Podcasts about DEFCON

Alert posture used by the United States Armed Forces

  • 1,219PODCASTS
  • 3,454EPISODES
  • 56mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • May 19, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about DEFCON

Show all podcasts related to defcon

Latest podcast episodes about DEFCON

The Ken Carman Show with Anthony Lima
Hour 1: Defcon for Guardians + Browns trade QB to Saints? + Lima Likes

The Ken Carman Show with Anthony Lima

Play Episode Listen Later May 19, 2025 37:16


Hour 1: Defcon for Guardians + Browns trade QB to Saints? + Lima Likes full 2236 Mon, 19 May 2025 14:56:45 +0000 t102HMyL8F7h35wlXDUzxK3v4kKsm12p sports The Ken Carman Show with Anthony Lima sports Hour 1: Defcon for Guardians + Browns trade QB to Saints? + Lima Likes The only place to talk about the Cleveland sports scene is with Ken Carman and Anthony Lima. The two guide listeners through the ups and downs of being a fan of the Browns, Cavaliers, Guardians and Ohio State Buckeyes in Northeast Ohio. They'll help you stay informed with breaking news, game coverage, and interviews with top personalities.Catch The Ken Carman Show with Anthony Lima live Monday through Friday (6 a.m. - 10 a.m ET) on 92.3 The Fan, the exclusive audio home of the Browns, or on the Audacy app. For more, follow the show on X @KenCarmanShow. 2024 © 2021 Audacy, Inc. Sports False https://player.amperwa

The Ken Carman Show with Anthony Lima
Defcon 1, maybe 2, with the Cavs

The Ken Carman Show with Anthony Lima

Play Episode Listen Later May 12, 2025 13:01


Defcon 1, maybe 2, with the Cavs full 781 Mon, 12 May 2025 13:42:18 +0000 k02SjnkswSUBs5zHaKLfIeWkxGGGzy1k cleveland browns,cleveland cavaliers,sports The Ken Carman Show with Anthony Lima cleveland browns,cleveland cavaliers,sports Defcon 1, maybe 2, with the Cavs The only place to talk about the Cleveland sports scene is with Ken Carman and Anthony Lima. The two guide listeners through the ups and downs of being a fan of the Browns, Cavaliers, Guardians and Ohio State Buckeyes in Northeast Ohio. They'll help you stay informed with breaking news, game coverage, and interviews with top personalities.Catch The Ken Carman Show with Anthony Lima live Monday through Friday (6 a.m. - 10 a.m ET) on 92.3 The Fan, the exclusive audio home of the Browns, or on the Audacy app. For more, follow the show on X @KenCarmanShow. 2024 © 2021 Audacy, Inc. Sports False https://player.amperwavepodcasting.com?feed-link=https%3A%2F

The Ken Carman Show with Anthony Lima
Hour 4: Cavs Defcon 1, maybe 3 + Should we give the Pacers more credit? + Do the Cavs need more enforcers?

The Ken Carman Show with Anthony Lima

Play Episode Listen Later May 12, 2025 35:46


Hour 4: Cavs Defcon 1, maybe 3 + Should we give the Pacers more credit? + Do the Cavs need more enforcers? full 2146 Mon, 12 May 2025 14:20:58 +0000 LKU7NPXXhnhjjfAHDep42Gu68ECp3WB1 sports The Ken Carman Show with Anthony Lima sports Hour 4: Cavs Defcon 1, maybe 3 + Should we give the Pacers more credit? + Do the Cavs need more enforcers? The only place to talk about the Cleveland sports scene is with Ken Carman and Anthony Lima. The two guide listeners through the ups and downs of being a fan of the Browns, Cavaliers, Guardians and Ohio State Buckeyes in Northeast Ohio. They'll help you stay informed with breaking news, game coverage, and interviews with top personalities.Catch The Ken Carman Show with Anthony Lima live Monday through Friday (6 a.m. - 10 a.m ET) on 92.3 The Fan, the exclusive audio home of the Browns, or on the Audacy app. For more, follow the show on X @KenCarmanShow. 2024 © 2021 Audacy, Inc. Sports False

Bart and Hahn
Hour 1: DEFCON 1 for the Knicks?

Bart and Hahn

Play Episode Listen Later May 12, 2025 49:21


After Saturday's blow out loss to the Celtics, Bart & Carlin gauge the fanbase to see how concerned they are about the Knicks odds to win the series. Learn more about your ad choices. Visit podcastchoices.com/adchoices

BarCode
Worldwide Security

BarCode

Play Episode Listen Later May 7, 2025 44:22


In this conversation, Dr. Fred Heiding discusses theintersection of cybersecurity and AI threats, sharing insights from his research at Harvard's Belfer Center. He emphasizes the importance of collaboration in cybersecurity, the risks of isolationism, and the need for more technical talent in policy-making. The discussion also covers national cybersecurity strategies and the challenges of implementing effectiveframeworks. In this conversation, Fred Heiding discusses the critical need for technical expertise in policy-making, emphasizing the importance of quantifying cybersecurity risks for effective decision-making. He highlights globalstrategies, particularly Japan's approach to cybersecurity for vulnerable populations, and the necessity of measuring the impact of cybersecurity initiatives. The discussion also touches on personal insights, including Heiding's love for surfing and the idea of a cybersecurity-themed bar, showcasing a blend of professional and personal perspectives. 00:00 - Introduction to Cybersecurity and AI Threats04:46 - Fred Heiding's Journey in Cybersecurity07:57 - National Cybersecurity Strategies: A GlobalPerspective10:56 - The Risks of Isolationism in Cybersecurity13:44 - Collaboration in Cybersecurity: Challenges andOpportunities16:40 - The Role of Academia in Cybersecurity Frameworks19:29 - Bridging the Gap: Technical Talent in Policy Making22:33 - Future Directions in Cybersecurity Education27:53 - The Need for Technical Expertise in Policy Making29:00 - Quantifying Risk in Cybersecurity33:39 - Global Strategies in Cybersecurity37:04 - Measuring Impact of Cybersecurity Strategies40:24 - Personal Insights and Downtime42:29 - The Concept of a Cybersecurity-Themed BarSYMLINKS[LinkedIn] - linkedin.com/in/fheidingDr. Heiding is a research fellow at both the Harvard KennedySchool's Belfer Center for Science and International Affairs and the Harvard John A. Paulson School of Engineering and Applied Sciences. His work focuses on AI-enhanced cyberattacks, cybersecurity policy, and global cybercrimemitigation. He also collaborates with the World Economic Forum's Centre for Cybersecurity and teaches at Harvard Business School.[ Fred Heiding – Personal Website] -  https://www.fredheiding.com/Dr. Heiding's personal website outlines his mission todevelop defense systems resilient against superintelligent AI attacks. It features his research on AI-driven phishing tools, cybersecurity strategies, and the intersection of AI and human factors in security.[Black Hat] - https://www.blackhat.comAn internationally recognized cybersecurity conference where experts and researchers, including Dr. Fred Heiding, present cutting-edge research on information security. Black Hat is known for its focus on deep technical content and real-world relevance.[DEF CON] - https://defcon.orgOne of the world's largest and most notable hacker conventions, often held annually in Las Vegas. It showcases critical findings and demonstrations in cybersecurity, where researchers like Dr. Heiding share their insights.[IEEE Access] - https://ieeeaccess.ieee.orgA multidisciplinary, open-access journal of the IEEE that features research from all fields of engineering and technology. Dr. Heiding's work has been published here, underlining its technical credibility.[Harvard Business Review] - https://hbr.orgA leading publication on business strategy and practice, affiliated with Harvard University. Dr. Heiding's research featured here likely emphasizes the intersection of technology, security, and organizational impact.[Harvard Kennedy School] - https://www.hks.harvard.eduA graduate school of public policy and government at Harvard University where Dr. Heiding teaches and conducts policy-relevant cybersecurity research.

Breaking Badness
Hacking the Stage: John Donovan on RSAC, BSides SF, and the Human Side of Cybersecurity

Breaking Badness

Play Episode Listen Later May 7, 2025 22:13


In this episode of Breaking Badness, we sit down with John Donovan of ZEDEDA to unpack the lighter and more profound sides of cybersecurity's biggest gatherings. From RSA's unexpected baby goats and vendor booth antics to BSides San Francisco's community-driven keynote stage, John shares personal stories, industry insights, and valuable advice on how newcomers and veterans alike can navigate events like RSA, BSides, and DEF CON. You'll hear how he "hacked" his way onto the main stage, what it means to wear a “No Purchasing Authority” pin, and why protecting your mom from scams might be more urgent than defending your enterprise.

The Dynamist
AI for Science and Discovery, w/Austin Carson

The Dynamist

Play Episode Listen Later May 5, 2025 53:55


The race to harness AI for scientific discovery may be the most consequential technological competition of this time—yet it's happening largely out of public view. While many AI headlines focus on chatbots writing essays and tech giants battling over billion-dollar models, a quiet revolution is brewing in America's laboratories.AI systems like AlphaFold (which recently won a Nobel Prize for protein structure prediction) are solving scientific problems that stumped humans for decades. A bipartisan coalition in Congress is now championing what they call the "American Science Acceleration Project" or ASAP—an audacious plan to make U.S. scientific research "ten times faster by 2030" through strategic deployment of AI. But as federal science funding faces pressure and international competition heats up, can America build the AI-powered scientific infrastructure we need? Will the benefits reach beyond elite coastal institutions to communities nationwide? And how do we ensure that as AI transforms scientific discovery, it creates opportunities instead of new divides?Joining us is Austin Carson, Founder and President of SeedAI, a nonprofit dedicated to expanding AI access and opportunity across America. Before launching SeedAI, Carson led government affairs at NVIDIA and served as Legislative Director for Rep. Michael McCaul. He's been deep in AI policy since 2016—ancient history in this rapidly evolving field—and recently organized the first-ever generative AI red-teaming event at DEF CON, collaborating with the White House to engage hundreds of college students in identifying AI vulnerabilities.

