean Martin and Marco Ciappelli had powerful discussions around AI, identity, platform security, partnerships, the evolving legal and VC landscapes, and the growing importance of multi-layered defense strategies. But one moment stood out. While we were recording outside the conference, someone walking by asked us, “Is the world secure now?” Our answer was simple: “We're working on it.” That exchange captured the spirit of the entire event — security is not a destination, it's an ongoing effort. We learn, we adapt, and we move forward faster than the future is coming at us. Thank you to everyone who made RSAC 2025 such a meaningful experience. Next stops: AppSec Global in Barcelona, Infosec Europe in London, Black Hat and DEF CON in Las Vegas — and more conversations across the hybrid analog digital society we all share. Until next time, keep building, keep connecting, and keep moving forward. ___________Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974Akamai: https://itspm.ag/akamailbwcBlackCloak: https://itspm.ag/itspbcwebSandboxAQ: https://itspm.ag/sandboxaq-j2enArcher: https://itspm.ag/rsaarchwebDropzone AI: https://itspm.ag/dropzoneai-641ISACA: https://itspm.ag/isaca-96808ObjectFirst: https://itspm.ag/object-first-2gjlEdera: https://itspm.ag/edera-434868___________ResourcesLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage___________KEYWORDSsean martin, marco ciappelli, rsac 2025, quantum, ai, grc, devsecops, zero trust, appsec, resilience, event coverage, on location, conference___________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

A Quality Interruption
#447 L'Amour's DEAD MAN (1995)

A Quality Interruption

Play Episode Listen Later Apr 14, 2025 71:48


EPISODE #447-- After much hooting and hollering, we are back on the podcastin' trail with Jim Jarmusch's seminal DEAD MAN (1995) starign Gary Farmer, Robert Mitchum, and that guy from Pirates of the Caribbean. You know the one. The one with the texts. Anyways, fun movie. An important movie. We also ramble about the Oscar-winning documentary NO OTHER LAND (2024) (now available to rent and stream), BROOKLYN (2015), Michael Mann's BLACKHAT (2015), and the legacy sequel BEVERLY HILLS COP: AXEL F (2024). A solid bunch of movies. A strange bunch of movies. Join the cause at Patreon.com/Quality. Follow the us on on Bluesky at kislingconnection and cruzflores, on Instagram @kislingwhatsit, and on Tiktok @kislingkino. You can watch Cruz and show favorite Alexis Simpson on You Tube in "They Live Together." Thanks to our artists Julius Tanag (http://www.juliustanag.com) and Sef Joosten (http://spexdoodles.tumblr.com). The theme music is "Eine Kleine Sheissemusik" by Drew Alexander. Also, I've got a newsletter, so maybe go check that one out, too. Listen to DRACULA: A RADIO PLAY on Apple Podcasts, at dracularadio.podbean.com, and at the Long Beach Playhouse at https://lbplayhouse.org/show/dracula And, as always, Support your local unions! UAW, SAG-AFTRA, and WGA strong and please leave us a review on iTunes or whatever podcatcher you listened to us on!

BarCode
DELTA K

BarCode

Play Episode Listen Later Apr 11, 2025 56:34


In this conversation, the host Chris Glanden engages withguests Charlie Northrup and Keenan Hale to discuss advancements in AI, particularly focusing on large language models and their limitations. They explore the concept of Delta K, which refers to the transformation of knowledge, and how it relates to the predictive capabilities of AI. Thediscussion also delves into thin calculus and the category theory of things, emphasizing the need for an external truth to build sound mathematical systems. In this conversation, the speakers delve into the concepts of agentic calculusand Delta K, exploring their implications for artificial general intelligence (AGI) and the future of the economy. They discuss the observer-dependent nature of reality and how different perspectives can lead to varied interpretations ofthe same phenomena. The conversation also touches on the potential of the agentic economy to revolutionize ownership and economic dynamics, as well as the philosophical implications of waveform collapse in quantum mechanics.Overall, the discussion highlights the need for a new understanding of cognitive processing and the role of agents in shaping future interactions and economies. TIMESTAMPS:00:00 - Introduction to the Guests and Their Expertise02:16 - Recent Developments in AI and Technology04:50 - Understanding Large Language Models10:53 - Delta K and Its Limitations16:24 - Thin Calculus and the Category Theory of Things19:19 - Understanding Agentic Calculus22:27 - Delta K and Its Implications for AGI28:59 - Cognitive Processing and States of Being36:09 - The Agentic Economy: A New Paradigm40:25 - Waveform Collapse and Delta K43:20 The Future of Agentic Interactions SYMLINKS:[LinkedIn - Charlie Northrup] - https://www.linkedin.com/in/charlie-northrup-1b73b051Charlie Northrup is a technology innovator at Neewer Sciences, contributing pioneering research in agentic AI systems, thing calculus, and distributed digital ecosystems. He shares updates and insights about his work on LinkedIn.[LinkedIn - Keenan Hale] - https://www.linkedin.com/in/keenandewayne/Keenan Hale is recognized for his interdisciplinary contributions bridging theoretical mathematics and cryptographic systems. He connects with others inthe AI and cryptography communities through LinkedIn and shares research updates and discussions.[LinkedIn - Mike Elkins] - https://www.linkedin.com/in/elkinsmike/Mike Elkins is the Chief Human and Information Security Officer at Banffist, actively involved in discussions about cybersecurity, digital transformation, and AI-driven enterprise operations. He also speaks at major conferences like BlackHat, RSA, and SecureWorld.

Coaching for Leaders
728: Lower Your Risk of Being Hacked, with Qasim Ijaz

Coaching for Leaders

Play Episode Listen Later Apr 7, 2025 39:26


Qasim Ijaz Qasim Ijaz is the director of cybersecurity at a leading healthcare organization, overseeing detection, incident response, vulnerability management, purple teaming, and cybersecurity engineering. With a strong background in offensive security and risk management, he has helped organizations strengthen their defenses against evolving threats. He is also a dedicated educator, mentoring professionals and sharing his expertise at conferences such as BSides and Black Hat. You don't need to go far in the news these days to find out that another organization was hacked. Data breeches are a nightmare scenario for both leaders and the people they support. In this episode, Qasim and I explore what your team and you can do to be a bit more prepared. Key Points Use multi-factor authentication, passphrases, and a password manager. Freeze your personal credit reports. Do this for free directly with Experian, Equifax, and TransUnion. Leaders in bigger roles (executives, CEOs, board members) are larger targets for hackers due to their access and also their ability to occasionally side-step organizational guidelines. It's the non-technical pieces of a cyber response that organizations are least prepared for. Conduct incident response and disaster recovery tabletop exercises to uncover vulnerabilities before an attack. Regardless of organizational policy, employees will use AI. The best prevention assumes the inevitability of human behavior and works with it to improve systems. Resources Mentioned Recommended password managers: 1Password, Apple password app, Proton Pass Critical Security Controls by the Center for Internet Security Resources for Small and Medium Businesses by the Cybersecurity & Infrastructure Security Agency 2024 Data Breach Investigations Report by Verizon Business Related Episodes Dumb Things Smart People Do With Money, with Jill Schlesinger (episode 396) Where to Start When Inheriting a Team in Crisis, with Lynn Perry Wooten (episode 603) How to Use AI to Think Better, with José Antonio Bowen (episode 689) Discover More Activate your free membership for full access to the entire library of interviews since 2011, searchable by topic. To accelerate your learning, uncover more inside Coaching for Leaders Plus.