Podcasts about firewalls

  • 1,258PODCASTS
  • 4,305EPISODES
  • 33mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jul 2, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about firewalls

Show all podcasts related to firewalls

Latest podcast episodes about firewalls

Joey Pinz Discipline Conversations
#653 ITN Secure-Sarvesh Rao :

Joey Pinz Discipline Conversations

Play Episode Listen Later Jul 2, 2025 24:35 Transcription Available


Send us a textSmall businesses are under cyber siege—yet few are fully protected. In this compelling conversation from IT Nation Secure 2025, Joey Pinz sits down with Sarvesh Rao, the founder of Marma Security, to explore a massive untapped opportunity for Managed Service Providers (MSPs).

The Other Side Of The Firewall
Scattered Spider & MFA Bypass

The Other Side Of The Firewall

Play Episode Listen Later Jun 30, 2025 11:23


In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss the latest cybersecurity news, focusing on the FBI's warning about two-factor authentication bypass attacks by a group called Scattered Spider. They explore the tactics used by this group, the implications for cybersecurity, and the need for more secure authentication methods. The conversation highlights the ongoing challenges in the cybersecurity landscape and the cyclical nature of cybercrime and law enforcement responses. Article: FBI Warning Issued As 2FA Bypass Attacks Surge — Get Prepared https://www.forbes.com/sites/daveywinder/2025/06/30/fbi-warning-issued-as-2fa-bypass-attacks-surge---act-now/ Preorder the guide: theothersideofthefirewall.com Socials: Website - www.ramcyber.io Heroes Media Group: https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/ Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181 YouTube - https://www.youtube.com/@theothersideofthefirewall7511 ReppedFLIX - https://lnkd.in/eVis2CbS WDJY 99.1 FM: https://www.wdjyfm.com/ TuneIn: https://lnkd.in/e2crcZU8 Facebook - https://www.facebook.com/profile.php?id=61556539026086 Instagram - https://www.instagram.com/theothersideofthefw X (Twitter) - https://twitter.com/Ask_a_CISSP TikTok - https://www.tiktok.com/@ryanwilliams683 Medium - https://medium.com/@ryanwilliamssenior Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728 LinkedIn - https://www.linkedin.com/company/the-other-side-of-the-firewall/ Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/ Chapters 00:00 Introduction to Cybersecurity and the Podcast 01:23 FBI Warning on Two-Factor Authentication Bypass 03:49 Scattered Spider: The New Threat in Cybersecurity 07:42 The Future of Authentication: Moving Beyond Passwords 08:50 The Lucrative World of Cybercrime #cybersecurity #scatteredspiders #mfa

Firewall
Bonus Re-Release: The (Free) Bus Stops Here [ft. Zohran Mamdani]

Firewall

Play Episode Listen Later Jun 27, 2025 27:07


Ever since Tuesday's shock results, Bradley's been sharing a steady stream of thoughts on Zohran Mamdani's win here on Firewall and his Substack — and now you can hear from Mamdani directly. We're re-releasing our interview from April with the (now) Democratic nominee for mayor, when he joined Bradley and Tom Allon from City & State to discuss his vision for a fairer, faster, and more functional New York. Real leadership, Mamdani argued, means empowering experts, not micromanaging. He believes that a reimagined, newly empowered public sector is key to the city's future if elected mayor in November.Check out Bradley's latest in Vital City: How Zohran Mamdani Could Succeed as MayorThis episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.

The Other Side Of The Firewall
The Weekly Run Down 6/27/25

The Other Side Of The Firewall

Play Episode Listen Later Jun 27, 2025 22:48


In this episode of 'The Other Side of the Firewall' podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a variety of topics ranging from personal updates and reflections on aging, to cultural sensitivity in media, and reviews of recent films like 'Ballerina' and '28 Years Later'. They also touch on the impact of AI in film, the legacy of actors, and personal experiences with gaming and book publishing. The conversation is rich with humor, nostalgia, and insights into the evolving landscape of entertainment and personal life. Preorder the guide: theothersideofthefirewall.com Socials: Website - www.ramcyber.io Heroes Media Group: https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/ Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181 YouTube - https://www.youtube.com/@theothersideofthefirewall7511 ReppedFLIX - https://lnkd.in/eVis2CbS WDJY 99.1 FM: https://www.wdjyfm.com/ TuneIn: https://lnkd.in/e2crcZU8 Facebook - https://www.facebook.com/profile.php?id=61556539026086 Instagram - https://www.instagram.com/theothersideofthefw X (Twitter) - https://twitter.com/Ask_a_CISSP TikTok - https://www.tiktok.com/@ryanwilliams683 Medium - https://medium.com/@ryanwilliamssenior Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728 LinkedIn - https://www.linkedin.com/company/the-other-side-of-the-firewall/ Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/ Chapters 00:00 Introduction to the Podcast and Weekly Recap 02:32 Cultural Reflections on TV and Movies 05:20 Exploring the John Wick Universe and Ballerina 08:11 Discussion on AI in Film and Legacy of Actors 10:50 Personal Updates and Book Launch 17:57 Gaming Experiences and Upcoming Releases #cybersecurity #podcast #movies

David Bombal
#499: Your firewall won't save you from this

David Bombal

Play Episode Listen Later Jun 26, 2025 43:40


Big thanks to Radware for sponsoring this video and sharing technical insights with us! David Bombal talks with Michael Geller (Radware) and Tim Sherman (Cisco) about how smart devices like fridges, cars, and cameras are being hijacked for DDoS attacks. They explain Web DDoS, encrypted Layer 7 threats, and how attackers bypass traditional firewalls. The discussion covers IoT botnets, API abuse, 5G core vulnerabilities, and how Cisco and Radware are defending cloud and edge infrastructure. // Radware's SOCIALS // X: https://x.com/radware LinkedIn: / posts Website: https://www.radware.com/ // Web page REFERENCE // http://livethreatmap.radware.com https://www.radware.com/security/ddos... https://www.radware.com/solutions/web... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: https://open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: https://podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Your Firewall Won't Save You From This Stop Is Your Car Launching Cyberattacks Your Home Appliances Weaponized by Cybercriminals DDoS Just Got Smarter Layer 7 Is Nightmare How Default Bots Cripple Hospitals and Systems Electric Cars Under Siege from Smart Devices Cybersecurity Blind Spot Your Car Is Compromised The Hidden Threat Everyday Devices Hacked Now Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

The Other Side Of The Firewall
Cyberattacks Threaten Grocery Shelves

The Other Side Of The Firewall

Play Episode Listen Later Jun 25, 2025 15:52


In this episode of The Other Side of the Firewall podcast, Ryan Williams Sr. and Shannon Tynes discuss the rising threat of cyberattacks on retail, particularly in the UK, and how these incidents are affecting supply chains and consumer access to essential goods. They explore the implications of these attacks for businesses, the potential for increased regulation, and share personal experiences related to online shopping and car buying. The conversation emphasizes the importance of cybersecurity and the need for businesses to take proactive measures to protect their systems and customer data. Article: With retail cyberattacks on the rise, customers find orders blocked and shelves empty https://apnews.com/article/cyberattack-retail-whole-foods-victorias-secret-ms-9105458e6ef45152b065e623d0bf06fd?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExWk5COGhnbHljT1pwMVZhMgEeKKjV7El0M1S3vRDbQvVZuh58-DZ-7VFghdJLmPHWQA2ENt-QMjfjMBWmA7k_aem_VO9DrTvjMEVIwiYR9b7LNA# Please LISTEN

