Process of converting plaintext to ciphertext
POPULARITY
Categories
Can we build technology today to defend against the threats of tomorrow? This week, Technology Now concludes a double episode on post quantum cryptography and explores the subject of firmware, why it's imperative that it be protected against quantum attacks and why a simple update can't solve every problem. Nigel Edwards, Director of the Security Lab at HPE Labs, tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Nigel: https://www.linkedin.com/in/nigel-edwards-170591/?originalSubdomain=ukSources: https://www.theatlantic.com/technology/archive/2016/01/the-long-and-winding-history-of-encryption/423726/https://www.theqrl.org/blog/history-of-cryptography-behind-the-code-episode-1/https://www.theguardian.com/science/2025/may/07/todays-ai-can-crack-second-world-war-enigma-code-in-short-order-experts-say
Episode 5 of our series covers always-on encryption, the smart use of metadata, and our DIY install/repair/upgrade approach. Pure's approach to security is to have it built-in and non-optional, with end-to-end encryption—covering both user data and metadata—using device or software-based AES-256 alongside features like Rapid Data Locking, role-based access controls, and secure erasure methods to protect against breaches and support compliance needs. Next, hear about how metadata serves as the “secret sauce” for Pure, enabling highly efficient, granular data services and powering capabilities like snapshots and instant cloning through a scalable, multi-tiered framework that writes, caches, and protects metadata in ways traditional arrays cannot match. Finally, we touch on installation, repairs, and upgrades which are designed for ultimate simplicity and DIY ease, with non-disruptive software and hardware changes—thanks to Pure's Evergreen architecture—which allows organizations to grow and evolve storage resources without operational downtime, complex migrations, or compromise. These architectural choices underpin Pure's promise of secure, resilient, and agile storage that adapts to changing business needs while remaining effortless to manage. Series Overview: Pure Storage's foundational approach to product engineering is guided by 15 architectural decisions that were established at the company's inception and have shaped both the technical and user experience across its product lines. These architectural choices were not made arbitrarily—they stem from a deliberate focus on simplicity, efficiency, and scalability, ensuring Pure could deliver storage solutions that break away from legacy complexity and enable continuous innovation without compromise. This series will guide viewers through all of the 15 principles, helping you understand why certain choices were made, how they impact your operations, and how they compare to other industry features and products. Join Pure Report podcast hosts Rob Ludeman, Andrew Miller, and J.D Wallace for this fun technical retrospective on Pure Storage.
MIT's recent report reveals that a staggering 95% of enterprise generative AI pilot programs fail to deliver results, primarily due to poor execution rather than the quality of the AI models themselves. The study, which involved interviews with 150 leaders and a survey of 350 employees, highlights a significant learning gap in integrating these tools into business operations. Despite the promise of generative AI, most companies are misallocating their budgets, focusing on sales and marketing instead of back-office automation, where the highest returns are found. This disconnect is further exacerbated by outdated IT help desks, which hinder security and efficiency.The UK government has recently backed off its demand for Apple to provide backdoor access to user data protected by iCloud encryption, following pressure from U.S. officials. This decision is seen as a win for privacy advocates, but the ongoing clash between governments over data privacy regulations continues to pose challenges for tech companies. The FTC has warned major tech firms against compromising U.S. privacy standards in an effort to comply with foreign regulations, highlighting the complexities of compliance fragmentation that affects customers.In the realm of artificial intelligence, OpenAI has announced updates to its latest model, GPT-5, aiming to make it more approachable after user feedback indicated a preference for the previous version, GPT-4. Meanwhile, Chinese startup DeepSeek has launched a powerful AI model, DeepSeek v3.1, which challenges the dominance of American companies. Additionally, Elon Musk's XAI has open-sourced its GROK 2.5 model, despite facing controversy over its previous iterations. These developments illustrate the rapidly evolving landscape of AI technology and the competitive pressures within the industry.The U.S. government has made headlines by purchasing a 10% stake in Intel, investing $8.9 billion in taxpayer money to stabilize the company amid its ongoing struggles. Critics argue that this move represents a shift towards industrial policy rather than traditional capitalism, as the government selects specific companies as winners and losers. This intervention raises questions about the future of the semiconductor market, as government involvement could alter pricing, supply, and vendor strategies. For IT service providers, this situation underscores the importance of diversifying hardware investments and preparing clients for potential market disruptions. Four things to know today 00:00 MIT Finds 95% of GenAI Pilots Fail, While Businesses Overspend on Cloud and Ignore IT Gaps05:08 UK Retreats on Apple Backdoor Demand as FTC Warns Big Tech and OpenAI Lands Federal Deal08:14 GPT-5 Gets a Personality Makeover, DeepSeek Goes Big, Musk Goes Open Source, and Zoom Gives You a Robot Receptionist12:50 U.S. Buys 10% of Intel With $8.9B Investment, Blurring Lines Between Capitalism and Industrial Policy This is the Business of Tech. Supported by: https://scalepad.com/dave/ https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
Transform your chaotic to-do lists into powerful project management systems that actually get things done! Mikah and Rosemary get busy with task and project management on iOS, comparing the built-in Reminders app to powerhouse tools like OmniFocus 4 and Things 3, plus they tackle tricky location-based automation challenges. Breaking down overwhelming projects - The hosts discuss how splitting large, daunting tasks into smaller, manageable steps makes projects feel achievable and less intimidating OmniFocus deep dive - Rosemary demonstrates OmniFocus's advanced features including tags, defer dates, repeat systems, time zone-specific due dates, sequential vs parallel projects, and custom perspectives for organizing tasks Things 3 overview - Mikah explains how Things 3 offers similar powerful functionality to OmniFocus but with different design choices and user experience approaches Reminders app capabilities - Detailed walkthrough of Apple's built-in Reminders showing subtasks, location-based reminders, time-based alerts, priority flags, and even printing options for physical lists News UK government backs down on iCloud encryption - The UK reportedly withdrew demands for backdoor access to encrypted iCloud data, avoiding security risks for users worldwide Apple Watch blood oxygen sensor returns - Apple cleverly circumvents the Masimo patent dispute by having the iPhone process blood oxygen measurements instead of the watch displaying them directly Feedback Location reminder delays - Bob writes about his home arrival reminders triggering 10+ minutes late despite expanding the geographic boundary, with suggestions including checking low power mode and resetting network settings Shortcuts Corner Focus mode automation challenges - Dustin asks about setting up three different focus modes for his wife's work schedule that aren't switching properly between personal, office, and client time App Caps Product Hunt - Mikah recommends this app and website for discovering new products and services before they become mainstream, despite the recent influx of AI-focused launches Bridges - Rosemary showcases this $1.99 link formatting and organization app that lets you save, categorize, and export links in multiple formats including Markdown, HTML, and JSON Hosts: Mikah Sargent and Rosemary Orchard Contact iOS Today at iOSToday@twit.tv. Download or subscribe to iOS Today at https://twit.tv/shows/ios-today Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
