POPULARITY
Today's adversaries are increasingly operating in the cloud — and Sebastian Walla, Deputy Manager of Emerging Threats at CrowdStrike, is watching them. In this episode, he joins Adam and Cristian to dive into the latest cloud attack techniques and the adversaries behind them. So, who are they? SCATTERED SPIDER and LABYRINTH CHOLLIMA are two of the threat actors targeting and navigating cloud environments, but they have distinct methods of doing so. This conversation explores the different ways they slip into organizations undetected, some of the tools they rely on, and how they operate under the radar. It also touches on the future of cloud threat activity and AI's influence on how these attacks are evolving. Of course, no Adversary Universe episode is complete without guidance. Adam, Cristian, and Sebastian share best practices for protecting enterprise cloud environments from these threats as adversaries continue to take aim.
We bring more content from ACEP LAC with a discussion on shifting interpretations of EMTALA that may further blur the lines with the MSE and definition of fulfilling the EMTALA mandate. These changes may increase risk the physicians and potentially impact autonomy.
In this episode of Security Matters, host David Puner, dives into the world of evolving cyberthreats with Bryan Murphy, Senior Director of CyberArk's Incident Response Team. Imagine a scenario where an attacker uses AI-generated deepfakes to impersonate your company's VP of finance, gaining unauthorized access to your environment. Bryan Murphy shares insights on how these sophisticated attacks are turning identity into the attack surface and why your first line of defense might be as simple as a video call. Learn about the latest trends in social engineering, credential tiering and the importance of visual verification in incident response. Don't miss this eye-opening discussion on how to protect your organization from the ever-evolving threat landscape.
Network security has evolved from stateful perimeter firewalls with maybe some IDS/IPS to a complex stack delivered as numerous unique tools, which often don’t talk to one another and may need to be operated by specialists. In this environment it’s hard to unify a security policy, troubleshoot problems, manage and operate tools, and respond effectively... Read more »
Network security has evolved from stateful perimeter firewalls with maybe some IDS/IPS to a complex stack delivered as numerous unique tools, which often don’t talk to one another and may need to be operated by specialists. In this environment it’s hard to unify a security policy, troubleshoot problems, manage and operate tools, and respond effectively... Read more »
Network security has evolved from stateful perimeter firewalls with maybe some IDS/IPS to a complex stack delivered as numerous unique tools, which often don’t talk to one another and may need to be operated by specialists. In this environment it’s hard to unify a security policy, troubleshoot problems, manage and operate tools, and respond effectively... Read more »
This episode is sponsored by Permiso. Visit permiso.io/idac to learn more.In this sponsored episode of the Identity at the Center Podcast, hosts Jeff and Jim sit down with Paul Nguyen, co-founder and co-CEO of Permiso, to discuss the critical role of identity security in modern information security. Paul shares insights into the history of identity threats, the rise of identity-focused attacks like Scattered Spider and LLM Jacking, and the importance of real-time identity monitoring for both human and non-human identities across cloud and on-prem environments. The episode explores how Permiso is positioned in the market to provide comprehensive identity threat detection and response (ITDR) and identity security posture management (ISPM), offering advanced visibility and proactive measures against emerging threats.Chapters00:00 Introduction to Security Vendors00:50 Welcome to the Identity at the Center Podcast01:30 Sponsored Spotlight: Permiso02:14 Meet Paul Nguyen, Co-Founder of Permiso03:34 The Importance of Identity in Security05:35 Permiso's Unique Approach to Identity Security07:36 Real-Time Monitoring and Threat Detection09:23 Challenges and Solutions in Identity Security15:16 Modern Attacks and Identity Threats25:56 The Role of Honeypots in Security Research26:49 Challenges of Maintaining Security27:15 Honeypots and Breach Detection27:46 Dwell Time and Reconnaissance28:34 Password Complexity and Monitoring Gaps29:24 Roles and Responsibilities in Identity Security29:49 Unified Identity Security Teams30:57 Emerging Threats and Joint Efforts32:49 Permiso's Role in Identity Security34:10 Detection and Response Strategies36:11 Managing Identity Risks36:51 Combining Prevention and Detection39:44 Real-World Applications and Challenges51:17 Personal Insights and Final ThoughtsConnect with Paul: https://www.linkedin.com/in/paulnguyen/Learn more about Permiso: https://permiso.io/idacConnect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at idacpodcast.com and watch at idacpodcast.tvKeywords:identity security, real-time monitoring, IAM, cybersecurity, identity exploitation, modern attacks, insider threats, honeypots, organizational structure, Non-Human Identities, Identity Security, Permiso, Risk Management, Insider Threat, Shadow IT, Identity Graph, ITDR, ISPM, Cybersecurity
Kevin O'Connor is the Director of Threat Research at Adlumin. In this episode, he joins host Heather Engel to explore the cybersecurity landscape for 2025, including the emerging threats that organizations must be ready to face, from advanced ransomware tactics to AI-driven attacks. Cyber Tide is a Cybercrime Magazine podcast series brought to you by Adlumin. Working to revolutionize the way organizations secure sensitive data, Adlumin finds the newest cracks being exploited and shines a light on correcting the issue in real-time, with expert guidance. To learn more about our sponsor, visit https://adlumin.com
Lucas McCabe, a Data Science Fellow at LMI joins Breaking the Huddle to uncover fascinating insights into the world of data science, research, and AI safety. We discuss the story behind the naming of LIGER, LMI's innovative platform, and dives into his groundbreaking work on interdisciplinary data science, including a network science analysis of the opioid epidemic in collaboration with the CDC and SUNY Buffalo.
In today's episode, we're thrilled to have Niv Braun, co-founder and CEO of Noma Security, join us as we tackle some pressing issues in AI security.With the rapid adoption of generative AI technologies, the landscape of data security is evolving at breakneck speed. We'll explore the increasing need to secure systems that handle sensitive AI data and pipelines, the rise of AI security careers, and the looming threats of adversarial attacks, model "hallucinations," and more. Niv will share his insights on how companies like Noma Security are working tirelessly to mitigate these risks without hindering innovation.We'll also dive into real-world incidents, such as compromised open-source models and the infamous PyTorch breach, to illustrate the critical need for improved security measures. From the importance of continuous monitoring to the development of safer formats and the adoption of a zero trust approach, this episode is packed with valuable advice for organizations navigating the complex world of AI security.So, whether you're a data scientist, AI engineer, or simply an enthusiast eager to learn more about the intersection of AI and security, this episode promises to offer a wealth of information and practical tips to help you stay ahead in this rapidly changing field. Tune in and join the conversation as we uncover the state of AI security and what it means for the future of technology.Quotable Moments00:00 Security spotlight shifts to data and AI.03:36 Protect against misconfigurations, adversarial attacks, new risks.09:17 Compromised model with undetectable data leaks.12:07 Manual parsing needed for valid, malicious code detection.15:44 Concerns over Agiface models may affect jobs.20:00 Combines self-developed and third-party AI models.20:55 Ensure models don't use sensitive or unauthorized data.25:55 Zero Trust: mindset, philosophy, implementation, security framework.30:51 LLM attacks will have significantly higher impact.34:23 Need better security awareness, exposed secrets risk.35:50 Be organized with visibility and governance.39:51 Red teaming for AI security and safety.44:33 Gen AI primarily used by consumers, not businesses.47:57 Providing model guardrails and runtime protection services.50:53 Ensure flexible, configurable architecture for varied needs.52:35 AI, security, innovation discussed by Niamh Braun.
