The protection of computer systems from theft or damage
POPULARITY
Categories
Morgan Stanley MUFG 's Japan Equity Strategist Sho Nakazawa talks about the sectors that are leading the current rebound of Japanese stocks and why these gains may be more than a cyclical shift.Read more insights from Morgan Stanley.----- Transcript -----Welcome to Thoughts on the Market. I'm Sho Nakazawa, Japan Equity Strategist at Morgan Stanley MUFG Securities.Today: How Japan's Takaichi administration could define Japan's stock market for years to come.It's Tuesday, March 17th, at 3 PM in Tokyo.Sanae Takaichi became Japan's first female prime minister on October 21, 2025. She leads a conservative administration that emphasizes defense spending and economic resilience. When Takaichi took office in February, this signaled the start of a structural pivot in Japan's economy. And markets have responded quickly. Over the past several months, stocks with high exposure to the administration's 17 strategic domains have outperformed TOPIX by 15 percentage points. That kind of divergence suggests something bigger than a cyclical rebound. Capital is positioned to a structural shift. First, there's the Japanese government's increased emphasis on economic security and supply chain resilience. This reflects a philosophical shift. For years efficiency ruled: just-in-time supply chains and global optimization. The pandemic and the reorientation towards a multipolar world changed that workflow. Now the emphasis is on redundancy and autonomy – and this has implications for Defense & Space, Advanced Materials & Critical Minerals, Shipbuilding, and Cybersecurity. The second pillar of Japan's structural market shift is AI and the compute revolution. Yes, some investors worry about overinvestment in AI, but we believe in [the] possibility of nonlinear returns as AI breakthroughs occur. And, keep in mind, AI isn't just software. It requires data-center cooling, communications networks, expanded power grids, and critical minerals. This is a full industrial stack upgrade. Looking further out, the global humanoid robotics market could reach US$7.5 trillion annually by 2050 according to our global robotics team estimates. That's roughly three times the combined 2024 revenue of the world's top 20 automakers at about US$2.5 trillion. The third force reshaping Japan's market is infrastructure. The 2026 budget slated towards national resilience initiatives exceeds ¥5 trillion. With aging infrastructure and intensifying natural disasters, resilience spending relates directly to economic security. Ports, logistics, and communications systems are increasingly becoming strategic assets. Our work suggests the long-term construction cycle is entering an expansion phase as bubble-era buildings from the late 1980s reach replacement timing. That points to durable demand rather than a temporary spike. With all of this said, what's also important is how stock market leadership spreads. It tends to move from upstream to downstream – from materials and power infrastructure, to AI, to defense and communications, and eventually to applications like drug discovery, quantum technologies, cybersecurity, and content. Right now, the strongest three-month returns are in Advanced Materials and Critical Minerals, and in Next-Gen Power and Grid Infrastructure. Meanwhile, areas like Cybersecurity and Content have lagged but remain tightly connected in the network. If leadership broadens, those linkages matter. The real constraint isn't political opposition. It's [the] market itself. If investors decide this is a temporary stimulus rather than sustainable earnings growth, valuations might adjust. But we do believe that Japan's equity market isn't simply rallying. It is reorganizing around economic security, AI infrastructure, and national resilience.Thanks for listening. If you enjoy Thoughts on the Market, please leave us a review wherever you listen and share the podcast with a friend and colleague today.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
/proxy/ URL scans with IP addresses https://isc.sans.edu/forums/diary/proxy+URL+scans+with+IP+addresses/32800/ Local Network Address Restrictions https://learn.microsoft.com/en-us/deployedge/ms-edge-local-network-access#how-to-mitigate-impact-for-cross-origin-iframes https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnote-stable-channel European Security Vendor Targeted by Hackers Fronting as Cisco Domain https://specopssoft.com/blog/phishing-campaign-cisco/
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SmartApeSG campaign uses ClickFix page to push Remcos RAT https://isc.sans.edu/diary/SmartApeSG%20campaign%20uses%20ClickFix%20page%20to%20push%20Remcos%20RAT/32796 A React-based phishing page with credential exfiltration via EmailJS https://isc.sans.edu/diary/32794 Google Chrome announced two zero-day fixes, then removed one. https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_12.html AdGuard Vulnerability https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.107.73
In this week's MBA Admissions podcast we began by discussing the current state of the MBA admissions season. We are now getting close to the end of the interview invite season for Round 2 as top MBA programs begin to release their final decisions. This upcoming week, IESE, UVA / Darden, Emory / Goizueta, Yale SOM, Dartmouth / Tuck, INSEAD, Georgetown / McDonough and Georgia / Terry are releasing their Round 2 decisions. A few MBA programs are also beginning their next admissions rounds, including Oxford / Said, Notre Dame / Mendoza, Imperial Business School, Emory / Goizueta and Johns Hopkins / Carey. Graham highlighted upcoming MBA webinar events. On Thursday, we are hosting a series of panel discussions focused on international students who are targeting the top MBA programs in the United States. On May 11, Clear Admit is hosting our in-person MBA Fair in Atlanta. We are also hosting several online Application Overview events in May. Signups for all of these events are here: https://www.clearadmit.com/events And finally, Clear Admit will also be livestreaming a “Decision Day Watch Party” on March 25, you can subscribe here: https://www.youtube.com/@ClearAdmitMBA In the news & notes section of the show, Graham mentioned an MBA admissions tip that focuses on the Round 2 wait list and showcased more entries from our Real Humans Alumni series. This week focuses on three alumni from Fuqua / Netflix, Haas / Google and Johnson / Deloitte. For this week, for the candidate profile review portion of the show, Alex selected two ApplyWire entries and one DecisionWire entry: This week's first MBA admissions candidate is seeking to pivot from banking to MBB consulting and wants to use an executive MBA program to make that pivot. This week's second MBA applicant appears to have a strong career in cybersecurity and wants to pivot to consulting in digital strategy. They still need to take the GRE. This week's final MBA candidate is deciding between Fuqua and Ross, and possibly Johnson too. This episode was recorded in Paris, France and Cornwall, England. It was produced and engineered by the fabulous Dennis Crowley in Philadelphia, USA. Thanks to all of you who've been joining us and please remember to rate and review this show wherever you listen!