ITSPmagazine | Technology. Cybersecurity. Society
RSAC 2025 Coverage is done! It's a wrap, we are good to go, but The Musings Are Just Getting Started | An RSAC Conference 2025 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 3, 2025 5:12


RSAC 2025 is a wrap. The expo floor is closed, the conversations have ended, and the gear is packed — but the reflections are just beginning. Throughout the week, Sean Martin and Marco Ciappelli had powerful discussions around AI, identity, platform security, partnerships, the evolving legal and VC landscapes, and the growing importance of multi-layered defense strategies. But one moment stood out. While we were recording outside the conference, someone walking by asked us, “Is the world secure now?” Our answer was simple: “We're working on it.” That exchange captured the spirit of the entire event — security is not a destination, it's an ongoing effort. We learn, we adapt, and we move forward faster than the future is coming at us. Thank you to everyone who made RSAC 2025 such a meaningful experience. Next stops: AppSec Global in Barcelona, Infosec Europe in London, Black Hat and DEF CON in Las Vegas — and more conversations across the hybrid analog digital society we all share. Until next time, keep building, keep connecting, and keep moving forward. ___________Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974Akamai: https://itspm.ag/akamailbwcBlackCloak: https://itspm.ag/itspbcwebSandboxAQ: https://itspm.ag/sandboxaq-j2enArcher: https://itspm.ag/rsaarchwebDropzone AI: https://itspm.ag/dropzoneai-641ISACA: https://itspm.ag/isaca-96808ObjectFirst: https://itspm.ag/object-first-2gjlEdera: https://itspm.ag/edera-434868___________ResourcesLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage___________KEYWORDSsean martin, marco ciappelli, rsac 2025, quantum, ai, grc, devsecops, zero trust, appsec, resilience, event coverage, on location, conference___________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Bart and Hahn
Hour 1: Knicks DEFCON

Bart and Hahn

Play Episode Listen Later May 1, 2025 51:55


What DEFCON level are the Knicks fans at before tonight's game? Who needs to step up tonight? Learn more about your ad choices. Visit podcastchoices.com/adchoices

ITSPmagazine | Technology. Cybersecurity. Society
Inside the DARPA AI Cyber Challenge: Securing Tomorrow's Critical Infrastructure Through AI and Healthy Competition | An RSAC Conference 2025 Conversation with Andrew Carney | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 28, 2025 27:35


During RSAC Conference 2025, Andrew Carney, Program Manager at DARPA, and (remotely via video) Dr. Kathleen Fisher, Professor at Tufts University and Program Manager for the AI Cyber Challenge (AIxCC), guide attendees through an immersive experience called Northbridge—a fictional city designed to showcase the critical role of AI in securing infrastructure through the DARPA-led AI Cyber Challenge.Inside Northbridge: The Stakes Are RealNorthbridge simulates the future of cybersecurity, blending AI, infrastructure, and human collaboration. It's not just a walkthrough — it's a call to action. Through simulated attacks on water systems, healthcare networks, and cyber operations, visitors witness firsthand the tangible impacts of vulnerabilities in critical systems. Dr. Fisher emphasizes that the AI Cyber Challenge isn't theoretical: the vulnerabilities competitors find and fix directly apply to real open-source software relied on by society today.The AI Cyber Challenge: Pairing Generative AI with Cyber ReasoningThe AI Cyber Challenge (AIxCC) invites teams from universities, small businesses, and consortiums to create cyber reasoning systems capable of autonomously identifying and fixing vulnerabilities. Leveraging leading foundation models from Anthropic, Google, Microsoft, and OpenAI, the teams operate with tight constraints—working with limited time, compute, and LLM credits—to uncover and patch vulnerabilities at scale. Remarkably, during semifinals, teams found and fixed nearly half of the synthetic vulnerabilities, and even discovered a real-world zero-day in SQLite.Building Toward DEFCON Finals and BeyondThe journey doesn't end at RSA. As the teams prepare for the AIxCC finals at DEFCON 2025, DARPA is increasing the complexity of the challenge—and the available resources. Beyond the competition, a core goal is public benefit: all cyber reasoning systems developed through AIxCC will be open-sourced under permissive licenses, encouraging widespread adoption across industries and government sectors.From Competition to CollaborationCarney and Fisher stress that the ultimate victory isn't in individual wins, but in strengthening cybersecurity collectively. Whether securing hospitals, water plants, or financial institutions, the future demands cooperation across public and private sectors.The Northbridge experience offers a powerful reminder: resilience in cybersecurity is built not through fear, but through innovation, collaboration, and a relentless drive to secure the systems we all depend on.___________Guest: Andrew Carney, AI Cyber Challenge Program Manager, Defense Advanced Research Projects Agency (DARPA) | https://www.linkedin.com/in/andrew-carney-945458a6/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974Akamai: https://itspm.ag/akamailbwcBlackCloak: https://itspm.ag/itspbcwebSandboxAQ: https://itspm.ag/sandboxaq-j2enArcher: https://itspm.ag/rsaarchwebDropzone AI: https://itspm.ag/dropzoneai-641ISACA: https://itspm.ag/isaca-96808ObjectFirst: https://itspm.ag/object-first-2gjlEdera: https://itspm.ag/edera-434868___________ResourcesThe DARPA AIxCC Experience at RSAC 2025 Innovation Sandbox: https://www.rsaconference.com/usa/programs/sandbox/darpaLearn more and catch more stories from RSAC Conference 2025 coverage: https://www.itspmagazine.com/rsac25___________KEYWORDSandrew carney, kathleen fisher, marco ciappelli, sean martin, darpa, aixcc, cybersecurity, rsac 2025, defcon, ai cybersecurity, event coverage, on location, conference______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

Redefining CyberSecurity
Inside the DARPA AI Cyber Challenge: Securing Tomorrow's Critical Infrastructure Through AI and Healthy Competition | An RSAC Conference 2025 Conversation with Andrew Carney | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Apr 28, 2025 27:35


During RSAC Conference 2025, Andrew Carney, Program Manager at DARPA, and (remotely via video) Dr. Kathleen Fisher, Professor at Tufts University and Program Manager for the AI Cyber Challenge (AIxCC), guide attendees through an immersive experience called Northbridge—a fictional city designed to showcase the critical role of AI in securing infrastructure through the DARPA-led AI Cyber Challenge.Inside Northbridge: The Stakes Are RealNorthbridge simulates the future of cybersecurity, blending AI, infrastructure, and human collaboration. It's not just a walkthrough — it's a call to action. Through simulated attacks on water systems, healthcare networks, and cyber operations, visitors witness firsthand the tangible impacts of vulnerabilities in critical systems. Dr. Fisher emphasizes that the AI Cyber Challenge isn't theoretical: the vulnerabilities competitors find and fix directly apply to real open-source software relied on by society today.The AI Cyber Challenge: Pairing Generative AI with Cyber ReasoningThe AI Cyber Challenge (AIxCC) invites teams from universities, small businesses, and consortiums to create cyber reasoning systems capable of autonomously identifying and fixing vulnerabilities. Leveraging leading foundation models from Anthropic, Google, Microsoft, and OpenAI, the teams operate with tight constraints—working with limited time, compute, and LLM credits—to uncover and patch vulnerabilities at scale. Remarkably, during semifinals, teams found and fixed nearly half of the synthetic vulnerabilities, and even discovered a real-world zero-day in SQLite.Building Toward DEFCON Finals and BeyondThe journey doesn't end at RSA. As the teams prepare for the AIxCC finals at DEFCON 2025, DARPA is increasing the complexity of the challenge—and the available resources. Beyond the competition, a core goal is public benefit: all cyber reasoning systems developed through AIxCC will be open-sourced under permissive licenses, encouraging widespread adoption across industries and government sectors.From Competition to CollaborationCarney and Fisher stress that the ultimate victory isn't in individual wins, but in strengthening cybersecurity collectively. Whether securing hospitals, water plants, or financial institutions, the future demands cooperation across public and private sectors.The Northbridge experience offers a powerful reminder: resilience in cybersecurity is built not through fear, but through innovation, collaboration, and a relentless drive to secure the systems we all depend on.___________Guest: Andrew Carney, AI Cyber Challenge Program Manager, Defense Advanced Research Projects Agency (DARPA) | https://www.linkedin.com/in/andrew-carney-945458a6/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974Akamai: https://itspm.ag/akamailbwcBlackCloak: https://itspm.ag/itspbcwebSandboxAQ: https://itspm.ag/sandboxaq-j2enArcher: https://itspm.ag/rsaarchwebDropzone AI: https://itspm.ag/dropzoneai-641ISACA: https://itspm.ag/isaca-96808ObjectFirst: https://itspm.ag/object-first-2gjlEdera: https://itspm.ag/edera-434868___________ResourcesThe DARPA AIxCC Experience at RSAC 2025 Innovation Sandbox: https://www.rsaconference.com/usa/programs/sandbox/darpaLearn more and catch more stories from RSAC Conference 2025 coverage: https://www.itspmagazine.com/rsac25___________KEYWORDSandrew carney, kathleen fisher, marco ciappelli, sean martin, darpa, aixcc, cybersecurity, rsac 2025, defcon, ai cybersecurity, event coverage, on location, conference______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

ITSPmagazine | Technology. Cybersecurity. Society
No Manuals, No Shortcuts: Inside the Offensive Security Mindset at White Knight Labs | A White Knight Labs Brand Story With Co-Founders John Stigerwalt And Greg Hatcher

