Podcasts about firewalls

  • 1,320PODCASTS
  • 4,553EPISODES
  • 33mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Feb 23, 2026LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about firewalls

Show all podcasts related to firewalls

Latest podcast episodes about firewalls

Awakening
#409 Will Good beat Evil in AI with Manuj Aggarwal

Awakening

Play Episode Listen Later Feb 23, 2026 21:26


Manuj Aggarwal, is the founder and Chief Innovation Officer TetraNoodle Technologies, an elite AI consulting company. Join my PodFather Podcast Coaching Community https://www.skool.com/podfather/about Start Your Own SKOOL Communityhttps://www.skool.com/signup?ref=c72a37fe832f49c584d7984db9e54b71  #manujaggarwal #ai #TetraNoodleAwakening Podcast Social Media / Coaching My Other Podcasts  ⁠⁠⁠https://roycoughlan.com/⁠⁠ About my Guest:Manuj Aggarwal, is the founder and Chief Innovation Officer TetraNoodle Technologies, an elite AI consulting company. With a remarkable track record of driving transformative change, Manuj, through TetraNoodle, has touched at least 10 million lives and generated over $500M in value through his expertise in technology and AI. He has shared his insights at the United Nations alongside distinguished figures like the Secretary-General and Nobel Peace Prize winners, while President Obama and Bill Gates have recognized his work. With four AI patents to his name, Manuj is the perfect mentor to guide you through the transformative potential of AI and its benefits for businesses. Join us and discover the limitless possibilities of AI under the guidance of this visionary industry influencer.What we Discussed: 00:00 Who is Manuj Aggarwal 01:45 Where did the Name TetraNoodle Technologies come from?01:47 His 4 Patents05:00 Making $2 a day to a Successful Entrepreneur06:48 Will Good beat Evil in AI10:25 Will AI take over Humanity11:05 Ai does not always tell you the Truth12:50 The 2 Books he wrote13: 12 Firewalls to Protect our Data15:10 What has Meditation and Ai got in Common16:40 What AI tools he uses for his Podcast19:30 Have the AI can interact with your knowledge How to Contact Manuj Aggarwal https://manujaggarwal.com/ https://www.facebook.com/manuj.aggarwalhttps://x.com/manujagrohttps://www.youtube.com/@manujagrohttps://www.instagram.com/manujagro/https://www.linkedin.com/in/manujaggarwal/https://www.tiktok.com/@manujagro------------------------------More about the Awakening Podcast:All Episodes can be found at www.awakeningpodcast.org Awakening Podcast Social Media / Coaching My Other Podcasts  ⁠⁠⁠https://roycoughlan.com/⁠⁠ Our Facebook Group can be found at https://www.facebook.com/royawakening #podfather #roycoughlan #firewall #aitools

Speaking with Roy Coughlan
#348 Will Good beat Evil in AI with Manuj Aggarwal

Speaking with Roy Coughlan

Play Episode Listen Later Feb 23, 2026 21:26


Manuj Aggarwal, is the founder and Chief Innovation Officer TetraNoodle Technologies, an elite AI consulting company. Join my PodFather Podcast Coaching Community ⁠https://www.skool.com/podfather/about⁠   Start Your Own SKOOL Community ⁠https://www.skool.com/signup?ref=c72a37fe832f49c584d7984db9e54b71⁠    #manujaggarwal #ai #TetraNoodle Awakening Podcast Social Media / Coaching My Other Podcasts    ⁠⁠⁠⁠https://roycoughlan.com/⁠⁠⁠   About my Guest: Manuj Aggarwal, is the founder and Chief Innovation Officer TetraNoodle Technologies, an elite AI consulting company. With a remarkable track record of driving transformative change, Manuj, through TetraNoodle, has touched at least 10 million lives and generated over $500M in value through his expertise in technology and AI. He has shared his insights at the United Nations alongside distinguished figures like the Secretary-General and Nobel Peace Prize winners, while President Obama and Bill Gates have recognized his work. With four AI patents to his name, Manuj is the perfect mentor to guide you through the transformative potential of AI and its benefits for businesses. Join us and discover the limitless possibilities of AI under the guidance of this visionary industry influencer. What we Discussed:   00:00 Who is Manuj Aggarwal   01:45 Where did the Name TetraNoodle Technologies come from? 01:47 His 4 Patents 05:00 Making $2 a day to a Successful Entrepreneur 06:48 Will Good beat Evil in AI 10:25 Will AI take over Humanity 11:05 Ai does not always tell you the Truth 12:50 The 2 Books he wrote 13: 12 Firewalls to Protect our Data 15:10 What has Meditation and Ai got in Common 16:40 What AI tools he uses for his Podcast 19:30 Have the AI can interact with your knowledge   How to Contact Manuj Aggarwal  ⁠https://manujaggarwal.com/⁠  ⁠https://www.facebook.com/manuj.aggarwal⁠ ⁠https://x.com/manujagro⁠ ⁠https://www.youtube.com/@manujagro⁠ ⁠https://www.instagram.com/manujagro/⁠ ⁠https://www.linkedin.com/in/manujaggarwal/⁠ ⁠https://www.tiktok.com/@manujagro⁠ ------------------------------ More about the Awakening Podcast: All Episodes can be found at ⁠www.awakeningpodcast.org⁠   Awakening Podcast Social Media / Coaching My Other Podcasts    ⁠⁠⁠⁠https://roycoughlan.com/⁠⁠⁠   Our Facebook Group can be found at ⁠https://www.facebook.com/royawakening⁠   #podfather #roycoughlan #firewall #aitools