Transform your chaotic to-do lists into powerful project management systems that actually get things done! Mikah and Rosemary get busy with task and project management on iOS, comparing the built-in Reminders app to powerhouse tools like OmniFocus 4 and Things 3, plus they tackle tricky location-based automation challenges. Breaking down overwhelming projects - The hosts discuss how splitting large, daunting tasks into smaller, manageable steps makes projects feel achievable and less intimidating OmniFocus deep dive - Rosemary demonstrates OmniFocus's advanced features including tags, defer dates, repeat systems, time zone-specific due dates, sequential vs parallel projects, and custom perspectives for organizing tasks Things 3 overview - Mikah explains how Things 3 offers similar powerful functionality to OmniFocus but with different design choices and user experience approaches Reminders app capabilities - Detailed walkthrough of Apple's built-in Reminders showing subtasks, location-based reminders, time-based alerts, priority flags, and even printing options for physical lists News UK government backs down on iCloud encryption - The UK reportedly withdrew demands for backdoor access to encrypted iCloud data, avoiding security risks for users worldwide Apple Watch blood oxygen sensor returns - Apple cleverly circumvents the Masimo patent dispute by having the iPhone process blood oxygen measurements instead of the watch displaying them directly Feedback Location reminder delays - Bob writes about his home arrival reminders triggering 10+ minutes late despite expanding the geographic boundary, with suggestions including checking low power mode and resetting network settings Shortcuts Corner Focus mode automation challenges - Dustin asks about setting up three different focus modes for his wife's work schedule that aren't switching properly between personal, office, and client time App Caps Product Hunt - Mikah recommends this app and website for discovering new products and services before they become mainstream, despite the recent influx of AI-focused launches Bridges - Rosemary showcases this $1.99 link formatting and organization app that lets you save, categorize, and export links in multiple formats including Markdown, HTML, and JSON Hosts: Mikah Sargent and Rosemary Orchard Contact iOS Today at iOSToday@twit.tv. Download or subscribe to iOS Today at https://twit.tv/shows/ios-today Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
Transform your chaotic to-do lists into powerful project management systems that actually get things done! Mikah and Rosemary get busy with task and project management on iOS, comparing the built-in Reminders app to powerhouse tools like OmniFocus 4 and Things 3, plus they tackle tricky location-based automation challenges. Breaking down overwhelming projects - The hosts discuss how splitting large, daunting tasks into smaller, manageable steps makes projects feel achievable and less intimidating OmniFocus deep dive - Rosemary demonstrates OmniFocus's advanced features including tags, defer dates, repeat systems, time zone-specific due dates, sequential vs parallel projects, and custom perspectives for organizing tasks Things 3 overview - Mikah explains how Things 3 offers similar powerful functionality to OmniFocus but with different design choices and user experience approaches Reminders app capabilities - Detailed walkthrough of Apple's built-in Reminders showing subtasks, location-based reminders, time-based alerts, priority flags, and even printing options for physical lists News UK government backs down on iCloud encryption - The UK reportedly withdrew demands for backdoor access to encrypted iCloud data, avoiding security risks for users worldwide Apple Watch blood oxygen sensor returns - Apple cleverly circumvents the Masimo patent dispute by having the iPhone process blood oxygen measurements instead of the watch displaying them directly Feedback Location reminder delays - Bob writes about his home arrival reminders triggering 10+ minutes late despite expanding the geographic boundary, with suggestions including checking low power mode and resetting network settings Shortcuts Corner Focus mode automation challenges - Dustin asks about setting up three different focus modes for his wife's work schedule that aren't switching properly between personal, office, and client time App Caps Product Hunt - Mikah recommends this app and website for discovering new products and services before they become mainstream, despite the recent influx of AI-focused launches Bridges - Rosemary showcases this $1.99 link formatting and organization app that lets you save, categorize, and export links in multiple formats including Markdown, HTML, and JSON Hosts: Mikah Sargent and Rosemary Orchard Contact iOS Today at iOSToday@twit.tv. Download or subscribe to iOS Today at https://twit.tv/shows/ios-today Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
Transform your chaotic to-do lists into powerful project management systems that actually get things done! Mikah and Rosemary get busy with task and project management on iOS, comparing the built-in Reminders app to powerhouse tools like OmniFocus 4 and Things 3, plus they tackle tricky location-based automation challenges. Breaking down overwhelming projects - The hosts discuss how splitting large, daunting tasks into smaller, manageable steps makes projects feel achievable and less intimidating OmniFocus deep dive - Rosemary demonstrates OmniFocus's advanced features including tags, defer dates, repeat systems, time zone-specific due dates, sequential vs parallel projects, and custom perspectives for organizing tasks Things 3 overview - Mikah explains how Things 3 offers similar powerful functionality to OmniFocus but with different design choices and user experience approaches Reminders app capabilities - Detailed walkthrough of Apple's built-in Reminders showing subtasks, location-based reminders, time-based alerts, priority flags, and even printing options for physical lists News UK government backs down on iCloud encryption - The UK reportedly withdrew demands for backdoor access to encrypted iCloud data, avoiding security risks for users worldwide Apple Watch blood oxygen sensor returns - Apple cleverly circumvents the Masimo patent dispute by having the iPhone process blood oxygen measurements instead of the watch displaying them directly Feedback Location reminder delays - Bob writes about his home arrival reminders triggering 10+ minutes late despite expanding the geographic boundary, with suggestions including checking low power mode and resetting network settings Shortcuts Corner Focus mode automation challenges - Dustin asks about setting up three different focus modes for his wife's work schedule that aren't switching properly between personal, office, and client time App Caps Product Hunt - Mikah recommends this app and website for discovering new products and services before they become mainstream, despite the recent influx of AI-focused launches Bridges - Rosemary showcases this $1.99 link formatting and organization app that lets you save, categorize, and export links in multiple formats including Markdown, HTML, and JSON Hosts: Mikah Sargent and Rosemary Orchard Contact iOS Today at iOSToday@twit.tv. Download or subscribe to iOS Today at https://twit.tv/shows/ios-today Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