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 25, 2025 47:54


We've been in enough conversations to know when something clicks. This one did — and it did from the very first moment.In our debut Brand Story with White Knight Labs, we sat down with co-founders John Stigerwalt and Greg Hatcher, and what unfolded was more than a company intro — it was a behind-the-scenes look at what offensive security should be.John's journey is the kind that earns your respect quickly: he started at the help desk and worked his way to CISO, before pivoting into red teaming and co-founding WKL. Greg's path was more unconventional — from orchestral musician to Green Beret to cybersecurity leader. Two very different stories, but a shared philosophy: learn by doing, adapt without a manual, and never take the easy route when something meaningful is on the table.That mindset now defines how White Knight Labs works with clients. They don't sell cookie-cutter pen tests. Instead, they ask the right question up front: How does your business make money? Because if you can answer that, you can identify what a real-world attacker would go after. Then they simulate it — not in theory, but in practice.Their ransomware simulation service is a perfect example. They don't just show up with a scanner. They emulate modern adversaries using Cobalt Strike, bypassing endpoint defenses with in-house payloads, encrypting and exfiltrating data like it's just another Tuesday. Most clients fail the test — not because they're careless, but because most simulations aren't this real.And that's the point.White Knight Labs isn't here to help companies check a box. They're here to expose the gaps and raise the bar — because real threats don't play fair, and security shouldn't pretend they do.What makes them different is what they don't do. They're not an all-in-one shop, and they're proud of that. They won't touch IR for major breaches — they've got partners for that. They only resell hardware and software they've personally vetted. That honesty builds credibility. That kind of focus builds trust.Their training programs are just as intense. Between live DEF CON courses and their online platform, they're giving both new and experienced professionals a chance to train the way they operate: no shortcuts, no watered-down certs, just hard-earned skills that translate into real-world readiness.Pass their ODPC certification, and you'll probably get a call — not because they need to check a hiring box, but because it proves you're serious. And if you can write loaders that bypass real defenses? You're speaking their language.This first conversation with John and Greg reminded us why we started this series in the first place. It's not just about product features or service offerings — it's about people who live and breathe what they do, and who bring that passion into every test, every client call, and every training they offer.We've got more stories with them on the way. But if this first one is any sign of what's to come, we're in for something special.⸻Learn more about White Knight Labs: Guests:John Stigerwalt | Founder at White Knight Labs | Red Team Operations Leader | https://www.linkedin.com/in/john-stigerwalt-90a9b4110/Greg Hatcher | Founder at White Knight Labs | SOF veteran | Red Team | https://www.linkedin.com/in/gregoryhatcher2/White Knight Labs Website | https://itspm.ag/white-knight-labs-vukr______________________Keywords: penetration testing, red team, ransomware simulation, offensive security, EDR bypass, cybersecurity training, White Knight Labs, advanced persistent threat, cybersecurity startup, DEF CON training, security partnerships, cybersecurity services______________________ResourcesVisit the White Knight Labs Website to learn more: https://itspm.ag/white-knight-labs-vukrLearn more and catch more stories from White Knight Labs on ITSPmagazine: https://www.itspmagazine.com/directory/white-knight-labsLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

The BreakLine Arena
Raj Shah, Managing Partner at Shield Capital | The Future of War and DEFCON Investment

The BreakLine Arena

Play Episode Listen Later Apr 17, 2025 47:52


Join us in the BreakLine Arena for an insightful conversation with Raj Shah, Managing Partner at Shield Capital and co-founder of Resilience. As a former fighter pilot and the current Director of the Joint Reserve Detachment at DIU, Raj brings a unique perspective on the future of war, innovation in defense, and the intersection of government and technology.In this episode, Raj shares his expertise on:

Cyber Crime Junkies

Cyber Crime Junkies

Play Episode Listen Later Apr 16, 2025 58:42 Transcription Available


What if the hackers are actually the heroes?In this mind-blowing episode, host David Mauro sits down with Matt Toussain, elite military cyber warrior, DEF CON speaker, and Founder of Open Security, to reveal how offensive security and real-world hacking tactics are helping businesses reduce risk, fight cybercrime, and stay ten steps ahead of threats.

Reimagining Cyber
Cyber Storms at Sea: Securing the Maritime World - Ep 145

Reimagining Cyber

Play Episode Listen Later Apr 14, 2025 22:30


In this episode of Reimagining Cyber, we set sail into the world of maritime cybersecurity with one of the foremost experts in the field, Dr. Gary Kessler. From GPS spoofing to autonomous vessels, Gary breaks down the evolving threats facing modern ships and ports as they become increasingly digitized and connected. With over 50 years of experience in cybersecurity and a lifelong connection to the water, Gary shares how his career merged passion and profession, leading to groundbreaking research in AIS spoofing and maritime threat mitigation.We explore the real-world cyber risks impacting global logistics, including the infamous 2017 NotPetya attack on Maersk, the rise of ghost and dark fleets, and how pirates are using hacked logistics systems to target high-value cargo. Gary also explains why the term “cybersecurity” may miss the mark—and why protecting the information itself is what really matters.Plus, hear about the upcoming Maritime Hacking Village at DEFCON and how you can get involved. If you're curious about the cyber threats lurking beyond the horizon, this episode is your compass.Links:Maritime Cybersecurity: A Guide for Leaders and ManagersMaritime Hacking VillageFollow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.

Full Story
David Smith: is the US descending into authoritarianism?

Full Story

Play Episode Listen Later Apr 14, 2025 19:27


In just over 80 days of Donald Trump's second administration, the world already seems to have been remade. Even before the tariffs brought economic turmoil, the world watched as legal US residents were deported, and others arbitrarily detained at the border. And now some Australians are questioning whether they should risk travelling to the US at all. The Guardian's Washington DC bureau chief, David Smith, tells Reged Ahmad why experts fear the US is nearing ‘Defcon 1 for our democracy' You can support the Guardian at theguardian.com/fullstorysupport

Coffee Sketch Podcast
176 - Y2K, DEFCON Levels, and Zaha

Coffee Sketch Podcast

Play Episode Listen Later Apr 11, 2025 42:27 Transcription Available


DEFCON Levels and Zaha Hadid: A Nostalgic Dive into ArchitectureIn this episode of the Coffee Sketch Podcast, Jimmy and Kurt introduce a new DEFCON segment, reminiscing about Y2K, and discussing the art and architecture of Zaha Hadid. They explore the Millennium Dome's controversial legacy and dive into AI-enhanced sketches, juxtaposing traditional and modern architectural techniques. The conversation meanders through topics such as teaching, design iterations, and the influence of past projects on future work, all sprinkled with lighthearted banter and pop culture references.00:00 Introduction and New Podcast Feature01:27 Defcon Levels Explained03:16 Welcome to the Coffee Sketch Podcast04:27 Pie Day and Fundraising12:10 Sketch Collaboration and Y2K Memories16:44 Boomer Prepping and Prince's 199919:01 Millennium Dome and Richard Rogers20:34 Zaha Hadid's Influence and Mind Zone Pavilion22:44 Teaching Architecture and Student Inspirations34:49 AI Sketches and Surprising ResultsSend Feedback :) Support the showBuy some Coffee! Support the Show!https://ko-fi.com/coffeesketchpodcast/shop Our Links Follow Jamie on Instagram - https://www.instagram.com/falloutstudio/ Follow Kurt on Instagram - https://www.instagram.com/kurtneiswender/ Kurt's Practice - https://www.instagram.com/urbancolabarchitecture/ Coffee Sketch on Twitter - https://twitter.com/coffeesketch Jamie on Twitter - https://twitter.com/falloutstudio Kurt on Twitter - https://twitter.com/kurtneiswender

A Word With You
When You're Marching Off the Map - #9979

A Word With You

Play Episode Listen Later Apr 10, 2025


Maybe you've seen those old world maps that were created when a lot of the world was still unexplored. When they reached the edge of what had been explored, they drew a line and then they showed dragons and monsters beyond it - which didn't exactly encourage exploration. The story is told of this first century Roman commander who had to lead his troops beyond the line on the map and into "dragon" territory. He sent a courier back to Rome with a straightforward message - "We have just marched off the map! Please send new orders!" I'm Ron Hutchcraft and I want to have A Word With You today about "When You're Marching Off the Map." That describes how a whole lot of us are feeling since things changed so dramatically back on September 11, 2001 and all of the cataclysmic, unpredictable, unimaginable events that have come since then. We have marched off the map! Things are up for grabs with the economy; a lot of people feel their jobs are insecure. Our personal sense of safety and security have really never been the same. It has turned to a sense of vulnerability. There are prospects of bioterrorism and cyber terrorism. USA Today talked about DEFCON 1, the military's phrase for their highest state of alert - and they said a lot of us feel like we're living at DEFCON 1. We need some certainty after covid and all the upheavals; we need some leadership. We want to hear from our national leaders, from our military leaders, from our financial leaders, but none of them can give us that sense of peace and security that we're needing in this "new world" that's off the map. What we're looking for can ultimately only be found in the leader. That would be the One who created us. The issues of our day and the questions of our heart are just too big to be answered by anyone other than God Himself. In times like these, I am so glad Jesus described His relationship with those who belong to Him as one of a shepherd. Because with no clear direction these days, we're feeling a little like sheep. Here's what Jesus offered to people like us in times like these - it's in our word for today from the Word of God in John 10, beginning in verse 3, "He calls His own sheep by name and leads them out - He goes on ahead of them, and His sheep follow Him." Later, Jesus said, "My sheep listen to My voice; I know them, and they follow Me. I give them eternal life, and they shall never perish; no one can snatch them out of My hand." There is someone who knows the way to go when there is no map and He's the Lord of this universe! And Jesus leads those who belong to Him, giving them daily direction and daily provision, no matter what's happening in the headlines. And He never loses anyone that's His - because, in the words of John 10, He "laid down His life for the sheep." Jesus died for every wrong thing you've ever done so you could belong to Him forever. He's not about to lose you after paying that price for you! The Bible tells us that Jesus weeps for those who are, as He says, "sheep without a shepherd" (Matthew 9:36). That might be you today. But it doesn't have to be you for one more day. He's reaching out to you right now. He's ready to be your Shepherd in these confusing times; your anchor in the stormy times we live in and the storms of our own personal lives. Your relationship with Him begins when you tell Him you're done trying to be your own shepherd, running your own life and that you want to put your total trust in Him to forgive every sin you've ever committed, to direct your life from this day on, and to get you to heaven when you die. That's what He's waiting to give you. He's waiting for you to say, "Jesus, I'm Yours. You are my only hope. Your death on the cross, your resurrection from the dead...I want to belong to you, beginning today." Our website is all about helping you get that relationship started. I would invite you to go there. It is ANewStory.com. We have marched off the map. But Jesus knows exactly where we are - and what the future holds. And He can take you there safely...but, you have to grab His hand.