Today we're listening to the second half of Steve's recent Emerging Threats webinar for security leaders. In this episode, Steve responds to audience questions, covering everything from government regulation to supply chain to raising awareness within your organization. Steve Durbin's Contact Information: steve.durbin@securityforum.org Steve Durbin on LinkedIn Key Takeaways: 1. Knowing what your crown jewels are and how to protect them is paramount in a volatile world. 2. The government should do what the government does well, and it should let businesses do what businesses do well. The government should provide clear guidelines, but then there should be little interference. 3. Everything begins and ends with cyber resilience. How do we deal with the aftermath of the cyber incident that inevitably will occur? Tune in to hear more about: 1. How to get the board to care about cybersecurity and cyber risk (2:48) 2. How to avoid making regulatory compliance a tick box exercise (9:13) 3. How ISF can help make your organization more resilient (26:06) Standout Quotes: 1. “I like bringing people into the cyber space that are not technical. That doesn't mean to say you don't need technical people in cyber – you do, your security team needs to have a combination of the two – but I do very much like bringing them in from the business because their perspective is very much more about how they're going to make use of the technologies and therefore the use and the role that cybersecurity can play in securing the critical assets. Now, because we obviously are in an industry where there's a shortage of skills, what it does do is open up the markets to attracting – if you get it right – a whole variety of people that perhaps you wouldn't normally be able to bring into cybersecurity. So not only does it give you fresh perspective, not only does it align you more closely with the business, but it also opens up a pool of talent that otherwise might not be there.” - Steve Durbin 2. “I don't actually differentiate very much anymore between cyber risk and enterprise risk. [...] The reason I don't is that for me, I've become very much more convinced that cyber is so integral in everything that we do, that actually you create something of a problem for yourself if you begin to differentiate between enterprise and cyber.” Steve Durbin 3. “We need to make it simple for our users to be able to contact somebody in security if they are at all concerned about something that they've seen either through their email, on a system. And all too often we're not doing that. I can't tell you the number of times I've spoken to organizations and they simply aren't doing some of those basics. We don't need to complicate it all the time.” Steve Durbin Mentioned in this episode: Dear InfoSec Read the transcript of this episode Subscribe to the ISF Podcast wherever you listen to podcasts Connect with us on LinkedIn and Twitter From the Information Security Forum, the leading authority on cyber, information security, and risk management.
In this episode, Commissioner Dr. Jim McDonald and Executive Deputy Director Johanne Morne sit down with Dr. Nick Mantis, a Research Scientist and Principal Investigator at the New York State Department of Health's Wadsworth Center, to explore the vital role of microbiology research in improving public health outcomes. Discover how Dr. Mantis and his team's discoveries are paving the way for more effective vaccines, diagnostics, and treatments for a wide range of infectious diseases.From investigating the immune response to Lyme disease to tackling the rise of drug-resistant fungal infections, this episode delves into the critical work that is shaping the future of public health.Find out more about the work being done at the Mantis Laboratory: https://www.wadsworth.org/research/laboratories/mantisIf you have an idea for topics we should discuss, please let us know: PublicHealthNowPodcast@health.ny.gov
In this episode of Power Producers Podcast, David Carothers is joined by Joe Erle from C3 Insurance in San Diego to dive deep into the world of cyber insurance. From navigating ransomware attacks to exploring the evolving threat landscape, the conversation covers practical strategies, trends, and insights to help agencies and businesses stay ahead in a rapidly changing digital world. Joe shares his expertise on the critical role of cyber coverage, emerging AI threats, and the need for proactive planning. Key Points: Cyber Insurance in Focus Joe Erle discusses why cyber insurance is the most critical coverage today, sharing real-life cases and strategies to mitigate risks like ransomware and social engineering. Emerging Threats and AI The conversation highlights how hackers are leveraging AI for phishing, voice cloning, and malware, creating new challenges for businesses. Practical Cyber Solutions David and Joe explore tools like CyberCube, multi-factor authentication, and incident response plans to strengthen businesses' defenses. Industry Trends and Market Insights Joe sheds light on the soft cyber insurance market and why businesses should seize the opportunity to secure comprehensive coverage now. A Look Ahead The episode concludes with a teaser for future discussions, including a deep dive into conspiracy theories surrounding AI and cybersecurity. Connect with: David Carothers LinkedIn Joe Erle LinkedIn Kyle Houck LinkedIn Visit Websites: Power Producer Base Camp Killing Commercial C3 Insurance Crushing Content Power Producers Podcast Policytee The Dirty 130 The Extra 2 Minutes
Today's episode is our annual look ahead to next year, as we present Steve's recent Emerging Threats webinar for security leaders. Steve shares his thoughts on the threats cybersecurity professionals should be prepared for in 2025, and, of course, he also offers suggestions for how to handle these threats.
On this special episode, New York Times reporter Ana Swanson is joined by Neil Chilson, Head of AI Policy at The Abundance Institute, Kara Frederick, Director, Tech Policy Center at The Heritage Foundation, and Brandon Pugh, Director and Senior Fellow, Cybersecurity and Emerging Threats at R Street Institute. They discuss what we can expect from the incoming Trump administration when it comes to AI policy.
