Podcasts about cyber terrorism

  • 94PODCASTS
  • 125EPISODES
  • 39mAVG DURATION
  • ?INFREQUENT EPISODES
  • Apr 26, 2025LATEST
cyber terrorism

POPULARITY

20172018201920202021202220232024


Best podcasts about cyber terrorism

Latest podcast episodes about cyber terrorism

Moments with Marianne
GenAI Tools & Cybersecurity with Etay Maor

Moments with Marianne

Play Episode Listen Later Apr 26, 2025 8:39


Is GenAI safe to use or should we be cautious when using these tools? Tune in for an inspiring discussion with Etay Maor, Chief Security Strategist at Cato Networks on the 2025 Cato CTRL Threat Report.Moments with Marianne airs in the Southern California area on KMET1490AM & 98.1 FM, an ABC Talk News Radio affiliate! Etay Maor is the chief security strategist at Cato Networks, a founding member of Cato CTRL, and an industry-recognized cybersecurity researcher.  Prior to joining Cato in 2021, Etay was the chief security officer for IntSights (acquired by Rapid7), where he led strategic cybersecurity research and security services. Etay has also held senior security positions at Trusteer (acquired by IBM), where he created and led breach response training and security research, and RSA Security's Cyber Threats Research Labs, where he managed malware research and intelligence teams. Etay is an adjunct professor at Boston College and is part of the Call for Paper (CFP) committees for the RSA Conference and Qubits Conference. Etay holds a Master's degree in Counterterrorism and Cyber-Terrorism and a Bachelor's degree in Computer Science from IDC Herzliya. www.catonetworks.com/report  For more show information visit: www.MariannePestana.com

Rebel Tech
Rebel Tech Podcast | Episode 7: Foreign Cyberterrorism

Rebel Tech

Play Episode Listen Later Sep 30, 2024 44:29


On this episode of the Rebel Tech Podcast, the Honorable Zach Whiting interviews David Dunmoyer on the myriad cybersecurity threats hostile nations like China, Russia, and Iran pose to the security of Texas' critical infrastructure. In stark and sobering detail, they unpack past attacks on water systems and how China is infiltrating cyber systems across Texas as part of their bid to win a war of attrition against America. Dunmoyer concludes with concrete policy recommendations to improve cybersecurity preparedness for Texas' most critical infrastructure.

Deathless
Happy Birthday Agnes / Cyberterrorism (with Hannah Altenbach)

Deathless

Play Episode Play 31 sec Highlight Listen Later May 30, 2024 8:07


Welcome to this mini episode of Deathless where we break down the latest headlines in the news about immortality. To help me, Pulitzer winning journalist from The Times... Hannah Altenbach.On the Lighter Side: Happy Birthday AgnesAgnes Gottsmundottir, the oldest person in the world, celebrates her 125th birthday.Main Story: CyberterrorismA Permadorm cold storage facility in Bangladesh falls prey to a cyberterrorist attack.(***Hannah Altenbach is portrayed by Becca Schneider)Follow us on Instagram @deathlesspodAnd one more thing... How's your immortality going?

Do You Ever Wonder...The Hallmark Abstract Service Podcast
National Security Expert And Heritage Visiting Fellow Steven Bucci Visits Do You Ever Wonder!

Do You Ever Wonder...The Hallmark Abstract Service Podcast

Play Episode Listen Later Jan 8, 2024 42:07


Do You Ever Wonder About The State Of United States National Security?We had the opportunity to speak with Steven Bucci on the subject, a man who is uniquely qualified to opine based on his incredible government and military resume...U.S. Army Colonel (ret),  spending 28-years in the Special Forces,Cybersecurity expert in the private sector with companies such as IBM and the U.S. Chamber of Commerce,Deputy Assistant Secretary of Defense in the George W. Bush administration,Military Assistant to Secretary of Defense Donald Rumsfeld,Currently a security consultant in the private sector, and a Visiting Fellow at The Heritage Foundation leading the Foreign Policy, Homeland Security, and Defense Team.In other words, Steven Bucci is an expert and completely fluent in the areas of homeland security, defense, cybersecurity, terrorism, and geopolitics.Prior to our discussion we had a list of nine global issues to speak about but, because we were constrained by time and still went to 42 minutes, we barely got through four of them.The first topic, given that Steven Bucci is a former Deputy Secretary of Defense, is a  discussion concerning the disappearance of Secretary of Defense Lloyd Austin at a time when the world is on fire!We spoke about the old cliche of 'What keeps you up at night' given the plethora of issues facing the United States and the world.Of course the southern border was discussed, given the fact that it is an open portal for anyone in the world who wants to cross over. This means it's an issue of incoming deadly drugs, potential diseases, people with criminal records, and individuals on the terror watch list. Not to mention the human tragedy facing women and children.We spoke about the crisis in the Middle East centered around Israel, and whether leadership in the U.S. is sending the right message with our military reaction.The last subject that we spoke about is the potential for the U.S. energy grid to be shut down by cybercriminals or an EMP attack.Steven can be seen on many news shows, and we plan to have him back on Do You Ever Wonder soon to cover the rest of the issues facing the country!___________________________________________________Please subscribe to Do You Ever Wonder using the two links below, and don't be shy about sharing the links with your friends.Subscribe to Do You Ever Wonder on YouTube here:  https://www.youtube.com/channel/UCzmL4Yaump_9Q7tMSChDoUQSubscribe on your favorite streaming platform here: https://areyouwondering.buzzsprout.com/shareDo you have a great story to tell?Are you interested in appearing as a guest on the Do You Ever Wonder podcast? Let Mike Haltman know at mhaltman@hallmarkabstractllc.com.The Do You Ever Wonder podcast is brought to you by New York title insurance provider Hallmark Abstract Service, and hosted by its CEO Mike Haltman._______________________________________________Hallmark Abstract Service...You Buy Real Estate, We Protect It!Questions about the podcast, NY title insurance, or the RE transaction process? Let Hallmark Abstract Service know at (646) 741-6101 or at info@hallmarkabstractllc.com.

SpyTalk
Can Anyone Stop Cyber Terrorism?