Puck Presents: The Powers That Be
Wall Street Goes to Defcon 1

Puck Presents: The Powers That Be

Play Episode Listen Later Apr 8, 2025 30:19


Bill Cohan joins Peter for a sobering discussion of Trump's trade war and its discontents: Bill Ackman, warning of an “economic nuclear winter”; Jamie Dimon, sending panicked smoke signals to the White House; Larry Fink, predicting an imminent recession; and many more. Then they turn to the meltdown in the crypto market, the decline in consumer confidence, and what comes next. To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices

Autoline After Hours
AAH #737 - DEFCON 1 on Trump's Tariffs; Preparing for the Nuclear Fallout

Autoline After Hours

Play Episode Listen Later Apr 4, 2025 62:39


TOPIC: Tariffs PANEL: Edgar Faler, CAR; Paul Eisenstein, Headlight.news; Gary Vasilash, shinymetalboxes.net; John McElroy, Autoline.tv

Darknet Diaries
157: Grifter

Darknet Diaries

Play Episode Listen Later Apr 1, 2025 77:59


Grifter is a longtime hacker, DEF CON organizer, and respected voice in the infosec community. From his early days exploring networks to helping shape one of the largest hacker conferences in the world, Grifter has built a reputation for blending deep technical insight with a sharp sense of humor.Learn more about Grifter by visiting grifter.org.SponsorsSupport for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.Support for this show comes from ZipRecruiter. ZipRecruiter has solved the hiring problem. Employers prefer it the most for so many reasons. Let's start by telling you about their matching technology. They work hard to find the best candidates for your needs, and will instantly show you results once you post a job listing. ZipRecruiter will speed up your hiring process. See it for yourself at www.ziprecruiter.com/DARKNET.This show is sponsored by Material Security. Your cloud office (think Google Workspace or Microsoft 365) is the core of your business, but it's often protected by scattered tools and manual fixes. Material is a purpose-built detection and response platform that closes the gaps those point solutions leave behind. From email threats to misconfigurations and account takeovers, Material monitors everything and steps in with real-time fixes to keep your data flowing where it should. Learn more at https://material.security.

Refuse Fascism
All Out For April 5: Silence = Collaboration

Refuse Fascism

Play Episode Listen Later Mar 31, 2025 93:24


Listen to reports and excerpts from the protests demanding the release of Mahmoud Khalil and against the the broader fascist repression of the student movement to free Palestine. Sam and Mark discuss the moment we're in and the critical need to mobilize intensely for the upcoming protest on April 5 in DC (with additional gatherings in cities around the country). Then, Sam talks with David Smith, the Guardian's Washington DC bureau chief. Read The Trump administration is descending into authoritarianism: From media to culture and the arts to the refusal to abide by court orders, we're nearing ‘Defcon 1 for our democracy', experts say and his latest: ‘It reminds you of a fascist state': Smithsonian Institution braces for Trump rewrite of US history and follow his work at theguardian.com.Act:Join the Refuse Fascism Contingent in D.C. on Saturday April 5 at the HANDS OFF ProtestRead, Sign, Spread A Call to Conscience...A Call to ActVisit RefuseFascism.org for all links mentioned in this episode.We are on TikTok officially now! Follow @refusefashism (that spelling is intentional to get around TikTok censors). Send your comments to samanthagoldman@refusefascism.org or find Refuse Fascism on all the socials, usually spelled correctly. Connect with the movement at⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ RefuseFascism.org⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and support: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠patreon.com/refusefascism⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Music for this episode: Penny the Snitch by Ikebe Shakedown

Gas Station Sushi
Episode 193 WhiskeyLeaks

Gas Station Sushi

Play Episode Listen Later Mar 26, 2025 66:15


We talk about Tony's birthday gift, DEFSEC? moar lik DEFCON, 23 and Me goes belly up, Trump junk for sale, Barron can actually TURN ON A COMPUTER! The TX dildo law, Jasmine Crockett, Fetterman panders and more.

BarCode
MikeHacksThings

BarCode

Play Episode Listen Later Mar 25, 2025 31:38


In this conversation, Mike Lisi shares his journey into the cybersecurity field, detailing his early interest in computers, the challenges he faced while obtaining his OSCP certification, and his transition into consulting. He discusses the importance of understanding client needs incybersecurity assessments and his leadership role in the Red Team Village. Mike also elaborates on the NCAE Cyber Games and the design of Capture The Flag (CTF) challenges, providing insights into effective content development for cybersecurity education. The conversation concludes with Mike sharing unique experiences from cybersecurity events and his thoughts on future engagements.TIMESTAMPS:00:00 - Introduction to Cybersecurity Journey03:23 - The Path to OSCP Certification06:13 - Transitioning to Consulting in Cybersecurity09:14 - Understanding Client Needs in Cybersecurity11:56 - Leadership in Red Team Village14:32 - NCAE Cyber Games and CTF Design17:26 - Creating Effective CTF Challenges20:04 Resources for Aspiring CTF Participants22:57 Content Development for Cybersecurity Education25:49 Unique Experiences in Cybersecurity Events28:25 Closing Thoughts and Future Engagements SYMLINKS:[Maltek Solutions Website] - https://malteksolutions.com/A cybersecurity consulting firm specializing in offensive security services, penetration testing, and risk assessments, founded by Mike Lisi.[Mike Lisi LinkedIn] - https://www.linkedin.com/in/mikelisi/Mike Lisi's official LinkedIn profile, where he shares insights on cybersecurity, offensive security consulting, and industry trends.[Red Team Village (RTV) Website] - https://redteamvillage.ioA nonprofit organization dedicated to providing educational experiences in offensive security. RTV organizes workshops, talks, and training opportunities, primarily at DEF CON and other cybersecurity conferences.[Red Team Village Discord] - https://discord.com/invite/redteamvillageThe official Red Team Village Discord server where members can connect, discuss offensive security topics, and stay updated on upcoming events and volunteer opportunities.[Red Team Village X (Twitter)]- https://twitter.com/redteamvillage_RTV's official social media account for announcements, event updates, and cybersecurity-related discussions.[MetaCTF Website] - https://metactf.comA platform offering cybersecurity competitions and Capture The Flag (CTF) events designed to help participants develop their cybersecurity skills through hands-on challenges.[CTF Time Website] - https://ctftime.orgA website that tracks cybersecurity Capture The Flag (CTF) competitions worldwide, providing schedules, rankings, and resources for both beginners and experienced competitors.[Hack The Box Website] - https://www.hackthebox.comA cybersecurity training platform offering hands-on, gamified hacking labs and challenges to develop penetration testing skills.[TryHackMe Website] - https://tryhackme.comAn interactive cybersecurity learning platform that provides guided tutorials and virtual labs for security professionals and beginners.CONNECT WITH US ⁠www.barcodesecurity.com⁠ Become a Sponsor Follow us on LinkedIn Tweet us at @BarCodeSecurity Email us at info@barcodesecurity.com

Application Security PodCast
Javan Rasokat and Andra Lezza -- When Chatbots Go Rogue - Lessons Learned from Building and Defending LLM Applications

Application Security PodCast

Play Episode Listen Later Mar 18, 2025 47:31


Andra Lezza and Javan Rasokat discuss the complexities of securing AI and LLM applications. With years of experience in Application Security (AppSec), Andra and Javan share their journey and lessons from their DEF CON talk on building and defending LLMs. They explore critical vulnerabilities, prompt injection, hallucinations, and the importance of data security. This discussion sheds light on the evolving landscape of AI and LLM security, offering practical advice for developers and security professionals alike. Javan's blog article: Adversarial Misuse of Generative AIJavan's recommendation for the TLDR newsletterAndra's book recommendation: The Cuckoo's Egg by Cliff StollFOLLOW OUR SOCIAL MEDIA: ➜Twitter: @AppSecPodcast➜LinkedIn: The Application Security Podcast➜YouTube: https://www.youtube.com/@ApplicationSecurityPodcast Thanks for Listening! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Out of Bounds with Bo Bounds
3-18-25 Steve Robertson: Are we at defcon 1 in Starkville? Steve gives us some insight on how the outside noise is being handled in-house.

Out of Bounds with Bo Bounds

Play Episode Listen Later Mar 18, 2025 16:45


All guests join us on the Farm Bureau Insurance guest line, and we are LIVE from the BankPlus Studio! Learn more about your ad choices. Visit megaphone.fm/adchoices

The Goin' Deep Show
Goin' Deep Show 2217: That VaJayJay can take a pounding.... so be nice

The Goin' Deep Show

Play Episode Listen Later Mar 15, 2025 30:01


Silverback hasn't seen 2 girls one cup so Kid tries to describe it for him in this episode of the Goin' Deep Show. The two relive a night at Hooters, telling you pricks to treat women nice—those pussies take a fucking pounding. Go balls-deep and get some asshole to yank your nutsack so your dick looks like a goddamn monster. Retro Rewinde from March of 2012. Go Deep.   1:30 Kleen is selling you something 1:40 Salespeople… gotta love em 2:00 Facebook and Google will buttock us 2:30 Who's vagina are you down on… It's Calories 3:00 Can I log them in as Tator Tots 3:10 Dimples Breakfast 3:25 Two Girls one Cup 4:00 The Description 5:00 Hooters Seating Technique 6:30 Hooters in BC is not so good 7:00 Why am I giggling around - The greatest idea ever 8:30 We love Beer and we're feeling it 9:00 Who wants to get into the Kid's Head? 9:30 The JMac Agenda 10:00 Shownotes 11:00 Hat Trick is Focused 11:20 Scare your children then dating students 12:10 The Setup 12:20 It's Not….. 13:00 Every guys dream - Porn Star Stern 13:25 Evan Stone's Goat Balls 14:00 The Ron Jeremy of our generation 14:45 Sacrafice your balls  15:00 Internet we need you to suck our balls 15:20 Serenity X can dance and suck our balls 15:45 We can gang bang Serrenity X 16:00 Romance to get in the pants 16:30 Women are Dumb 17:00 The Midlife Crisis 17:20 Do they know enough to know? 18:30 Hat Trick doesn't need Romance 19:00 Silverback made her left arm go numb 20:00 You severed my spinal cord 20:30 Treat a woman right because her twits gonna get hit… hard 20:50 Oldies are excited to see a band 21:20 How to scope out a bar 22:00 Bartender with boobies hanging out.  22:25 Never seen a ring that can plug a hole 22:45 Primal panty move 23:00 watch the panty rug burn 23:40 Banker ends his reign at the Wheel 24:50 NORAD 25:00 Defcon 4 happened at the Wheel 25:40 Sloppy Sounds 27:00 Swinging ?  28:00 I don't share 28:40 Wrap up and Thank you 29:30 the Essentials

The Daily Quiz Show
General Knowledge | What toy was released in 1957, creating an instant craze among children? (+ 7 more...)