Why do quantum computers pose a threat to governments? This week Technology Now starts a two part dive into quantum computing. In this first episode, we ask: how are governments preparing to mitigate the threat posed by a hypothetical quantum computer which could be invented. Ken Rich, Federal CTO at HPE tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Ken Rich:https://www.linkedin.com/in/kenrich111/Sources:https://www.ncsc.gov.uk/whitepaper/next-steps-preparing-for-post-quantum-cryptographyhttps://www.britannica.com/technology/quantum-computerhttps://www.livescience.com/technology/computing/history-of-quantum-computing-key-moments-that-shaped-the-future-of-computingShor, Peter W.. “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer.” SIAM Rev. 41 (1995): 303-332.P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 1994, pp. 124-134, doi: 10.1109/SFCS.1994.365700.https://www.newscientist.com/article/2399246-record-breaking-quantum-computer-has-more-than-1000-qubits/
DigiCert is widely recognized for its expertise in PKI and as a TLS certificate authority. As you can imagine, they have a significant perspective on the quantum computing threat to encryption and the migration to post-quantum cryptography (PQC). We cover everything from the challenges of upgrading IoT devices to ML-DSA signature sizes, as well as the new DigiCert One platform the company offers to help manage the migration process. In the middle of this episode, you'll even get a clear summary of what a successful rollout to PQC looks like. Join host Konstantinos Karagiannis for a wide-ranging chat on actionable PQC steps you can take with Kevin Hilscher from DigiCert. There's even a Quantum Safe Playground to experiment with!For more information on DigiCert, visit www.digicert.com/. Visit the Quantum Safe Playground at https://labs.digicert.com/quantum-safe.Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti on LinkedIn and Twitter: @Protiviti. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021.Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
At Black Hat USA 2025, Sean Martin, co-founder of ITSPmagazine, sat down with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, to discuss the findings from the company's latest ransomware report. Over the past five years, the research has tracked how attack patterns, targets, and business models have shifted—most notably from file encryption to data theft and extortion.Brett explains that many ransomware groups now find it more profitable—and less risky—to steal sensitive data and threaten to leak it unless paid, rather than encrypt files and disrupt operations. This change also allows attackers to stay out of the headlines and avoid immediate law enforcement pressure, while still extracting massive payouts. One case saw a Fortune 50 company pay $75 million to prevent the leak of 100 terabytes of sensitive medical data—without a single file being encrypted.The report highlights variation in attacker methods. Some groups focus on single large targets; others, like the group “LOP,” exploit vulnerabilities in widely used file transfer applications, making supply chain compromise a preferred tactic. Once inside, attackers validate their claims by providing file trees and sample data—proving the theft is real.Certain industries remain disproportionately affected. Healthcare, manufacturing, and technology are perennial top targets, with oil and gas seeing a sharp increase this year. Many victims operate with legacy systems, slow to adopt modern security measures, making them vulnerable. Geographically, the U.S. continues to be hit hardest, accounting for roughly half of all observed ransomware incidents.The conversation also addresses why organizations fail to detect such massive data theft—sometimes hundreds of gigabytes per day over weeks. Poor monitoring, limited security staffing, and alert fatigue all contribute. Brett emphasizes that reducing exposure starts with eliminating unnecessary internet-facing services and embracing zero trust architectures to prevent lateral movement.The ransomware report serves not just as a data source but as a practical guide. By mapping observed attacker behaviors to defensive strategies, organizations can better identify and close their most dangerous gaps—before becoming another statistic in next year's findings.Learn more about Zscaler: https://itspm.ag/zscaler-327152Note: This story contains promotional content. Learn more.Guest:Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, | On LinkedIn: https://www.linkedin.com/in/brett-stone-gross/ResourcesLearn more and catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscalerLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: sean martin, brett stone-gross, ransomware, data extortion, cyber attacks, zero trust security, threat intelligence, data breach, cyber defense, network security, file transfer vulnerability, data protection, black hat, black hat usa 2025, zscaler
In this episode, Craig Jeffery and Brian Weeks explore homomorphic encryption, an emerging encryption method that allows data to be processed while still encrypted. They discuss how it works, why it matters, and potential future applications in finance, benchmarking, and fraud detection. When will it become relevant to treasury? Listen in for a forward-looking perspective. For a deeper technical dive, check out these videos: https://youtu.be/SEBdYXxijSo https://youtu.be/lNw6d05RW6E
IonQ is poised to redefine the quantum computing landscape, projecting a staggering 80,000 logical qubits by 2030—potentially unlocking the power to crack encryption. NIST has us on a timeline to upgrade to post-quantum cryptography (PQC) by 2035, so this 5-year gap may spell doom for cybersecurity. Of course, these machines will also revolutionize industries from finance to drug discovery to AI. How is IonQ boosting their roadmap by orders of magnitude? Learn about their cutting-edge acquisitions and bold vision for scalable, error-corrected systems in this wide-ranging chat between host Konstantinos Karagiannis and IonQ SVP Dean Kassmann.For more information on IonQ, visit https://ionq.com/.Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready.Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti on LinkedIn and Twitter: @Protiviti. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
For episode 567 of the BlockHash Podcast, host Brandon Zemp is joined by Joe Andrews, Co-founder & President of Aztec. Aztec is a fully programmable private ZK-rollup on Ethereum enabling developers to create decentralized applications with encryption and scale.⏳ Timestamps: (0:00) Introduction(0:55) Who is Joe Andrews?(4:03) Aztec in 2025(6:00) Aztec Roadmap(8:05) Aztec's role in Privacy Onchain(12:50) Aztec ecosystem applications(16:30) Balancing Privacy and Compliance Onchain(20:40) Future of Privacy(23:45) Events & Conferences in 2025(24:35) Aztec website, socials & community