Please enjoy this encore episode of Career Notes. Senior security researcher from Secureworks Marcelle Lee shares her career journey into cybersecurity and how she helps solve hard problems in her daily work. Marcelle came into cybersecurity not through any traditional path. She describes her route from a different field and starting in cyber at her local community college through a grant program. Marcelle took full advantage of the opportunities she had and grew her career from there. She recommends finding your specialty, but continue to build other skills. As a woman in the field, she is a strong proponent of diversity and encouraging others to find what excites them. And, we thank Marcelle for sharing her story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices
Please enjoy this encore episode of Career Notes. Senior security researcher from Secureworks Marcelle Lee shares her career journey into cybersecurity and how she helps solve hard problems in her daily work. Marcelle came into cybersecurity not through any traditional path. She describes her route from a different field and starting in cyber at her local community college through a grant program. Marcelle took full advantage of the opportunities she had and grew her career from there. She recommends finding your specialty, but continue to build other skills. As a woman in the field, she is a strong proponent of diversity and encouraging others to find what excites them. And, we thank Marcelle for sharing her story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices
School safety experts delve into the latest challenges facing K-12 institutions, including cyber threats and physical vulnerabilities. This session will equip you with the tools to identify potential risks, implement effective threat assessment strategies, and ensure the safety of your school community. Learn how to spot emerging threats early, ensuring that vulnerabilities are addressed before they become critical issues.Speakers: James Miller Assistant DirectorArlington Public Schools (APS), School Safety & Emergency Management divisionJames Miller is a Certified Protection Professional and an Assistant Director with Arlington Public Schools (APS), School Safety & Emergency Management division. He holds a masters in Homeland Security from George Washington University. Prior to APS, he was a Senior Security Manager for Amazon Corporate Security and helped grow security programs for HQ2, $2.5 billion infrastructure investment in Arlington. Between 2011 and 2020, Jim was a Special Agent with the U.S. Department of State's Bureau of Diplomatic Security. He was trusted and trained to provide a secure environment for the conduct of U.S. diplomacy while protecting people, global property, and information at over a dozen U.S. diplomatic missions around the world. As a community volunteer, Jim was appointed to the Community Oversight Board in March 2022. He currently serves as one of two, non-voting members for a four-year term. Prior to joining the Foreign Service, Jim spent eight years as an infantryman in the United States Marine Corps, including three combat tours in support of Operation Iraqi Freedom. When not busy keeping our schools safe, Jim spends time with family and training for triathlons. You can find him running on Four Mile Run trail or swimming at Wakefield.Dr. Judith Solis Deputy Director Region One Education Service CenterDr. Judith M. Solis is a passionate educator with over 40 years of experience in leadership roles that prioritize educational excellence, fiscal responsibility, and organizational health. Currently serving as the Deputy Director of Region One Education Service Center, Dr. Solis leads critical regional initiatives, including the implementation of AI gun detection technology and the "Driving for Success" program. She is a regional trainer for Behavioral Threat Assessments and oversees Adult Education and Early Childhood Intervention programs, ensuring compliance with state and federal regulations.Dr. Solis's career also includes leadership roles as Assistant Superintendent at San Antonio ISD, Superintendent at La Villa ISD, and Principal at PSJA Memorial ECHS, where she consistently drove improvements in student performance, college readiness, and district operations. Her innovative leadership has earned multiple accolades, and she continues to influence educational practices with a focus on collaboration and strategic growth.Aaron SkrbinDirector of Safety and SecurityAllegheny Intermediate UnitAs the Director of Safety and Security for Allegheny Intermediate Unit, Aaron Skirbin leads the development and implementation of safety initiatives designed to ensure the well-being of students, staff, and facilities. With a strong background in emergency preparedness, Aaron works closely with school leaders to establish crisis management protocols, integrate security technologies, and foster a culture of safety throughout the district. His expertise helps create secure learning environments while staying ahead of emerging safety challenges.
Ronald Reagan's famous quote, “trust, but verify” captures the balance between faith and caution. It reminds us to value trust while backing it up with evidence. When we think about risk and resilience, this week's guest tells us the same thing. Hello everyone, and welcome to episode 162 of the Resilient Journey podcast, presented by the Resilience Think Tank. This week we revisit the relationship between risk and resilience by welcoming special guest Donna Speckhard. Donna and Mark talk about emerging threats that you and your organization should consider as we head into 2025. Donna explains how her own diversity of interests helps make her a better resilience professional. Then, she and Mark talk about third party risk and the importance of understanding what our key suppliers have in place in terms of plans, procedures and training. And, she says “trust, but verify”. Be sure to follow The Resilient Journey! We sure do appreciate it! Learn more about the Resilience Think Tank here. Want to learn more about Mark? Click here or on LinkedIn or Twitter. Special thanks to Bensound for the music.
Last week, the new director of the Pentagon's All-domain Anomaly Resolution Office (AARO), Dr. Jon Kosloski, made his first official public appearance before lawmakers during a Senate hearing, hosted by the Senate Armed Services Subcommittee on Emerging Threats and Capabilities and overseen by U.S. Senator Kirsten Gillibrand (D-NY). Although many immediately took to social media and expressed criticism of Kosloski, AARO's recent report, and the Senate hearing, there are still several notable details that have emerged within the last week that suggest AARO may be headed in a new, more promising direction. This week on The Micah Hanks Program, we provide a complete analysis of the most significant takeaways from the hearing, and what they could mean for the future of the Pentagon's UAP investigations. Have you had a UFO/UAP sighting? Please consider reporting your sighting to the UAP Sightings Reporting System, a public resource for information about sightings of aerial phenomena. The story doesn't end here... become an X Subscriber and get access to even more weekly content and monthly specials. Want to advertise/sponsor The Micah Hanks Program? We have partnered with the AdvertiseCast to handle our advertising/sponsorship requests. If you would like to advertise with The Micah Hanks Program, all you have to do is click the link below to get started: AdvertiseCast: Advertise with The Micah Hanks Program Show Notes Below are links to stories and other content featured in this episode: NEWS: China Just Activated the Most Powerful Advanced Hypergravity Machine Ever Built Buried Beneath Arctic Ice, a Secretive Underground Military Base Emerges in New Radar Images Strange “Quack-like” Noises Were Detected Off the New Zealand Coast Decades Ago. This Researcher Thinks They Were Communication AARO HEARING: Closed hearings to examine the activities of the All-domain Anomaly Resolution Office BECOME AN X SUBSCRIBER AND GET EVEN MORE GREAT PODCASTS AND MONTHLY SPECIALS FROM MICAH HANKS. Sign up today and get access to the entire back catalog of The Micah Hanks Program, as well as “classic” episodes, weekly “additional editions” of the subscriber-only X Podcast, the monthly Enigmas specials, and much more. Like us on Facebook Follow @MicahHanks on X. Keep up with Micah and his work at micahhanks.com.