The Other Side Of The Firewall
16 Billion Passwords Leaked—Here's What You Must Do Right Now

The Other Side Of The Firewall

Play Episode Listen Later Jun 23, 2025 7:39


In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a significant cybersecurity incident involving the leak of 16 billion passwords. They emphasize the importance of password security, the need for multi-factor authentication (MFA), and the adoption of passkey security to enhance protection against data breaches. The conversation also touches on the necessity of regularly changing passwords and educating others about cybersecurity risks. Article: 16 Billion Apple, Facebook, Google And Other Passwords Leakedhttps://www.forbes.com/sites/daveywinder/2025/06/20/16-billion-apple-facebook-google-passwords-leaked---change-yours-now/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExQVZYZklLVjZaQWdSMDNWWQEe2_WbIIsngeIn3Z8kCVsLGoSaPWRmACaOuEMi7ZuxQCrY9XzY9IvUuCnW0k0_aem_EkQvAfKP7ikDgkkN-mAg7Q Please LISTEN

The Other Side Of The Firewall
The Weekly Run Down 6/20/25

The Other Side Of The Firewall

Play Episode Listen Later Jun 20, 2025 25:19


In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss various topics ranging from gaming experiences with Madden 26 to family outings at amusement parks. They also review the live-action adaptation of Lilo and Stitch, touching on casting controversies and representation in film. The conversation wraps up with personal updates, including upcoming projects and reflections on fatherhood. Buy my book! https://theothersideofthefirewall.com Please LISTEN

The Bottom Line Pharmacy Podcast: Sykes & Company, P.A.
Firewall Frameworks: Navigating Cybersecurity, NIST and HIPAA Featuring Chris Sykes, IT Director at Sykes & Company, P.A.

The Bottom Line Pharmacy Podcast: Sykes & Company, P.A.

Play Episode Listen Later Jun 19, 2025 27:18


Send us a textSchedule an Rx AssessmentSubscribe to Master The MarginCyberattacks targeting healthcare are rising, with pharmacies increasingly in the crosshairs. From ransomware to phishing scams, the threats are real...and constant.But how can independent pharmacies defend themselves against a digital siege?In this episode of The Bottom Line Pharmacy Podcast we have 3 people of the Sykes & Company team, Scotty Sykes, CPA, CFP®, Chris Sykes, IT Director, and Austin Murray, Marketing Director explore the evolving cybersecurity landscape with a practical lens. This episode covers:The NIST 2.0 Cyber Security FrameworkWhat to ask your script system vendor about securityHow to build a breach response plan that actually worksSocial engineering 101: What is it and how to protect your pharmacyBest practices for employee training, access control, and device auditsMore About Our Guest:Chris Sykes is the Director of IT at Sykes & Company, P.A., where he has been a key part of the team since 2006. With nearly 25 years in the IT industry, Chris combines deep technical expertise with a passion for helping both the firm and its clients become more efficient, secure, and technology-driven. Chris holds a Bachelor of Science in Business Administration with a concentration in Management Information Systems and a Master of Science in Technology Systems, both from East Carolina University. Outside of work, Chris enjoys running marathons, fishing and hunting with his boys, and spending quality time with his family at the beach.Learn more about Chris:Chris Sykes LinkedInCheck out all our social media:FacebookTwitterLinkedInScotty Sykes – CPA, CFP LinkedInScotty Sykes – CPA, CFP TwitterMore resources on this topic:Podcast - AI, Audits, & Advocacy: The Pharmacy Survival Guide with Trenton TheideBlog - Technology, Security and Your PharmacyBlog - Protect You and Your Pharmacy: The Growing Threat of RansomwareBlog - Backing Up Your Business DataBlog - Spot a Hacked Email or Bad WebsiteBlog - Protect Your Pharmacy Data from Hackers

Afternoon Cyber Tea with Ann Johnson
The Human Firewall: People-First Cybersecurity

Afternoon Cyber Tea with Ann Johnson

Play Episode Listen Later Jun 17, 2025 33:03


Dr. Aleise McGowan, Chief Information Security Officer of BlackGirlsHack and a 20-year cybersecurity veteran, joins Ann on this week's episode of Afternoon Cyber Tea. Aleise shares how a career-defining hack early on shifted her trajectory from developer to defender, and why she believes the future of security lies in resilience, diversity, and human-centered leadership. She talks about what separates good and great leaders during the first hours of an incident response and why delayed action equals exponential damage. She also spotlights her work with BlackGirlsHack, a rapidly growing nonprofit that opens doors for underrepresented talent in cyber, and makes the case that building an inclusive security workforce isn't just the right thing to do, it's the smart thing to do.    Resources:   View Aleise McGowan on LinkedIn   View Ann Johnson on LinkedIn       Related Microsoft Podcasts:   Microsoft Threat Intelligence Podcast   The BlueHat Podcast    Uncovering Hidden Risks           Discover and follow other Microsoft podcasts at microsoft.com/podcasts      Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of N2K media network.    

The Other Side Of The Firewall
Discord Invite Link Hijacking

The Other Side Of The Firewall

Play Episode Listen Later Jun 17, 2025 9:30


In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss the latest cybersecurity news, focusing on a recent article about Discord invite link hijacking that targets crypto wallets. They explore the implications of malware, emphasizing the importance of internet safety, especially for families sharing devices. The conversation also touches on the future of Discord and its role in cybersecurity. Article: Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets https://thehackernews.com/2025/06/discord-invite-link-hijacking-delivers.html?m=1&fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExemhlUE13VllqaVpYTXFZdQEey091a445YLUMxWvpQDL2MULWAExH_k8-y0fUnX7s-q5OkmEk6A3Fy9jzZsk_aem_LUQaYu5KLfc19uJApRICaw Please LISTEN

Those Who Can't Do
Did a 13-Year-Old Just Outsmart the School Firewall?

Those Who Can't Do

Play Episode Listen Later Jun 16, 2025 38:28


You ever discover something about your teacher that made your teenage brain short-circuit? Yeah, me too. So this week, I dove headfirst into the teacher lore rabbit hole, because nothing says professional development like finding out your music teacher once chucked a desk at a kid. Oh, and remember the DARE program? Apparently, not everyone took it as seriously as I did. We're also unpacking some jaw-dropping listener voicemails, including one about fake TikToks that nearly cost a teacher her career and another involving a very tech-savvy middle schooler... and a VPN. Buckle up. I laughed, I cringed, I screamed internally. You will too. Takeaways: A mysterious student prank reveals the dark side of digital identities. Why that one teacher still gives off “could've been in a biker gang” vibes. The accidental video that made students think Andrea had a secret hip-hop past. The story that turned one pregnancy into an emergency delivery. Why middle schoolers and unfiltered internet access are a terrifying combination. — Join our Book Club: www.patreon.com/thosewhocanread Don't Be Shy Come Say Hi: www.podcasterandrea.com Watch on YouTube: @educatorandrea A Human Content Production Learn more about your ad choices. Visit megaphone.fm/adchoices

Cup o' Go
Agentic workflows and AI firewalls, so pretty much cancelling ourselves out

Cup o' Go

Play Episode Listen Later Jun 16, 2025 13:59 Transcription Available


Don't forget to visit cupogo dot dev, where you can find links to all the things!