At Black Hat USA 2025, Jennifer Granick—Surveillance and Cybersecurity Counsel at the American Civil Liberties Union—takes the keynote stage to make a bold case: we are long overdue for a new threat model, one that sees government surveillance not as a background risk, but as a primary threat to constitutional privacy.Granick draws from decades of experience defending hackers, fighting surveillance overreach, and engaging with the security community since DEFCON 3. She challenges the audience to reconsider outdated assumptions about how the Fourth Amendment is interpreted and applied. While technology has made it easier than ever for governments to collect data, the legal system hasn't kept pace—and in many cases, fails to recognize the sheer scope and sensitivity of personal information exposed through modern services.Her talk doesn't just raise alarm; it calls for action. Granick suggests that while legal reform is sluggish—stymied by a lack of political will and lobbying power—there's an urgent opportunity for the technical community to step up. From encryption to data minimization and anonymization, technologists have the tools to protect civil liberties even when the law falls short.The session promises to be a wake-up call for engineers, designers, policymakers, and privacy advocates. Granick wants attendees to leave not only more informed, but motivated to build systems that limit the unnecessary collection, retention, and exposure of personal data.Her keynote also surfaces a critical cultural shift: from the “Spot the Fed” days of DEFCON to a more nuanced understanding of government roles—welcoming collaboration where it serves the public good, but not at the expense of unchecked surveillance.This conversation reframes privacy as a design problem as much as a legal one—and one that requires collective effort to address. If the law can't fix it, the question becomes: will the technology community rise to the challenge?___________Guest:Jennifer Granick, Surveillance and Cybersecurity Counsel at American Civil Liberties Union | On LinkedIn: https://www.linkedin.com/in/jennifergranick/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesKeynote: Threat Modeling and Constitutional Law: https://www.blackhat.com/us-25/briefings/schedule/index.html#keynote-threat-modeling-and-constitutional-law-48276Learn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com
Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com
Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com
Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com
Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com
Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com
In this episode of From the Crows' Nest, host Ken Miller delves into the intersection of privacy and national security with Susan Landau, the Director of the Cybersecurity Center at Tufts University.Landau testified before Congress last month calling for improved encryption as a matter of national security. She tells host Ken Miller that the modern debate over encryption and cybersecurity dates back to a cyber espionage operation run by Chinese hackers called “Salt Typhoon” that breached various parties and critical U.S. infrastructure, including wiretapping members of both the Trump and Harris presidential campaigns. Their ability to breach texts and voice messages and access databases highlighted inefficiencies in America's cybersecurity infrastructure – and the tension between protecting American citizens from cyberattacks while posing additional challenges to law enforcement agencies worldwide.To learn more about today's topics or to stay updated on EMSO and EW developments, visit our homepage.We also invite you to share your thoughts, questions, or suggestions for future episodes by emailing host Ken Miller at host@fromthecrowsnest.org.
Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com
Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com
Contribute to Politicology at politicology.com/donate To unlock Politicology+ visit politicology.com/plus This week, Ron Steslow and Hagar Chemali (Fmr. spokesperson for the U.S. Mission to the UN) examine how efforts to “protect democracy” can sometimes undermine its foundations. They unpack the ongoing Epstein investigation and what it reveals about the importance of impartial justice and truth. They dig into the U.K.'s Banter Bill and its chilling effect on free speech—an essential pillar of democratic society. And they discuss the Tornado Cash trial unfolding in Manhattan, and how it could set a precedent that reshapes Americans' digital privacy rights. These aren't just headline stories—they're stress tests for the core values that make democracy function. Then, in Politicology+ they discuss Javier Milei proving his detractors wrong and the remarkable turn around in Argentina this year. Not yet a Politicology+ member? Don't miss all the extra episodes on the private, ad-free version of this podcast. Upgrade now at politicology.com/plus. Find our sponsor links and promo codes here: https://bit.ly/44uAGZ8 Send your questions and ideas to podcast@politicology.com or leave a voicemail at (703) 239-3068 Follow this week's panel on X (formerly Twitter): https://twitter.com/RonSteslow https://x.com/HagarChemali Related Reading: WSJ- Justice Department Told Trump in May That His Name Is Among Many in the Epstein Files Axios - Deputy attorney general seeking meeting with Epstein associate Ghislaine Maxwell FP - Britain's War on Speech Comes for the Pub NYTimes - As Trump Quits UNESCO, China Expands Influence - The New York Times Axios - The trial of a Tornado Cash developer begins Coindesk - Legitimate Privacy Tool or Dirty Money ‘Laundromat'? Lawyers Debate Role of Tornado Cash on Day 1 of Roman Storm Trial Learn more about your ad choices. Visit megaphone.fm/adchoices
When will iOS 26's public beta will be made available? Is Apple losing ground in the AI talent war? Apple's first foldable iPhone could arrive next year. And a unique color could be coming with the iPhone 17 Pro. macOS Tahoe Public Beta Available for Some Users [Update: Pulled]. TSMC US chip production may soon only be three years behind Taiwan. UK backing down on Apple encryption backdoor after pressure from US. Bigfoot, Orca, and a Trombone, are among new emoji coming to iOS 26. Apple's Emoji Game is now out for News+ subscribers in the US and Canada. Why Apple Is Losing Ground in the AI Talent War (It's Not Just Money). The first foldable iPhone will arrive next year in Un-Apple-Like fashion. One of the iPhone 17 Pro colors might literally be Liquid Glass. 'Ted Lasso' Season 4: Juno Temple & Brendan Hunt return; new cast includes Tanya Reynolds, Faye Marsay & Ted's son. Apple warns Iranians of iPhone spyware attacks ahead of Israel conflict. Earth will spin faster today to create 2nd-shortest day in history. Picks of the Week: Andy's Pick: MDR Dasher Keyboard Alex's Pick: Flipboard Jason's Pick: Longplay Hosts: Leo Laporte, Alex Lindsay, Andy Ihnatko, and Jason Snell Download or subscribe to MacBreak Weekly at https://twit.tv/shows/macbreak-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zocdoc.com/macbreak helixsleep.com/twit
When will iOS 26's public beta will be made available? Is Apple losing ground in the AI talent war? Apple's first foldable iPhone could arrive next year. And a unique color could be coming with the iPhone 17 Pro. macOS Tahoe Public Beta Available for Some Users [Update: Pulled]. TSMC US chip production may soon only be three years behind Taiwan. UK backing down on Apple encryption backdoor after pressure from US. Bigfoot, Orca, and a Trombone, are among new emoji coming to iOS 26. Apple's Emoji Game is now out for News+ subscribers in the US and Canada. Why Apple Is Losing Ground in the AI Talent War (It's Not Just Money). The first foldable iPhone will arrive next year in Un-Apple-Like fashion. One of the iPhone 17 Pro colors might literally be Liquid Glass. 'Ted Lasso' Season 4: Juno Temple & Brendan Hunt return; new cast includes Tanya Reynolds, Faye Marsay & Ted's son. Apple warns Iranians of iPhone spyware attacks ahead of Israel conflict. Earth will spin faster today to create 2nd-shortest day in history. Picks of the Week: Andy's Pick: MDR Dasher Keyboard Alex's Pick: Flipboard Jason's Pick: Longplay Hosts: Leo Laporte, Alex Lindsay, Andy Ihnatko, and Jason Snell Download or subscribe to MacBreak Weekly at https://twit.tv/shows/macbreak-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zocdoc.com/macbreak helixsleep.com/twit