SpyTalk

Play Episode Listen Later Sep 22, 2023 32:47


This week Jeff talks cybersecurity with Michael Mestrovich, the former director of the CIA's Technical Services Office; former Principal Deputy Chief Information Officer for the U.S. Department of State, and current Chief Information Security Officer at Rubrik.Michael Mestrovich | LinkedInRubrik LeadershipRubrik a Multi-Cloud Data Control CompanyFollow Jeff Stein on Twitter:https://twitter.com/SpyTalkerFollow SpyTalk on Twitter:https://twitter.com/talk_spySubscribe to SpyTalk on Substackhttps://www.spytalk.co/Take our listener survey where you can give us feedback, too.http://survey.podtrac.com/start-survey.aspx?pubid=BffJOlI7qQcF&ver=short

Speaking of Writers
Danielle Spencer- Digital Assassins: Surviving Cyberterrorism and a Digital Assassination Attempt

Speaking of Writers

Play Episode Listen Later Aug 30, 2023 14:21


This book documents events experienced after becoming a Whistleblower against the most powerful debt collection organization in the world. Using fictional characters and conversations, this story exposes efforts to cause financial, emotional, and mental harm to me, my family, and my friends. Tactics such as privacy violations, illegal monitoring and surveillance, misuse of government records, and violation of trusted agreements with third-party banking, healthcare, credit, government officials and data are exploited by this institution to achieve their goal. About The Author: I am a senior leader with over 20 years of experience focused on business, finance, and acquisition management. I'm a change agent; transforming and improving business operations and processes. I have two Masters degrees in Business Administration and Information Systems, and a Bachelor of Science degree in Medical and Research Technology. I am also certified in Information Assurance (cybersecurity) and Project Management. I am by no means ignorant or naive. For several years, I worked for the Federal government with no problems, until I decided to take a stand against corruption. I did not know that taking on this new role would also mean a new title - a Whistleblower. You can puchase a copy of the book here: https://www.writersrepublic.com/bookshop/digital-assassins-surviving-cyberterrorism-and-digital-assassination-attempt --- Support this podcast: https://podcasters.spotify.com/pod/show/steve-richards/support

Negotiations Ninja Podcast
Dissecting Cyberterrorism Negotiation, Throwback with Cal Chrustie, Ep #368

Negotiations Ninja Podcast

Play Episode Listen Later Jun 15, 2023 34:52


Cyberterrorism is becoming prevalent. Highly intelligent criminals associated with cartels and sovereign nations like North Korea, China, Russia, etc. are mining for any data they can find. State actors take data and leverage it however they please, without conscience. That's why cyberterrorism negotiation is becoming part of the negotiation conversation. Everyday businesses and even healthcare organizations need to be adequately prepared. Learn what that looks like in this throwback episode with Cal Chrustie (who spent 33 years with the Canadian Federal Police negotiating kidnaps and extortions).

Political Bites
Political Bites: Cyberterrorism

Political Bites

Play Episode Listen Later May 1, 2023 37:06


Political Bites, the School of Politics and IR podcast, has returned. Joining our new interviewees - Ramsha Ashraf and Sushila Pandit - is Dr Gareth Moss, Lecturer in Security and Intelligence. In this edition, Gareth talks about 'Cybersecurity'.Find out more about the School:https://www.kent.ac.uk/politics-international-relationsTwitter:@UniKentPoliticshttps://twitter.com/UniKentPoliticsInstagram:@unikentpolirhttps://www.instagram.com/unikentpolir/ Hosted on Acast. See acast.com/privacy for more information.

Reimagining Cyber
EXTRA! Ransomware: The Good, The Bad, and The Ugly

Reimagining Cyber

Play Episode Listen Later Feb 15, 2023 14:49 Transcription Available


It's been a mixed few weeks if you are in the ransomware game. (If you listen to this podcast we presume you are not a cybercriminal, but do get in touch if you are and leave us your full contact details).In this episode Rob and Stan look at the hacks that have made the headlines and suggest what can be done to stop it happening to you.First up for discussion is ransomware-as-a-service malware LockBit hitting ION Trading UK:“It left scores of brokers unable to process derivative trades and they had to resort to manual methods. Imagine them going back to using spreadsheets to figure out what's going on as far as their trades”LockBit threatened to publish stolen data unless a ransom was paid and ION Trading did as they were told. Rob and Stan talk about the incident and the potential repercussions.The episode also looks at a ransomware campaign targeting VMware ESXi technology:“It's a previously known vulnerability. It's been out there for two years. But the reality is that organizations have been slow in patching it. There was a general warning put out by Italy's National Cybersecurity Agency, warning about a large-scale campaign now exploiting this vulnerability. Thousands of computer servers across Europe and North America could potentially be impacted. And this context is, well if you're not going to patch, we'll take a advantage of that”But there's also been bad news for the threat actors.Rob and Stan give their take on the sabotaging of the Hive ransomware group by the FBI and other law enforcement agencies.“This take down shows that international enforcement against ransomware threat actors is increasing. I think this is a good sign. It may make it more difficult for some of these entities to target organizations in the future, but, they're still ongoing and so it's going to be difficult to truly mitigate this threat if you can't reach those that are behind it.”There are call backs to other relevant episodes of the Reimagining Cyber podcast:Episode 12, Brett Thorson, Colonial Pipeline fuels the fire: not the first, not the last, and how to protect for the futurewww.buzzsprout.com/2004238/10791017Episode 2, Jim Routh, Unconventional approaches to improve enterprise resiliencewww.buzzsprout.com/2004238/10791027Episode 27, Shawn Tuma Cyber insurance in the wake of Log4jwww.buzzsprout.com/2004238/10791001Episode 15, Shawn Tuma – So you've been hacked, now what?www.buzzsprout.com/2004238/10791014Plus the Galaxy threat actors reporthttps://publications.cyberres.com/view/679673707/Rate and review the show on Apple Podcasts.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com

GANGS OF AMERICA STREETS OF AMERICA
#Iam1 Morning Update: Gang Stalkers Liars Cheats & Theives Cyber Terrorism Security Breach Update

GANGS OF AMERICA STREETS OF AMERICA

Play Episode Listen Later Feb 1, 2023 4:40


This is 4.5-5 minute morning update on my current events the gang stalkers are torturing me and others with overnight. This is a whistle blowing event, and connecting to local and/or state government is not easy.   *PURPOSE OF THIS PODCAST IS TO CAST SPOT LIGHT ONTO THOSE RESPONSIBLE FOR THE CRIMES AGAINST HUMANITY AND OTHER ILLEGAL ACTIVITIES CONNECTED. THERE IS NO SOLE PURPOSE  OR INTENTION OF ANY SLANDER FROM MYSELF TOWARDS ANY NAMES OR INDIVIDUALS  NAMED BY THE SECRET SOCIETY MAFIA TASK FORCE.