Cyber Security Headlines
Arkanix was POC, 600 Fortinet firewalls breach, Russia heightens tension

Cyber Security Headlines

Play Episode Listen Later Feb 23, 2026 8:03


Arkanix Stealer – the new AI info-stealer experiment AI-assisted hacker breached 600 Fortinet firewalls in 5 weeks Russia stepping up hybrid attacks, preparing for confrontation with West Get links to all of today's news in our show notes here: https://cisoseries.com/cybersecurity-news-arkanix-was-poc-600-fortinet-firewalls-breach-russia-heightens-tension/ Thanks to today's episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first security awareness platform built to stop AI-powered social engineering. Deepfakes aren't science fiction anymore; they're a daily threat. Quick tip: if your voicemail greeting is your real voice, switch it to the default robot voice. A few seconds of audio can be enough to clone you. Adaptive helps teams spot and stop these AI-powered social engineering attacks. Learn more at adaptivesecurity.com.  

Jubal Phone Pranks from The Jubal Show
Trevor Took Down The Company Firewall...

Jubal Phone Pranks from The Jubal Show

Play Episode Listen Later Feb 21, 2026 4:44 Transcription Available


What would you do if your brand-new IT employee called to say he accidentally took down the company firewall… forgot his password… and replaced the homepage with a llama?

Software Engineering Daily
Inside China's Great Firewall with Jackson Sippe

Software Engineering Daily

Play Episode Listen Later Feb 19, 2026 58:00


China's Great Firewall is often spoken about but is rarely understood. It is one of the most sophisticated and opaque censorship systems on the planet, and it shapes how over a billion people interact with the global internet, influences the design of privacy and proxy tools worldwide, and continues to evolve in ways that challenge The post Inside China's Great Firewall with Jackson Sippe appeared first on Software Engineering Daily.

china firewalls great firewall inside china sippe software engineering daily
Packet Pushers - Full Podcast Feed
N4N049: Understanding Firewalls

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Feb 19, 2026 70:05


Today, Ethan and Holly provide an overview of firewalls. While cybersecurity is a separate discipline from network engineering, much of what happens in cybersecurity is interesting at the packet level, so there’s a good deal of overlap. It's likely that as a network engineer, you'll be managing, or at least dealing with, firewalls in your... Read more »

Packet Pushers - Fat Pipe
N4N049: Understanding Firewalls

Packet Pushers - Fat Pipe

Play Episode Listen Later Feb 19, 2026 70:05


Today, Ethan and Holly provide an overview of firewalls. While cybersecurity is a separate discipline from network engineering, much of what happens in cybersecurity is interesting at the packet level, so there’s a good deal of overlap. It's likely that as a network engineer, you'll be managing, or at least dealing with, firewalls in your... Read more »

ETDPODCAST
CIA richtet sich mit Video an KPCh-Militärüberläufer – viral trotz Firewall | Nr. 8842

ETDPODCAST

Play Episode Listen Later Feb 17, 2026 8:59 Transcription Available


Die CIA veröffentlichte ein chinesischsprachiges Video, in dem ein fiktiver KPCh-Militäroffizier von der Partei abkehrt und Kontakt zu den USA sucht, um sein Land und seine Familie zu schützen. Das Video thematisiert interne Spannungen, Loyalitätskonflikte und militärische Unzufriedenheit innerhalb der KPCh und erreicht trotz der „Großen Firewall“ Hunderttausende Nutzer.