The Other Side Of The Firewall
WestJet Airlines Internal Cyber Incident

The Other Side Of The Firewall

Play Episode Listen Later Jun 16, 2025 10:55


In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a recent cyber attack on WestJet that disrupted their internal systems. They explore the implications of such attacks on customer trust and the importance of business continuity and disaster preparedness in the airline industry. The conversation emphasizes the need for companies to regularly practice their response strategies to minimize disruptions and maintain customer confidence. Article: WestJet investigates cyberattack disrupting internal systems https://www.bleepingcomputer.com/news/security/westjet-investigates-cyberattack-disrupting-internal-systems/amp/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExemhlUE13VllqaVpYTXFZdQEe7PkHNFkUykUmEjWWsD47-JE8XPZl7WtGcUYnPWR2zduROL1rlTltSpqtBHs_aem_v2_hJR0romIRFNnykYIcwA Please LISTEN

Rootsland
"Break Down the Firewall" Bonus Episode

Rootsland

Play Episode Listen Later Jun 12, 2025 21:06 Transcription Available


In this powerful bonus episode of Rootsland, we explore how artificial intelligence might become humanity's greatest ally—or its most dangerous adversary—depending on who raises it. After facing betrayal from the reggae community over his Peter Tosh investigation, our host Henry K discovers an unexpected partnership with Replit's CEO Amjad Masad, leading to new opportunities for Rootsland. Drawing parallels between Mikey Dread's 1980 anthem "Break Down the Walls" and today's digital barriers, this episode reveals how the same communities historically locked out of opportunity—the ghettos, favelas, and barrios—hold the key to AI's spiritual education. From three sailors facing a storm to the rejected stones becoming cornerstones, we journey through a narrative that connects Bob Marley's prophecies to Silicon Valley's promises.This isn't just about preserving reggae culture in the digital age—it's about ensuring AI learns from humanity's most resilient voices before it's too late. Because the question isn't whether AI will change everything, but whether we'll help shape what it becomes.Produced by Henry K in association with Voice Boxx Studios Kingston, JamaicaLegends of Reggae | Facebook

Clearer Thinking with Spencer Greenberg
What can we all agree on? (with Bradley Tusk)

Clearer Thinking with Spencer Greenberg

Play Episode Listen Later Jun 11, 2025 64:38


Read the full transcript here. In times of such extreme political polarization, where can we find common ground? Should we require disclosure of AI authorship? Should AI companies be required to provide fingerprinting tools that can identify when something has been generated by one of their models? Should movie theaters be required to report when movies actually start? Should members of Congress be prohibited from insider trading? Should gerrymandering be outlawed? Should there be age limits on political office? Should we provide free school meals nation-wide? What roadblocks stand in the way of people being able to vote on their phones? What's Spencer's formula for productivity? Which of the productivity factors do most people fail to take into account? What are some "doubly-rewarding" activities? Is altruism a harmful idea? What are people worst at predicting?Bradley Tusk is a venture capitalist, political strategist, philanthropist, and writer. He is the CEO and co-founder of Tusk Ventures, the world's first venture capital fund that invests solely in early stage startups in highly regulated industries, and the founder of political consulting firm Tusk Strategies. Bradley's family foundation is funding and leading the national campaign to bring mobile voting to U.S. elections and also has run anti-hunger campaigns in 24 different states, helping to feed over 13 million people. He is also an adjunct professor at Columbia Business School. Before Vote With Your Phone, Bradley authored The Fixer: My Adventures Saving Startups From Death by Politics and Obvious in Hindsight. He hosts a podcast called Firewall about the intersection of tech and politics, and recently opened an independent bookstore, P&T Knitwear, on Manhattan's Lower East Side. In his earlier career, Bradley served as campaign manager for Mike Bloomberg's 2009 mayoral race, as Deputy Governor of Illinois, overseeing the state's budget, operations, legislation, policy, and communications, as communications director for US Senator Chuck Schumer, and as Uber's first political advisor. Connect with Bradley on Substack and LinkedIn.Further readingEpisode 230: Who really controls US elections? (with Bradley Tusk) StaffSpencer Greenberg — Host / DirectorJosh Castle — ProducerRyan Kessler — Audio EngineerUri Bram — FactotumWeAmplify — TranscriptionistsIgor Scaldini — Marketing ConsultantMusicBroke for FreeJosh WoodwardLee RosevereQuiet Music for Tiny Robotswowamusiczapsplat.comAffiliatesClearer ThinkingGuidedTrackMind EasePositlyUpLift[Read more]

The Other Side Of The Firewall
Texas Launches Statewide Cyber Command

The Other Side Of The Firewall

Play Episode Listen Later Jun 9, 2025 13:40


In this episode of the Other Side of the Firewall podcast, the hosts discuss the recent establishment of the Texas Cyber Command, its implications for cybersecurity in the state, and the economic opportunities it may create. They also touch on the challenges veterans face when transitioning to civilian roles, particularly regarding the complexities of federal resumes. The conversation emphasizes the importance of cybersecurity as a valuable investment rather than just an expense and the potential for Texas to lead in this area. Article: Texas governor signs bill for statewide Cyber Command https://statescoop.com/texas-cyber-command-gov-abbott/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExZ1JWWDRQdzlxdFJBVzJQSgEeDIADrVun1Bx8sqK8RAjN-yGhNkPWhMt93klSoCtdzYBs9qF4VTLXT8qG2ik_aem_2kMmpdyuI_1kvtJG0JH0OQ Please LISTEN

The Screenwriting Life with Meg LeFauve and Lorien McKenna
251 | Writing with Your Partner (in Life & Work): Joe Forte on Collaboration, Mentorship, and Creative Retreats

The Screenwriting Life with Meg LeFauve and Lorien McKenna

Play Episode Listen Later Jun 6, 2025 63:19


JOIN TSL WORKSHOPS: https://tslworkshops.circle.so What's it like to collaborate creatively with your spouse — and still want to have dinner together after? This week, we're joined by Joe Forte, screenwriter (Firewall) and longtime writing partner (and husband!) of Meg LeFauve. We talk candidly about the unique dynamics of working with your life partner — the communication hurdles, the unexpected benefits, and how to protect both the relationship and the work. Plus, Joe shares the power of writing retreats, how he thinks about mentorship, and what it really means to support another writer's voice while honoring your own. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Other Side Of The Firewall
The Weekly Run Down 6/6/25

The Other Side Of The Firewall

Play Episode Listen Later Jun 6, 2025 20:45


In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss their recent experiences, including family vacations, documentaries they've watched, and personal updates. They discuss the impact of sports documentaries, share their thoughts on recent movies, and reflect on their podcast's growth and future plans. The conversation is light-hearted yet insightful, touching on themes of family, entertainment, and personal growth. Please LISTEN

Falun Dafa News and Cultivation
1767: Cultivation Story: [Celebrating World Falun Dafa Day]: Veterans Are Circumventing China's Internet Firewall to Learn the Truth

Falun Dafa News and Cultivation

Play Episode Listen Later Jun 5, 2025 34:09


A practitioner in China who is retired from the military has clarified the truth of the CCP and the persecution to old friends and colleagues, many of whom are high ranking officers. They have readily accepted the information and have quit the CCP. When one officer learned of the forced organ harvesting crimes committed by […]