Reimagining Cyber
EXTRA - State of Cyber 2023 review

Reimagining Cyber

Play Episode Listen Later Jan 25, 2023 18:28 Transcription Available


In this episode Rob talks about a recent event discussing the State of Cyber into 2023 Hosted by Dave DeWalt (founder & MD of NightDragon, one of the most successful business leaders in the cybersecurity industry) the event promised to take "a unique look at what products are really being adopted by cybersecurity buyers, what financial analysts are watching around skyrocketing valuations and what investors are watching for the next frontier of innovation. We'll also look at the state of the cyber talent gap, public-private partnership efforts and how CISOs are responding to the latest threats."Rob reacts to the thoughts of organisations such as EY, Kyndryl, Citi, Piper Sandler, AllegisCyber Capital, Team8, ForgePoint."What I took away as an extreme positive is the consistency of the CISOs on the panel, talking about how the shift in their approach and model is very much centered around how they're actually aligning with what the business needs from the cyber organization"[Regarding the Wall Street perspective] "2023 could be the biggest opportunity for investing in the cyber market because of what those returns are going to look like going forward, because the reality of the business delivering on what they market has to come to fruition.""The event and the timing of the event was very effective. The format of the event and the audience and the different segments and perspectives, I thought was a really nice balance."

Reimagining Cyber
EXTRA: FedRAMP, Software Supply Chain Guidance & API Security - New Year Updates!

Reimagining Cyber

Play Episode Listen Later Jan 18, 2023 15:25 Transcription Available


“I think with any metric, the FedRAMP program has been viewed as...."Listen to this edition of Reimagining Cyber EXTRA and find out what Rob and Stan think about FedRAMP.Firstly, what is it?!“[FedRAMP's] whole purpose is to provide a standardized government-wide approach to security assessment, authorization, and continuing monitoring of cloud products and services used by the federal government agencies.”Plus:- FedRAMPs codification into law via the National Defense Authorization Act (NDAA)- Action to making the process easier for vendors and agencies.- Establishment of the Federal Secure Cloud Advisory Committee – what is it, what's it for?- Why does the NDAA not make vendors provide a SBOM? Will this change?“The crystal ball is if you are a software supplier to the government, you have to be prepared in the future to be able to provide this kind of inventory of components that make up your software build. It's important to be able to react quickly to zero-days, to be able to understand what your software consists of to be able to mitigate open source security issues and risks”- Microsoft share how they manage supply chain risks with the Secure Supply Chain Consumption Framework (S2C2F). What does the OpenSSF think of it?“Everything that we're talking about in cyber always somehow turns itself back around to the software. The software supply chain is the common theme that we heard through last year. It's not going to slow down this year.”- The rise of APIs (application programming interface) as an attack surface

Reimagining Cyber
Energizing Cybersecurity: National Lab Perspective - "We got very good at testing things to failure"

Reimagining Cyber

Play Episode Listen Later Jan 11, 2023 25:11 Transcription Available


"We got very good at testing things to failure" Virginia “Ginger” Wright is the Energy Cybersecurity Portfolio Manager for Idaho National Laboratory's Cybercore division within its National and Homeland Security directorate. She leads programs focused on cybersecurity and resilience of critical infrastructure for the Department of Energy, DARPA [Defense Advanced Research Projects Agency] and other government agencies. Her recent research areas include cyber supply chain for operational technology components,  instant response, critical infrastructure modeling and simulation and nuclear cybersecurity. Some quotes from this episode:"Idaho National Laboratory is the only national laboratory that is focused on nuclear energy. Part of that legacy was in testing what are today normal commercial nuclear installations and understanding where the boundaries of either operational resilience were, or the boundaries of particular material and installation methods that would cause that infrastructure to fail. We have, of course, taken that ability to turn things into failure and use that to develop our own adversary guided thinking about defensive cybersecurity.""In the energy infrastructure, we have devices that are in regular use today that are decades old. In the IT world, I have Patch Tuesday where every week my critical infrastructure is updated. Then after about three years. I toss it and I get another one that is completely and wholly built on the more modern incarnation of technology.  When we think about operational technology, applications, energy or water, we certainly can't re-engineer those systems on that cycle of replacement. So often we may not be able to patch or the technology that we are using is so old that the vendor is now no longer supporting patches.""I think a lot of engineers understand materials that they build with. They understand wood,  concrete,  but they don't often get taught to think about digital systems in the same way they think about materials -  that these systems have stress points and failure points and they can be trusted to a certain level but after that we need to build protections into our system to protect us from the ways that they can fail or be brought to failure by an adversary"

Trust Issues
EP 18 - Why Protecting Critical Infrastructure is Critical in 2023

Trust Issues

Play Episode Listen Later Jan 5, 2023 37:40


We're starting the new year with a conversation focused on securing critical infrastructure. The issue, of course, is that we're seeing increased threats and cyberattacks on critical infrastructure. Not to mention the war in Ukraine. This collective threat is a rallying point, bringing together cyber professionals from around the world, as well as their respective countries. On today's episode, host David Puner talks with David Higgins, who's a Senior Director in CyberArk‘s Field Technology Office, about how the critical infrastructure landscape has changed, its global implications and how cyber protectors have had to adapt.

Reimagining Cyber
A Christmas Gift - "Our cyber life cannot be attached to the whims of politics"

Reimagining Cyber

Play Episode Listen Later Dec 28, 2022 33:20 Transcription Available


"The major issue that we typically have is on The Hill. For years, we've seen bills coming out, which specified a direction of left or right or up the middle, and nothing happens. That leads a lot of us sceptics to believe that people on The Hill who are being funded by the largest tech companies don't move because it's not financially viable for their future campaigns. Our cyber life cannot be attached to the whims of politics. "Rob and Stan are taking a well earned festive break, they'll be back in the new year.So we've decided to do some Christmas re-gifting and dust down a terrific episode from a couple of years ago.It features Michael Echols, CEO of MAX Cybersecurity, LLC and author of 'Secure Cyber Life: The Government Is Not Coming To Save You'As you will hear, Michael is passionate about his subject  and has conclusions that you could find rather disturbing.In other words, perfect for a podcast episode.Do share the reimagining cyber podcast with those who you think will find it useful, and if you use apple leave us a review. It really helps spread the word.We'll be back in 2023 with more great guests.