In this episode of 'Cybersecurity: Today's Month in Review,' the panel of experts, including Laura Payne, David Shipley, and new guest Tammy Harper, delve into major cybersecurity stories from the past month. Discussions range from the recent arrest of a Montreal scam operator, Scattered Spider's targeted attacks on various sectors, and the impacts of AI on the cybersecurity landscape. The panel also highlights industry shifts, new threat tactics, and the importance of strategic communication during incidents. The episode concludes with reflections on AI's integration into enterprise systems, emphasizing preparation and ethical considerations. 00:00 Introduction to the Cybersecurity Month in Review 00:12 Meet the Panelists 00:26 Laura Payne's Introduction 01:04 David Shipley's Introduction 01:38 Tammy Harper's Introduction 04:09 First Story: Montreal Scam Arrest 10:52 David Shipley's Big Story: Scattered Spider 16:40 The Rise of Young Cybercriminals 32:36 Ingram Micro Ransomware Attack 33:27 Government Breaches and Fast Recovery 34:56 Ingram Micro Incident and Communication Failures 35:55 Importance of Communication in Incident Response 37:39 Ransomware Trends and Threat Actor Tactics 39:55 Shift from Encryption to Exfiltration 46:41 Government Actions and Market Impact 51:27 AI in Cybersecurity: Risks and Opportunities 58:53 Ethical AI and Future Considerations 01:08:12 Final Thoughts and Wrap-Up
The Institute of Internal Auditors Presents: All Things Internal Audit Tech Quantum computing might sound futuristic, but internal auditors need to prepare now. Bill Truett catches up with Nick Reese to talk about what's changed in the quantum space — including new cryptography standards — real-world risks, and what internal auditors can do today to get ready. HOST:Bill Truett, CIA, CISA Senior Manager, Standards & Guidance, IT, The IIA GUEST:Nick Reese Co-founder and Chief Operating Officer, Frontier Foundry Adjunct Professor, New York University KEY POINTS: Introduction and What's New in Quantum [00:00-01:34] What is Quantum Computing? [00:01:34-05:57] Milestones in Quantum Development [00:05:58-07:50] Quantum + AI? Not Yet [00:08:12-09:58] What Auditors Should Know About NIST Standards [00:10:00-11:54] Immediate Steps for Internal Audit [00:13:15-17:38] Legislation and Regulatory Outlook [00:20:28-22:19] Global Threats and Historical Analogies [00:22:20-26:11] Key Terms Auditors Should Learn [00:26:17-28:34] Training Resources [00:28:35-31:00] Opportunities Beyond Risk Management [00:31:00-34:11] The Five-Year Vision [00:34:16-37:21] THE IIA RELATED CONTENT: Interested in this topic? Visit the links below for more resources: 2025 Governance, Risk & Controls Conference All Things Internal Audit: Quantum Computing GTAG: Assessing Cybersecurity Risk Cyber Resource Center Post-Quantum Cryptography Roadmap – DHS.gov NIST's Post-Quantum Cryptography Project Visit The IIA's website or YouTube channel for related topics and more. Follow All Things Internal Audit: Apple PodcastsSpotify LibsynDeezer
There are several famous examples of mysterious medieval writing, including the so-far unbreakable Voynich Manuscript. So, what secrets were medieval people trying to hide? And why? This week, Danièle speaks with Garry Shaw about who was encrypting their manuscripts, the codes they used, and the centuries of attempts to crack the Voynich Manuscript.You can support this podcast on Patreon at https://www.patreon.com/medievalists
When NIST released the first post-quantum cryptography standards in August 2024, it set off a domino effect that will hopefully result in protecting the world from the quantum computing threat. Now that we're beginning to migrate and trust our data to lattice-based cryptography, it's a good time to examine how ML-KEM works and get some hints about how to implement it well. And who better to ask than one of the coauthors of the PQC standard? Join host Konstantinos Karagiannis for a wide-ranging chat with Joppe Bos from NXP, where they discuss the past and future of ML-KEM. For more information on NXP, visit www.nxp.com/. Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
Send us a textAnurag Lal discusses the critical importance of quantum-resistant encryption for enterprise messaging and the urgent need for organizations to prepare for the coming quantum computing revolution that will render current encryption methods obsolete.• Anurag's extensive background in technology from Apple to Sprint and participation in the National Broadband Task Force• How mobile messaging has infiltrated enterprises without proper security consideration• Consumer messaging apps were never designed to be secure, controlled by IT, or regulatory-compliant• What "true end-to-end encryption" means and why most platforms claiming it actually decrypt messages in transit• The concept of "Q-Day" - when quantum computers will break current encryption methods• Biden administration's executive order mandating quantum-resistant encryption by 2028• How cyber capabilities have been weaponized by nation-states, creating unprecedented threats• AI-powered phishing attacks becoming increasingly sophisticated, including voice cloning• The importance of implementing quantum-proof encryption now rather than waiting• Netsphere's approach to quantum-resistant security for enterprise messagingFind Anurag on LinkedIn (Anurag Lal) and learn more about Netsphere at netsphere.comChapters00:00 Introduction and Background of Anurag Lal05:52 Netsphere: A Solution for Secure Enterprise Messaging12:08 The Importance of Encryption and Quantum Security18:03 Apple's Approach to Security and Personal Experiences28:34 Security Perspectives: Apple vs. Android35:46 The Urgency of Quantum Security43:10 Access Control: The Weakest Link in Security49:42 AI in Phishing: A Real-World ExamplePodMatchPodMatch Automatically Matches Ideal Podcast Guests and Hosts For Interviews Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods.Listen on: Apple Podcasts SpotifySupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast
William Lyne of the UK's National Crime Agency joins us live at Infosecurity Europe to talk ransomware, AI threats, and the future of cybercrime disruption.When the UK's top cyber intelligence strategist sits down with you in London, you listen — and you hit record.At Infosecurity Europe 2025, the ITSPmagazine podcast team — Marco Ciappelli and Sean Martin — sat down with William Lyne, Deputy Director and Head of Cyber Intelligence at the UK's National Crime Agency (NCA). This is the guy who not only leads cyber strategy for the NCA, but has also represented the UK at the FBI in the U.S. and now oversees national-level ransomware disruption efforts. It's not just a conversation — it's a rare front-row seat into how one of the world's most serious crime-fighting agencies is tackling ransomware 3.0.The message? Ransomware isn't just a cyber issue. It's a societal one. And it's evolving faster than we're prepared for — unless we change the game.