What does it look like when a cybersecurity founder who built a $2.5 billion company decides to level up, again? Dean Sysman, co-founder of Axonius, sits down with Ron Eddings to pull back the curtain on what it really took to go from zero to $100M ARR in four and a half years, and what came next. Dean breaks down the founder mindset, the emotional weight of tying your identity to your company, and why he stepped into the Executive Chairman role while simultaneously pursuing a PhD in AI systems at Columbia University. He gets into how boxing taught him what solo performance reveals about leadership, why vulnerability is a non-negotiable skill at scale, and what it means to care about something bigger than yourself. This one hits differently if you're building, leading, or figuring out what your next chapter looks like. Impactful Moments 00:00 – Introduction 05:00 – Boxing for charity: raising $55K 08:00 – Competitive by nature, born to build 10:00 – Solo performance sharpens team leadership 13:00 – Axonius: zero to $100M ARR in 4.5 years 15:00 – Founder identity tied to company success 21:00 – Purpose bigger than yourself fuels resilience 25:00 – Self-awareness as the #1 growth tool 28:00 – Executive Chairman + Columbia PhD pursuit 33:00 – Ron's personal reflection on founder identity Links Connect with our guest, Dean Sysman, on LinkedIn: https://www.linkedin.com/in/deansysman/ Check out our upcoming events: https://www.hackervalley.com/livestreams Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Sensei Liam is back. He brought the subject of Strength and Power with him. We enjoyed it so much, we've added Part 2 for next week. Today's show focuses on the external applications. But, as usual, we're all over the map. One thing we do is refer to a couple of the other times Sensei Liam joined us. He was on in 2021 talking about the relationship between Obligation and Opportunity. Here it is in case you missed it:https://www.buzzsprout.com/477379/episodes/9763317One of my favorite episodes with Sensei Liam happened when he applied his Martial Arts to Cyber-Security. Here's that link:https://www.buzzsprout.com/477379/episodes/15836335Please get in touch. Sensei Liam added a quiz that is full of opinions. He wold love it if you shared your opinions!While you're in a giving mood, don't forget our link below - any amount is SO appreciated. Thanks in advance. Support the showThanks so much for listening and sharing the podcast with friends. Reach us all over the web. Facebook and twitter are simply wildcatdojo. However, insta is wildcatdojo conversations. (There's a story there.)On YouTube (where we are now airing some of our older episodes - complete with a slideshow that I tweak constantly) https://www.youtube.com/@wildcatdojo9869/podcastsAnd for our webpage, where you can also find all the episodes and see some info about the dojo: http://wildcatdojo.com/025-6/podcast.html . And of course, we love it when you support our sponsor Honor Athletics. Here is their link:https://honor-athletics.com/Thank you for listening.
Kory Daniels, Chief Security and Trust Officer at LevelBlue, discusses the multifaceted cybersecurity challenges in the healthcare industry and the risks posed by legacy systems not designed for secure internet connectivity. Artificial intelligence is being used successfully to defend against cyber attacks, while threat actors are using AI without ethical constraints to launch sophisticated attacks. Managing cybersecurity includes using digital twins to model vulnerabilities and to develop strategies for identity and access management for human and non-human identities, such as robots and AI agents. Kory explains, "We must recognize that we're not starting from a clean slate - we have a lot of decades-old systems operating both within the physical footprint of the healthcare and hospital facility and in record retention and data management. Many organizations are looking at how to get ahead in identifying what needs to happen to embrace new technology and much of the innovation. At the same time, being conscious and cognizant of opportunities to retrofit, taking what's there already today and making it internet-connected as an example, making it Internet of Things-connected so that devices that weren't purpose-built to communicate to the internet now can communicate to the internet, but it creates some risks and it poses some challenges." "We highlighted that some of these legacy systems or initial systems that have been in the organization for years, some 10 years or more, were not necessarily purpose-built or designed at the time of manufacturing, nor with the software needed for those tools to operate with current speed, expectations, and requirements. Healthcare entities are engaging both patients and supporting care doctors and patient care professionals in 2026 and beyond." #LevelBlue #HealthcareCybersecurity #DigitalTransformation #AIinHealthcare #LegacySystems #PatientSafety #CyberThreats #HealthTech #DataSecurity #MedicalDevices #DigitalHealth #HealthcareIT #CyberDefense #HealthcareInnovation #RiskManagement #ComplianceMatters LevelBlue.com Listen to the podcast here
Kory Daniels, Chief Security and Trust Officer at LevelBlue, discusses the multifaceted cybersecurity challenges in the healthcare industry and the risks posed by legacy systems not designed for secure internet connectivity. Artificial intelligence is being used successfully to defend against cyber attacks, while threat actors are using AI without ethical constraints to launch sophisticated attacks. Managing cybersecurity includes using digital twins to model vulnerabilities and to develop strategies for identity and access management for human and non-human identities, such as robots and AI agents. Kory explains, "We must recognize that we're not starting from a clean slate - we have a lot of decades-old systems operating both within the physical footprint of the healthcare and hospital facility and in record retention and data management. Many organizations are looking at how to get ahead in identifying what needs to happen to embrace new technology and much of the innovation. At the same time, being conscious and cognizant of opportunities to retrofit, taking what's there already today and making it internet-connected as an example, making it Internet of Things-connected so that devices that weren't purpose-built to communicate to the internet now can communicate to the internet, but it creates some risks and it poses some challenges." "We highlighted that some of these legacy systems or initial systems that have been in the organization for years, some 10 years or more, were not necessarily purpose-built or designed at the time of manufacturing, nor with the software needed for those tools to operate with current speed, expectations, and requirements. Healthcare entities are engaging both patients and supporting care doctors and patient care professionals in 2026 and beyond." #LevelBlue #HealthcareCybersecurity #DigitalTransformation #AIinHealthcare #LegacySystems #PatientSafety #CyberThreats #HealthTech #DataSecurity #MedicalDevices #DigitalHealth #HealthcareIT #CyberDefense #HealthcareInnovation #RiskManagement #ComplianceMatters LevelBlue.com Download the transcript here
Gus Serino, President of I&C Secure, joins the Nexus Podcast to discuss the formation and evolution of an ongoing water utility cybersecurity collaborative that leans on a collective defense model to share resources and threat intelligence among six water & wastewater companies in the commonwealth. Serino helped put together this coalition, and he explains how a feasibility study came together resulting in a shared grant that member utilities can use to improve their security programs. Gus talks about the origins of this collaborative and how other utilities can follow this model to improve cybersecurity in this struggling, resource-strapped critical infrastructure sector.Subscribe and listen to the Nexus Podcast here.