GentleMan Style Podcast-God, Family, Finance, Self
Privacy vs. Security - What is More Important to You? The Life of a Super Spy

GentleMan Style Podcast-God, Family, Finance, Self

Play Episode Listen Later Nov 9, 2022 46:10


Watch This Interview Live: Click Here Karim has been at the forefront of attacker counterintelligence and infiltration research for the last decade, developing new ways for security teams to clandestinely monitor hackers and anticipate attacks before they happen. Prior to launching Prevailion, Karim was the founder/CEO of Unveillance, an early pioneer in advanced threat intelligence and the first cloud-based data leak intelligence platform. Karim successfully exited Unveillance in 2012 with an acquisition by Mandiant, and he was then appointed as Mandiant's new director of intelligence. While at Mandiant, Karim played an important role in that company's well-known APT1 report released in 2013, which definitively linked the People's Liberation Army of China to widespread cyber espionage activity against US interests. Mandiant was acquired by FireEye soon after. Over the years, Karim has served as a cybersecurity industry source for many prominent news outlets, including CNN, Fox News, Washington Post, The New York Times, Forbes, CyberScoop and many more. Before devoting his work full-time to defense and intelligence product development, Karim served as founder at Demiurge Consulting, a counterintelligence and countermeasure consultancy whose clients and collaborations included Coca-Cola, TSYS, Baker Botts LLP, McKesson, Palantir, MIT, Berkeley and Stanford Universities. Do you or someone you love Not lasting as long as they should in the bedroom?

Reimagining Cyber
Inside cybercrime with Raveed Laeb

Reimagining Cyber

Play Episode Listen Later Sep 19, 2022 23:36


Raveed Laeb, Vice President of Product for KELA (pronounced Kay-la), a cyber intelligence technology company, gives us a behind-the-curtain view of the world of cybercriminals in the latest Reimagining Cyber episode, “Inside cybercrime with Raveed Laeb.” 

Reimagining Cyber
Under the hood of cyber insurance

Reimagining Cyber

Play Episode Listen Later Sep 13, 2022 23:16


Dan Bowden, CISO at Marsh, gives us an under-the-hood view of how insurance companies mitigate cyber risk, thinks they look for, and how they support their clients, in this week's Reimagining Cyber episode, “Under the hood of cyber insurance"

WBAP Morning News Podcast
WBAP Morning News: Cyber Terrorism Expert Morgan Wright on Cyber Security

WBAP Morning News Podcast

Play Episode Listen Later Aug 4, 2022 5:05


Morgan Wright is a cyber terrorism expert and former US Dept. Anti-Terrorism program senior advisor. He talks with Ernie and Carla about Cyber Security and evil cyber actors in the world.See omnystudio.com/listener for privacy information.

To Catch a Fraudster
A former FBI Special Agent and CIA Cyber-Operations Officer discusses IT security and cyber terrorism

To Catch a Fraudster

Play Episode Listen Later Jun 14, 2022 34:35


Dan Woods, ex-CIA and FBI and current Head of Global Intelligence at F5, shares his stories of IT security, cyber terrorism, gives his best advice for how to get business and fraud teams to work together to protect businesses and customers, and recounts the heartbreaking and untimely demise of his 'Santa Claus' beard.Bonus show notes: You can see Dan's fierce beard here.

BlockSolid with Yael Tamar
Episode 34: Changing the Way Cybersecurity is Delivered: A conversation with David Carvalho

BlockSolid with Yael Tamar

Play Episode Listen Later Mar 30, 2022 31:56


In this episode, I had the great pleasure of having David Carvalho join as my guest speaker. David Carvalho is currently the CEO of Naoris, the world's first distributed Cybersecurity mesh. He advises various nation-states and national highly regulated environments on the critical areas of Cyber Espionage, Cyber War, and Cyber Terrorism. David advised a large number of crypto and cyber-security projects, from startups to multi-billion dollar businesses and nation-state level projects.

Alabama's Morning News with JT
Morgan Wright 032422

Alabama's Morning News with JT

Play Episode Listen Later Mar 24, 2022 5:01


Cyberterrorism Analyst Morgan Wright talks about what the FBI is seeing as far as Russian hacker interest in US energy firms.

CarahCast: Podcasts on Technology in the Public Sector
Operation Work Safer: Eliminate Threats and Protect Against Cyber Terrorism with Google Cloud

CarahCast: Podcasts on Technology in the Public Sector

Play Episode Listen Later Mar 18, 2022 42:09


Google is bringing the best of their products and cybersecurity partners to help protect against malware, phishing, ransomware, and other cyberattacks. Google Cloud's Work Safer program enables public sector organizations to securely collaborate and communicate in hybrid work environments.

STEM Southwest Podcast
080 Entrepreneurial Excellence through Perseverance, with Dr. Srinivas Mukkamala

STEM Southwest Podcast

Play Episode Listen Later Jan 30, 2022 61:39


What started with a class project led to an entrepreneurial journey and innovation in the informational technology company, RiskSense.  Today's guest, Dr. Srinivas Mukkamala, openly shares the challenges and victories of his amazing race.  In 2021, Ivanti acquired his company and he now serves as Senior Vice President of Security Products.  Sri impressed Shelly while openly sharing his journey during a keynote presentation at the New Mexico Technology Council Experience IT Conference in 2021.  There is a lot to unpack in this episode so let's get started! Show Notes Watch episode here Dr. Srinivas Mukkamala is Senior Vice President of Security Products for Ivanti.  He was the founder and CEO for RiskSense until Ivanti acquired the company in August 2021.  He is a recognized authority in the artificial intelligence (AI) and neural networks communities and was part of a think tank that collaborated with the U.S. Department of Defense on applying these concepts to cybersecurity problems.  Dr. Mukkamala is responsible for Product Management for all Ivanti Security products and will continue to drive innovation in integrated security solutions across all company pillars: ITSM, Security, and UEM. Dr. Mukkamala was also a lead researcher for CACTUS (Computational Analysis of Cyber Terrorism against the U.S.) and holds a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing. Dr. Mukkamala holds a PhD of Philosophy and a Master of Science degree from New Mexico Institute of Mining and Technology. New Mexico Tech Indian Space Research Organisation RiskSense Ivanti   Battling Bots League (Be Greater Than Average and Electric Playhouse partnership) Robot Rumble (in partnership with Cottonwood Mall) Be Greater Than Average Gift of Learning Be Greater Than Average Courses Be Greater Than Average Family Fun! Be Greater Than Average A Semester of STEM Activities E-Book   Contact: Dr. Srinivas Mukkamala Linkedin

Alabama's Morning News with JT
Morgan Wright 120721

Alabama's Morning News with JT

Play Episode Listen Later Dec 7, 2021 5:23


Cyberterrorism analyst Morgan Wright talks about the FBI email system getting hacked to send out fake cyber security alerts to thousands