In this episode of the Identity at the Center podcast, Jim McDonald is joined by guest David Mahdi, CIO at Transmit Security and former Gartner analyst. The discussion delves into the challenges of identity security and the necessity of transitioning from IAM to identity security to mitigate privacy, fraud, and scam risks. They explore the convergence of cybersecurity and identity, the rise of non-human identities, and the importance of cyber resilience. David shares insights from his global experiences and highlights the importance of behavior-based monitoring for both human and non-human identities. The episode wraps up with a lighter note as they discuss the perfect trail mix ingredients. 00:00 Welcome to the Identity at the Center Podcast 01:12 Guest Introduction: David Mahdi 02:35 The Evolution of Identity Security 04:13 The Importance of Identity Security 05:26 David Mahdi's Journey in Identity Security 07:20 Challenges in Identity and Access Management 10:10 The Role of Machine Learning in Identity Security 12:19 The Future of Identity Security 22:52 The Need for Convergence in Identity and Security Teams 33:01 Non-Human Identities and Their Management 41:00 Defining Roles and Responsibilities 41:46 Ignoring Non-Human Accounts 42:38 Emerging Threats and Risk Management 44:33 The Importance of Identity Security 46:46 Cyber Resilience in Modern Organizations 49:24 Cloud Services and Backup Plans 51:26 Ransomware and Data Access Governance 54:27 The Future of Identity Security 01:07:53 Trail Mix and Lighter Notes 01:14:32 Closing Remarks and Upcoming Events Connect with David: https://www.linkedin.com/in/dmahdi/ Learn more about Transmit Security: https://transmitsecurity.com/ Gartner IAM Summit - Save $375 on registration using our exclusive code IDAC375: https://www.gartner.com/en/conferences/na/identity-access-management-us Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at http://idacpodcast.com Keywords: Identity Security, IAM, Cyber Resilience, Machine Identity, Non-Human Identity, Digital Transformation, Cloud Security, Zero Trust, Data Breach, Risk Management, ITDR, MFA Fatigue, Deepfakes, Gen AI, Copilot, Claude AI, Decentralized Identity, Quantum Computing, Ransomware, Data Access Governance, Transmit Security, Gartner IAM Summit, FIDO Authenticate Conference.
Historian and UFO investigator Richard M. Dolan said during one of his recent YouTube shows that he doesn't believe the reality of the UFO phenomenon will ever be voluntarily disclosed by the Pentagon. “I imagine there will not be a disclosure so much as an eventual confirmation,” Dolan said. Links/Sources: Questionable Findings - AARO's Senate Testimony - YouTube AARO Open Hearing Case Slides: Senate Armed Services Subcommittee on Emerging Threats and Capabilities Pentagon says ‘no verifiable evidence' of extraterrestrial beings or technology | Fox News Flying Saucers and Swamp Gas | Bentley Historical Library Check out my YouTube channel: Quirk Zone - YouTube Extraterrestrial Reality Book Recommendations: Link to ROSWELL: THE ULTIMATE COLD CASE: CLOSED: https://amzn.to/3O2loSI Link to COMMUNION by Whitley Strieber: https://amzn.to/3xuPGqi Link to THE THREAT by David M. Jacobs: https://amzn.to/3Lk52nj Link to TOP SECRET/MAJIC by Stanton Friedman: https://amzn.to/3xvidfv Link to NEED TO KNOW by Timothy Good: https://amzn.to/3BNftfT Link to UFOS AND THE NATIONAL SECURITY STATE, VOLUME 1: https://amzn.to/3xxJvlv Link to UFOS AND THE NATIONAL SECURITY STATE, VOLUME 2: https://amzn.to/3UhdQ1l Link to THE ALLAGASH ABDUCTIONS: https://amzn.to/3qNkLSg Link to UFO CRASH RETRIEVALS by Leonard Stringfield: https://amzn.to/3RGEZKs FLYING SAUCERS FROM OUTER SPACE by Major Donald Keyhoe: https://amzn.to/3S7Wkxv CAPTURED: THE BETTY AND BARNEY HILL UFO EXPERIENCE by Stanton Friedman and Kathleen Marden: https://amzn.to/3tKNVXn --- Support this podcast: https://podcasters.spotify.com/pod/show/james-quirk/support
Historian and UFO investigator Richard M. Dolan said during one of his recent YouTube shows that he doesn't believe the reality of the UFO phenomenon will ever be voluntarily disclosed by the Pentagon. “I imagine there will not be a disclosure so much as an eventual confirmation,” Dolan said. Links/Sources: Questionable Findings - AARO's Senate Testimony - YouTube AARO Open Hearing Case Slides: Senate Armed Services Subcommittee on Emerging Threats and Capabilities Pentagon says ‘no verifiable evidence' of extraterrestrial beings or technology | Fox News Flying Saucers and Swamp Gas | Bentley Historical Library Check out my YouTube channel: Quirk Zone - YouTube Extraterrestrial Reality Book Recommendations: Link to ROSWELL: THE ULTIMATE COLD CASE: CLOSED: https://amzn.to/3O2loSI Link to COMMUNION by Whitley Strieber: https://amzn.to/3xuPGqi Link to THE THREAT by David M. Jacobs: https://amzn.to/3Lk52nj Link to TOP SECRET/MAJIC by Stanton Friedman: https://amzn.to/3xvidfv Link to NEED TO KNOW by Timothy Good: https://amzn.to/3BNftfT Link to UFOS AND THE NATIONAL SECURITY STATE, VOLUME 1: https://amzn.to/3xxJvlv Link to UFOS AND THE NATIONAL SECURITY STATE, VOLUME 2: https://amzn.to/3UhdQ1l Link to THE ALLAGASH ABDUCTIONS: https://amzn.to/3qNkLSg Link to UFO CRASH RETRIEVALS by Leonard Stringfield: https://amzn.to/3RGEZKs FLYING SAUCERS FROM OUTER SPACE by Major Donald Keyhoe: https://amzn.to/3S7Wkxv CAPTURED: THE BETTY AND BARNEY HILL UFO EXPERIENCE by Stanton Friedman and Kathleen Marden: https://amzn.to/3tKNVXn --- Support this podcast: https://podcasters.spotify.com/pod/show/james-quirk/support
Exopolitics Today Week in Review with Dr Michael Salla – Nov23, 2024 Topics 00:01:28 URGENT MESSAGE for HUMANITY – James Gilliland video 00:03:33 Congressman Tim Burchett on Pres Trump releasing UFO files 00:07:40 Volcanic lightning gives us a compelling reason for why UFOs are often seen entering/leaving volcanoes. 00:09:15 The Illuminati took over a military network of DUMBs to create corporate-controlled SSPs and Satanic Lodges - Interview with Gene Decode 00:11:35 Kerry Cassidy and positive human-looking ‘Nordic' ETs 00:16:08 I was a guest on Scot McKay's podcast where we discussed ET disclosure, the Trump administration, Nordic ETs/Galactic Federation, etc. 00:17:28 The subcommittee on Emerging Threats and Capabilities from the US Senate Armed Services Committee hold a meeting on UAPs/UFOs featuring only one witness: Dr. Jon Kosloski 00:23:30 Senator Kirsten Gillibrand, who chairs the Armed Services Subcommittee on Emerging Threats and Capabilities, has proposed a bill that will authorize the Pentagon to shoot down UAPs/UFOs over sensitive military sites 00:25:22 Announcement - Monthly Briefing Webinar – Trump Administration and ET Disclosure (insert banner) 00:28:16 JP's Nordic Encounter & Medbed - Update 40 00:30:09 Sec Def Lloyd Austin says he knows of no UFO cases that are a national security, but they nevertheless are a mystery the Pentagon will continue to investigate. 00:33:53 Friday marked the 61st anniversary of JFK's assassination. Most are unaware of the UFO factor in the assassination. Twitter Feed: https://twitter.com/michaelsalla --- Support this podcast: https://podcasters.spotify.com/pod/show/exopoliticstoday/support
It's never aliens. At least, it hasn't been yet. The United States Senate Armed Services Subcommitte on Emerging Threats and Capabilities heard testimony on Tuesday (Nov. 19) from Jon T. Kosloski, the new director of the Pentagon's All Domain Anomaly Resolution Office (AARO). In his new annual report, Kosloski revealed that AARO has found 'no empirical evidence' for alien technology. That stands in stark contrast to testimony presented to U.S. House of Representatives subcommittee, in which U.S. Navy rear admiral Tim Galludet and former U.S. counterintelligence officer Lue Elizondo told lawmakers that the American government is part of a decades long coverup to conceal the fact that "we are not alone in the cosmos."