As RSAC 2026 approaches, Michael Parisi of Steel Patriot Partners sits down with Marco Ciappelli and Sean Martin to talk about what it means to show up to the world's largest cybersecurity conference with a business-first mindset. For Parisi — a 20-plus year veteran of professional services, federal compliance, and cybersecurity — RSA is less about the show floor and more about the quiet corners where real conversations happen. Steel Patriot Partners operates on a simple but powerful premise: business owners first, engineers second, compliance professionals third. That philosophy shapes everything from how they engage clients to how they show up at industry events. At RSAC, Parisi's calendar is already full — and intentionally so. The value isn't in the booths. It's in the bilateral trust that forms between peers who cut through the noise to share what's actually working. And the noise, this year, is particularly loud. AI dominates the conversation in ways that create as much anxiety as excitement — especially for federal cybersecurity professionals whose institutional knowledge feels suddenly uncertain. Parisi addresses this head-on: the question isn't just whether AI will replace jobs, it's whether leaders are having honest conversations with their teams about what's changing and why. The fog of marketing has thickened into what he calls a "fog of truth" — a marketplace where it's increasingly hard to know who actually delivers versus who just pitches well. This conversation is a preview of what Steel Patriot Partners will be listening for, talking about, and connecting around at RSAC 2026 — from retaining trusted people amid AI disruption, to whether tried-and-true solutions still hold their own against the wave of AI-native platforms. Parisi and the SPP team will also be sitting down with Marco and Sean live on the floor for a deeper follow-up conversation. Loved this conversation? Share it with someone heading to RSAC 2026 and make sure to connect with Michael Parisi and the Steel Patriot Partners team in San Francisco. GUEST Michael Parisi Chief Growth Officer, Steel Patriot Partners https://www.linkedin.com/in/michael-parisi-4009b2261/ https://www.steelpatriotpartners.com RESOURCES Steel Patriot Partners: https://www.steelpatriotpartners.com RSAC Conference 2026: https://www.rsaconference.com ✨ A special thank you to our sponsors and supporters: https://itspm.ag/telecom-ts630 _____________________________ Are you interested in telling your story?
Gemini in Google Workspace, Agentic AI, and Managing AI Anxiety (with Accenture's Krish Banerjee) Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst In a special edition of Project Synapse shared with Cybersecurity Today, host Jim Love and co-host John Pinard (a VP and CSO at a Canadian financial institution) speak with Krish Banerjee, Accenture's managing director and partner leading AI in Canada. They discuss Google integrating Gemini into Workspace and how AI assistants like Gemini and Microsoft Copilot are converging, along with recent moves around agent platforms and the business models of AI, including Meta and Nvidia's evolving strategies and Nvidia's push toward enterprise agent infrastructure amid rapidly rising compute demand. The conversation explores why AI adoption lags capability, emphasizing task-based redesign, human-in-the-loop guardrails, and not "AI-washing" broken processes. They also address AI anxiety, training and culture change, impacts on education and jobs, and practical ways to use agents to stay informed and productive. 00:00 Sponsor Message 00:20 Show Intro and Guests 01:12 Gemini Comes to Workspace 03:38 AI Tool Leapfrogging 05:06 Agent Network Acquisitions 07:53 Nvidia Bets on Enterprise Agents 11:08 Why AI Adoption Lags 14:27 Agentic AI and Process Redesign 16:19 Security Guardrails and Human Oversight 24:05 Accenture Transformation and Training 26:55 AI Anxiety in the Workplace 30:22 Tasks Not Jobs 32:12 Outcome First Thinking 34:15 Personal AI Assistants 37:24 Building Agents Together 38:35 Executive Learning Curve 44:31 Kids And AI Natives 50:15 Critical Thinking And Trust 54:15 Company Advice Focus Value 55:58 Wrap Up And Sponsor
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
When your IoT Device Logs in as Admin, It s too Late! https://isc.sans.edu/diary/When%20your%20IoT%20Device%20Logs%20in%20as%20Admin%2C%20It%3Fs%20too%20Late!%20%5BGuest%20Diary%5D/32788 Apple Patches https://support.apple.com/en-us/100100 Veeam Patches https://www.veeam.com/kb4830
Independent investigative journalism, broadcasting, trouble-making and muckraking with Brad Friedman of BradBlog.com
Independent investigative journalism, broadcasting, trouble-making and muckraking with Brad Friedman of BradBlog.com
Send me a text (I will personally respond)Are you struggling to navigate strategic partnerships with hyperscalers like AWS? Wondering when and how to build your company's platform story to stand out in a crowded cyber market? Curious about the real value of industry relationships and communities for sales growth? This episode tackles these challenges head-on, drawing insights from a leader who's been at the heart of cybersecurity's evolving ecosystem.In this conversation we discuss:
Despite an earnings miss, Lennar (LEN) shares soared at Friday's open following its 1Q print. Diane King Hall dives into the print in which the CEO says was defined by the "same persistent headwinds" challenging the housing market. On the cybersecurity front, SentinelOne (S) delivered mixed earnings but shares hovered around the unchanged line to start the day. Then, Diane looks at news that Meta Platforms (META) will delay its upcoming "Avocado" AI model to at least May. ======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Our guest on this week's episode is Mike Van Bree, director of product safety and engineering at Louisville Ladder Inc. and current president of the American Ladder Institute (ALI). This is Friday the 13th, and you have probably heard that old adage not to walk under ladders. That warning is probably not so much because it might bring you bad luck, but because it is an unsafe thing to do. And that brings us to our guest today: March is National Ladder Safety Month in the United States – a reminder to follow proper safety procedures while working at heights in warehouse and distribution centers, among other places. Mike Van Bree brings some safe practices when working with ladders to our discussion.This week we saw the launch of a new plan by businesses in Europe to cooperate on joining together to set standards and practices for cybersecurity, specifically for software used in industrial automation and manufacturing. Ben Ames tells you what their plans are to defend themselves against cyber criminals.Global demand for sensors in logistics is set to double between 2024 and 2033, according to recent industry reports. Victoria Kickham shares about a feature she wrote for DC Velocity's March issue that examines how sensor technology is helping companies improve the efficiency, accuracy, and security of their supply chains. Specifically, she looked into an inventory project by Walmart and a recent market expansion by a transportation industry security startup that shows just how powerful sensors are in logistics.Supply Chain Xchange also offers a podcast series called Supply Chain in the Fast Lane. It is co-produced with the Council of Supply Chain Management Professionals. The latest series is now available on Top Threats to our Supply Chains. It covers topics including Geopolitical Risks, Economic Instability, Cybersecurity Risks, Threats to energy and electric grids; Supplier Risks, and Transportation Disruptions Go to your favorite podcast platform to subscribe and to listen to past and future episodes. The podcast is also available at www.thescxchange.com.Articles and resources mentioned in this episode:American Ladder InstituteNational Ladder Safety Month websiteLadder Safety Training resourcesEuropean groups form cybersecurity initiative for industrial automationSensing your way to a smoother supply chainVisit DC VelocityVisit Supply Chain XchangeListen to CSCMP and Supply Chain Xchange's Supply Chain in the Fast Lane podcastSend feedback about this podcast to podcast@agilebme.comThis podcast episode is sponsored by: Storage SolutionsOther linksAbout DC VELOCITYSubscribe to DC VELOCITYSign up for our FREE newslettersAdvertise with DC VELOCITY