GANGS OF AMERICA STREETS OF AMERICA
I hear Gang Stalkers; You Can Too; ALSO CYBER TERRORISM PROOF telecommunications fraud

GANGS OF AMERICA STREETS OF AMERICA

Play Episode Listen Later Nov 27, 2021 19:16


this was a YouTube livestream broadcast be sure to listen through all the way to the end and pretty sure after 12 minutes you'll be able to hear their voice coming through the frequency and hum of the motor on the furnace.  Also video proof of their attacks against everyone's computer and internet connections as well as explanations of the MITM ( Man-in-the-middle cyber attacks plaguing the world. Check out the blog for a link to shared iCloud photos

The Institute of World Politics
Cyber Terrorism: Current Threats and Responses

The Institute of World Politics

Play Episode Listen Later Nov 9, 2021 44:08


Prof. Paul Davis gave a talk on "Cyber Terrorism: Current Threats and Responses" at IWP's annual Chancellor's Council Meeting, which was held on October 27, 2021 at the Mayflower Hotel. Prof. Davis is an Adjunct Professor at IWP, Vice President of Government Business Development for SecureDAM, and Founder and President of JANUS Think. At IWP, he teaches Cyber Terrorism and Intelligence (IWP 692). Learn more about joining the Chancellor's Council: https://www.iwp.edu/donate/chancellors-council/

Expanding your Faith
USCA abuse, Harassment, Bullying and cyber terrorism and more

Expanding your Faith

Play Episode Listen Later Nov 7, 2021 55:52


Tonight we talk about the abusive environment at the University of South Carolina in Aiken, an update on the cyber terrorist and other interesting topics. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app

Bloomdaddy On Demand
Bloomdaddy 10-25-21 Hour 3 Pt 1 Morgan Wright, Cyberterrorism Analyst; NBC's Michael Bower

Bloomdaddy On Demand

Play Episode Listen Later Oct 25, 2021 24:01


Bloomdaddy On Demand
Bloomdaddy 10-25-21 Hour 3 Pt 1 Morgan Wright, Cyberterrorism Analyst; NBC's Michael Bower

Bloomdaddy On Demand

Play Episode Listen Later Oct 25, 2021 24:01


The Get CyBUr Smart Podcast
The Get CyBUr Smart Podcast Ep: 7 - The Cyber Terrorism Threat

The Get CyBUr Smart Podcast

Play Episode Listen Later Oct 13, 2021 8:56


In this episode of the Get CyBUr Smart podcast I explain the Cyber Terrorism threat. What it mean, the severity of the threat, and how to recognize it when you see it. Give a listen tell a friend. Get a little CyBUr Smarter, get a whole lot cyber safer. Feel free to email me at darren@cybursmart.com

No Password Required
Winn Schwartau – an infowar expert who was almost certainly the first to pave the path from rock-and-roll to cybersecurity

No Password Required

Play Episode Listen Later Oct 8, 2021 71:28


Winn Schwartau is a security, privacy, infowar, and cyber-terrorism expert who has been paving the way in cybersecurity since 1983. He is often referred to as the “Civilian Architect of Information Warfare” and is known for his straight-shooting, no-BS originality. In this episode, Winn joins the No Password Required team to talk about how he went from the world of rock-and-roll to cybersecurity, times when he pissed off the CIA, and why Louis Armstrong wasn't the best teacher he ever had (you read that right!) Ernie, Clabby, and Pablo talk about the reality of cybersecurity policies and employee training. In the Positively Cyber segment, Pablo introduces Snoop Dogg as the Dark Net Intelligence Analyst of our fictitious organization.

Global Connections Television Podcast
Dr. John Arquilla: "Bitskrieg: The Challenge of Cyberwarfare”

Global Connections Television Podcast

Play Episode Listen Later Sep 13, 2021 27:13


Dr. John Arquilla, Distinguished Professor Emeritus of Defense Analysis at the U.S. Naval Postgraduate School, highlights his recent book titled “Bitskrieg: The Challenge of Cyberwarfare,”  and explains the importance of confronting cybersecurity threats  and a potentially emerging international  “Cool Cyber War” that could spiral out of control.

SAE Tomorrow Today
72. Protection from Global Threats: Cyber Terrorism & Personal Security with Bryan Hurd

SAE Tomorrow Today

Play Episode Listen Later Aug 26, 2021 46:00


Imagine living in a world where everyone knows your name. Our world is becoming more and more connected every day. Ask yourself: if you were a high-profile individual, how would you keep your data secure? What if your day-to-day safety was at risk? Are there bad actors that would be able to take control of your finances or your business? . These are the questions that keep Bryan Hurd up at night. As Chief of Office in Seattle for Aon's Cyber Solutions, Hurd and the team help corporations, individuals, and their families stay safe from cyber terrorism and threats using special security details, organizational education, and more. .  To learn more about the work from the team at Aon, head to https://www.aon.com/cyber-solutions and follow Bryan Hurd on LinkedIn (https://www.linkedin.com/in/bryanhurd/). . Interested in staying updated on emerging news and trends that influence transportation and mobility? Have SAE SmartBrief delivered straight to your inbox using the following link: https://bit.ly/SAE_podcast . Liked the episode? Drop us a review and click the bell to subscribe on your favorite podcasting platform. Bookmark SAE Tomorrow Today at https://www.sae.org/podcasts/tomorrow-today to dive deeper into the work being done by our guests and check out the video and bonus features. Help us become even better by sending ideas for future guests and topics by tagging us on LinkedIn. . Follow SAE on LinkedIn, Instagram, Facebook, Twitter, and YouTube. Follow host Grayson Brulte on LinkedIn, Twitter, and Instagram.

Fresh Take with Josh Dukelow
Rising Murder Rates, Make the Ride Happen & Global Threats

Fresh Take with Josh Dukelow

Play Episode Listen Later Jul 12, 2021 99:01


(00:00) Local News Chat: Peshtigo Drowning & LU Trail (18:00) Your Take on Responses to Rising Murder Rates (39:10) Holly Keenen, Mobility Mgr, Make The Ride Happen (56:40) Prof Art Cyr Weighs Strategic Threats to America (1:31:20) The Takeaway: What Do We Owe Afghanistan?

InSecurity
Scott Scheferman: Is Ransomware about Money, Power or Leverage?