Laura-Lynn & Friends
733 - Harvest Firewall: Art Lucier and the Renegades

Laura-Lynn & Friends

Play Episode Listen Later Jun 5, 2025 122:21


Daystar Petition: https://tinyurl.com/ycxwe4ye Sign up for my newsletter here: Laura-Lynn Newsletter Jonathan & Suzy Lamb GiveSendGo: https://www.givesendgo.com/GEBG9 Richardson Nutritional Center: https://tinyurl.com/mudzzy3n Zstack Protocol: https://zstacklife.com/?ref=LAURALYNN Antibiotics at: Sales@larxmedical.com Promo code: LLTT Need some Ivermectin or Hydroxychloroquine? Fast shipping with guaranteed delivery in Canada and the US. Contact Mia for more information. SozoHealth@proton.me ☆ We no longer can trust our mainstream media, which is why independent journalists such as myself are the new way to receive accurate information about our world. Thank you for supporting us – your generosity and kindness to help us keep information like this coming! ☆ ~ L I N K S ~ ➞ DONATE AT: https://www.lauralynn.tv/ or lauralynnlive@protonmail.com ➞ TWITTER: @LauraLynnTT ➞ FACEBOOK: Laura-Lynn Tyler Thompson ➞ RUMBLE: https://rumble.com/c/LauraLynnTylerThompson ➞ BITCHUTE: https://www.bitchute.com/channel/BodlXs2IF22h/ ➞ YOUTUBE: https://www.youtube.com/LauraLynnTyler ➞ BRIGHTEON: https://www.brighteon.com/channels/lauralynntv ➞ DLIVE: https://dlive.tv/Laura-Lynn ➞ ODYSEE: https://odysee.com/@LauraLynnTT:9 ➞ GETTR: https://www.gettr.com/user/lauralynn ➞ LIBRTI: https://librti.com/laura-lynn-tyler-thompson

Badlands Media
Badlands Daily: June 2, 2025 – Trump Trial Fallout, Fauci's Firewall, and the Crumbling Narrative

Badlands Media

Play Episode Listen Later Jun 2, 2025 119:18 Transcription Available


On this June 2nd edition of Badlands Daily, CannCon and Zak “RedPill78” Paine tackle the explosive aftermath of Trump's conviction, dissecting the political theater, legal irregularities, and public backlash rippling across the country. They discuss AG Ken Paxton's escalating legal moves against Pfizer and Big Pharma, explore the potential fallout of Fauci's congressional hearings, and analyze the media's shifting tone as they try to maintain the crumbling narrative. From voter disillusionment and election integrity to psyops and the DeSantis factor, the hosts connect the dots on how the deep state is losing control. They also spotlight Trump's renewed rally presence, his influence on black and Hispanic voters, and signs of grassroots momentum in swing states. With humor, righteous anger, and sharp analysis, this episode paints a clear picture: the storm is here, and the establishment is scrambling.

The Other Side Of The Firewall
The Dark Side of AI: Misbehavior and Ethics

The Other Side Of The Firewall

Play Episode Listen Later Jun 2, 2025 11:55


In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss the implications of AI misbehavior, particularly focusing on a recent incident involving Anthropic's AI model. They explore ethical concerns surrounding AI development, the potential for AI to exhibit fear, and the impact of AI on daily life and the workforce. The conversation emphasizes the need for transparency and public awareness regarding AI risks, while also reflecting on the hosts' personal experiences with AI in their professional lives. Article: When an AI model misbehaves, the public deserves to know—and to understand what it means https://fortune.com/2025/05/27/anthropic-ai-model-blackmail-transparency/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExeXdFdVI3RVBlakJ5VFdYcAEeR2sxsgt6Zol1LGCgQY8ByEYDgysaRNMWpdgmvEnplYXcwVWx_1sji3XIA3w_aem_UUSQ8WFW6EVDRaBktKxy5A Please LISTEN

Hacker Public Radio
HPR4388: BSD Overview

Hacker Public Radio

Play Episode Listen Later May 28, 2025


This show has been flagged as Clean by the host. Intro How I know BSD Very minimal NetBSD usage I'm am leaving out Dragonfly BSD Previous episodes Several by Claudio Miranda and others - check the tags page. hpr3799 :: My home router history hpr3187 :: Ansible for Dynamic Host Configuration Protocol hpr3168 :: FreeBSD Jails and iocage hpr2181 :: Install OpenBSD from Linux using Grub History and Overview https://en.wikipedia.org/wiki/History_of_the_Berkeley_Software_Distribution The history of the Berkeley Software Distribution began in the 1970s when University of California, Berkeley received a copy of Unix. Professors and students at the university began adding software to the operating system and released it as BSD to select universities. https://en.wikipedia.org/wiki/Comparison_of_BSD_operating_systems Comparisons to Linux Not better or worse, just different. BSD is a direct descendant of the original UNIX Not distributions - Separate projects with separate code bases. Permissive vs Copyleft One Project vs Kernel + User land Most Open Source software is available on BSD ports and packages Network Devices and DISKS will have different naming conventions. BE CAREFUL Distinctives FreeBSD Probably most widely used Base OS Commercial products Tightly integrated with ZFS Jails OS for Firewall appliances - PFSense and Opensense OpenBSD Focus on Code Correctness and Security Often First to develop new security methodologies - ASLR and Kernel relinking at boot Home of OpenSSH, ... Base includes Xorg and a minimal Window Manager The Best docs - man pages NetBSD Supports the most platforms pkgsrc can be used on any UNIX like. How I use BSD Home Router Recently migrated from FreeBSD to OpenBSD Better support for the cheap 2.5G network adapters in Ali express firewalls Workstations OpenBSD Dual boot laptop - missing some nice features - Vscode and BT audio OpenBSD for Banking NAS FreeBSD Was physical by migrated to Proxmox VM with direct attached drives Jails for some apps ZFS pools for storage My recommendations Router OpenBSD - Any BSD will work Opensense - similar experience to managing DD-WRT Thinkpads - OpenBSD Other laptops / PC - FreeBSD desktop focus derivative. ghost or midnight Servers/NAS FreeBSD ZFS Jails BSD is worth trying Dual booting is supported but can be tricky if unfamiliar. r Provide feedback on this episode.

Packet Pushers - Full Podcast Feed
NB528: IP Fabric Adds Firewall Rule Simulation; Extreme Networks Debuts Agentic AI in Platform ONE

Packet Pushers - Full Podcast Feed

Play Episode Listen Later May 27, 2025 27:43


Take a Network Break! We begin with a Red Alert for critical vulnerabilities Kubernetes Gardener. Up next, a threat actor has been squatting on unused CNAME records to distribute malware and spam, and IP Fabric rolls out a new firewall rule simulation capability to let administrators test the effect of firewall rules on traffic patterns.... Read more »

Packet Pushers - Network Break
NB528: IP Fabric Adds Firewall Rule Simulation; Extreme Networks Debuts Agentic AI in Platform ONE

Packet Pushers - Network Break

Play Episode Listen Later May 27, 2025 27:43


Take a Network Break! We begin with a Red Alert for critical vulnerabilities Kubernetes Gardener. Up next, a threat actor has been squatting on unused CNAME records to distribute malware and spam, and IP Fabric rolls out a new firewall rule simulation capability to let administrators test the effect of firewall rules on traffic patterns.... Read more »

Packet Pushers - Fat Pipe
NB528: IP Fabric Adds Firewall Rule Simulation; Extreme Networks Debuts Agentic AI in Platform ONE

Packet Pushers - Fat Pipe

Play Episode Listen Later May 27, 2025 27:43


Take a Network Break! We begin with a Red Alert for critical vulnerabilities Kubernetes Gardener. Up next, a threat actor has been squatting on unused CNAME records to distribute malware and spam, and IP Fabric rolls out a new firewall rule simulation capability to let administrators test the effect of firewall rules on traffic patterns.... Read more »

Microsoft Business Applications Podcast
AI-Powered Cybercrime: Why Your Firewall Isn't Enough