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Stop ransomware without the hassle. Allow what you need and block the rest with ThreatLocker Zero Trust Platform — simple to deploy, simple to manage: https://www.threatlocker.com/dailycyber Check out Flare.io Academy at https://simplycyber.io/flare Check out Pay-What-You-Can Antisyphon Training: https://simplycyber.io/antisyphon SC Academy - The Place for Cyber Careers: https://zpr.io/mYV5232V66Qn Join SC Discord: https://SimplyCyber.io/Discord News: https://cisoseries.com Follow SC: https://simplycyber.io/socials
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Analyzing "Zombie Zip" Files (CVE-2026-0866) https://isc.sans.edu/diary/Analyzing%20%22Zombie%20Zip%22%20Files%20%28CVE-2026-0866%29/32786 How "Strengthening Crypto" Broke Authentication: FreshRSS and bcrypt's 72-Byte Limit https://pentesterlab.com/blog/freshrss-bcrypt-truncation-auth-bypass
In this episode, Lamar Garrett from Redbird Security delves into the critical importance of agency-specific cybersecurity tailored for insurance businesses. He discusses how proactive hardware and software maintenance can significantly reduce downtime, while the integration of AI streamlines operations and enhances security protocols. Lamar highlights the differences between general IT providers and insurance-specific MSPs, emphasizing the need for compliance with state and federal data regulations. He also shares best practices for integrating new technology, managing shiny objects, and preventing breaches through layered security and cyber awareness training. Additionally, Lamar addresses the impact of legacy hardware on security vulnerabilities and the importance of building strong relationships and trust within the insurance industry, along with strategies to improve communication about cybersecurity to agency owners.Lamar emphasizes that tailored cybersecurity, proactive hardware management, and clear communication are crucial for insurance agencies to protect their data and scale efficiently. His insights highlight that investing in industry-specific IT solutions is not just smart but necessary in today's digital landscape.Timestamps:00:00 - Introduction to Lamar Garrett and Redbird Security06:25 - The importance of insurance-specific IT solutions08:41 - How cybersecurity breaches impact large organizations and why agencies are at risk12:48 - Common misconceptions about insurance cybersecurity needs16:41 - Optimizing agency tech stacks for efficiency and compliance24:23 - Response times and minimizing downtime for agency management systems28:40 - How AI is transforming insurance IT security and operations32:38 - The hidden costs of aging hardware and legacy systems37:40 - Final thoughts on securing agency data and building industry trustResources & Links:Redbird SecurityRedbird Security on LinkedInApplied Epic MSP PartnershipMicrosoft CopilotEZLinks SoftwareCybersecurity Awareness CartoonsBook: "The Art of Cybersecurity" by David S. TanenbaumConnect with Lamar Garrett:LinkedIn - Lamar GarrettRedbird SecuritySponsors:MavCanopy ConnectGOLI
From skyrocketing state budgets to bizarre taxpayer-funded projects, today's episode breaks down the latest in South Carolina politics, the SAFE Act showdown, and the power of viral social media in holding politicians accountable. Join us as we unpack government spending, lewd art exhibits, and how public pressure is pushing Senator John Thune on the SAFE Act—all while exposing the myths mainstream media keeps pushing. Summary / Segment Breakdown: Segment 1: Columbia Math & Budget Madness South Carolina plans to spend 8.75% more this year, despite a population growth of only 1.5%. Discussion of lobbyists, corporate welfare, and unusual funding priorities under a Republican supermajority. How taxpayer dollars fund projects like LGBTQ+ podcasts, lewd art exhibits, drag shows, and climate research. Insight on the state's budget committee and the role of Democrats in controlling subcommittees despite the GOP supermajority. Segment 2: The Lesbian Podcast Controversy Grant funding of a six-episode lesbian history podcast through the Arts Commission. Questions raised about why conservative voices rarely receive similar support. Broader discussion on government funding for content with no market demand and the process for allocating grants. Segment 3: Public Pressure on John Thune & the SAFE Act John Thune facing unprecedented public scrutiny via viral posts on X. Debate over the vote count for the SAFE Act: 51 votes secured vs. Thune's claims of needing 60. The role of social media in holding elected officials accountable and debunking false narratives. Influence of Dave Rubin and other commentators in mobilizing public action to sway Senate votes. Segment 4: Mainstream Media Misfires & Cyber Threats Examples of CNN and other outlets spreading misinformation about protests and attacks, later corrected by social media. Highlighting the reach of social media corrections, sometimes surpassing traditional media audiences. Updates on Iranian and Chinese cyber threats, DHS shutdown, and the importance of coordinated government cybersecurity measures. Discussion on the blurred line between Democrat policies and national security vulnerabilities. Segment 5: Taxpayer Spending Debates Misconceptions about Pentagon spending on luxury items like lobster and ribeye. Historical context: comparable spending under past administrations including Obama and Bush. Discussion on public perception versus media narrative. Key Takeaways: South Carolina's budget increases vastly outpace population growth, with questionable allocations. Taxpayer dollars fund niche projects, while core infrastructure and conservative initiatives receive minimal attention. Social media is now a primary tool for political accountability, particularly on issues like the SAFE Act. Mainstream media often fails to accurately report events, but virality and community corrections mitigate misinformation. National security threats from cyber attacks are exacerbated by bureaucratic shutdowns and political gridlock. CTA (Call to Action): Follow us on X to stay updated with viral accountability posts. Check out Freedom Caucus research for real-time budget analysis. Subscribe to Battleground America and AmperWave Daily for ongoing coverage of government spending, media oversight, and legislative updates. Custom Labels: South Carolina, Budget, SAFE Act, John Thune, LGBTQ Funding, Arts Commission, Viral Accountability, Social Media, Cybersecurity, Government Spending