The Daily Quiz Show

Play Episode Listen Later Mar 9, 2025 8:08


The Daily Quiz - General Knowledge Today's Questions: Question 1: What toy was released in 1957, creating an instant craze among children? Question 2: What does the Latin abbreviation term 'e.g.' mean? Question 3: When is the Feast of St. Nicholas? Question 4: What does the military acronym DEFCON stand for? Question 5: Which word is defined as 'in Turkey and some other Oriental countries, a decree or mandate issued by the sovereign'? Question 6: Which word is defined as 'high-waisted skiing pants with shoulder straps'? Question 7: What Native Language Would Jesus Christ Have Spoken? Question 8: Where did the first atomic bomb explode? This podcast is produced by Klassic Studios Learn more about your ad choices. Visit megaphone.fm/adchoices

Dare to be Legendary by Daversa Partners
Transforming Defense with AI: A Deep Dive into DEFCON AI's Mission to Redefine Mobility and Logistics ft. Yisroel Brumer, Co-Founder & CEO

Dare to be Legendary by Daversa Partners

Play Episode Listen Later Mar 6, 2025 53:36


AI is reshaping defense, mobility, and logistics. Yisroel Brumer, Co-founder & CEO of DEFCON AI, joins Paige Kuderka, Partner at Daversa, to discuss the future of AI in national security, scaling defense tech, and the challenges of innovation in a high-stakes industry. Tune in for a sharp look at how AI is redefining modern warfare and beyond.

A No Nonsense Podcast : Football
The Mateta Incident, Cunha Crash Out, Newcastle Trophy Trauma, FA Cup Defcon 5

A No Nonsense Podcast : Football

Play Episode Listen Later Mar 4, 2025 64:48


While the excitement of this years Premier League may be dwindling the magic of the cup is still in full effect. But, this weekend it felt the magic was darker than ever.A horrendous high boot on Crystal Palace's Mateta was the most obvious red card in the history of football to everyone watching, except of course to the man in charge of handing out the cards Michael Oliver.A crash out of epic proportions saw Brazil star Matheus Cunha sent off in the 120th minute, leading to Wolves being knocked out of the cup.Newcastle also crashed out, with injuries to Isak and Lewis Hall and Anthony Gordon picking up a mush based red card. The desperation continues with the Carabao Cup final rapidly approaching.Who cares if Man United are out of the F.A Cup, its the league they want to win according to manager Ruben Amorim who, once again just to confirm, is not going to change.We have some ideas to freshen up the cup branding and make these 5th round fixtures more exciting.Support the showWant to support us and also get some sweet bonus exclusive pods? Head to patreon.com/nononsensepod where you can get access to:* Weekly Bonus Episodes! Midweek games, European games, it's all there folks!* A 20+ episode mini-pod called After The Nonsense where we chat everything except football* A full archive of all our bonus content in one handy to find spot!Retro Kits!Want a retro kit to show off your ball knowledge. Use this link and support the show!Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to youhttps://www.classicfootballshirts.co.uk/?ref=nwuyn2q&cid=

ITSPmagazine | Technology. Cybersecurity. Society
Hackers, Policy, and the Future of Cybersecurity: Inside The Hackers' Almanack from DEF CON and the Franklin Project | A Conversation with Jake Braun | Redefining CyberSecurity with Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 3, 2025 40:32


⬥GUEST⬥Jake Braun, Acting Principal Deputy National Cyber Director, The White House | On LinkedIn: https://www.linkedin.com/in/jake-braun-77372539/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martin⬥EPISODE NOTES⬥Cybersecurity is often framed as a battle between attackers and defenders, but what happens when hackers take on a different role—one of informing policy, protecting critical infrastructure, and even saving lives? That's the focus of the latest Redefining Cybersecurity podcast episode, where host Sean Martin speaks with Jake Braun, former Acting Principal Deputy National Cyber Director at the White House and current Executive Director of the Cyber Policy Initiative at the University of Chicago.Braun discusses The Hackers' Almanack, a project developed in partnership with DEF CON and the Franklin Project to document key cybersecurity findings that policymakers, industry leaders, and technologists should be aware of. This initiative captures some of the most pressing security challenges emerging from DEF CON's research community and translates them into actionable insights that could drive meaningful policy change.DEF CON, The Hackers' Almanack, and the Franklin ProjectDEF CON, one of the world's largest hacker conferences, brings together tens of thousands of security researchers each year. While the event is known for its groundbreaking technical discoveries, Braun explains that too often, these findings fail to make their way into the hands of policymakers who need them most. That's why The Hackers' Almanack was created—to serve as a bridge between the security research community and decision-makers who shape regulations and national security strategies.This effort is an extension of the Franklin Project, named after Benjamin Franklin, who embodied the intersection of science and civics. The initiative includes not only The Hackers' Almanack but also a volunteer-driven cybersecurity support network for under-resourced water utilities, a critical infrastructure sector under increasing attack.Ransomware: Hackers Filling the Gaps Where Governments Have StruggledOne of the most striking sections of The Hackers' Almanack examines the state of ransomware. Despite significant government efforts to disrupt ransomware groups, attacks remain as damaging as ever. Braun highlights the work of security researcher Vangelis Stykas, who successfully infiltrated ransomware gangs—not to attack them, but to gather intelligence and warn potential victims before they were hit.While governments have long opposed private-sector hacking in retaliation against cybercriminals, Braun raises an important question: Should independent security researchers be allowed to operate in this space if they can help prevent attacks? This isn't just about hacktivism—it's about whether traditional methods of law enforcement and national security are enough to combat the ransomware crisis.AI Security: No Standards, No Rules, Just ChaosArtificial intelligence is dominating conversations in cybersecurity, but according to Braun, the industry still hasn't figured out how to secure AI effectively. DEF CON's AI Village, which has been studying AI security for years, made a bold statement: AI red teaming, as it exists today, lacks clear definitions and standards. Companies are selling AI security assessments with no universally accepted benchmarks, leaving buyers to wonder what they're really getting.Braun argues that industry leaders, academia, and government must quickly come together to define what AI security actually means. Are we testing AI applications? The algorithms? The data sets? Without clarity, AI red teaming risks becoming little more than a marketing term, rather than a meaningful security practice.Biohacking: The Blurry Line Between Innovation and BioterrorismPerhaps the most controversial section of The Hackers' Almanack explores biohacking and its potential risks. Researchers at the Four Thieves Vinegar Collective demonstrated how AI and 3D printing could allow individuals to manufacture vaccines and medical devices at home—at a fraction of the cost of commercial options. While this raises exciting possibilities for healthcare accessibility, it also raises serious regulatory and ethical concerns.Current laws classify unauthorized vaccine production as bioterrorism, but Braun questions whether that definition should evolve. If underserved communities have no access to life-saving treatments, should they be allowed to manufacture their own? And if so, how can regulators ensure safety without stifling innovation?A Call to ActionThe Hackers' Almanack isn't just a technical report—it's a call for governments, industry leaders, and the security community to rethink how we approach cybersecurity, technology policy, and even healthcare. Braun and his team at the Franklin Project are actively recruiting volunteers, particularly those with cybersecurity expertise, to help protect vulnerable infrastructure like water utilities.For policymakers, the message is clear: Pay attention to what the hacker community is discovering. These findings aren't theoretical—they impact national security, public safety, and technological advancement in ways that require immediate action.Want to learn more? Listen to the full episode and explore The Hackers' Almanack to see how cybersecurity research is shaping the future.⬥SPONSORS⬥LevelBlue: https://itspm.ag/attcybersecurity-3jdk3ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥The DEF CON 32 Hackers' Almanack: https://thehackersalmanack.com/defcon32-hackers-almanackDEF CON Franklin Project: https://defconfranklin.com/ | On LinkedIn: https://www.linkedin.com/company/def-con-franklin/DEF CON: https://defcon.org/Cyber Policy Initiative: https://harris.uchicago.edu/research-impact/initiatives-partnerships/cyber-policy-initiative⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity: 