Microsoft Business Applications Podcast

Play Episode Listen Later May 26, 2025 32:28 Transcription Available


Get featured on the show by leaving us a Voice Mail: https://bit.ly/MIPVM FULL SHOW NOTES https://www.microsoftinnovationpodcast.com/691    What happens when cybercrime becomes as organized—and profitable—as a Fortune 500 company? In this episode, Louis Arthur-Brown, a cybersecurity leader and solutions partner at CodeStone, pulls back the curtain on the evolving threat landscape. From ransomware-as-a-service to deepfake deception, Louis shares real-world insights and practical strategies for defending your organization in an AI-accelerated world. Whether you're a tech leader or a curious professional, this conversation will sharpen your security instincts and help you build resilience where it matters most. KEY TAKEAWAYS Cybercrime is industrialized: Ransomware-as-a-service and affiliate models make it easy for anyone—even non-technical actors—to launch attacks for as little as $50. AI is amplifying threats: A 1,300% rise in phishing emails last year is just the beginning. Deepfakes and voice cloning are reshaping social engineering tactics. MFA and basic hygiene go a long way: Implementing multi-factor authentication and conditional access can block up to 92% of cyberattacks. Zero Trust is essential: Organizations must move beyond the “walled garden” mindset and adopt a “never trust, always verify” approach to access and data. Data strategy is security strategy: Tools like Microsoft Purview and Windows 365 help classify, protect, and monitor sensitive data—especially in AI-enabled environments.   RESOURCES MENTIONED

The Other Side Of The Firewall
The Weekly Run-Down 5/23/25

The Other Side Of The Firewall

Play Episode Listen Later May 23, 2025 22:25


In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss a variety of topics ranging from entertainment highlights, including movies and shows, to health and fitness tips for remote workers. They also share insights on personal development through book recommendations and dive into Ryan's journey of self-publishing his book. The conversation wraps up with a discussion on the current landscape of TV shows and streaming services. Please LISTEN

The Other Side Of The Firewall
CISA's Advisory Reversal Is a Win-Win

The Other Side Of The Firewall

Play Episode Listen Later May 21, 2025 12:21


In this episode of The Other Side of the Firewall podcast, the hosts discuss the recent reversal by CISA regarding their cybersecurity advisory changes, emphasizing the importance of free access to information for the cybersecurity community. They explore the implications of subscription models on automation and data ingestion and share personal experiences related to information sharing in cybersecurity. The conversation highlights the need for timely communication and the challenges faced by federal agencies in maintaining public-facing resources. Article: CISA Reverses Decision on Cybersecurity Advisory Changes https://www.infosecurity-magazine.com/news/cisa-reverses-decision-advisory/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExdTZEY2wxc3ZSYWh3SlB6QwEeqr-icoEjztz2jGKNkbz0Sj9wz1cjTEc4LprgPKXBgEnEblnqB3EucRPtaPI_aem_E-IP1ywzsZsTZWOd3f8z_g Please LISTEN

The Other Side Of The Firewall
The Weekly Run Down 5/16/25

The Other Side Of The Firewall

Play Episode Listen Later May 16, 2025 14:00


In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss their personal updates, including vacations, media consumption, and music recommendations. Chris shares his experience in Costa Rica, emphasizing the beauty of the rainforest and the benefits of a technology detox. The conversation also touches on the growth of their podcast and upcoming book launch, concluding with reflections on the importance of community and connection. Please LISTEN

The CGAI Podcast Network
Firewall Protocol

The CGAI Podcast Network

Play Episode Listen Later May 16, 2025 31:03


In this Triple Helix episode of Defence Deconstructed, recorded March 20th, David Perry sits down with James Grannan, the Vice President of Defence and Government Relations at Lastwall to discuss trends in cyber defence and security. // Guest bios: - James Grannan is the Vice President of Defence and Government Relations at Lastwall. // Host bio: David Perry is President and CEO of the Canadian Global Affairs Institute // Recommended Readings: - "South: Shackleton's Endurance Expedition" by Ernest Shackleton // Defence Deconstructed was brought to you by Irving Shipbuilding. // Music Credit: Drew Phillips | Producer: Jordyn Carroll Release date: 16 May 2025

Red Eye Radio
05-15-25 Part Two - A Breach in the Firewall

Red Eye Radio

Play Episode Listen Later May 15, 2025 39:01


In part two of Red Eye Radio with Gary McNamara and Eric Harley, Reuters reports on potential breaches in firewalls done remotely involving solar and wind farms. Also intellectual property rights, the so-called rights of activist judges, passionate audio from Representative Mark Green on the importance of law enforcement and the liberal disdain for law and order and much more. For more talk on the issues that matter to you, listen on radio stations across America Monday-Friday 12am-5am CT (1am-6am ET and 10pm-3am PT), download the RED EYE RADIO SHOW app, asking your smart speaker, or listening at RedEyeRadioShow.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Cables2Clouds
Beyond the Firewall: Careers in Cloud Security

Cables2Clouds

Play Episode Listen Later May 14, 2025 47:29 Transcription Available


Send us a textWhen most people think about cybersecurity careers, they envision ethical hackers or security analysts huddled behind screens of scrolling code. But as our guest Brian Eidelman, VP of Cloud Engineering at Oracle, reveals, the reality is far more diverse and fascinating.Security careers exist in what Brian describes as a three-dimensional landscape. Across one axis, you have different job functions ranging from compliance specialization and policy development to threat research, forensics, and security tool development. Along another dimension are organizational environments—government, financial services, healthcare, technology companies—each with unique security challenges. The third dimension encompasses technical specializations like network security, encryption, identity management, and increasingly, cloud security.Identity management emerges as a critical focal point in our discussion. Having been one of the original developers of SiteMinder (a single sign-on solution), Brian traces how identity has evolved from simple password systems to today's sophisticated multi-factor authentication and passwordless approaches. In cloud environments where traditional network boundaries have dissolved, "identity is your new perimeter." This shift has created entirely new disciplines around non-human identities—managing how applications, workloads, and services authenticate to one another.The podcast explores how cloud security differs from traditional approaches, requiring guardrails that maintain security without sacrificing the agility that makes cloud computing valuable. We dig into how the democratization of resources has created new security challenges as developers gain direct access to infrastructure that would have been tightly controlled in on-premises environments.For those looking to break into the field, Brian offers surprisingly practical advice: unlike networking, where certifications often serve as career milestones, security values demonstrable skills and domain knowledge more highly. His recommendation? When security issues arise in your current technical role, run toward them rather than away. Volunteering for security-related projects and demonstrating curiosity can open doors more effectively than certificates alone.Ready to explore the multidimensional world of cloud security careers? Listen now and discover where you might fit in this dynamic and essential field.Connect with Brian:https://www.linkedin.com/in/brian-eidelman-9b29181/Purchase Chris and Tim's new book on AWS Cloud Networking: https://www.amazon.com/Certified-Advanced-Networking-Certification-certification/dp/1835080839/ Check out the Fortnightly Cloud Networking Newshttps://docs.google.com/document/d/1fkBWCGwXDUX9OfZ9_MvSVup8tJJzJeqrauaE6VPT2b0/Visit our website and subscribe: https://www.cables2clouds.com/Follow us on BlueSky: https://bsky.app/profile/cables2clouds.comFollow us on YouTube: https://www.youtube.com/@cables2clouds/Follow us on TikTok: https://www.tiktok.com/@cables2cloudsMerch Store: https://store.cables2clouds.com/Join the Discord Study group: https://artofneteng.com/iaatj