Are America's security agencies being crippled at the worst possible time? Today's episode dives into alarming claims about sleeper cells entering the U.S., rising cyber threats from Iran and China, and a political battle in Washington that could impact funding for the Department of Homeland Security. Tara and Lee connect the dots between border policy, national security warnings, and escalating geopolitical tensions. As cyberattacks increase and intelligence officials warn about foreign threats, the debate intensifies over whether political gridlock is putting Americans at risk. Summary Tara and Lee examine claims that border policies allowed large numbers of military-aged men from high-risk regions to enter the United States through crossings such as Lukeville. The conversation highlights warnings from former FBI officials who previously raised concerns about the changing demographic patterns of migrants at the southern border. They also discuss the broader national security implications, including cyberattack threats attributed to Iran and China and the potential impact of political disputes over funding for the Department of Homeland Security and related cybersecurity infrastructure. The discussion ultimately centers on whether political gridlock is undermining America's ability to respond to foreign threats and protect critical infrastructure. Key Topics Border security and migration patterns Claims of Iranian sleeper cells in the U.S. Cybersecurity threats targeting U.S. infrastructure Political fight over Department of Homeland Security funding Intelligence warnings about national security risks Geopolitical tensions involving Iran and China Social Media Post
In this episode of The Derivative, Jeff Malec sits down with Ian Winer, West Point grad and founder of Center 15 Capital, to unpack how modern warfare and national security are being reshaped by drones, AI, and space. Using the recent conflict with Iran as a case study, they explore how cheap one-way attack drones are challenging traditional air defenses, why firing multimillion-dollar interceptors at $15,000 drones is unsustainable, and what a proper layered counter-drone strategy looks like, including jammers, directed energy, and high-powered microwaves. Ian also explains how space-based sensors and AI-driven analysis are shortening the intelligence loop, and walks through Center 15's investments in companies like Shield AI (autonomy for unmanned systems), Epirus (high-powered microwaves for drone defense), Shift5 (cybersecurity for large platforms), and HawkEye 360 (RF detection from space). They close with what keeps Ian up at night, from attacks on civilian infrastructure to cyber risks, and lighten it up with his Mount Rushmore of military movies, from Full Metal Jacket to Red Dawn(yes, the original)...… SEND IT!Chapters:00:00-01:52= Intro01:53-08:59 = Early Lessons from the Iran Conflict: Air Dominance, Drones, Interceptors, and Space-Based Intelligence09:00-18:07= How Cheap Drones Are Reshaping Warfare: Drone Classes, Ranges, and Iran's One‑Way Attack Systems18:08-24:05= Iran's Shahed Drones vs. Western Defenses: Costly Interceptors, Missile Stockpiles, and Broken Defense Incentives24:06-37:20= From Drone Swarms to Force Fields: Venture Investing in Next‑Gen Counter‑Drone Tech37:21-46:42= Directed-Energy ‘Force Fields' and Autonomous Combat Drones: Inside Epirus and Shield AI46:43-57:32= Cybersecurity for Jets, Trains, and Warships: Inside Shift5, Hawkeye 360, and the New Defense Tech Stack57:33-01:11:01= How Defense-Focused VCs Back Critical Tech—and What keeps you up at night & the Mount Rushmore of Military moviesFrom the Episode: When Skynet Writes a Substack: The AI Doom Piece That Moved Markets: https://www.rcmalternatives.com/2026/03/when-skynet-writes-a-substack-the-ai-doom-piece-that-moved-markets/Follow along with Ian on LinkedIn and check out Center15 Capital at center15capital.com for more information!Disclaimer: This podcast is provided for informational purposes only and should not be relied upon as legal, business, or tax advice. All opinions expressed by podcast participants are solely their own opinions and do not necessarily reflect the opinions of RCM Alternatives, their affiliates, or companies featured. Due to industry regulations, participants on this podcast are instructed not to make specific trade recommendations, nor reference past or potential profits. And listeners are reminded that managed futures, commodity trading, and other alternative investments are complex and carry a risk of substantial losses. As such, they are not suitable for all investors. For more information, visitwww.rcmalternatives.com/disclaimer
The salient point of this podcast episode centers on the recent updates regarding cybersecurity vulnerabilities and significant environmental events. Specifically, the Cybersecurity and Infrastructure Security Agency (CISA) has added new entries to its list of known exploited vulnerabilities, which signals an urgent need for patch mitigation among federal agencies and all entities utilizing the affected products. Furthermore, the episode discusses the ongoing monitoring of Kilauea volcano, which remains at an alert level of “watch” with implications for aviation safety and public awareness. Severe storms in the Houston area have also led to widespread power outages, with restoration efforts actively underway. The episode concludes with an invitation to attend the IWC 2026 conference, emphasizing the importance of critical communications in times of crisis.Takeaways:* The Cybersecurity and Infrastructure Security Agency has recently updated its list of exploited vulnerabilities, necessitating immediate action from federal agencies and other affected entities.* The National Terrorism Advisory System currently indicates that there are no active advisories, suggesting a stable security situation across the nation at this time.* The United States Geological Survey has provided updates on the Kilauea volcano, maintaining a watch status due to ongoing volcanic activity and associated hazards for aviation.* Severe thunderstorms have resulted in significant power outages in the Houston area, with restoration efforts ongoing and customer impact being monitored closely by utility providers.* A water main break in Storey County, Nevada has prompted a boil water advisory for affected customers, with guidance to follow specific instructions until the advisory is lifted.* The upcoming IWC 2026 event in Las Vegas promises to gather key figures in critical communications, showcasing advancements in technology and providing essential networking opportunities for professionals.Sponsorhttps://go.emnmedia.com/IWCE2026SourcesDHS, NTAS — current advisory statusCISA, KEV Catalog (CSV) — entries include “Date Added: 2026-03-11”USGS / VolcanoHVO “Newest Volcano Notice Including Kilauea” — Daily Update (March 11, 2026)HVO photo/video chronology — March 10–11, 2026 activity contextNevadaStorey County Sheriff's Office — boil water notice guidance (official social post)KOLO — Storey County boil water notice (reporting / public guidance)2 News Nevada — USA Parkway water main break / boil water warning detailsTexasCenterPoint statement (syndicated) — “Less than 2.5% … impacted during midweek storms”Houston Chronicle — outage impacts and restoration reporting This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit emnetwork.substack.com/subscribe
This includes our regular Wednesday/Thursday segment but with an update from this breaking story on the attack on a large US medical company.