“It went from niche to national threat fast,” Lyne explains. “The tools were always there. It just took a few threat actors to stitch them together.”From banking malware to fully operational cybercrime-as-a-service ecosystems, Lyne walks us through how the underground economy has industrialized. Ransomware isn't just about tech — it's about access, scale, and business models. And most importantly, it's no longer limited to elite coders or closed-door Russian-speaking forums. The barrier to entry is gone, and the dark web is wide open for business.Sean brings up the obvious: “Why does this still feel like we're always reacting?”Lyne responds: “We've shifted. We're going after the ecosystem — the people, the infrastructure, the business model — not just the payload.” That includes disrupting ransomware-as-a-service, targeting marketplaces, and yes, investing in preemptive intelligence.Marco flips the script by comparing today's cyber landscape to something deeply human. “Extortion is nothing new — we've just digitalized it. This is human behavior, scaled by tech.”From there, the conversation takes a future-facing turn. Deepfakes, AI-powered phishing, the commoditization of generative tools — Lyne confirms it's all on their radar. But he's quick to note that cybercriminals aren't bleeding-edge innovators. “They adopt when the ROI is right. But AI-as-a-service? That's coming. And it will reshape how efficient — and damaging — these threats become.”And then the real insight lands:“You can't wait to be a victim to talk to law enforcement. We may already have access to the infrastructure. The earlier we hear from you, the better we can act — and fast.”That kind of operational openness isn't something you heard from law enforcement five years ago. It signals a cultural shift — one where collaboration is not optional, it's essential.William also highlights the NCA's partnerships with private sector firms, academia, and international agencies, including the Kronos operation targeting LockBit infrastructure. These kinds of collaborations prove that when information moves, so does impact.Why does this matter?Because while most cybersecurity media gets stuck in product buzzwords and vendor hype, this is the real stuff — how ransomware groups behave, how law enforcement thinks, and how society can respond. It's not theory. It's strategy, lived on the front lines.
AI models have a defined memory ceiling, which is reshaping the ongoing debates surrounding copyright and data privacy. Recent research from Meta, Google DeepMind, Cornell, and NVIDIA reveals that large language models have a fixed memorization capacity of approximately 8.6 bits per parameter. This finding clarifies the distinction between memorized data and generalized knowledge, indicating that larger datasets do not necessarily lead to increased memorization of specific data points. This understanding is crucial as it informs the operational mechanisms of AI models and addresses concerns related to copyright infringement.Sundar Pichai, CEO of Google, has introduced the term "artificial jagged intelligence" to describe the current phase of AI development, highlighting the non-linear progress and the challenges faced by researchers despite significant advancements. Pichai's perspective reflects the mixed performance of AI models, which can exhibit extraordinary capabilities alongside notable errors. This sentiment is echoed by deep learning researcher Andrej Karpathy, emphasizing the unpredictability of AI performance and the need for a more nuanced understanding of its capabilities.The rise of AI retrieval bots is transforming how users access information online, with a significant increase in traffic from these bots. Companies like OpenAI and Anthropic are deploying these bots to summarize content in real-time, moving away from traditional search methods that provide links to multiple sources. This shift poses challenges for content publishers, as the growth of retrieval bots indicates a changing economic landscape where content is increasingly consumed by AI first, with human users following. Publishers may need to rethink their engagement strategies to adapt to this new reality.In the broader context of technology and cybersecurity, WhatsApp's intervention in a legal case concerning encryption and privacy rights highlights the growing role of platforms in surveillance debates. Additionally, the U.S. Cybersecurity and Infrastructure Security Agency faces leadership challenges amid a talent exodus, raising concerns about its operational effectiveness. As the IT services industry evolves, the integration of AI into various sectors, including hiring and cybersecurity, underscores the importance of execution, interoperability, and trust in automation. The future of technology will depend on how well businesses can navigate these changes and support their clients in making informed decisions. Four things to know today 00:00 AI's Jagged Reality: Study Reveals Limits to Model Memory as Bots Redefine the Web Economy05:35 Cybersecurity Crossroads: WhatsApp Joins Apple in Legal Fight as U.S. Agency Leadership Crumbles08:29 AI Matures Into Infrastructure Layer as IT Vendors Shift Focus to Outcomes and Execution11:51 Legal Tech, GenAI, and Fast Food Bots All Show One Thing: Hype Doesn't Equal Success This is the Business of Tech. Supported by: All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
What if the world's most trusted cryptographic systems could be broken in just minutes instead of centuries? In this thought-provoking episode of the Brilliance Security Magazine Podcast, David Close, Chief Solutions Architect at Futurex, joins host Steven Bowcut to discuss the very real—and rapidly accelerating—threat that quantum computing poses to modern encryption. With quantum advancements progressing faster than many expected, Close explains why organizations need to act now to safeguard long-term data, and how hybrid and agile cryptographic systems are the key to staying ahead.SummaryDavid Close opens the conversation by tracing his own journey from embedded firmware engineering to his current role leading cryptographic innovation at Futurex. He shares how his work with Hardware Security Modules (HSMs)—specialized devices that securely manage encryption keys—laid the groundwork for Futurex's leadership in enterprise-grade encryption.The core of the episode centers on the quantum computing threat to current encryption standards like RSA and elliptic curve cryptography. David breaks down the technical implications in accessible terms: quantum computers can solve problems exponentially faster than classical computers, meaning encryption methods that would take millennia to break with today's machines might be cracked in minutes by quantum processors.A key highlight is the concept of “Harvest Now, Decrypt Later”—a tactic where attackers steal encrypted data today, intending to decrypt it once quantum technology matures. David emphasizes that this threat is not futuristic; it's already underway, with critical long-life data like medical records, financial information, and government secrets at risk.David outlines how Futurex and other leading organizations are proactively adapting. For example, Google and Cloudflare have already implemented hybrid cryptography using both classical and quantum-safe algorithms. Futurex is doing the same across its suite of HSMs and key management solutions, supporting new standards ratified by NIST (including Kyber and Dilithium) and enabling “crypto agility”—the ability to quickly adopt new encryption standards without overhauling infrastructure.He also shares how Futurex is helping clients through cryptographic discovery, which allows organizations to identify where and how cryptography is being used across their environments. This step is essential for prioritizing risk areas and laying a foundation for a secure, phased migration to post-quantum cryptography.Finally, David stresses that while the quantum threat is real and imminent, organizations shouldn't panic—but they must act now. The transition to post-quantum cryptography is already underway, and those who prepare today will be far more secure and resilient tomorrow.