I Speak Jeep
Comfort is Optional, from Frostbite to Firewalls

I Speak Jeep

Play Episode Listen Later Feb 11, 2026 78:24


We want to hear from you, Send us a TextWelcome to the arctic! The team is facing off with penguins as they talk creature comforts in Jeeps. That's right from the sub zero temperatures of the Great Lake Erie, our team is bundled up and talking about heat! How does your heater system work but more importantly, how will Scott relate this to horses. Tune in to find out and learn about Jeff's big announcement at the end. Support the showThanks for listening, give us a review and check us out on YouTube -SFJ4x4 and visit our website to grab some great gear or products for your Jeep, SFJ4x4.com. Don't forget, you can email Jeffc@sfj4x4.com for special content requests, blind react videos, suggestions, special guests, or general questions. Check out our Patreon patreon.com/ISpeakJeep

Input
Bildschirmzeit bei Kindern: Regeln, Konflikte, Lösungen

Input

Play Episode Listen Later Feb 11, 2026 37:50


«Sie verschwendet ihre Zeit», sagt Corine. Und ihre Teenager-Tochter meint: «Meine Eltern verstehen mich nicht.» Über die Hälfte der Schweizer Familien streitet wegen der Bildschirmzeit. Was hilft? Regeln, sagt der Medienpädagoge – und eine Haltung aus Vertrauen, Neugier, Humor und Selbstdisziplin. «Input» besucht zwei Familien mit Kindern zwischen 6 und 15 Jahren, darunter Romy. Sie konnte die Zeitlimits für Youtube und Snapchat selbst ändern. «Weil Kinder Eltern technisch oft überlegen sind», erklärt der Medienpädagoge, «zählt am Ende vor allem das Vertrauen, das über Jahre aufgebaut wurde.» ____________________ Habt ihr Feedback, Fragen oder Wünsche? Wir freuen uns auf eure Nachrichten an input@srf.ch – und wenn ihr euren Freund:innen und Kolleg:innen von uns erzählt. ____________________ 00:00 Intro 01:44 Lea und ihre drei Söhne (11, 9 und 6) 06:50 Medienpädagoge Beat Richert über Firewalls, Begleitung und Vertrauen 10:42 Zeitlimits und Handyentzug bei Lea und ihren Söhnen 14:52 Medienerziehung, Streit und Regeln (Medienpädagoge Beat Richert) 22:17 Vorbildrolle der Eltern 25:43 Corina und ihre Teenagertöchter über Streit und Einsicht 35:08 Fazit ____________________ In dieser Episode zu hören - Corina (45), Mutter von Aline (15) und Romy (14) - Lea (37), Mutter von Damian (11), Nino (9) und Gian (6) - Beat Richert, Medienpädagoge ____________________ - Autorin: Mariel Kreis - Publizistische Leitung: Anita Richner ____________________ Das ist «Input»: Dem Leben in der Schweiz auf der Spur – mit all seinen Widersprüchen und Fragen. Der Podcast «Input» liefert jede Woche eine Reportage zu den Themen, die euch bewegen.

CISSP Cyber Training Podcast - CISSP Training Program
CCT 322: From Firewalls To AI: Building A Smarter Defense - CISSP Domain 7.7

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Feb 9, 2026 36:02 Transcription Available


Send us a textThe weakest link is often sitting on the edge, blinking away with expired firmware and no vendor support. We kick off with a blunt reality check on outdated firewalls, load balancers, and IoT gateways, and why waiting two years to retire them is a gift to attackers. From there, we guide you through Domain 7.7 with a practical blueprint for operating and maintaining detective and preventive measures that actually hold up under pressure.We unpack firewall fundamentals with clear, real‑world tradeoffs: when a simple packet filter is enough, when stateful inspection and deep packet inspection earn their keep, and how a WAF stops the web attacks your L3/L4 controls will miss. You'll hear how RTBH can deflect denial‑of‑service floods upstream, and why segmentation is your best friend for reducing blast radius—whether you use internal segmentation firewalls for R&D, Purdue‑style tiers for industrial networks, or controlled air gaps for the most sensitive systems. In the cloud, we separate security groups from true firewalls and show how to stitch policies across hybrid environments without creating blind spots.Detection makes prevention smarter, so we break down IDS versus IPS in plain language. Baseline first, then block with intent to avoid outages. We compare host‑based and network‑based sensors, explain where to place them, and share tactics for cutting alert noise. You'll also get straight talk on allowlists and blacklists, the right way to maintain them, and why stale entries cause the ugliest outages. We explore sandboxing for safe detonation and learning, and give an unvarnished take on honeypots and honeynets—where they help, where they waste time, and what legal lines to respect.Not every team can build a 24x7 SOC, so we outline how MSSPs can extend your coverage with clear SLAs and ownership. Endpoint anti‑malware remains non‑negotiable, but tool sprawl is a trap—choose a strong EDR and manage it well. Finally, we dive into AI and machine learning: how they supercharge detection, triage, and response—and how adversaries use them too. The throughline is simple: shrink attack surface, raise signal quality, and respond faster than threats can pivot. If this helps you secure one more edge box or tune one more control, share it with a teammate, subscribe for more practical walkthroughs, and drop a review so we can keep raising the bar together.Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