This episode features a panel discussion from ACT-IAC's Imagine Nation ELC event focused on artificial intelligence (AI). The session emphasizes aligning AI initiatives with mission objectives, rigorous testing, and governance to ensure public trust and operational success.gAp Pulse: Trends. Talks. Takeaways | ACT-IAC Become a Member | ACT-IAC Small Business Alliance | ACT-IACSubscribe on your favorite podcast platform to never miss an episode! For more from ACT-IAC, follow us on LinkedIn or visit http://www.actiac.org.Learn more about membership at https://www.actiac.org/join.Donate to ACT-IAC at https://actiac.org/donate. Intro/Outro Music: See a Brighter Day/Gloria TellsCourtesy of Epidemic Sound(Episodes 1-159: Intro/Outro Music: Focal Point/Young CommunityCourtesy of Epidemic Sound)
AI doesn't just make businesses faster — it makes attackers faster too.In Part 3 of The Executive AI Series, the discussion moves from shadow adoption to active exploitation. Artificial intelligence is no longer just a productivity tool. It has become a force multiplier for cybercrime.We break down how AI is transforming the threat landscape:AI-driven phishing that is personalized, scalable, and nearly indistinguishable from legitimate communicationMalware and ransomware were built, refined, and deployed with AI assistanceAI attacking AI as automated defense systems face automated exploitationThe rise of small language models running locally, outside traditional visibility and controlThe barrier to entry for sophisticated attacks is collapsing. What once required elite skill can now be generated, refined, and deployed at speed.The tone shifts here, from strategic governance to tactical urgency. Because the imbalance isn't theoretical. It's operational.The episode ends at another inflection point: when the cybersecurity discussion begins to reveal deeper human and organizational consequences.If Episode 2 exposed the loss of control, Episode 3 shows what happens when that control is actively challenged.
What does it really take to lead in cybersecurity today? In this episode of Life of a CISO, Dr. Eric Cole sits down with longtime cybersecurity executive and educator Mary Kotch for a sharp, honest conversation about the future of the industry. From breaking into the field to building a career that lasts, Mary shares why continuous learning, technical depth, and real-world experience matter more than ever. Together, they unpack the growing role of AI in both cyber defense and cyber attacks, why ethical hacking may be one of the most valuable skills professionals can develop, and what aspiring CISOs need to understand about the difference between technical work and executive leadership. If you want a real look at where cybersecurity is heading and how to stay ahead of it, this is an episode worth hearing.
Comprehensive coverage of the day's news with a focus on war and peace; social, environmental and economic justice. WW2 era image from National Infantry Museum and Soldier Center Dems blast Iran war as “kingly oppression” at Senate hearing on military budget; Senate approves Gen. Rudd to head NSA and Cybersecurity, despite Dem concerns over inexperience and domestic surveillance; Trump suing California over state's zero-emission electric vehicles policy for climate goal; Congressmember Swallwell leading polls among Dem candidates for Governor, Fox commentator Hilton leading Republicans; Landmark trial on social media and teen mental health ending in Los Angeles; Oakland celebrates native Alysa Liu, figure skating Olympic medalist and role model The post Dems blast Iran war as “kingly oppression” at Senate hearing; Trump suing California over state's electric vehicles policy – March 12, 2026 appeared first on KPFA.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.
In this episode of the Cybersecurity at ViVE series on The Beat Podcast, host Sandy Vance sits down with Chad Alessi, Managing Director of Cybersecurity at CTG, for a wide-ranging conversation about what it really takes to protect healthcare organizations in today's threat landscape. With a background spanning chemical engineering, the U.S. Marines, energy sector Operational Technology security, and IT consulting, Chad brings a unique cross-industry perspective to healthcare cybersecurity. From the difference between cybersecurity and cyber resilience to the rise of AI-powered attacks, this episode is packed with practical insights for healthcare leaders who want to stay ahead of what is coming. In this episode, they talk about how: Cyber resilience focuses on operational continuity when an attack happens, not just prevention Breaches resolved within 200 days can save organizations over $1 million Bad actors often sit idle inside networks for months, collecting data before launching an attack Baseline requirements are identity-first security, including multi-factor authentication (MFA) and privileged access management Human-only Security Operations Center (SOC) models are too slow to keep up with today's automated, AI-powered attacks CTG uses Microsoft's Unified Security Operations (SecOps) platform to eliminate tool sprawl and improve response time Zero-trust architecture is expanding from department-level to enterprise-wide in healthcare New HIPAA regulations now require provable network segmentation for legacy medical devices AI-assisted security operations will continue to grow in the next few years A Little About Chad: As CTG's Managing Director of Cybersecurity, Chad Alessi leverages decades of experience in technology, cybersecurity, and operational strategy across enterprise and mid-market sectors to meet the evolving cybersecurity needs of clients in the U.S. During his time in IT consulting, Chad was instrumental in driving IT transformation in the company's regulated pipeline and gas processing business units. He holds a BS in Chemical Engineering, an MBA from the University of Alabama, an MS in Information Systems with a concentration in Information Security from Syracuse University, and post-graduate certifications in leadership, full stack development, cybersecurity, and cloud computing. Chad is known for his strong work ethic, integrity, resourcefulness, and service-based leadership, which he attributes to his time in the U.S. Marine Corps.