How do we prepare our cybersecurity for a post quantum world? This week, Technology Now explores how security experts are looking to future-proofing their work. We will examine the hurdles to post-quantum security, the underlying ways in which our data is protected, and we will be delving into the underground world of “harvest now, decrypt later”. Dr Sarah McCarthy tells us more. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it. About Dr Sarah McCarthy: https://www.linkedin.com/in/sarahmccarthyphd/?originalSubdomain=ca SourcesQuantum computing chip: https://blog.google/technology/research/google-willow-quantum-chip/https://www.bbc.co.uk/news/articles/c791ng0zvl3oNIST Post Quantum Standards: https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standardsMartian aurora: https://science.nasa.gov/solar-system/planets/mars/nasa-observes-first-visible-light-auroras-at-mars/Rutherford's Lecture: https://web.lemoyne.edu/giunta/ruth1920.htmlJames Chadwick: https://www.nobelprize.org/prizes/physics/1935/chadwick/biographical/
On the NAB Show floor in Las Vegas Resilio Chief Marketing Officer Adam Kranitz introduces Resilio Active Everywhere, a powerful tool that helps creative teams move large video and media files quickly and securely. Whether working from home, in the field, or across multiple studios, Resilio ensures smooth, fast sharing without delays. It's built to handle big projects while keeping things simple, secure, and compatible with your existing setup. Show Notes: Chapters: 00:11 Introduction to Resilio at NAB Show01:45 Resilio Active Everywhere Unveiled03:36 Data Movement Challenges Explained06:10 Addressing Security Concerns07:42 Open Data Philosophy08:54 Closing Thoughts with Adam Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
On the NAB Show floor in Las Vegas Resilio Chief Marketing Officer Adam Kranitz introduces Resilio Active Everywhere, a powerful tool that helps creative teams move large video and media files quickly and securely. Whether working from home, in the field, or across multiple studios, Resilio ensures smooth, fast sharing without delays. It's built to handle big projects while keeping things simple, secure, and compatible with your existing setup. http://traffic.libsyn.com/maclevelten/MV25158.mp3 Show Notes: Chapters: 00:11 Introduction to Resilio at NAB Show 01:45 Resilio Active Everywhere Unveiled 03:36 Data Movement Challenges Explained 06:10 Addressing Security Concerns 07:42 Open Data Philosophy 08:54 Closing Thoughts with Adam Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Random but Memorable turns 150! 1️⃣5️⃣0️⃣ (It's official, we're old.)
In this episode of Hands-On Windows, we explore the pros and cons of using Microsoft accounts in Windows 11, mainly focusing on the vital role encryption plays in protecting your data. While some cling to the nostalgia of local accounts, we examine the undeniable advantages of disk encryption when using an online account. Additionally, I provide practical advice on managing your BitLocker recovery key to ensure you're never left in a lurch. Prepare to be informed and empowered as we dispel myths and equip you with the knowledge to enhance your device's security confidently. Host: Paul Thurrott Download or subscribe to Hands-On Windows at https://twit.tv/shows/hands-on-windows Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
Episode Topic: Ruston Miles of Bluefin joins PayPod to unravel the real story behind payment data security. From debunking myths around chip card protection to highlighting the need for encryption at the point of interaction, Ruston shares critical insights into why businesses must adopt P2P encryption and tokenization to stay ahead of evolving threats. Lessons You'll Learn: How to distinguish fraud prevention from data security, the necessity of protecting data at the entry point, why chips don't equal encryption, and how upcoming technologies like quantum computing and AI are reshaping the threat landscape. About Our Guest: Ruston Miles is the Founder and Chief Strategy Officer at Bluefin, a payment security company that pioneered PCI-validated point-to-point encryption. With decades of experience in cybersecurity, Ruston has been instrumental in setting encryption standards adopted by Visa, Mastercard, and global universities. He's also a strong advocate for tokenization, quantum-resistant encryption, and secure digital wallets. Topics Covered: The difference between fraud and data breaches How P2P encryption protects data before it can be stolen Why EMV chips give a false sense of security Storing tokens instead of real card numbers Security challenges in higher education and enterprise Quantum computing's potential threat to public key encryption
In this episode, I explore the privacy implications of using AI apps like ChatGPT and Claude on mobile devices. I discuss why ChatGPT's requirement for Google Play Store login and audio recording storage led me to Claude on my GrapheneOS device. I also cover my daily app setup, Windows telemetry blocking with SimpleWall, macOS privacy with Little Snitch, and the potential of System76 Linux laptops.In this week's episode:Privacy comparison between ChatGPT and Claude AI appsChatGPT's audio recording storage and data export concernsGrapheneOS setup without Google Play Store loginUsing FUTO Keyboard and FUTO Voice for local transcriptionEssential privacy tools: SimpleWall for Windows and Little Snitch for macOSWindows Subsystem for Linux (WSL) for developersSystem76 Linux laptops as a privacy-focused alternativeShow Links:Anthropic Claude.ai Encryption - https://privacy.anthropic.com/en/articles/10458704...Duck.ai - https://duck.aiFuto Keyboard & Voice - https://futo.org/Aurora Store - https://auroraoss.com/aurora-storeSimpleWall (Windows Firewall) - https://github.com/henrypp/simplewallLittle Snitch (macOS) - https://www.obdev.at/products/littlesnitch/GeoSpy (OSINT Tool) - https://geospy.netSystem76 Linux Laptops - https://system76.com/Mental Outlaw YouTube Channel - https://www.youtube.com/@MentalOutlawDaVinci Resolve - https://www.blackmagicdesign.com/products/davinciresolveOSINT Defense & Security Framework - https://psysecure.com/services/odsf/“██████REDACTED███”- █████████Official Website: https://psysecure.com Podcast music: The R3cluse