InSecurity

Play Episode Listen Later Jun 28, 2021 79:46


-- Photo credit: Huss Harden   When you lived on the wrong side of the law, information, however vague or apparently meaningless, was everything. It gave you leverage. And leverage was power  -- Top Dog; 2014, written by Dougie Brimson   Ransomware is the biggest buzzword in the news right now, and rightfully so. You can't turn on a network police procedural without someone getting extorted for $100,000 in Bitcoin. But are the news agencies getting the story completely accurate? Yes, the money is always a nice prize to take home, but there is a larger looming question out there… What are these ransomware attacks really all about?   Matt Stephenson welcomes Eclypsium Chief Strategist Scott Scheferman to the No Name Security podcast for a long overdue discussion on the impact of ransomware on the overall approach of the cybersecurity industry and those who rely on us for defense, protection and prevention. After fighting the good fight together at Cylance, Scott finally joins Matt for a chat about all the bad things the bad guys are getting up to… the mistakes the good guys tend to make… and how we can fix them in order to protect those who really need it.   About Scott Scheferman   Scott Scheferman (@transhackerism) is the founder of Armanda Intelligence, LLC, with a mission of providing CxO/board advisement, strategy and threat intelligence.  He is also Principal Strategist for Eclypsium, Inc. Scott keeps a hyper-current beat on the threat landscape and how it continues to fundamentally change business and mission cyber risk dynamics. Battle-hardened from years of red-teaming, incident response and cyber consulting, as well as having served as the technical lead and final security risk determination for the Navy's Certification Authority (thousands of systems per year, with over 800 validators and 30 risk analysts feeding these risk determinations), Scott draws his perspective from significant real-world high-stakes (multi-billion dollar programs and Fortune 10 enterprise) experience. If you want the truth about what is happening in the world of cybersecurity, Scott is a voice you want to be listening to. If you can't handle the truth… he may not be your guy… but that doesn't mean he won't keep telling it.   About Matt Stephenson Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well.   In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know...   Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy.   Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round...   If you tuned in to any of my previous podcasts, there's great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We're still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts!   Make sure you Subscribe, Rate and Review!

Heart of Texas Podcast
Episode 47: Cyberterrorism, MLB Substance Issue, Killer Tinder Date, & Recommendations

Heart of Texas Podcast

Play Episode Listen Later Jun 25, 2021 55:08


They boys have a very special guest: Will Gupton a.k.a Willy G, a.k.a Will from Waco, in the studio. This weeks topics range from cyberterrorism, to the MLB, and even the online dating app, Tinder. Follow us on our social media (twitter/facebook/instagram): @HeartOfTexasPod For business inquiries or sponsorships please email: blake.v.palmer@gmail.com All Rights Reserved. Explicit Content

Thought to Action
Ep 36: Why Protecting Our Critical #Infrastructure Matters and How to Get Politicians to Pay Attention

Thought to Action

Play Episode Listen Later Jun 25, 2021 22:46


President Biden and Congressional Democrats are still trying to push an extremely expensive spending package disguised as an "infrastructure" bill aiming a plethora of funds toward Federal Universal Pre-K, Child Care and Free Community College tuition, there is little to no financial attention toward protecting the nation's national power grid and critical infrastructure. As Congressional Moderates are working on a bipartisan agreement, those on the farther side of the Left continue to clamor for the Trojan Horse provisions in the Biden Infrastructure Plan which could easily be proposed in a separate bill subject to Congressional debate. Still, there is no money or media attention paid to the need to prepare for potential cyber attacks, EMP attacks or CME event. On this installment of Thought to Action, London Center for Policy Research Senior Fellow LTC (British Army, Retired) and Distinguished Fellow Navy Capt. (Retired) Pete O'Brien go in-depth as to why we need to protect our critical infrastructure, preparing for interruptions to our grid as individuals and how to get politicians to pay significant attention to this issue. Thank you for watching; please feel free to comment, share and subscribe.Or, please feel free to make a contribution here: paypal.com/us/fundraiser/charity/1338653 Thought to Action is presented by the London Center for Policy Research https://www.londoncenter.org​Tim Wilson is a Senior Fellow at the London Center for Policy Research, a retired Lt. Col. in the British Army and leader of the LCPR 2nd Amendment Project. https://www.londoncenter.org/fellows/...Peter O'Brien has more than 30 years of successful leadership and planning experience in a wide range of organizations afloat and ashore on three continents. Mr. O'Brien's Navy career included ten years at sea, more than a dozen years stationed overseas and multiple deployments in actions across the operational spectrum, providing the opportunity to study, practice and execute the widest possible of leadership and planning skills. He has particpated in planning and execution of military operations from the tactical to the strategic level in the Middle East, North Africa and East Asia

Scott Adams Show on Red State Talk Radio
061821 Podcast, SCOTUS ACA, Vaccine Passports, COVID Bio-Weapon, Green Initiative Cyber Terrorism

Scott Adams Show on Red State Talk Radio

Play Episode Listen Later Jun 21, 2021 55:04


061821 Podcast, SCOTUS ACA Decision, Vaccine Passports, COVID Bio-Weapon, Green Initiative Cyber Terrorism

That's On Point!
Clip: Stop Capitulating to Cyber-Terrorism

That's On Point!

Play Episode Listen Later Jun 8, 2021 6:41


Welcome back, you, Inglorious Bastards, and Magnificent Bitches to Doc's Thought of the Day Your daily test of the Emergency Podcast System. Here is a clip from the last podcast. Today we discuss the need to stop capitulating to terrorism.Website - https://thatsonpoint.squarespace.com/Follow Us On;Bitchute-https://www.bitchute.com/channel/8SXcz1rqDyu7/YouTube-https://www.youtube.com/channel/UCRNHroldv9kuaatarS7uclAMinds-https://www.minds.com/thatsonpoint/ToP Clips: https://www.youtube.com/channel/UCn_fZ4JhHN05YLijsdmkYSQ/Paler:https://parler.com/profile/DocComeauSupport Us On;Subscribe Star-https://www.subscribestar.com/that-s-on-pointPatreon-https://www.patreon.com/ThatsOnPoint?fan_landing=true

Cyber Work
Working as a cybersecurity researcher and industry analyst | Cyber Work Podcast