Realities Remixed, formerly know as Cloud Realities, launches a new season exploring the intersection of people, culture, industry and tech.After years of remote‑first work built on swift trust, companies are asking a harder question: what does a organization really stand for when people rarely show up together? As AI accelerates change, leaders are rethinking presence, team design, and collaboration to fuel trust, innovation, and growth. This week, Dave, Esmee, and Rob are joined by Dr. Tim Currie, disruptor, author, innovator, and advisor, to examine transformation versus trust, the role of AI, and whether organisations can truly build culture without deeper human connection. TLDR00:42– Introduction01:10 – Hang out: New film releases07:17 – Dig in: The trust gap in remote work17:57 – Conversation with Dr. Tim Currie54:07 – The Wizard of Oz at the Sphere in Las Vegas and staying connected GuestDr. Tim Currie: https://www.linkedin.com/in/dr-tim-currie-37756a/Book Swift Trust: https://swifttrustbook.com/HostsDave Chapman: https://www.linkedin.com/in/chapmandr/Esmee van de Giessen: https://www.linkedin.com/in/esmeevandegiessen/Rob Kernahan: https://www.linkedin.com/in/rob-kernahan/ProductionMarcel van der Burg: https://www.linkedin.com/in/marcel-vd-burg/Dave Chapman: https://www.linkedin.com/in/chapmandr/ SoundBen Corbett: https://www.linkedin.com/in/ben-corbett-3b6a11135/Louis Corbett: https://www.linkedin.com/in/louis-corbett-087250264/ 'Realities Remixed' is an original podcast from Capgemini
Dr. Sebastian Bojemski graduated from the Institute of History of Warsaw University and gained his doctoral degree at The Cardinal Wyszyński University in Warsaw. At the Institute of World Politics (Washington, DC) he attended individual courses in geography and strategy, geoeconomy, strategic influence and propaganda. He was awarded scholarships by the Kosciuszko Foundation (USA) and the M. Grabowski Fund (UK). Mr Bojemski also has extensive experience in strategic communication, marketing, sales and management. For over 15 years (2003-2018) he had owned a Warsaw-based consulting firm. Between 2018-2024 he was an executive director for marketing at PKN Orlen – the largest oil company in Central Europe, a vice chairman at Lotos Fuels, the second largest oil company in Poland and a vice chairman at PERN, the largest fuel and logistics company in the region and critical infrastructure operator. He is currently affiliated with the University College of Professional Education as a member of the Center for Research on Disinformation and Cybersecurity and a senior fellow at the Eastern Flank Institute, a Brussels-based think tank. The start of the Russian invasion in 2014 changed the security architecture in Central and Eastern Europe. These changes deepened in 2021 after Belarus launched a border operation targeting Poland. Another milestone in this process was Russia's full-scale aggression against Ukraine. The level of security on Poland's eastern border has significantly decreased. In this situation, it is necessary to make changes in the area of national security. This includes the development of the armed forces, the assignment of new strategy to the secret services, and the strengthening of critical infrastructure protection. This lecture is part of the 18th Annual Symposium of the Kosciuszko Chair of Polish Studies. The Kościuszko Chair serves as a center for Polish Studies in the broadest sense, including learning, teaching, researching, and writing about Poland's culture, history, heritage, religion, government, economy, and successes in the arts, sciences, and letters, with special emphasis on the achievements of Polish civilization and its relation to other nations, particularly the United States. This year, the 17th annual Kościuszko Chair Conference focuses on the topic of threats and opportunities in the Intermarium. **Learn more about IWP graduate programs: https://www.iwp.edu/academics/graduate-degree-programs/ ***Make a gift to the IWP Kosciuszko Chair of Polish Studies: https://wl.donorperfect.net/weblink/WebLink.aspx?name=E231090&id=4
Executive cyber liability - new regulations and the responsibility to actSupporting your C-Suite with a framework for defining, tracking, and reporting security KPIsBridging the gap to your C-Suite - leveraging attack surface management and employee insight for strategic governanceThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Edd Hardy, Director Cyber Security, AlixPartnershttps://www.linkedin.com/in/eddhardyBjörn Orri Guðmundsson, CEO & Founder, Aftrahttps://www.linkedin.com/in/bj%C3%B6rn-orri-gu%C3%B0mundsson-b7b62527
Federal Tech Podcast: Listen and learn how successful companies get federal contracts
The word "deplorable" signals something shockingly bad. Often used for the truly awful or dreadful, Todd Harbour, with decades of federal data experience, applies it specifically to data quality. That may be an overstatement, but the description certainly makes the point that today AI is based on fragmented, incomplete data sets. The bright, shiny thing called AI is so much in focus that federal leaders may not pause to ask what data is being used to train today's models. During the interview, Harbour acknowledges that nobody is seeking perfection here. He has coined the term "mission-ready" to describe the kind of data that should be used for decision-making in the federal government. This would indicate a serious attempt to include siloed and poorly structured data. In a fascinating digression, he refers to MIT's Project Iceberg. This initiative suggests that AI is only the "tip of the iceberg" of its economic impact. The majority are in the future and beneath the surface. If that is the case, the case for mission-ready data is even stronger. Harbour urges immediate initiative-taking measures to confront these challenges and proactively prepare for rapid AI-driven changes to cybersecurity and national defense. Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Stop ransomware without the hassle. Allow what you need and block the rest with ThreatLocker Zero Trust Platform — simple to deploy, simple to manage: https://www.threatlocker.com/dailycyber Check out Flare.io Academy at https://simplycyber.io/flare Check out Pay-What-You-Can Antisyphon Training: https://simplycyber.io/antisyphon SC Academy - The Place for Cyber Careers: https://zpr.io/mYV5232V66Qn Join SC Discord: https://SimplyCyber.io/Discord News: https://cisoseries.com Follow SC: https://simplycyber.io/socials
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Microsoft Patch Tuesday, March 2026 https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20March%202026/32782 Fortinet Updates https://fortiguard.fortinet.com/psirt Adobe Updates https://helpx.adobe.com/security.html Zoom Update https://www.instagram.com/direct/t/17848218473607233/
Send a textIn this episode of Joey Pinz Discipline Conversations, Joey Pinz sits down with Mark Hardy, a retired U.S. Navy Captain and longtime cybersecurity executive, for a powerful conversation on leadership, growth, and decision-making under pressure.Mark shares what it was like stepping into command on September 11th in Lower Manhattan, leading without resources, infrastructure, or certainty—and how those moments shaped his lifelong approach to people and leadership. From developing future leaders to creating environments where individuals can step up when it matters most, this conversation goes far beyond theory.They explore why logic alone rarely drives lasting change, why emotional triggers are often the real catalyst for transformation, and how high-performing professionals can unintentionally disconnect from the very feelings that help them grow. Mark also reflects on cybersecurity careers, executive credibility, and why protecting people—not breaking systems—is the real challenge.This episode blends real-world leadership, personal evolution, and hard-earned wisdom from decades in the Navy, consulting, and cybersecurity—making it a must-listen for leaders, builders, and anyone navigating high-stakes decisions. ⭐ Top 3 Highlights
Send a textHow do we protect ourselves in a digital world where attackers face almost no real consequences?In this episode of Joey Pinz Discipline Conversations, Joey Pinz sits down with cybersecurity founder and inventor Mike Siers for a thought-provoking conversation that challenges everything we assume about online security, identity, and trust.Mike's journey begins in the Florida National Guard and a deployment to Afghanistan, where life-altering experiences shaped how he sees service, responsibility, and problem-solving. That same mindset later led him into healthcare innovation—and eventually into cybersecurity—after realizing that the internet lacks one critical element found in the physical world: real risk for bad actors.Inspired by military strategy and an MIT thesis on cyber power projection, Mike explains a radical idea: what if unauthorized access attempts cost money? Instead of defenders absorbing endless attacks, attackers would inherit the risk before they even try.This conversation explores how empathy fuels innovation, why most cybersecurity models are reactive by design, and how shifting incentives could dramatically change online behavior. It's a powerful look at leadership, responsibility, and building solutions not just for today—but for the next generation. ⭐ Top 3 Highlights
The Roundtable Panel: a daily open discussion of issues in the news and beyond. Today's panelists are Joseph Palamountain Jr. Chair in Government at Skidmore College Beau Breslin, Chief of Staff and Vice President for Strategy and Policy at Bard College Malia DuMont, and Dean of the College of Emergency Preparedness, Homeland Security and Cybersecurity at the University at Albany Robert Griffin.