Destination Linux
409: Interview with Craig Rowland of Sandfly Security

Destination Linux

Play Episode Listen Later Mar 3, 2025 94:13


video: https://youtu.be/O4KGfG2UJmo Join us for an insightful conversation with Craig Rowland as we dive into Linux security, cybersecurity, and the evolution of hacking from BBS days to modern threats. We explore how Sandfly Security's agentless approach protects Linux systems, the role of AI in cybersecurity, and whether you really need antivirus on Linux. Plus, we discuss startup scaling, Defcon's rise, and the cleverest Linux attack we've seen. Don't miss it! Forum Discussion Thread (https://destinationlinux.net/forum) Download as MP3 (https://aphid.fireside.fm/d/1437767933/32f28071-0b08-4ea1-afcc-37af75bd83d6/b3a44155-6616-48f2-8fe8-f269a49f9725.mp3) Support the show by becoming a patron at tuxdigital.com/membership (https://tuxdigital.com/membership) or get some swag at tuxdigital.com/store (https://tuxdigital.com/store) Hosted by: Ryan (DasGeek) = dasgeek.net (https://dasgeek.net) Jill Bryant = jilllinuxgirl.com (https://jilllinuxgirl.com) Michael Tunnell = michaeltunnell.com (https://michaeltunnell.com) Chapters: 00:00:00 Intro 00:01:56 TWIL 300 Celebration 00:05:11 Community Feedback 00:21:16 Agentless Linux Security: A Chat with Craig Rowland 00:21:46 Cybersecurity in the Military: Craig's Wildest Lessons 00:26:51 Scaling Startups & Catching the Eye of Tech Giants 00:29:27 Old-School Hacking: BBS and Salvaged Tech 00:32:52 From Small Rooms to Global Stages: The Rise of Defcon 00:35:21 Protecting Linux: The Sandfly Security Story 00:40:01 The Magic Behind Sandfly's Agentless Security 00:43:21 Assuming Linux Is Secure? Think Again! 00:47:16 Should You Run Antivirus on Linux? 00:54:15 Breaking Into Cybersecurity: Advice for Linux Enthusiasts 00:58:41 Distro Talk: What's on Craig's Machine? 00:59:58 Sandfly for the Desktop: Home Edition Arrives! 01:05:15 How AI is Changing the Cybersecurity Game 01:13:11 Linux is Everywhere—How Does Sandfly Keep Up? 01:15:59 The Most Clever Linux Attack We've Seen 01:20:51 Catching Hackers in the Act: A Sandfly Success Story 01:23:03 Drift Detection: Now with More Horsepower! 01:23:42 Think Fast! It's Lightning Round Time 01:28:38 SCALE 22x is coming 01:30:03 Red Hat Summit 2025 01:30:47 Support the Show 01:32:36 Outro Links: TWIL 300 Celebration https://thisweekinlinux.com/300 (https://thisweekinlinux.com/300) Community Feedback https://destinationlinux.net/comments (https://destinationlinux.net/comments) https://destinationlinux.net/forum (https://destinationlinux.net/forum) Craig Rowland of Sandfly Security https://destinationlinux.net/sandfly (https://destinationlinux.net/sandfly) Discount Code: destination50 Defcon https://defcon.org/ (https://defcon.org/) SCALE 22x is coming https://www.socallinuxexpo.org/scale/22x (https://www.socallinuxexpo.org/scale/22x) Red Hat Summit 2025 https://www.redhat.com/en/summit (https://www.redhat.com/en/summit) Support the Show https://tuxdigital.com/membership (https://tuxdigital.com/membership) https://store.tuxdigital.com/ (https://store.tuxdigital.com/)

Redefining CyberSecurity
Hackers, Policy, and the Future of Cybersecurity: Inside The Hackers' Almanack from DEF CON and the Franklin Project | A Conversation with Jake Braun | Redefining CyberSecurity with Sean Martin

Redefining CyberSecurity

Play Episode Listen Later Mar 3, 2025 40:32


⬥GUEST⬥Jake Braun, Acting Principal Deputy National Cyber Director, The White House | On LinkedIn: https://www.linkedin.com/in/jake-braun-77372539/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martin⬥EPISODE NOTES⬥Cybersecurity is often framed as a battle between attackers and defenders, but what happens when hackers take on a different role—one of informing policy, protecting critical infrastructure, and even saving lives? That's the focus of the latest Redefining Cybersecurity podcast episode, where host Sean Martin speaks with Jake Braun, former Acting Principal Deputy National Cyber Director at the White House and current Executive Director of the Cyber Policy Initiative at the University of Chicago.Braun discusses The Hackers' Almanack, a project developed in partnership with DEF CON and the Franklin Project to document key cybersecurity findings that policymakers, industry leaders, and technologists should be aware of. This initiative captures some of the most pressing security challenges emerging from DEF CON's research community and translates them into actionable insights that could drive meaningful policy change.DEF CON, The Hackers' Almanack, and the Franklin ProjectDEF CON, one of the world's largest hacker conferences, brings together tens of thousands of security researchers each year. While the event is known for its groundbreaking technical discoveries, Braun explains that too often, these findings fail to make their way into the hands of policymakers who need them most. That's why The Hackers' Almanack was created—to serve as a bridge between the security research community and decision-makers who shape regulations and national security strategies.This effort is an extension of the Franklin Project, named after Benjamin Franklin, who embodied the intersection of science and civics. The initiative includes not only The Hackers' Almanack but also a volunteer-driven cybersecurity support network for under-resourced water utilities, a critical infrastructure sector under increasing attack.Ransomware: Hackers Filling the Gaps Where Governments Have StruggledOne of the most striking sections of The Hackers' Almanack examines the state of ransomware. Despite significant government efforts to disrupt ransomware groups, attacks remain as damaging as ever. Braun highlights the work of security researcher Vangelis Stykas, who successfully infiltrated ransomware gangs—not to attack them, but to gather intelligence and warn potential victims before they were hit.While governments have long opposed private-sector hacking in retaliation against cybercriminals, Braun raises an important question: Should independent security researchers be allowed to operate in this space if they can help prevent attacks? This isn't just about hacktivism—it's about whether traditional methods of law enforcement and national security are enough to combat the ransomware crisis.AI Security: No Standards, No Rules, Just ChaosArtificial intelligence is dominating conversations in cybersecurity, but according to Braun, the industry still hasn't figured out how to secure AI effectively. DEF CON's AI Village, which has been studying AI security for years, made a bold statement: AI red teaming, as it exists today, lacks clear definitions and standards. Companies are selling AI security assessments with no universally accepted benchmarks, leaving buyers to wonder what they're really getting.Braun argues that industry leaders, academia, and government must quickly come together to define what AI security actually means. Are we testing AI applications? The algorithms? The data sets? Without clarity, AI red teaming risks becoming little more than a marketing term, rather than a meaningful security practice.Biohacking: The Blurry Line Between Innovation and BioterrorismPerhaps the most controversial section of The Hackers' Almanack explores biohacking and its potential risks. Researchers at the Four Thieves Vinegar Collective demonstrated how AI and 3D printing could allow individuals to manufacture vaccines and medical devices at home—at a fraction of the cost of commercial options. While this raises exciting possibilities for healthcare accessibility, it also raises serious regulatory and ethical concerns.Current laws classify unauthorized vaccine production as bioterrorism, but Braun questions whether that definition should evolve. If underserved communities have no access to life-saving treatments, should they be allowed to manufacture their own? And if so, how can regulators ensure safety without stifling innovation?A Call to ActionThe Hackers' Almanack isn't just a technical report—it's a call for governments, industry leaders, and the security community to rethink how we approach cybersecurity, technology policy, and even healthcare. Braun and his team at the Franklin Project are actively recruiting volunteers, particularly those with cybersecurity expertise, to help protect vulnerable infrastructure like water utilities.For policymakers, the message is clear: Pay attention to what the hacker community is discovering. These findings aren't theoretical—they impact national security, public safety, and technological advancement in ways that require immediate action.Want to learn more? Listen to the full episode and explore The Hackers' Almanack to see how cybersecurity research is shaping the future.⬥SPONSORS⬥LevelBlue: https://itspm.ag/attcybersecurity-3jdk3ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥The DEF CON 32 Hackers' Almanack: https://thehackersalmanack.com/defcon32-hackers-almanackDEF CON Franklin Project: https://defconfranklin.com/ | On LinkedIn: https://www.linkedin.com/company/def-con-franklin/DEF CON: https://defcon.org/Cyber Policy Initiative: https://harris.uchicago.edu/research-impact/initiatives-partnerships/cyber-policy-initiative⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity: 

Irish Tech News Audio Articles
Securing Ireland's Talent Pipeline in Cybersecurity

Irish Tech News Audio Articles

Play Episode Listen Later Feb 28, 2025 5:19


eSentire, a leading global Managed Detection and Response (MDR) cybersecurity services provider, has announced that it has awarded the annual "Sean Hennessy Bursary" to Munster Technological University (MTU)computer science student, James Spillane. This year, eSentire is also celebrating the 10-year anniversary of the opening of its international headquarters and Security Operations Centre (SOC) in Cork, Ireland. eSentire established the Sean Hennessy Bursary award in 2021, in collaboration with the Department of Computer Science at MTU, in response to Ireland's growing cybersecurity skills shortage. According to Cyber Ireland's 2024 Security Snapshot Report, the cybersecurity industry employs approximately 8,000 professionals in Ireland, an increase of 8% since 2022. The Sean Hennessy Bursary provides college financial aid, as well as the opportunity to participate in a nine-month internship with eSentire. The scholarship is named in honour of the late Sean Hennessy, a former eSentire team member who was instrumental in establishing and managing eSentire's Global SOC in Cork in 2015. Sean Hennessy passed away in 2016. This is the fourth year that the Sean Hennessy Bursary has been awarded to a MTU student. Impressively, the three previous recipients of the award are all currently employed with eSentire's Global SOC in Cork, Ireland. Each of them has reached various stages of eSentire's Career Development Program, which fosters and supports security analysts' growth through attainment of internal and external certifications, mentoring and progression. "I am delighted and honoured to have been selected as this year's recipient of the Sean Hennessy Bursary," said James Spillane, 2025 eSentire Sean Hennessy Bursary winner. "I would like to sincerely thank everyone at eSentire for this incredible opportunity to further explore the fascinating world of cybersecurity, which is a passion and interest of mine. I am also grateful to MTU for their support and guidance through my studies. Receiving this award is an honour and a fulfilling achievement, I want to thank everyone involved for this prestigious opportunity." eSentire has been protecting organisations from known and unknown cyber threats for 20+ years, providing complete attack surface coverage on premises and in the cloud. With 2000+ customers in 80+ countries, eSentire provides Exposure Management, Managed Detection and Response, and Digital Forensics and Incident Response services designed to build an organisation's cyber resilience and prevent business disruption. eSentire protects the world's most targeted organisations, with 65% of its global base recognised as critical infrastructure, vital to economic health and stability. eSentire operates the largest SOC in the Southwest region of Ireland, and as a global leader in providing award-winning cybersecurity solutions, eSentire has contributed to the broader development of the Cork region and its security analysts are highly trained experts on the frontlines of cybercrime. "The 10-year anniversary of the opening of our Global SOC and headquarters in Cork is an important milestone for us," said Ciaran Luttrell, Vice President of eSentire's Global Security Operations. "We have grown our operations and currently employ over 50 staff members, we have completed over 25 SOC analyst internships, and this is the fourth year of our special bursary program honouring the memory of Sean Hennessy." "Reflecting on our ten years in Cork, we are especially proud to have led the way in contributing to the growth of the cybersecurity community," continued Luttrell. "It is through programs such as the annual bursary, our work as Chapter Leads with Cyber Ireland, the sponsorship of CorkSec, a Cork-based Def Con meetup group; and most recently, our partnership with Cyber Innovate, an incubator program supporting cybersecurity start-up companies, which launched in 2024. We could not have accomplished all these achievements without our strong ...