Cyber Work

Play Episode Listen Later Jun 7, 2021 53:30


French Caldwell of The Analyst Syndicate talks about his role as founder and chief researcher of the group. We also talk about Caldwell's time at Gartner research, and his passion for cybersecurity research as a whole. 00:00 - Intro 03:43 - Caldwell's background in cybersecurity 07:25 - Knowledge management09:55 - Protecting digital trash 12:33 - Risk assessment and day-to-day work life18:00 - How has research changed since 1999?22:48 - Founding The Analyst Syndicate 26:45 - What is your day like at the Syndicate?28:11 - What is your research like now?29:33 - Disruptive technology and public policy31:09 - Disruptive trends34:30 - Advice to students in disruptive technologies38:58 - Tell us about your simulator46:22 - Cyberterrorism and risk to municipalities and hospitals50:18 - Learn more about Caldwell and the Syndicate51:54 - OutroLearn cybersecurity for free with our new hands-on Cyber Work Applied series. Whether you want to learn how cross-site scripting attacks work, set up a man-in-the-middle attack or walk through major breaches like Equifax, Infosec instructors will teach you these skills and show you how they apply to real-world scenarios.  Best of all — it's free!– Learn cybersecurity with our FREE Cyber Work Applied training series: https://www.infosecinstitute.com/learn/– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcastFrench Caldwell is the leading strategist and thought leader in RegTech, including GRC and ESG, cybersecurity, social and digital risks and regulation and the impact of disruptive technologies on policy and strategy. He is a former Gartner Fellow, and following Gartner he became the global head of marketing at a Silicon Valley firm that delivers regtech solutions for governance, risk and compliance analytics and reporting. Skilled at the alignment of strategy, communications, technology, processes, analysis, policy and people to improve business and mission outcomes. Experienced at advising senior executives and corporate directors on disruptive technology, strategic risk management, cybersecurity and public policy issues.About InfosecInfosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with  skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. It's our mission to equip all organizations and individuals with the know-how and confidence to outsmart cybercrime. Learn more at infosecinstitute.com.

I'd Rather Be Right with Luc & Nate
This Was Supposed to Be a Book Report: Bitcoin, Beer, Reflexivity, Technology, Cyber Terrorism, Aliens, Lies, Dating, Epstein, Nate's Personal Nemesis Anthony Fauci, and Covid Vaccines and Masks

I'd Rather Be Right with Luc & Nate

Play Episode Listen Later Jun 3, 2021 120:30


First, this was supposed to be a book report. It largely wasn't. Right out of the gate, we introduce our special guest, Jill (last name unknown to protect the guilty and innocent alike). Then we hit some Bitcoin updates including updates from both Apple, PayPal, and the Bitcoin Miami conference. This leads to a discussion on beer, why some cities have a great beer scenes, and others don‘t. We discuss an idea Nate has for a club and what makes for good nightlife scenes. Then eventually we get to The Alchemy of Finance. Of course, this being Nathan, he brings it back to Bitcoin and other digressions. With some help from Jill we actually get back to the book for a bit. This also leads to a discussion about one of our favorite topics, what the future might look like. This leads to a discussion on ransomware, cyber terrorism, and the importance of CISA. Then we get into how Luc is both younger and more adult than both Jill and Nate and whether Nate wants a family. Then we get into a question that Jill's fiancée had on aliens and we revisit the UFO episode for another possible scenario that is a hybrid of two we talked about in the previous episode. This leads to a discussion the government used subterfuge in WWII and the discussion on subterfuge leads to whether we could do different jobs such as being a spy, whether spies are good people, and the different types of lying. This leads to a conversation on honesty, full disclosure, and lies of omission in the context of dating. This goes into a larger conversation about dating. Then it's onto the real conspiracies around Jeffrey Epstein, why Anthony Fauci is Nate's personal nemesis, Covid vaccines and how they impact mask wearing. Also, please let us know if you'd like to hear from Jill once a quarter as she gives her female perspective on all of the things we got wrong. Book mentioned during the podcast: Bodyguard of Lies: The Extraordinary True Story Behind D-Day by Anthony Cave Brown --- Send in a voice message: https://anchor.fm/idratherberight/message

Criminal Justice Evolution Podcast  - Hosted by Patrick Fitzgibbons
CJ Evolution / January 4th / Episode 259 - Cybersecurity and Cyberterrorism Expert - Morgan Wright

Criminal Justice Evolution Podcast - Hosted by Patrick Fitzgibbons

Play Episode Listen Later Jan 5, 2019 46:10


Hello everyone and welcome back to episode 259. This is the first episode of 2019. The team at CJE hope you have a great 2019. Special thanks to all the brave men and women who work in the criminal justice field. Keep up the great work, and you have much support. The show continues to grow because of you the listener and supporter. If you would rate and review the podcast on iTunes the team would appreciate it. If you love coffee, which we know most of you do, you will love the coffee from Four Sigmatic. Head over to cjevolution.com and get 15% off your purchases using the promo code CJEVO. In this episode, Patrick welcomes back Morgan Wright. Morgan is an internationally recognized expert on cybersecurity strategy, cyber terrorism, identity theft and privacy. His landmark testimony before Congress on Healthcare.gov changed how the government collected personally identifiable information. He has made hundreds of appearances on national news, radio, print and web, and has spoken to audiences around the world. Patrick and Morgan talk about a variety of topics such as cybersecurity, the current state of law enforcement and challenges the profession may face in the future. A great episode. You can find Morgan here: https://www.morganwright.us/ Stay tuned for more great episodes. Patrick www.cjevolution.com    

Data Security and Privacy with the Privacy Professor
Cyber Terrorism Defense at Home and While Traveling

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Sep 18, 2018 56:58


There are growing numbers of cyber-attacks being launched by terrorists throughout the world against critical infrastructure networks not only within governments, but also within the healthcare, financial, utilities, and transportation industries, just to name a few. The US Department Homeland Security said during a 2018 9/11 memorial event that, ?The cyber threat has eclipsed the threat from physical terrorism.? What is cyber terrorism, and how do cyber terrorists choose their victims? What factors lead to cyber terrorists targeting travelers? How can you keep cyber terrorists from your data and systems? How can data security be used during hostage situations? Listen to Tom Conley is President & CEO of The Conley Group, discuss the answers to these questions, and other issues related to domestic and international terrorism and travel security.