The Senate Armed Services Committee held a closed hearing, followed by an OPEN hearing on November 19th "to examine the activities of the All-Domain Anomaly Resolution Office," (AARO) on Emerging Threats & Capabilities. Subcommittee Chair, Sen. Kirsten Gillibrand (D-NY) met with new director of AARO, Jon Kosloski. This is the entire broadcast of that hearing, followed by a post-discussion with former attorney and moderator, Suzanne Landers. Follow Suzanne on Twitter: https://x.com/csuzannelandersPatreon: www.patreon.com/somewhereskiesByMeACoffee: buymeacoffee.com/UFxzyzHOaQPayPal: Sprague51@hotmail.comWebsite: www.somewhereintheskies.comStore: http://tee.pub/lic/ULZAy7IY12UYouTube Channel: CLICK HERETwitch: https://www.twitch.tv/somewhereskies/videosOrder Ryan's new book: https://a.co/d/4KNQnM4Order Ryan's older book: https://amzn.to/3PmydYCTwitter: @SomewhereSkiesRead Ryan's Articles by CLICKING HEREOpening Theme Song, "Ephemeral Reign" by Per KiilstofteProduced by LIONSGATECopyright © 2024. Ryan Sprague. All rights reserved.Support this show http://supporter.acast.com/somewhere-in-the-skies. Hosted on Acast. See acast.com/privacy for more information.
Live Commentary, Discussion, and AARO UFO UAP Hearing Coverage. November 19, 2024 Senate Armed Services Subcommittee on Emerging Threats and Capabilities will hear testimony in regards to the activities of AARO All-domain Anomaly Resolution Office in an open session after a closed session meeting with Dr. Jon T. Kosloski, the new Director of the All-domain Anomaly Resolution Office. LIVE AARO Hearing UFOs UAP Testimony on Emerging Threats.If you enjoy the show, please leave a 5 star review..!!To see the VIDEO of this episode, click or copy link - http://youtu.be/MzzpRPIfktU❤️ EXCLUSIVE FREE MERCH INCLUDED & BEHIND-THE-SCENES ONLY FOR MY SUPPORTERS ON PATREON ➔ https://www.patreon.com/paradigm_shifts/membershipVisit my website with Articles, Videos, and Podcast direct links - https://strangeparadigms.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/strange-and-unexplained--5235662/support.
The leader of the Defense Department organization charged with investigating reports of “unidentified anomalous phenomena” laid out findings related to two high-profile incidents and another that he said hasn't received as much attention from the public. The presentation by Jon Kosloski, director of the All-Domain Anomaly Resolution Office (AARO), came during a congressional hearing Tuesday with members of the Senate Armed Services Subcommittee on Emerging Threats and Capabilities. Lawmakers have been urging the Pentagon to be more transparent about its work on UAP issues and have raised national security concerns about these types of incidents. UAP, an acronym that refers to unidentified anomalous phenomena, is a modern term for UFOs and mysterious transmedium objects. During the hearing Kosloski walked the subommittee through the findings the AARO delivered on a trio of UAP cases referred to as the Go Fast, Puerto Rico and Mt. Etna incidents, the latter of which he said hasn't received as much attention from the public. Congressional efforts to extend the Chief Data Officer Council past the end of the year got a boost Monday when a bipartisan House bill was introduced as the companion to earlier Senate legislation. The Modernizing Data Practices to Improve Government Act (H.R. 10151), introduced by Reps. Summer Lee, D-Pa., and Nancy Mace, R-S.C., calls for an extension to the council's lifespan until 2031, while also requiring the CDO Council to report to Congress about data governance challenges that prevent the adoption of emerging tech across the federal landscape. Sens. Gary Peters, D-Mich., and Todd Young, R-Ind., introduced the Senate version of this bill in September.
After serving as the head of the Technology Transformation Services at GSA for the past two years, Ann Lewis announced recently she is stepping down from the role. Lewis led the TTS organization during a time of major AI adoption across government, workforce transformation and a greater focus on spreading use of the agency's Login.gov single sign on platform. In a final interview with FedScoop, Lewis discusses those priorities for TTS going forward, as well as her journey into government, now that she's stepping away. The new director of the Defense Department's All-Domain Anomaly Resolution Office (AARO) is scheduled to meet with lawmakers in closed-door and open sessions Tuesday to discuss his organization's activities investigating “unidentified anomalous phenomena” that have raised national security concerns. The hearing with the Senate Armed Services Subcommittee on Emerging Threats and Capabilities comes on the heels of the release of the Pentagon's fiscal 2024 consolidated annual report on UAP — the modern term for UFOs and mysterious Restrictive software licensing practices are impacting multiple federal agencies in the form of cost increases and limited choices of cloud service providers (CSP) or cloud architecture, according to the Government Accountability Office. The Department of Justice, NASA, Department of Transportation and Department of Veterans all told the GAO that as result of restrictive practices in software licensing, the agencies either experienced or expected cost increases in acquisition, infrastructure and licensing. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
The Senate Armed Services Subcommittee on Emerging Threats and Capabilities hears from Jon Kosloski, director of the All-domain Anomaly Resolution Office. Kosloski became the latest permanent director of AARO earlier this year, replacing AARO's first director, Dr. Sean Kirkpatrick, who was hostile to allegations that the Department of Defense is hiding information on UFOs and aliens from elected officials. Links/Sources: AARO director to testify to Senate about UFOS: How to watch hearing Check out my YouTube channel: Quirk Zone - YouTube Extraterrestrial Reality Book Recommendations: Link to ROSWELL: THE ULTIMATE COLD CASE: CLOSED: https://amzn.to/3O2loSI Link to COMMUNION by Whitley Strieber: https://amzn.to/3xuPGqi Link to THE THREAT by David M. Jacobs: https://amzn.to/3Lk52nj Link to TOP SECRET/MAJIC by Stanton Friedman: https://amzn.to/3xvidfv Link to NEED TO KNOW by Timothy Good: https://amzn.to/3BNftfT Link to UFOS AND THE NATIONAL SECURITY STATE, VOLUME 1: https://amzn.to/3xxJvlv Link to UFOS AND THE NATIONAL SECURITY STATE, VOLUME 2: https://amzn.to/3UhdQ1l Link to THE ALLAGASH ABDUCTIONS: https://amzn.to/3qNkLSg Link to UFO CRASH RETRIEVALS by Leonard Stringfield: https://amzn.to/3RGEZKs FLYING SAUCERS FROM OUTER SPACE by Major Donald Keyhoe: https://amzn.to/3S7Wkxv CAPTURED: THE BETTY AND BARNEY HILL UFO EXPERIENCE by Stanton Friedman and Kathleen Marden: https://amzn.to/3tKNVXn --- Support this podcast: https://podcasters.spotify.com/pod/show/james-quirk/support