Google issues an emergency patch for a high-severity Chrome browser flaw. Researchers bypass BitLocker encryption in minutes. A massive Chinese-language black market has shut down. The CFPB cancels plans to curb the sale of personal information by data brokers. A cyberespionage campaign called Operation RoundPress targets vulnerable webmail servers. Google warns that Scattered Spider is now targeting U.S. retail companies. The largest steelmaker in the U.S. shut down operations following a cybersecurity incident. Our guest is Devin Ertel, Chief Information Security Officer at Menlo Security, discussing redefining enterprise security. The long and the short of layoffs. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment and direct from RSAC 2025, our guest is Devin Ertel, Chief Information Security Officer at Menlo Security, discussing redefining enterprise security. Listen to Devin's interview here. Selected Reading Google fixes high severity Chrome flaw with public exploit (Bleeping Computer) BitLocker Encryption Bypassed in Minutes Using Bitpixie Vulnerability: PoC Released (Cyber Security News) The Internet's Biggest-Ever Black Market Just Shut Down Amid a Telegram Purge (WIRED) German operation shuts down crypto mixer eXch, seizes millions in assets (The Record) CFPB Quietly Kills Rule to Shield Americans From Data Brokers (WIRED) EU ruling: tracking-based advertising by Google, Microsoft, Amazon, X, across Europe has no legal basis (Irish Council for Civil Liberties) Operation RoundPress targeting high-value webmail servers (We Live Security) Google says hackers that hit UK retailers now targeting American stores (Reuters) Cybersecurity incident forces largest US steelmaker to take some operations offline (The Record) Infosec Layoffs Aren't the Bargain Boards May Think (Dark Reading) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
As anticipation builds for the RSAC Conference 2025, ISACA leaders Mary Carmichael and Dooshima Dabo'Adzuana join Sean Martin and Marco Ciappelli to preview what the global technology and cybersecurity association has in store for attendees this year. With a focus on expanding community, AI governance, and professional development, their conversation reveals how ISACA is showing up with both timely insights and tangible resources.Mary Carmichael, President of ISACA's Vancouver Chapter and a CPA focused on cybersecurity risk and governance, highlights the session she's co-presenting with Dooshima Dabo'Adzuana: Third-Party AI: What Are You Really Buying? Their talk will explore the increasing complexity of evaluating AI solutions procured from vendors—especially those embedding large language models. Topics include due diligence during procurement, monitoring post-deployment, and assessing whether vendor practices align with internal risk and privacy requirements.Dooshima Dabo'Adzuana, a researcher at Boise State University and leader from ISACA's Abuja Chapter, shares how ISACA members across regions are grappling with similar questions: What does AI mean for my organization? What risks do third-party integrations introduce? She emphasizes the importance of frameworks and educational tools—resources that ISACA is making readily available at their booth (South Expo #2268) and through new certification tracks in AI audit and security.Alongside the AI focus, visitors to the booth can explore results from ISACA's Quantum Pulse Poll and access guidance on encryption readiness for a post-quantum future. The booth will also feature a selfie station and serve as a meeting point for the diverse ISACA community, with members from over 220 chapters worldwide.The conversation rounds out with a critical discussion on cybersecurity career development. Both Mary and Dooshima share personal stories of transitioning into the field—Mary from accounting, Dooshima from insurance—and call for broader recognition of transferable skills. They point to global tools, such as career pathway frameworks supported by ISACA and the UK Cyber Security Council, as essential for addressing the persistent workforce gap.This episode offers a preview of how ISACA is connecting global conversations on AI, quantum, and professional development—making RSAC Conference 2025 not just a tech showcase, but a community gathering rooted in learning and action.Stop by booth 2268 in the South Expo to explore how ISACA are equipping professionals with practical tools for AI governance, quantum readiness, and cybersecurity career growth—and how your organization can benefit from a stronger, more connected community.Learn more about ISACA: https://itspm.ag/isaca-96808Guests:Mary Carmichael, President of ISACA's Vancouver Chapter | https://www.linkedin.com/in/carmichaelmary/Dooshima Dabo'Adzuana, a researcher at Boise State University and leader from ISACA's Abuja Chapter | https://www.linkedin.com/in/dooshima-dabo-adzuana/ResourcesMary and Dooshima's session at RSA Conference: https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1737642290064001tqyqLearn more about ISACA's AI resources: https://www.isaca.org/resources/artificial-intelligenceLearn more about ISACA's credentials: https://www.isaca.org/credentialingLearn more and catch more stories from ISACA: https://www.itspmagazine.com/directory/isacaLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage______________________Keywords: ai, quantum, cybersecurity, risk, governance, audit, certification, encryption, rsa, rsac, third-party, compliance, career, skills, education, community, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
What's the best thing small businesses can do to improve their security posture?
Fedora 42 and Ubuntu 25.04 are here—We break down what's new, what stands out, and what we love most about each release.Sponsored By:Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. ConfigCat Feature Flags: Manage features and change your software configuration using ConfigCat feature flags, without the need to re-deploy code. Support LINUX UnpluggedLinks:
Send Bidemi a Text Message!In this episode, host Bidemi Ologunde talked about the national security risks of encrypted messaging — highlighting policy gaps and some suggested remedies.Support the show
Plus the rumors of SXSW Interactive's death are exaggerated, and Gemini gets personal. Starring Tom Merritt and Huyen Tue Dao.Show notes can be found here.