SOFREP Radio
Austin Shamlin, CEO and Founder of Traverse Project

SOFREP Radio

Play Episode Listen Later Feb 26, 2025 83:40 Transcription Available


Austin Shamlin is the CEO and Founder of Traverse Project—a nonprofit organization that combats the human trafficking threat through data intelligence—where has pioneered data-driven methodologies to combat human trafficking. He is a former police executive who currently sits on the Advisory Board for the University of Houston’s Center for Research Excellence to Counter Human Trafficking, as well as the Board of Directors for Operation Path Forward—a nonprofit supporting those who serve America. Previously, Austin directed international counter-human trafficking operations for a nonprofit under the Tim Tebow Foundation and managed law enforcement operations for D.C. Public Schools. He has also worked as a government contractor in Afghanistan, Haiti, Iraq, and Somalia. He is a recognized speaker at Blackhat USA, DefCon, BENS, and other major conferences.See omnystudio.com/listener for privacy information.

Black Hills Information Security
2025-05-24 - Get Political (With Jake Williams)

Black Hills Information Security

Play Episode Listen Later Feb 26, 2025 62:29


00:00 - PreShow Banter™ — Get Political05:27 - BHIS - Talkin' Bout [infosec] News 2025-02-2506:07 - Story # 1: Trump 2.0 Brings Cuts to Cyber, Consumer Protections37:57 - Story # 2: OpenAI Uncovers Evidence of A.I.-Powered Chinese Surveillance Tool49:48 - Story # 3: Apple pulls data protection tool after UK government security row55:00 - Story # 4: Judge dismisses Chris Hadnagy lawsuit against DEF CON

Cash The Ticket
DEFCON 1: Jim's Vacation and Evan's Laid up [FULL EPISODE] | Cash the Ticket

Cash The Ticket

Play Episode Listen Later Feb 19, 2025 21:03


Cash the Ticket had some bumps in the road this week so we apologize for the lack of episodes. Valenti explains it all and gives out "system plays" in college basketball for Wednesday evening. Download the latest episode of Cash the Ticket today. To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices

Unspoken Security
What is DEF CON Hotline?

Unspoken Security

Play Episode Listen Later Feb 18, 2025 58:02 Transcription Available


DEF CON is more than just a hacking conference—it's a community. In this episode, host AJ Nash sits down with Ada Zebra, a longtime goon and leader behind DEF CON Hotline, a resource dedicated to handling security incidents, harassment reports, and crisis situations at the event. Ada shares her journey from a first-time attendee to a key figure in DEF CON's security efforts, shedding light on the history and evolution of the hotline.She discusses how the hotline was born out of necessity after an incident in 2017, when leadership realized DEF CON needed a dedicated space for attendees to report issues safely. Since its launch in 2018, the hotline has grown every year, bringing in highly trained volunteers to assist in complex situations ranging from restraining orders to personal safety concerns.AJ and Ada also explore the hotline's relationship with DEF CON's security team, how volunteers are selected and trained, and why fostering an inclusive environment matters in the hacker community. If you've ever wondered what happens behind the scenes at one of the world's largest hacker gatherings, this episode offers an inside look at the challenges, responsibilities, and impact of the DEF CON Hotline.Send us a textSupport the show

The Audit
Social Engineering Tactics & Defense Strategies with Alethe Denis

The Audit

Play Episode Listen Later Feb 10, 2025 38:24 Transcription Available


You're Being Hacked Right Now—And You Don't Even Know It Ever wonder how cybercriminals manipulate human behavior to breach even the most secure organizations?  In this episode of The Audit, Eric Brown and Nick Mellum sit down with renowned social engineer and penetration tester Alethe Denis to break down real-world hacking techniques, red team strategies, and the shocking ways attackers exploit trust. From winning DEF CON's Black Badge Social Engineering competition to executing high-stakes red team engagements, Alith shares jaw-dropping stories and expert insights on modern security threats. Key topics we cover: The art of social engineering and why it still works Wildly effective pretexts hackers use to gain access How AI and deepfakes are shaping the future of cybercrime Physical penetration testing stories that will make you rethink office security Simple but powerful strategies to protect yourself and your organization Don't wait until your organization is the next headline. Whether you're a cybersecurity pro or just getting started, this episode is packed with eye-opening insights you can't afford to miss. Like, share, and subscribe for more in-depth security discussions! #Cybersecurity #SocialEngineering #PenTesting #EthicalHacking #RedTeam 

Between The Joysticks
Episode 129: The Console War Ends

Between The Joysticks

Play Episode Listen Later Feb 5, 2025 66:37


While one live service game thrives, another dies. We kick things off by talking about the end of MultiVersus, a game both unique as a live service game and has the strength of IP. The console war officially is over between PlayStation and Xbox as Xbox brings one of its biggest franchises to PlayStation. Speaking of PlayStation we are at Defcon 1 for a State of Play and give our predictions. We wrap things up with a listener email about the Like A Dragon franchise. Thanks for listening! Intro: MultiVersus 4 Things: - MulitVersus Shutting Down - Forza Horizon 5 Coming To PS5 - State of Play February 2025 Predictions - Email! Outro: J-E-N-O-V-A - Emergence - Final Fantasy 7 Rebirth by Yoshinori Nakamura Questions or comments? Please send emails to BetweenTheJoysticks@gmail.com. Follow us on Twitter @JoysticksPod Subscribe to us on Youtube @BetweenTheJoysticks

Badlands Media
The Brief: Feb. 4, 2025 - Sovereign Wealth, Tariff Triumphs & Intersectional Insubordination

Badlands Media

Play Episode Listen Later Feb 4, 2025 58:59 Transcription Available


The gears of economic warfare are turning, and today on The Brief, Patrick Gunnels and Ashe in America break down Trump's latest power move: the creation of a U.S. Sovereign Wealth Fund—a first in American history. Is it just tariffs funding it, or is there a little “what's theirs is ours” energy in play? We connect the dots back to Saudi Arabia's 2017 purge and why this could be very bad news for the deep state's bank accounts. Meanwhile, Trudeau folds like a cheap lawn chair as Canada agrees to ramp up border security and tackle fentanyl in exchange for a tariff pause—but is this all just theater? Also, Panama kicks China's Belt and Road Initiative to the curb after a visit from Marco Rubio (yes, that Marco Rubio), and USAID's panic levels hit DEFCON 1 as Elon's band of autists dismantle their empire. All that, plus the libertarian take on tariffs, leftist meltdowns over Trump's CIA pick, and why “fair trade” has always been a scam. Buckle up, because it's all happening.

Schopp and Bulldog
How does the DEFCON system work?

Schopp and Bulldog

Play Episode Listen Later Feb 4, 2025 12:59


Mike and Bulldog talk the Sabres and also discuss the movie War Games

Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

Shawn Ryan Show

Play Episode Listen Later Jan 29, 2025 155:07


Mike Grover is a security researcher, InfoSec expert, and the creator of the infamous O.MG Cable. He gained prominence in 2019 when he showcased his malicious USB cable prototype at DEF CON, capable of recording keystrokes and executing remote commands. Grover's O.MG Cable looks identical to a regular charging cable, but contains a tiny implant that creates a Wi-Fi hotspot, allowing attackers to access the connected device from up to 300 feet away. Since its inception, Grover has refined the O.MG Cable design, making it indistinguishable from normal USB cables and expanding its capabilities. The latest iteration includes features such as geofencing, self-destruct mechanisms, and support for various connector types including Lightning and USB-C. Grover's work aims to raise awareness about hardware security risks while providing tools for red teams and security researchers to test and improve organizational defenses. Shawn Ryan Show Sponsors: https://ROKA.com | Use Code SRS https://ExpressVPN.com/SRS https://ZipRecruiter.com/SRS https://RocketMoney.com/SRS https://prizepicks.onelink.me/LME0/SRS https://ShawnLikesGold.com | 855-936-GOLD #goldcopartner https://americanfinancing.net/srs NMLS 182334, nmlsconsumeraccess.org. Call 866-781-8900 for details about credit costs and terms. Mike Grover Links: Website - https://o.mg.lol/ X - https://x.com/_MG_ LinkedIn - linkedin.com/in/mgrover Please leave us a review on Apple & Spotify Podcasts. Vigilance Elite/Shawn Ryan Links: Website | Patreon | TikTok | Instagram | Download Learn more about your ad choices. Visit podcastchoices.com/adchoices

Superpowers School Podcast - Productivity Future Of Work, Motivation, Entrepreneurs, Agile, Creative
How the Lazarus Heist Podcast Mastered the Art of Storytelling (and What You Can Learn)

Superpowers School Podcast - Productivity Future Of Work, Motivation, Entrepreneurs, Agile, Creative

Play Episode Listen Later Jan 28, 2025 38:45


We explore the power of storytelling with Geoff White, an investigative journalist and co-host of the popular BBC podcast 'The Lazarus Heist.' Geoff shares the story of North Korea's cybercriminal activities, particularly the infamous Bangladesh Bank heist. He shares insights into the underpinnings of successful cybersecurity breaches and the human vulnerabilities they exploit.Geoff also discusses his career trajectory, tips for compelling storytelling, and his experiences interviewing key figures involved in these cybercrimes. The episode highlights the importance of emotional connection and narrative in effectively communicating complex information, both in cybersecurity and beyond. 00:00 The Tragic Tale of Ignaz Semmelweis 03:52 Introducing Geoff White: Master Storyteller 14:53 The Genesis of the Lazarus Heist 18:24 The Bangladesh Bank Heist 20:47 The Heist Unfolds: From Bank to Casino 22:28 Personal Connection to the Heist 23:26 Cybersecurity Lessons from the Lazarus Heist 26:25 The Art of Storytelling in Investigative Journalism 30:42 Memorable Interviews and Behind-the-Scenes 33:31 Final Thoughts⚡️ In each episode, Paddy Dhanda deep dives into a new human Superpower to help you thrive in the age of AI.Paddy Dhanda (Host)Paddy works at the largest Tech training organisation in the UK and is passionate about helping tech professionals build human skills to thrive in the age of AI.Contact Paddy: paddy@superpowers.schoolSubscribe to my newsletter:

Packet Pushers - Full Podcast Feed
NAN083: Cox Gets Network Automation Right, and Proves It at DEF CON (Sponsored)

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Jan 22, 2025 61:22


Today’s Network Automation Nerds episode discusses Cox Communications’ journey to getting network automation right. We also talk about how they used network automation to support operating the network at the DEF CON hacker convention. Our guests are David Ezell, Joshua Watkins and Eric Hansen from Cox Communications. We dive into initial steps and challenges in... Read more »

Packet Pushers - Fat Pipe
NAN083: Cox Gets Network Automation Right, and Proves It at DEF CON (Sponsored)

Packet Pushers - Fat Pipe

Play Episode Listen Later Jan 22, 2025 61:22


Today’s Network Automation Nerds episode discusses Cox Communications’ journey to getting network automation right. We also talk about how they used network automation to support operating the network at the DEF CON hacker convention. Our guests are David Ezell, Joshua Watkins and Eric Hansen from Cox Communications. We dive into initial steps and challenges in... Read more »

BarCode
Syntax

BarCode

Play Episode Listen Later Jan 21, 2025 55:25 Transcription Available


In this engaging conversation, Chris Glanden interviews Brandon Prince, also known as Syntax, a multifaceted individual who is a hacker, DJ, and motorcycle racer. They delve into Brandon's early life, his journey into hacking and music, his experiences at DefCon, and his insights into the current job market in cybersecurity. Brandon shares unique stories from his life, including his transition from competitive motorcycle racing to DJing at security conferences, and discusses the challenges of navigating the job market today. In this engaging conversation, Chris Glanden and Syntax delve into various topics surrounding cybersecurity, innovative uses of technology, and the vibrant hacker community. They discuss the intricacies of Windows language packs and their implications for security, the creative use of Twitch as a command and control platform, and the importance of community-driven conferences. Syntax shares his experiences with unique venues and bars across the country, culminating in a humorous discussion about the concept of a cybersecurity-themed bar, complete with signature drinks that reflect hacker culture.TIMESTAMPS:00:00 - Introduction to Brandon Prince03:52 - Early Life and Hacking Beginnings06:33 - Navigating the Hacker Community08:59 - The DJ Journey and DefCon Experience11:22 - Incorporating Hacking into Music14:01 - Motorbike Racing Adventures16:35 - Current Job Market Insights19:14 - Unique Hacking Experiences26:46 - Resume Hacking29:35 - Exploring Windows Language Packs and Exploits31:39 - Innovative Use of Twitch as a C237:25 - Upcoming Conferences and Events39:37 - Preference for Community-Based Conferences46:29 - Unique Venues and Bar Experiences51:29 - Conceptualizing a Cybersecurity-Themed BarSYMLINKS:Syntax on Twitch - https://twitch.tv/Syntax976Syntax's official Twitch channel where he streams music, sim racing, and hacker-themed content.Syntax on SoundCloud - https://soundcloud.com/Syntax976SoundCloud profile featuring Syntax's original tracks, including contributions to Defcon soundtracks.DEF CON Media Server - https://media.defcon.orgOfficial media server for DEF CON, hosting soundtracks, talks, and other resources.Meow Wolf Official Website - https://meowwolf.comInteractive and immersive art experiences, including Meow Wolf venues mentioned by Syntax.CactusCon Official Website - https://cactuscon.comDetails about the CactusCon conference in Phoenix, Arizona, where Syntax may perform.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

Cleanse Heal Ignite
‘FOGVID'...TOP 5 TOXIC THREATS of 2025 and MY TOP 5 PEPTIDE SOLUTIONS

Cleanse Heal Ignite

Play Episode Listen Later Jan 9, 2025 50:02


DianeKazer.com DianeKazer.com/PEPTIDES DianeKazer.com/PURCHASEPEPTIDES DianeKazer.com/VIP DianeKazer.com/SHOP DianeKazer.com/PATIENT Sabrina Wallace and Her Extensive Research https://odysee.com/@VictorHugoArt:1/Sabrina-Wallace-Ryan-Veli-Victor-Hugo:2 Transhumanism https://www.bibliotecapleyades.net/ciencia3/ciencia_transhumanism109.htm Weather https://www.instagram.com/reel/DEgkvcRpJ2z/?igsh=cDU4OG85bXlsZHpk CIPRO Paralysis https://www.instagram.com/reel/DEitvzNSZaQ/?igsh=MXNuM3E1ZXE1b3k0bg%3D%3D 2 Men & Dog In Palisades Fire https://www.instagram.com/reel/DEgkvcRpJ2z/?igsh=cDU4OG85bXlsZHpk X Users Streaks https://www.instagram.com/reel/DEjkPMTuI3Y/?igsh=MTg0ZG4zanA4bjJpMw%3D%3D What's In The Fog https://www.instagram.com/reel/DEcMZU6yCPd/?igsh=enJrYmQ3djQ2dmtk Food Supply https://www.instagram.com/reel/DEYr4XYJJCr/?igsh=MTdpYjdmbjd3MzZzcQ%3D%3D Tsunami Fog Bank https://www.instagram.com/reel/DD0-qN1xeJN/?igsh=ZTlmMmY1a2lhY2E5 Fake Fruits https://www.instagram.com/reel/DBHSf-sRfiH/?igsh=OWliOWc1YTRuaXA3 Surgeon General's Warning on Alcohol https://www.hhs.gov/about/news/2025/01/03/us-surgeon-general-issues-new-advisory-link-alcohol-cancer-risk.html We are literally in THE battle for our life right now. The toxins have increased to DEFCON 5 and they are attacking us from every angle. And no, this is not hyperbole, this is the reality. I'm not here to SCARE you but simply to AWARE you…your survival depends on it. I know you've seen this ‘FOG' all over the place. Well my friend, it hasn't lifted and we have no idea when the evil insanity will end. There's no sitting on the sidelines at this point. So what in the heck can you do? You've got to be detoxing your body, your home, your office and every environment you NOW. I'm urging you to take serious action. And this is what I'll be sharing with you today, during our CHI Podcast: DOC TALK: The TOP 5 TOXINS and my TOP 5 PEPTIDE SOLUTIONS. So my warriors, you've got questions about toxins (and peptides and just why they are phenomenal solutions) and I've got the answers. I'm going live here Wednesday, January 8th at 10am PT / 1pm ET to give you all the details you need to know for our survival. Don't miss out, I'm answering your peptide questions LIVE and I'm offering you the solutions on WHAT to do, HOW to do it and WHERE to get your peptides to begin your healing journey. WE COVER: The TOP 5 TOXIC EXPOSURES of 2025 to Reduce & Detox NOW WHY Peptides Are a Solution the MAINSTREAM MEDICAL SCAM doesn't want you to use NEW & Rising Ozempic Dangers & What to do Instead to Lose weight FAST Let's dive deeper into my TOP 5 PEPTIDE FAV'S to Increase your Energy, Immunity, Beauty, Vitality by addressing Hormone Optimization, Infection, Inflammation + Weight Gain, Body Pain and Broken Brain! WHERE to get the solutions - JOIN our VIP Mastermind Tribe for the ‘Take Action After Party' and SHOW-AND-TELL on all things peptides for EVEN MORE INFO!

End Time Headlines
Boston researcher and physician warns we're at ‘DEFCON 3' for bird flu

End Time Headlines

Play Episode Listen Later Jan 4, 2025 35:38


A Boston researcher and physician warn that we're at ‘DEFCON 3' for bird flu, Face mask mandates return across multiple states in the US as doctors warn of ‘quad-demic’ of four viral infections, China steps up monitoring of emerging respiratory diseases while a “mystery disease outbreak” overwhelms their hospitals in a chilling echo of the […]

The CyberWire
Digital Mindhunters: a novel look at cybersecurity and artificial intelligence. [Special Edition]

The CyberWire

Play Episode Listen Later Dec 8, 2024 46:37


In this special edition podcast, N2K's Executive Editor Brandon Karpf talks with author, CEO and cybersecurity advisor Dr. Bilyana Lilly about her new novel "Digital Mindhunters." Book Overview In a high-stakes game of espionage and deception, a female analyst uncovers Russia's plot to wield artificial intelligence, espionage, and disinformation as weapons of chaos against the United States. As she races against time to thwart an assassination plot, she finds herself entangled in a web of international intrigue and discovers a parallel threat from a Chinese spy network aiming to steal data, manipulate American voters, and harness technology to dismantle the very foundations of U.S. democracy. In a world where lies are a weapon and trust is a luxury, she navigates the treacherous worlds of arms dealers, hackers, and spies to protect her country. About the author Dr. Bilyana Lilly is a cybersecurity and information warfare expert. She advises senior executives in the private and public sector on how to mitigate cybersecurity risk across their enterprises. Dr. Lilly serves on the Advisory Boards of the venture capital firm Night Dragon and the cybersecurity firm RunSafe Security. She chairs the Democratic Resilience Track of the Warsaw Security Forum and is an adjunct senior advisor for critical infrastructure and resilience at the Institute for Security and Technology. Her previous roles include a manager at Deloitte's Financial Cybersecurity Practice and a fellow at the RAND Corporation. Dr. Lilly holds a PhD in policy analysis and cyber security, and three master's degrees, including an honors degree from Oxford University. Her book "Russian Information Warfare" became a bestseller and is on display at the Pentagon. Dr. Lilly is a mentor and a speaker at RSA, DefCon, CyCon, and the Executive Women's Forum. She has been denounced by Russia's Ministry of Foreign Affairs and called cyber expert by Tom Hanks. Learn more about your ad choices. Visit megaphone.fm/adchoices