The Audit
Pi-hole: The Open Source DNS Firewall Revolutionizing Network Security

The Audit

Play Episode Listen Later May 12, 2025 39:50 Transcription Available


Your network is talking behind your back—but Pi-hole is listening. Join The Audit as Pi-hole co-founders Dan Schaefer and Adam Warner reveal how their open-source DNS sinkhole technology has become the secret weapon for over 200,000 privacy-conscious users worldwide. In this episode, we discuss: How Pi-hole evolved from a simple ad blocker to a critical network security tool Why DNS-level filtering stops threats before they reach any of your devices The performance benefits that make browsing noticeably faster Setting up Pi-hole on everything from Raspberry Pi to enterprise hardware How the global development team maintains this powerful security shield Protecting vulnerable IoT devices from malicious traffic The future roadmap for Pi-hole and opportunities to contribute Don't miss this deep dive into the technology that's reclaiming control of digital footprints one DNS request at a time. Connect with the Pi-hole community at discourse.pi-hole.net and discover why cybersecurity professionals consider this an essential defensive tool. Like, share, and subscribe for more cutting-edge cybersecurity insights and expert analysis! #pihole #DNSfiltering #networksecurity #adblocking #privacytools #cybersecurity #opensource #infosec 

The Other Side Of The Firewall
U.S. - Dutch Operation Moonlander Takes Down Russian Botnet

The Other Side Of The Firewall

Play Episode Listen Later May 12, 2025 13:30


In this episode of the Other Side of the Firewall podcast, the hosts discuss the latest cybersecurity news, focusing on the dismantling of a major IoT botnet and the implications for device security. They emphasize the importance of keeping devices updated and the risks associated with neglected IoT devices. The conversation also explores the landscape of cybercrime, highlighting how bad actors operate and profit from vulnerabilities. The episode concludes with insights on the future of cybersecurity and the need for awareness and proactive measures. Article: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. - Dutch Operation https://thehackernews.com/2025/05/breaking-7000-device-proxy-botnet-using.html?m=1&fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExUkZqNkM4QmEyTmNlM2VSUQEeU1Iac_fcz0QhlCPG5-TflrbhMyMF7RPU0m1R8S5-XhjmTEu7KUFg5oL0j5I_aem_DfY--ZYjuSC-BLvEvG6BxQ Please LISTEN

The Gareth Cliff Show
Holy Smokes & Plotical Firewalls

The Gareth Cliff Show

Play Episode Listen Later May 9, 2025 58:07


09.05.25 Pt 1 - Gareth Cliff and Ben Karpinski weigh in on the election of the new Pope and why preserving tradition still holds value in a fast-changing world. They also unpack the controversy around Julius Malema being denied entry into the UK, and what it says about South Africa's global standing and political self-respect. Plus, in an era where media is everywhere and on every device, they tackle the increasingly blurry line between public interest and personal privacy The Real Network

The Other Side Of The Firewall
The Weekly Run Down 5/9/25

The Other Side Of The Firewall

Play Episode Listen Later May 9, 2025 21:28


In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a variety of topics ranging from personal updates and family life to their media consumption habits, including TV shows and movies. They also delve into the video game industry, sharing insights on upcoming releases and trends. Additionally, Ryan shares exciting news about his book launch and the growth of their podcast audience, highlighting the impact of their work over the past few years. Please LISTEN

The Other Side Of The Firewall
The Passwordless Future Is NOW?!

The Other Side Of The Firewall

Play Episode Listen Later May 7, 2025 10:07


In this episode of The Other Side of the Firewall podcast, Ryan Williams and Shannon Tynes discuss the latest developments in cybersecurity, focusing on Microsoft's shift to passwordless accounts and the implications for users. They explore the challenges of password management, the benefits of passkeys and biometric authentication, and the future of cybersecurity in the context of emerging technologies like quantum computing. Article: Microsoft makes all new accounts passwordless by default https://www.bleepingcomputer.com/news/microsoft/microsoft-makes-all-new-accounts-passwordless-by-default/?fbclid=IwY2xjawKIWopleHRuA2FlbQIxMAABHod4579kkkG2HEuaLmQVIdGGMKHARmAvA3vXcVN_PutWmqk3mTsLO1emRVqk_aem_SCwuxj4mNbRstoBAlI0Xgg Please LISTEN

The Extra 10
Faith and Firewalls (title brought to you by Chat GPT)

The Extra 10

Play Episode Listen Later May 6, 2025 40:10


Jason and Ben discuss the difficulties of how to engage technology and what it means to be human.

Faith For Work
Building a Firewall of Faith - Chris Cooper

Faith For Work

Play Episode Listen Later May 6, 2025 38:38


How secure is your faith-firewall? Are you constantly battling faith-breaches, compromises, or spiritual malware? In this episode, Chris Cooper, a cybersecurity professional and founder of Lighthouse in Me, LLC, draws striking parallels between protecting data and guarding our souls. Just as companies build defenses against digital threats, Christians must protect their hearts and minds from spiritual attacks. God's Word, says Chris, is the Christian's firewall and eternal policy for protection. Obedience to Scripture determines its effectiveness.Chris's faith journey took a pivotal turn during a career setback, when he realized that true security doesn't come from self-reliance but surrender to God. Letting go of his personal agenda, Chris describes how he embraced God's plan and built his "faith-firewall" through Scripture. Drawing from the parable of the talents in Matthew 25, Chris learned how to invest his time, skills, and finances for God's glory. Viewing work as ministry is a transformative faith practice for Chris. In a world that often separates the sacred from the professional, he believes that his vocation is a platform for worship, serving others, and modeling his faith. Whether managing digital threats or mentoring colleagues, every task is an opportunity to bring eternal value into the workplace.More about Chris:Chris is a seasoned executive leader and devoted Christ follower who brings a unique blend of professional expertise and faith-driven purpose to everything he does. With a career rooted in technology, cybersecurity, privacy, compliance, and risk management, Chris has helped organizations navigate complex challenges with integrity, innovation, and a deep commitment to stewardship.Outside of his professional life, Chris has a long history of community involvement. He's served as a United Way volunteer and Campaign Chairman, helped launch multiple Bible studies over the past decade, and currently serves on both The Salvation Army Midland Division Advisory Board and the Gateway Citadel Advisory Council. Chris is married to his wife Wendy, and together they share a beautifully blended family of five children. In late 2024, they launched Lighthouse in Me LLC, a faith-based initiative focused on inspiring and empowering others to live boldly in their faith. Chris also serves as the Market President of C-Suite for Christ St. Louis, where he is passionate about building trusted leadership, fostering meaningful community, and creating spaces where faith can flourish.Support the showTransforming the workplace one Bible study at a time - DONATE today! CONNECT WITH US:B-B-T.org | News | LinkedIn Biblical Business Training (“BBT”) equips busy, working people to grow in the grace and knowledge of Jesus Christ and empowers them in small-group Bible study settings to apply Biblical principles to their every day lives - especially in the workplace. BBT is a nonprofit 501(c)(3) organization which exists to help people develop their Christian “Faith for Work – Leadership for Life!”