The Senate Armed Services Subcommittee on Emerging Threats and Capabilities hears from Jon Kosloski, director of the All-domain Anomaly Resolution Office. Kosloski became the latest permanent director of AARO earlier this year, replacing AARO's first director, Dr. Sean Kirkpatrick, who was hostile to allegations that the Department of Defense is hiding information on UFOs and aliens from elected officials. Links/Sources: AARO director to testify to Senate about UFOS: How to watch hearing Check out my YouTube channel: Quirk Zone - YouTube Extraterrestrial Reality Book Recommendations: Link to ROSWELL: THE ULTIMATE COLD CASE: CLOSED: https://amzn.to/3O2loSI Link to COMMUNION by Whitley Strieber: https://amzn.to/3xuPGqi Link to THE THREAT by David M. Jacobs: https://amzn.to/3Lk52nj Link to TOP SECRET/MAJIC by Stanton Friedman: https://amzn.to/3xvidfv Link to NEED TO KNOW by Timothy Good: https://amzn.to/3BNftfT Link to UFOS AND THE NATIONAL SECURITY STATE, VOLUME 1: https://amzn.to/3xxJvlv Link to UFOS AND THE NATIONAL SECURITY STATE, VOLUME 2: https://amzn.to/3UhdQ1l Link to THE ALLAGASH ABDUCTIONS: https://amzn.to/3qNkLSg Link to UFO CRASH RETRIEVALS by Leonard Stringfield: https://amzn.to/3RGEZKs FLYING SAUCERS FROM OUTER SPACE by Major Donald Keyhoe: https://amzn.to/3S7Wkxv CAPTURED: THE BETTY AND BARNEY HILL UFO EXPERIENCE by Stanton Friedman and Kathleen Marden: https://amzn.to/3tKNVXn --- Support this podcast: https://podcasters.spotify.com/pod/show/james-quirk/support
As we continue to highlight sessions from Convergence 2024, we came upon this talk we think you should not miss: Emerging Threats in Rheumatology: Chronic Chikungunya Arthritis and Syphilis Mimicking Rheumatic Diseases. Session presenters, Dr. Jose Kennedy Amaral Pereira and Dr. Daniela DiMarco help us explore the world of emerging threats in rheumatology: specifically, Chikungunya Arthritis and Syphilis. These two experts share insights with us to help diagnose and manage those with these devastating infections and highlight for us how important it is for rheumatologists to remain on high alert for these infections, which can be easily mistaken for more common rheumatic disorders!
Live session held for organization. Guarding the Gate. Emerging Threats. Protecting Your Life Online. Covering topics like Cyber crime by the numbers, best practices and more.Other topics: affordable ways to limit cyber liability, ai implications in cyber security today, best security practices for business, best security practices for individuals, emerging threats. ways to protect yourself online, guarding the gate of your online security, how to guard your online security, how to limit liability from cyber attacks, how to measure risk in security, parenting tips for children online, risk and brand protection, top security awareness no cost, understanding the hacker mind, ways to stop social engineering, why too much old data is risky.Send us a textHave a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446 Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That's NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.
Dr. Ann Hohenhaus interviews Dr. Scott Weese, a leading expert in veterinary infectious diseases and creator of the must-read Worms & Germs blog. Tune in as they discuss:Insights into the 2023 “mystery” canine respiratory diseaseThe impact of social media and lifestyle trends on the perception of pet healthHow the social network of dogs influences the spread of diseaseThe tragic situations that can arise if pets don't receive vaccinations on time or at allEmerging challenges and threats that will impact the future of veterinary medicine, including climate change and antibiotic resistanceAlso on this month's show: Viral trending animal story of the month, featuring the raccoons who invited close to 100 guests to a Washington woman's garden buffetAnimal news, including the contagious smile of dolphinsPet Health Listener Q&ADo you have a pet question for Dr. Hohenhaus? Email askthevet@amcny.org to have your question answered on Ask the Vet's Listener Q&A.Follow us on Facebook, Instagram, LinkedIn, and Twitter!
In this episode, host Corey Smith chats with cybersecurity expert Kenneth Knapp about critical aspects of modern cyber defense. Drawing from his 20-year Air Force background, Knapp outlines major threats like ransomware, phishing, and natural disasters, while emphasizing their potential impacts on businesses. He stresses the importance of employee training, comprehensive response plans, and staying current with emerging threats and regulations. Listen now to learn more.
Today, you're in for a treat with Eli Farhood, a licensed trader and financial market analyst with a remarkable 20 years of experience. Eli gained a deep knowledge of cybercrime and money laundering in his career. After becoming an identity theft victim, he created Katsh to solve a problem affecting hundreds of millions. Eli's unique perspective will guide us through the world of biometric authentication, a field he's been revolutionizing to eliminate the need for traditional credentials like passwords and usernames, thereby enhancing security against hacking risks. Eli will share insights on removing hardware dependency in biometric systems, making this advanced technology accessible on any smart device. We will also explore cybersecurity challenges in the age of AI. Find out the role of biometrics in ensuring GDPR compliance, their superiority over password generators, and the exciting developments in Web 3 and blockchain technology. So, get ready to discover the future of digital identities, cybersecurity, and the emerging threats of AI. Listen up!
The National Security Hour with Col. John Mills Ret. – Brandon Pugh serves as director and senior fellow for the R Street Institute's Cybersecurity and Emerging Threats team. A leader in national security and cyber policy, he also teaches at the U.S. Army's legal school. With a background in law and public policy, Brandon brings practical solutions to complex challenges in cybersecurity, technology, and privacy.
The National Security Hour with Col. John Mills Ret. – Brandon Pugh serves as director and senior fellow for the R Street Institute's Cybersecurity and Emerging Threats team. A leader in national security and cyber policy, he also teaches at the U.S. Army's legal school. With a background in law and public policy, Brandon brings practical solutions to complex challenges in cybersecurity, technology, and privacy.