Malicious Life
Cyber Terrorism

Malicious Life

Play Episode Listen Later Feb 21, 2018 31:22


What governments and powerful organizations regularly use, others will find ways to use as well. Cyber activity fits so incredibly well with terrorism. Actors can remain hidden, or reveal themselves to the world; Create propaganda campaign, or aim for real damage. Join us on this episode of Malicious Life, as we learn the story of […] The post Cyber Terrorism appeared first on Malicious Life.Advertising Inquiries: https://redcircle.com/brands

Criminal Justice Evolution Podcast  - Hosted by Patrick Fitzgibbons
CJ Evolution / July 17th / Episode 118 - Cyberterrorism & Cybercrime expert Morgan Wright

Criminal Justice Evolution Podcast - Hosted by Patrick Fitzgibbons

Play Episode Listen Later Jul 17, 2017 37:00


Hello everyone and welcome back to episode 118. In this episode Patrick talks with Morgan Wrigt. Morgan is an internationally recognized expert on cybersecurity strategy, cyberterrorism, identity theft and privacy. His landmark testimony before Congress on Healthcare.gov changed how the government collected personally identifiable information. He has made hundreds of appearances on national news, radio, print and web, and has spoken to audiences around the world.  Enjoy this interview with a true American Hero.   You can find Morgan here: www.morganwright.us www.identitySecurity.com @morganwright_us   Patrick 

PI’s Declassified!
Cyber-Terrorism

PI’s Declassified!

Play Episode Listen Later Mar 26, 2015 56:12


Straight from the headlines…Breaking News! Another data breach! Millions of identities at risk! From Sony to Anthem, it has almost become a daily occurance. What are these companies who house our most vital information such as medical records, financial data, and all of our other personal information doing to protect all of us? Join PI's Declassified! to hear Risk Management Expert, Jeff Spivey, discuss this important topic and a service most major banks and major corporations use to combat this risk that happens beyond the firewall.

The Armstrong and Getty Show (Bingo)
Topics include: LAPD killed homeless man, Lumber Liquidators 60 Minutes, laminate wood formaldehyde, Wicked Tuna Bobby Flay, Marshawn Lynch, Melanie Griffith, James Clapper, cyberterrorism

The Armstrong and Getty Show (Bingo)

Play Episode Listen Later Mar 2, 2015


1 - LAPD shot and killed a homeless man and there's video of it!; 60 Minutes story on Lumber Liquidators selling laminate wood with formaldehyde; Joe watched Bobby Flay and a TV show called Wicked Tuna. 2 - Marshawn Lynch said to Turkish media that he was expecting the ball in the Super Bowl. 3 - Marshall's News. 4 - Melanie Griffith looks weird; James Clapper warned about cyberterrorism; Final Thoughts.

The Drill Down
353: The Enforcement Awakens

The Drill Down

Play Episode Listen Later Dec 5, 2014 79:31


This week, Black Friday sales are up, body cams for cops, more cellphone spying, Sony gets hacked (again), a monumental change for music charts, and Daleks are alive and well-- and we're building them. The Force is strong with this week's show...  What We're Playing With Andy, Dwayne & Tosin: Black Friday finds Headlines U.S. Thanksgiving, Black Friday Sales Break $1B; Total Holiday Spend Online Will Be $89B Netflix CEO Predicts Broadcast TV Will Die By 2030 FAA to propose rules on commercial drones Obama announces funding for 50,000 police body cameras Will they change anything? Audible Book of the Week How Star Wars Conquered the Universe: The Past, Present, and Future of a Multibillion Dollar Franchise by Chris Taylor Sign up at AudibleTrial.com/TheDrillDown Music Break: The Princess Appears from Star Wars by John Williams Hot Topics: Americans' Cellphones Targeted in Secret U.S. Spy Program Sony Pictures Hacked, All Computers Reportedly Unusable Unreleased Sony movies leak after hack; Sony may suspect North Korea Here's What We Know About North Korea's Cyberwar Army FBI warns of 'destructive' malware in wake of Sony attack Billboard Music Chart Marks First Major Change In 20 Years Music Break: The Emperor Confronts Luke/The Duel by John Williams Final Word Knightscope's Autonomous Robots Will Take on Security Jobs Normally Held by Humans South Korea bans Selfie sticks! The Drill Down Video of the Week Star Wars: The Force Awakens Official Teaser Subscribe! The Drill Down on iTunes (Subscribe now!) Add us on Stitcher! The Drill Down on Facebook The Drill Down on Twitter Geeks Of Doom's The Drill Down is a roundtable-style audio podcast where we discuss the most important issues of the week, in tech and on the web and how they affect us all. Hosts are Geeks of Doom contributor Andrew Sorcini (Mr. BabyMan), marketing research analyst Dwayne De Freitas, and Box tech consultant Tosin Onafowokan. Occasionally joining them is Startup Digest CTO Christopher Burnor.

The Drill Down
291: The Hero Gotham Deserves

The Drill Down

Play Episode Listen Later Aug 30, 2013 96:37


This week, it's cyberwar, as Syrian hackers attack the NYT, Steve Ballmer's out at Microsoft, Google takes design of the self-driving car into its own hands, Kevin Spacey dresses down traditional media, and the internet goes into a tizzy over casting the next Batman. What We're Playing With Andy: Oculus VR Dwayne: Pebble Headlines Syrian Electronic Army Apparently Hacks DNS Records Of Twitter, NYT Microsoft CEO Steve Ballmer to retire within 12 months Ballmer Departure From Microsoft Was More Sudden Than Portrayed Ballmer on his biggest regret, the next CEO and more Google Designing Its Own Self-Driving Car, Considers ‘Robo Taxi' Apple's iPhone ‘Reuse and Recycle' trade-in program detailed, begins rolling out August 30th First impressions: Hands-on with Nintendo 2DS Audible Book of the Week The Distraction Addiction by Alex Soojung-Kim Pang Sign up at AudibleTrial.com/TheDrillDown Music Break: Hold Me, Thrill me, Kiss Me, Kill Me by U2 Hot Topic: Ben Affleck is Batman Ben Affleck Is Batman Ben Affleck as Batman casting in 'Man of Steel' sequel sparks fan jeers, Hollywood cheers Patton Oswalt defends Batman casting More Details on Ben Affleck in Snyder's Superman/Batman Rumor: ‘Breaking Bad' Star Bryan Cranston To Play Lex Luthor In ‘Batman vs. Superman' Music Break: Spiritual High (Part III) by Moodswings Final Word 50th Anniversary of the March on Washington The Drill Down Video of the Week Kevin Spacey urges TV channels to give control to viewers Subscribe! The Drill Down on iTunes (Subscribe now!) Add us on Stitcher! The Drill Down on Facebook The Drill Down on Twitter Geeks Of Doom's The Drill Down is a roundtable-style audio podcast where we discuss the most important issues of the week, in tech and on the web and how they affect us all. Hosts are Geeks of Doom contributor Andrew Sorcini (Mr. BabyMan), marketing research analyst Dwayne De Freitas, and Startup Digest CTO Christopher Burnor. Occasionally joining them is Box tech consultant Tosin Onafowokan.