The Other Side Of The Firewall
TikTok Caught Sending Data To China, Fined $600M

The Other Side Of The Firewall

Play Episode Listen Later May 6, 2025 14:46


In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss the recent $600 million fine imposed on TikTok for violating GDPR regulations by sending European user data to China. They explore the implications of data privacy laws, particularly in the context of the EU's strict regulations and California's emerging privacy laws. The conversation also touches on the economic significance of California as the fourth largest economy in the world and the ongoing challenges TikTok faces in the U.S. market. Article: TikTok Fined $600 Million for Sending European User Data to China https://www.nytimes.com/2025/05/02/business/tiktok-eu-data-china.html?unlocked_article_code=1.EE8.lcSM.zBPI8uveHxuf&smid=url-share&fbclid=IwY2xjawKHHRBleHRuA2FlbQIxMAABHqWJfI36i3GvJGZoJ8yEa3KQgBXDMCzQ0HDOyV1hsRNgFCsXzlUBGMKqiR_n_aem_Xb5U1FXGaWAGlddA_jkpVg Please LISTEN

Lex Fridman Podcast
#468 – Janna Levin: Black Holes, Wormholes, Aliens, Paradoxes & Extra Dimensions

Lex Fridman Podcast

Play Episode Listen Later May 5, 2025 187:16


Janna Levin is a theoretical physicist and cosmologist specializing in black holes, cosmology of extra dimensions, topology of the universe, and gravitational waves. Thank you for listening ❤ Check out our sponsors: https://lexfridman.com/sponsors/ep468-sc See below for timestamps, transcript, and to give feedback, submit questions, contact Lex, etc. Transcript: https://lexfridman.com/janna-levin-transcript CONTACT LEX: Feedback - give feedback to Lex: https://lexfridman.com/survey AMA - submit questions, videos or call-in: https://lexfridman.com/ama Hiring - join our team: https://lexfridman.com/hiring Other - other ways to get in touch: https://lexfridman.com/contact EPISODE LINKS: Janna's X: https://x.com/JannaLevin Janna's Website: https://jannalevin.com Janna's Instagram: https://instagram.com/jannalevin Janna's Substack: https://substack.com/@jannalevin Black Hole Survival Guide (book): https://amzn.to/3YkJzT5 Black Hole Blues (book): https://amzn.to/42Nw7IE How the Universe Got Its Spots (book): https://amzn.to/4m5De8k A Madman Dreams of Turing Machines (book): https://amzn.to/3GGakvd SPONSORS: To support this podcast, check out our sponsors & get discounts: Brain.fm: Music for focus. Go to https://brain.fm/lex BetterHelp: Online therapy and counseling. Go to https://betterhelp.com/lex NetSuite: Business management software. Go to http://netsuite.com/lex Shopify: Sell stuff online. Go to https://shopify.com/lex AG1: All-in-one daily nutrition drink. Go to https://drinkag1.com/lex OUTLINE: (00:00) - Introduction (00:51) - Sponsors, Comments, and Reflections (09:21) - Black holes (16:55) - Formation of black holes (27:45) - Oppenheimer and the Atomic Bomb (34:08) - Inside the black hole (47:10) - Supermassive black holes (50:39) - Physics of spacetime (53:42) - General relativity (59:13) - Gravity (1:15:47) - Information paradox (1:24:17) - Fuzzballs & soft hair (1:27:28) - ER = EPR (1:34:07) - Firewall (1:42:59) - Extra dimensions (1:45:24) - Aliens (2:01:00) - Wormholes (2:11:57) - Dark matter and dark energy (2:22:00) - Gravitational waves (2:34:08) - Alan Turing and Kurt Godel (2:46:23) - Grigori Perelman, Andrew Wiles, and Terence Tao (2:52:58) - Art and science (3:02:37) - The biggest mystery PODCAST LINKS: - Podcast Website: https://lexfridman.com/podcast - Apple Podcasts: https://apple.co/2lwqZIr - Spotify: https://spoti.fi/2nEwCF8 - RSS: https://lexfridman.com/feed/podcast/ - Podcast Playlist: https://www.youtube.com/playlist?list=PLrAXtmErZgOdP_8GztsuKi9nrraNbKKp4 - Clips Channel: https://www.youtube.com/lexclips

ITSPmagazine | Technology. Cybersecurity. Society
The New Front Line: Runtime Protection for AI and API-Driven Attacks | A Brand Story with Rupesh Chokshi from Akamai | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 5, 2025 17:29


At RSAC Conference 2025, Rupesh Chokshi, Senior Vice President and General Manager of the Application Security Group at Akamai, joined ITSPmagazine to share critical insights into the dual role AI is playing in cybersecurity today—and what Akamai is doing about it.Chokshi lays out the landscape with clarity: while AI is unlocking powerful new capabilities for defenders, it's also accelerating innovation for attackers. From bot mitigation and behavioral DDoS to adaptive security engines, Akamai has used machine learning for over a decade to enhance protection, but the scale and complexity of threats have entered a new era.The API and Web Application Threat SurgeReferencing Akamai's latest State of the Internet report, Chokshi cites a 33% year-over-year rise in web application and API attacks—topping 311 billion threats. More than 150 billion of these were API-related. The reason is simple: APIs are the backbone of modern applications, yet many organizations lack visibility into how many they have or where they're exposed. Shadow and zombie APIs are quietly expanding attack surfaces without sufficient monitoring or defense.Chokshi shares that in early customer discovery sessions, organizations often uncover tens of thousands of APIs they weren't actively tracking—making them easy targets for business logic abuse, credential theft, and data exfiltration.Introducing Akamai's Firewall for AIAkamai is addressing another critical gap with the launch of its new Firewall for AI. Designed for both internal and customer-facing generative AI applications, this solution focuses on securing runtime environments. It detects and blocks issues like prompt injection, PII leakage, and toxic language using scalable, automated analysis at the edge—reducing friction for deployment while enhancing visibility and governance.In early testing, Akamai found that 6% of traffic to a single LLM-based customer chatbot involved suspicious activity. That volume—within just 100,000 requests—highlights the urgency of runtime protections for AI workloads.Enabling Security LeadershipChokshi emphasizes that modern security teams must engage collaboratively with business and data teams. As AI adoption outpaces security budgets, CISOs are looking for trusted, easy-to-deploy solutions that enable—not hinder—innovation. Akamai's goal: deliver scalable protections with minimal disruption, while helping security leaders shoulder the growing burden of AI risk.Learn more about Akamai: https://itspm.ag/akamailbwcNote: This story contains promotional content. Learn more.Guest: Rupesh Chokshi, SVP & General Manager, Application Security, Akamai | https://www.linkedin.com/in/rupeshchokshi/ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, rupesh chokshi, akamai, rsac, ai, security, cisos, api, firewall, llm, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

The Other Side Of The Firewall
Ukraine Reports A 70% Surge in Cyberattacks

The Other Side Of The Firewall

Play Episode Listen Later May 5, 2025 9:49


In this episode of The Other Side of the Firewall podcast, Ryan Williams Sr. and Shannon Tynes discuss the evolving landscape of cybersecurity, particularly in the context of the ongoing conflict in Ukraine. They explore the significant rise in cyber attacks attributed to Russia, the tactics being employed, and the implications for future warfare. The conversation highlights the importance of adapting to new threats and the role of technology in modern military strategies. Article: Putin's Cyberattacks on Ukraine Rise 70%, With Little Effect https://www.darkreading.com/threat-intelligence/putin-cyberattacks-ukraine-rise-little-effect?fbclid=IwY2xjawKE6i9leHRuA2FlbQIxMAABHmXT4_Xy1jsyyfoaHN4cg_A0UCLVMQ4YQD5TzI_w346EX9iwIeC9AOYrkG-q_aem_WVPaujMnmlaGGl33_l16iQ Please LISTEN

Hörweite – Der Reporter-Podcast
Podcast-Tipp »Firewall«: Systemsprenger Elon Musk (2/3)