All Things Internal Audit: Cybersecurity Challenges and AI Solutions In this episode, Sami Rifky, vice president of ISACA Casablanca, joins Mike Levy, CEO of Cherry Hill Advisory, to discuss the evolving cybersecurity landscape. They explore how AI is transforming threat detection and response, the importance of cybersecurity governance, and internal audit's role in managing cyber risks. Guests:Sami Rifky, vice president, ISACA Casablanca Host:Mike Levy, CEO, Cherry Hill Advisory Key Points: Introduction to Cybersecurity and AI (00:00:02) Sami Rifky's Background and Approach (00:00:37) Top Cybersecurity Risks and AI's Role (00:02:04) Challenges During the COVID-19 Pandemic (00:02:53) AI in Cybersecurity: Opportunities and Risks (00:05:06) Internal Audit's Role in Cybersecurity (00:07:23) Generative AI and Emerging Threats (00:10:10) Challenges in Implementing AI in Cybersecurity (00:13:08) Ethical Considerations in AI Deployment (00:18:37) Future of AI in Cybersecurity (00:21:15) The IIA Related Content: Interested in this topic? Visit the Cyber Resource Center to find comprehensive tools, courses, research, and webinars that help effectively manage and audit cybersecurity risks. Register for the IIA's Cybersecurity Virtual Conference on October 30th, where Sami Rifky will be a keynote speaker IIA Global Knowledge Brief: Cybersecurity (Part 2: Artificial Intelligence – Cybersecurity Friend and Foe) Visit The IIA's website or YouTube channel for related topics and more. Resources Mentioned: IIA's Cybersecurity Virtual Conference IIA's AI Auditing Framework National Science and Technology Council (NSTC) - AI and Cybersecurity: Opportunities and Challenges IBM on AI & Cybersecurity Follow All Things Internal Audit: Apple PodcastsSpotify LibsynDeezer
In this episode, Dr. Jessica Steier and Dr. Sarah Scheinman are joined by Dr. Caitlin Rivers, an expert in outbreak science, to explore the complex world of infectious diseases. The scientists discuss how outbreaks evolve into pandemics and examine the current landscape of infectious threats. They delve into the nature of various pathogens, with a particular focus on COVID-19 dynamics and emerging concerns such as Marburg virus and avian influenza. Dr. Rivers shares insights on the critical role of effective public health communication and the challenges faced by officials in a post-pandemic environment. Throughout the conversation, the hosts emphasize the importance of preparedness in addressing future infectious disease threats, offering listeners a comprehensive understanding of outbreak science and its implications for global health. All our sources from this episode are available at: https://www.unbiasedscipod.com/episodes/ (00:00) Introduction (03:17) Childhood Aspirations and Pandemic Hobbies (06:19) Understanding Pathogens and Infection (10:22) The Evolution of Outbreaks to Pandemics (15:19) Endemicity and the Future of COVID-19 (18:33) Current Outbreaks: Marburg, Measles, and Mpox (26:15) Avian Flu and Emerging Threats (42:25) Final Thoughts: Preparedness for Future Pandemics Interested in advertising with us? Please reach out to advertising@airwavemedia.com, with “Unbiased Science” in the subject line. PLEASE NOTE: The discussion and information provided in this podcast are for general educational, scientific, and informational purposes only and are not intended as, and should not be treated as, medical or other professional advice for any particular individual or individuals. Every person and medical issue is different, and diagnosis and treatment requires consideration of specific facts often unique to the individual. As such, the information contained in this podcast should not be used as a substitute for consultation with and/or treatment by a doctor or other medical professional. If you are experiencing any medical issue or have any medical concern, you should consult with a doctor or other medical professional. Further, due to the inherent limitations of a podcast such as this as well as ongoing scientific developments, we do not guarantee the completeness or accuracy of the information or analysis provided in this podcast, although, of course we always endeavor to provide comprehensive information and analysis. In no event may Unbiased Science or any of the participants in this podcast be held liable to the listener or anyone else for any decision allegedly made or action allegedly taken or not taken allegedly in reliance on the discussion or information in this podcast or for any damages allegedly resulting from such reliance. The information provided herein do not represent the views of our employers. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode from 2011 I was joined by Frank Sharpe Jr. to discuss his years of experience including some frightening predictions he had for America's future. We discussed current unrest in much of the world, potential terrorist activity, the … Continue reading →
In this episode of the NIDS view, Adam and Jim are joined by Senior Fellow, Rob Kittinger, as they discuss the concept of a transparent ocean and its implications for military strategy and nuclear deterrence.
In this bonus episode of The Business of Tech podcast, Brett Leatherman, a senior executive with the FBI, provides insights into the current cybersecurity landscape from a law enforcement perspective. Leatherman highlights the ongoing threat of ransomware targeting businesses, particularly in critical sectors like healthcare and energy. He emphasizes the importance of imposing costs on cybercriminals while also offering substantial assistance to victims of cybercrime.The FBI's success in pushing back against cybercriminals is attributed to their strategic approach of imposing costs on malicious actors while providing assistance to victims. Leatherman discusses a recent operation against the LockBit ransomware group, showcasing the FBI's efforts to disrupt cybercriminal infrastructure and assist affected businesses in decrypting data. By collaborating with international partners and conducting technical operations, the FBI aims to deter cyber adversaries and bring them to justice.Leatherman delves into the process of engaging with the FBI during a cybersecurity incident, emphasizing the importance of establishing a relationship with the local field office before a breach occurs. He outlines the steps MSPs can take before, during, and after a breach, including contacting the FBI, preserving evidence, and collaborating with law enforcement. By sharing insights on contentious information, legal considerations, and post-incident procedures, Leatherman provides valuable guidance for organizations navigating cybersecurity incidents.As cyber threats evolve, Leatherman highlights emerging technologies like artificial intelligence being leveraged by state actors for disinformation campaigns. He underscores the significance of maintaining strong cyber hygiene practices, such as implementing multi-factor authentication, patch management, and software inventory management. By focusing on the basics of cybersecurity and engaging with law enforcement proactively, organizations can enhance their defenses and mitigate the risk of cyberattacks. Leatherman concludes by emphasizing the FBI's role in assisting businesses and encouraging listeners to establish a partnership with their local FBI field office for cybersecurity support. Supported by: https://coreview.com/msp/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social
On this episode of the Six Five On the Road at BlackHat 2024, host Shira Rubinoff is joined by IBM's Guy Shanny, Global Data Security Leader, Co Founder & CEO, Polar Security, and Matthew Shriner, Global Threat Management Partner & Portfolio Leader, for a conversation on securing AI against emerging threats. Their discussion covers: The current landscape of AI security challenges Innovative strategies businesses are employing to safeguard AI The role of collaboration between tech companies in enhancing AI security IBM's approach to threat management in the context of AI Future trends in AI security and threat management Learn more at IBM.