Tiziana Barrow has built a career around cybersecurity and human risk, leading product marketing across some of the industry's most specialized domains like threat intelligence, OT/ICS security, risk quantification and supply chain risk. She's now channeling that experience into Safer Shift, a personal endeavor to build stories that bridge the physical and digital world with a bias toward changing behavior. She discussed why the most powerful tool for reducing human risk isn't technology, it's narrative — stories that make digital safety habits intuitive, accessible and human. In an AI-driven world, protecting people can't just be an enterprise priority. It has to be a personal one.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Encrypted Client Hello: Ready for Prime Time? https://isc.sans.edu/diary/Encrypted%20Client%20Hello%3A%20Ready%20for%20Prime%20Time%3F/32778 The ExifTool vulnerability: how an image can infect macOS systems https://www.kaspersky.com/blog/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102/55362/ Remote code execution in Nextcloud Flow via vulnerable Windmill version https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g7vj-98x3-qvjf
Kyler Middleton, a software developer in the healthcare sector, builds and supports AI bots and AI agents that are now widely used inside the company where she works. Today on Packet Protector, Kyler stops by to talk about how and why she built these tools, how she (and her organization) address the risks these tools... Read more »
In this episode, David Hill sits down with Ephraim Alexander Ebstein to explore the intersection of AI and cybersecurity in modern business. They discuss practical AI implementation strategies, common pitfalls, the reality of AI's limitations, and the growing threat landscape in cybersecurity. Ephraim shares insights from years of deploying AI solutions and protecting businesses from cyber threats, offering actionable advice for entrepreneurs looking to leverage AI while staying secure. https://www.linkedin.com/in/ephraim-ebstein-5a2a1a10/ YouTube: https://www.youtube.com/c/DavidHillcoach Instagram: https://www.instagram.com/davidihill PODCAST SUBSCRIBE & REVIEW https://podcasts.apple.com/us/podcast/the-persistent-entrepreneur/id1081069895 #AI #Cybersecurity #Entrepreneur #BusinessOwner #ArtificialIntelligence #AIThreat #CyberThreat #BusinessSecurity #AIBusiness #DigitalSecurity #Podcast #BusinessPodcast #EntrepreneurPodcast #AITools #TechForBusiness #SmallBusiness #OnlineBusiness #BusinessGrowth #FutureOfBusiness #AIAutomation
Israel claims a strike on Iran's cyber warfare headquarters. The Trump administration releases a new national cyber strategy. DHS shakes up its IT and cybersecurity leadership. Velvet Tempest uses ClickFix to drop loaders and RATs. Researchers uncover a Linux cryptocurrency clipboard hijacker. The DOJ brings a Ghanaian romance scammer to justice. Online advertising enables government tracking. Monday business breakdown. Our guest is Jon France, CISO from ISC2, sharing some insights and findings from their 2025 ISC2 Cybersecurity Workforce Study. An Apple II app gets audited by AI. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Joining us today is Jon France, CISO from ISC2, sharing some insights and findings from their 2025 ISC2 Cybersecurity Workforce Study. For further detail, you can also check out ISC2's just released Women in Cybersecurity report. Selected Reading Iranian cyber warfare HQ allegedly hit by Israel | brief (SC Media) Iran internet blackout reaches 6th day as rights groups call for end to digital shutdown (The Record) The long-awaited Trump cyber strategy has arrived (CyberScoop) DHS CISO, deputy CISO exit amid reported IT leadership overhaul (FedScoop) Termite ransomware breaches linked to ClickFix CastleRAT attacks (Bleeping Computer) ClipXDaemon: Autonomous X11 Clipboard Hijacker Delivered Via Bincrypter-Based Loader (Cyble) Ghanaian Pleads Guilty to Role in $100m Romance Scam (Infosecurity Magazine) The Government Uses Targeted Advertising to Track Your Location. Here's What We Need to Do. (Electronic Frontier Foundation) Zurich Insurance Group intends to acquire UK cyber insurer Beazley for approximately $11 billion. (N2K Pro Business Briefing) Microsoft Azure CTO says Claude found vulns in Apple II code (The Register) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
YARA-X 1.14.0 Release https://isc.sans.edu/diary/YARA-X%201.14.0%20Release/32774 INTERPLAY BETWEEN IRANIAN TARGETING OF IP CAMERAS AND PHYSICAL WARFARE IN THE MIDDLE EAST https://research.checkpoint.com/2026/interplay-between-iranian-targeting-of-ip-cameras-and-physical-warfare-in-the-middle-east/ Announcing the Node.js LTS Upgrade and Modernization Program https://openjsf.org/blog/nodejs-lts-upgrade-program nginx UI Vulnerability https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-g9w5-qffc-6762