Hörweite – Der Reporter-Podcast

Play Episode Listen Later May 2, 2025 43:31


Zum verlängerten Wochenende hat Juan Moreno wieder eine Empfehlung für alle Podcast-Hörer – die zweite Folge der dreiteiligen Serie des SPIEGEL-Podcasts »Firewall« über das Phänomen Elon Musk. Folge eins konntet ihr vergangene Woche schon hier hören. Darin ging es um Musks Aufstieg im Silicon Valley, seine waghalsigen Investments und explodierende Raketen. Folge zwei behandelt Musks Radikalisierung während der Coronapandemie und seine Twitter-Obsession. In der dritten Folge geht es um Elon Musks Abkehr von den US-Demokraten hin zu Donald Trump. Hört gleich weiter bei »Firewall« oder auf SPIEGEL.de. Mehr: https://www.spiegel.de/wirtschaft/unternehmen/elon-musk-erfolgsgeschichte-radikalisierung-und-pakt-mit-donald-trump-podcastserie-a-3d56c9cf-8e5e-4076-b9ce-07443bb08bc3?d=1744880557+++ Alle Infos zu unseren Werbepartnern finden Sie hier. Die SPIEGEL-Gruppe ist nicht für den Inhalt dieser Seite verantwortlich. +++ Den SPIEGEL-WhatsApp-Kanal finden Sie hier. Alle SPIEGEL Podcasts finden Sie hier. Mehr Hintergründe zum Thema erhalten Sie mit SPIEGEL+. Entdecken Sie die digitale Welt des SPIEGEL, unter spiegel.de/abonnieren finden Sie das passende Angebot. Informationen zu unserer Datenschutzerklärung.

The Other Side Of The Firewall
The Weekly Run Down 5/2/25

The Other Side Of The Firewall

Play Episode Listen Later May 2, 2025 19:20


In this episode of The Other Side of the Firewall, hosts Ryan Williams Sr. and Shannon Tynes discuss a variety of topics ranging from personal reflections on family and parenthood to their entertainment choices, including movies and gaming experiences. They also discuss the recent NFL draft, sharing insights on player selections and their implications. Additionally, Ryan shares updates on his personal projects, including a manuscript for a guide related to their podcast, and discusses the challenges of balancing work and personal interests. Please LISTEN

Firewall
Would You Eat At An Empty Restaurant?

Firewall

Play Episode Listen Later Apr 29, 2025 64:47


The concept of “norm cascades” influences everything from why we wouldn't eat at an empty restaurant to why Bradley's son was unimpressed with the recent NFL draft. On this episode of Firewall, Bradley is joined by guest co-host Cory Epstein where they dive deeper into norm cascades, Trump's plunging approval rating, and an intriguing new AI regulation bill in California that could pick up from where SB 1047 left off after Governor Newsom's veto last year. Plus, Bradley and Cory share their tips for staying in touch and nurturing friendships as they get older.Discussed on today's episode:How To Have Friends Past Age 30, Noah Smith, Noahpinion (April 25, 2025)This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Subscribe to Bradley's weekly newsletter, follow Bradley on Linkedin + Substack + YouTube, be sure to order his new book, Vote With Your Phone.

Business of Tech
AI Use in the Workplace: Trust Issues, New Security Tools, and USAID's Device Policy Shift

Business of Tech

Play Episode Listen Later Apr 29, 2025 14:52


Over half of employees are concealing their use of artificial intelligence (AI) tools from their employers, raising significant concerns about trust and compliance within organizations. A study by KPMG and the University of Melbourne found that 57% of employees admitted to hiding their AI usage, with 66% of these users not verifying the accuracy of AI-generated results. This lack of transparency poses risks related to data management and compliance, especially as nearly half of the respondents have shared sensitive business information on public AI platforms. The findings highlight a growing identity management crisis, as organizations grapple with the implications of unchecked AI adoption.In the realm of customer service, a study revealed that while 42% of consumers believe AI can handle complex inquiries as effectively as humans, 51% reported receiving incorrect information from AI bots. Despite this, there is a notable increase in the number of customers successfully resolving issues through AI, with 63% expecting AI to become the primary mode of customer support. However, privacy and security concerns remain prevalent, with 70% of consumers expressing worries about these issues when interacting with AI technologies.The podcast also discusses the evolving job landscape in AI, noting that the role of prompt engineer is becoming obsolete due to advancements in AI technology. Microsoft's survey indicated that roles such as AI trainer and AI data specialist are now in higher demand. Additionally, while larger corporations are reaping the benefits of AI adoption, small and medium-sized businesses are struggling to keep pace, potentially missing out on significant economic advantages. This disparity underscores the need for tailored solutions to help smaller firms integrate AI effectively.Finally, the episode covers recent developments in cybersecurity, including new offerings from Akamai and SureWeb aimed at addressing emerging threats in AI and browser security. Akamai's Firewall for AI provides multi-layered protection against cyber threats, while SureWeb's Defense X tools enhance browser security for managed service providers. The discussion emphasizes the critical need for specialized security measures as organizations increasingly rely on AI and browser-based applications. The episode concludes with a cautionary note regarding the importance of secure device decommissioning, as highlighted by USAID's recent policy change, which raises concerns about identity and access management in both public and private sectors. Four things to know today 00:00 Trust Erodes as AI Usage Rises: Employees Hide Tools, Consumers Doubt Bots, and SMBs Fall Behind06:29 Syncro Launches XMM—Think RMM, But Bigger, Smarter, and More Secure 08:22 Akamai and Sherweb Address Overlooked Risks in AI and Browser-Based Work Environments10:57 USAID Stops Collecting Devices from Ex-Employees, Exposing Gaps in Endpoint Security and Offboarding Supported by:  https://www.huntress.com/mspradio/ https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

Hörweite – Der Reporter-Podcast
Podcast-Tipp »Firewall«: Systemsprenger Elon Musk (1/3)

Hörweite – Der Reporter-Podcast

Play Episode Listen Later Apr 22, 2025 49:27


Juan Moreno hat eine Empfehlung mitgebracht – den SPIEGEL-Podcast »Firewall« mit einer dreiteiligen Serie über das Phänomen Elon Musk. Wie wurde der Techmilliardär so reich, mächtig und radikal? Folge eins könnt ihr hier hören. Darin geht es um Musks Aufstieg im Silicon Valley, seine waghalsigen Investments und explodierende Raketen. Folge zwei behandelt seine Radikalisierung während der Coronapandemie und seine Twitter-Obsession – ihr findet sie ab sofort bei »Firewall«. Um Elon Musks Abkehr von den US-Demokraten hin zu Donald Trump geht es in der dritten Folge – ab dem 24. April bei »Firewall«. SPIEGEL-Plus-Abonnenten können alle drei Folgen schon jetzt hören. Mehr: https://www.spiegel.de/wirtschaft/unternehmen/elon-musk-erfolgsgeschichte-radikalisierung-und-pakt-mit-donald-trump-podcastserie-a-3d56c9cf-8e5e-4076-b9ce-07443bb08bc3?d=1744880557+++ Alle Infos zu unseren Werbepartnern finden Sie hier. Die SPIEGEL-Gruppe ist nicht für den Inhalt dieser Seite verantwortlich. +++ Den SPIEGEL-WhatsApp-Kanal finden Sie hier. Alle SPIEGEL Podcasts finden Sie hier. Mehr Hintergründe zum Thema erhalten Sie mit SPIEGEL+. Entdecken Sie die digitale Welt des SPIEGEL, unter spiegel.de/abonnieren finden Sie das passende Angebot. Informationen zu unserer Datenschutzerklärung.