Guest: Fred Heiding, Research Fellow, HarvardOn LinkedIn | https://www.linkedin.com/in/fheiding/On Twitter | https://twitter.com/fredheidingOn Mastodon | https://mastodon.social/@fredheidingOn Instagram | https://www.instagram.com/fheiding/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this Chats on the Road episode as part of the On Location with Sean and Marco series, hosts Sean Martin and Marco Ciappelli invite listeners into an engaging dialogue with Fred Heiding, a research fellow in computer science at Harvard. The episode dives into the intricacies of national cybersecurity strategies, exploring the intersection of technology, policy, and economics in safeguarding nations against cyber threats.Fred opens up about his journey from a technical background to a more policy-focused role at Harvard's Kennedy School, driving home the importance of a multidisciplinary approach to cybersecurity. This sets the stage for a captivating discussion on the collaborative research project he's leading, which aims to evaluate and enhance national cybersecurity strategies worldwide.Listeners are treated to an insightful narrative on how the project originated from an insightful question Fred posed at a Harvard conference, leading to a fruitful partnership with national security researcher Alex O'Neill and Lachlan Price, a pivotal figure in crafting Australia's renowned cybersecurity strategy. Together, they've been investigating the effectiveness of various national strategies, emphasizing the need for context-specific evaluations.A major highlight of the episode is the discussion on the inclusion of emerging technologies, particularly AI, in these cybersecurity policies. Fred provides an optimistic update on how even slightly older documents are proactively addressing future-proof strategies against new technological threats. This is paired with a deep dive into the concepts of resilience and the importance of creating detailed, actionable policy documents that can be evaluated for effectiveness over time.Sean and Marco steer the conversation towards the practical implications of these strategies, questioning how economic factors influence cybersecurity policy and the trade-offs between system security and usability. Fred's insights into the economic dimensions of cybersecurity, including the balance between investment in protection and the potential costs of cyber attacks, add a valuable perspective to the discussion.The episode promises to inspire listeners with Fred's forward-thinking approach and the practical applications of his research. As Fred previews his upcoming presentation at Black Hat, excitement builds for those interested in the detailed findings and innovative strategies he will share.Tune in to this episode for a thought-provoking exploration of national cybersecurity strategies, enriched by Fred Heiding's expert insights and the dynamic interaction between the hosts and their guest. Whether you're a policymaker, technologist, or cybersecurity enthusiast, this conversation offers valuable takeaways and a fresh perspective on the ever-evolving cyber landscape.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________Contributors to A Multilateral Framework for Evaluating National Cybersecurity Strategies (BlackHat Session): Fred Heiding | Research Fellow, HarvardAlex O'Neill | IndependetLachlan Price | Research Assistant, HarvardEric Rosenbach | Senior Lecturer in Public Policy, Harvard____________________________This Episode's SponsorsLevelBlue: https://itspm.ag/levelblue266f6cCoro: https://itspm.ag/coronet-30deSquareX: https://itspm.ag/sqrx-l91____________________________Follow our Black Hat USA 2024 coverage: https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegasOn YouTube:
In the latest episode of the Trust Issues podcast, the focus is on the criticality of time in organizational security. The conversation with host David Puner and guest Katherine Mowen, SVP of Information Security at Rate (formerly Guaranteed Rate), highlights the importance of swift decision-making and prompt threat response. They discuss the role of just-in-time (JIT) access and AI in accelerating response times, as well as the ever-evolving threat landscape that requires constant vigilance. The episode emphasizes the strategies and technologies shaping the future of cybersecurity, particularly at the intersection of time management and identity protection. Join us for a timely discussion that underscores the intersection of time management and identity protection.
In this episode of the 2-Minute Drill, Drex brings you the latest cybersecurity updates and insights from the healthcare sector. Learn about the forthcoming cybersecurity performance goals and healthcare regulations expected to be issued soon and the potential financial penalties for hospitals that fail to comply. Drex discusses the interconnected nature of healthcare security and the importance of third-party partners meeting higher standards. He also covers recent cybersecurity incidents, including a destructive cyberattack by a 22-year-old Russian national and a significant ransomware breach at Antlery Children's Hospital affecting nearly 800,000 individuals. Remember, Stay a little paranoid.Subscribe: https://www.thisweekhealth.com/subscribe/Linkedin: https://www.linkedin.com/company/ThisWeekHealthTwitter: https://twitter.com/thisweekhealthDonate: Alex's Lemonade Stand: Foundation for Childhood Cancer - https://www.alexslemonade.org/mypage/3173454
You've heard me say on many occasions we're shifting into the age of distrust. This week I'm exploring what that means and why it's happening as I dive into the complex world of deepfakes and cybersecurity with Jason Thatcher, founder of Breacher.ai. Together we're the evolving threats posed by AI technologies. In our conversation, we cover how deepfakes are created and the ethical challenges they pose. While this reality often creates a polarized conversation, we'll bring a balanced view on AI, discussing its potential for both innovation and misuse. We also explore practical strategies for individuals and organizations to shield themselves against digital deception, emphasizing the importance of digital literacy and situational awareness. I think you'll find the entire episode filled with actionable advice on how to navigate the challenges of this advanced technology in our everyday lives. Hopefully, by understanding the mechanics behind deepfakes and learning how to enhance our defenses, we can better prepare ourselves for a future where digital authenticity is constantly questioned. Show Notes: In this episode, Christopher dives into the rapidly evolving world of deepfakes and cybersecurity. It focuses on the implications of living in an age where distinguishing real from fake becomes increasingly challenging. Joined by Jason Thatcher, founder of Breacher AI, they explore the dangers posed by deepfakes, share anecdotes of impactful scams, and offer practical advice and strategies to mitigate these threats. From understanding the underlying human behaviors exploited by deepfakes to implementing simple countermeasures, this conversation aims to keep professionals, individuals, and families aware and prepared in the face of emerging digital threats. 00:00 -Introduction 02:01 - The Rapid Evolution of AI and Its Implications 05:37 - The Ethical Dilemma: Balancing Innovation with Security 12:17 - Understanding Deep Fakes: Definitions and Dangers 17:02 - Awareness and Education: The First Line of Defense 25:56 - Emerging Threats and How to Prepare 31:49 - Strategies for Mitigating Cybersecurity Risks 36:14 - Building Trust and Verification in the Digital Age 46:50 - Emerging Technologies and the Future of Cybersecurity 55:30 - Reflecting on the Impact and Future of AI #deepfake #ai #cybersecurity #ethics #artificialintelligence
Senior security researcher from Secureworks Marcelle Lee shares her career journey into cybersecurity and how she helps solve hard problems in her daily work. Marcelle came into cybersecurity not through any traditional path. She describes her route from a different field and starting in cyber at her local community college through a grant program. Marcelle took full advantage of the opportunities she had and grew her career from there. She recommends finding your specialty, but continue to build other skills. As a woman in the field, she is a strong proponent of diversity and encouraging others to find what excites them. And, we thank Marcelle for sharing her story with us.
Larry Johnson: A Global Chessboard New Alliances and Emerging ThreatsSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.