Hacker Public Radio
HPR4567: Movie Recommendations for Hackers

Hacker Public Radio

Play Episode Listen Later Feb 3, 2026


This show has been flagged as Clean by the host. Warning, this episode containers some spoilers for movies. The following movies are in my cybersecurity movie library. The ones marked * are included in review in this episode. 2001: A Space Odyssey (1968) * AntiTrust (2001) Blackhat (2015) Blade Runner (1982) Catch Me If You Can (2002) Citizenfour (2015) CSI: Cyber (2015) Enemy of the State (1998) Firewall (2006) Gattaca (1997) * Ghost in the Shell (1995) Hackers (1995) * Heartbreakers (2001) The Imitation Game (2014) I, Robot (2004) Johnny Mnemonic (1995) Jurassic Park (1993) * The KGB, the Computer and Me (1990) * - Youtube link The Lives of Others (2006) * Lo and Behold, Reveries of the Connected World (2016) The Matrix (1999) The Matrix Reloaded (2003) * The Matrix Revolutions (2003) Minority Report (2002) Mission: Impossible (1996) * Mr. Robot (2015) The Net (1995) * The Net 2.0 (2006) Ocean's Eleven (2001) Office Space (1999) * Person of Interest (2011) * Revolution OS (2001) The Social Network (2010) Sneakers (1992) * Superman III (1983) * Surrogates (2009) Swordfish (2001) Takedown (2000) Tron (1982) * WarGames (1983) * Slashdot "Best Hacker movie" poll (August 2001): https://slashdot.org/poll/683/best-hacker-flick This episode contains short except clips from some of these movies used under free use for demonstration. Provide feedback on this episode.

The Other Side Of The Firewall
The Cybersecurity Ecosystem We've All Been Waiting For Ft. Mary N. Chaney, Esq

The Other Side Of The Firewall

Play Episode Listen Later Feb 3, 2026 52:58


In this episode of The Other Side of the Firewall's, Ask a CISSP, host Ryan Williams Sr. welcomes Mary N. Chaney, Esq, a multifaceted professional in cybersecurity and law. Mary shares her inspiring journey from humble beginnings in Cincinnati to becoming a special agent for the FBI, where she investigated cyber crimes. As a law professional with extensive experience in corporate cybersecurity, she transitioned into entrepreneurship, founding multiple organizations aimed at empowering minorities in the tech space. Mary discusses her current initiatives, including Minorities in Cybersecurity (MiC), which focuses on leadership development and mentorship, and the Mary N. Chaney Cybersecurity Training Center (MNC-CTC), designed to provide hands-on training for aspiring cybersecurity professionals. Throughout the conversation, Mary emphasizes the importance of business fluency in cybersecurity, arguing that technical skills alone are insufficient for career advancement. She highlights the challenges faced by entry-level professionals in the industry, particularly the unrealistic expectations for experience. Mary also discusses her vision for creating a supportive ecosystem for aspiring cybersecurity professionals, including mentorship, training, and job placement services. The episode concludes with insights into her upcoming initiatives, including the 2026 MiC Annual Conference (March 22-26, 2026) and a residency program aimed at bridging the gap between education and employment in cybersecurity. Mary N. Channey Socials: LinkedIn: https://www.linkedin.com/in/marynchaney/ Minorities in Cybersecurity (MiC): https://www.mincybsec.org/ Mary N. Chaney Cybersecurity Training Center: https://www.mnc-ctc.com/ MiC Talent Solutions: https://www.mictalent.solutions/ Buy the guide: https://www.theothersideofthefirewall.com/ Please LISTEN

The Other Side Of The Firewall
Cybercrime, Human Exploitation, and Securing Global Events in 2026

The Other Side Of The Firewall

Play Episode Listen Later Jan 28, 2026 57:08


In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams and Shannon Tynes discuss the latest cybersecurity news, including Ghana's crackdown on cybercrime, the cybersecurity challenges posed by the upcoming 2026 World Cup, and NIST's evolving role in analyzing software vulnerabilities. The conversation is enriched with personal anecdotes and reflections, making it relatable and engaging for listeners. The hosts emphasize the importance of collaboration in cybersecurity efforts and encourage audience engagement with the podcast. Articles: Ghana arrests Nigerians accused of running cyber-crime networks https://www.bbc.com/news/articles/cr4k35q6yr0o.amp?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExc2ZadnRKZVlEaXlTeTRlaHNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR7MVQYrOg2gWr49O9UvlvDZZe8VXut4EtyL-5WjyxERR3RlNhslh3nWd9KsSA_aem_aW6PFykQSmBzeCPWD3JroA 2026 World Cup to Stress-Test Cybersecurity, Business Continuity https://mexicobusiness.news/cybersecurity/news/2026-world-cup-stress-test-cybersecurity-business-continuity?tag=cybersecurity&fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExc2ZadnRKZVlEaXlTeTRlaHNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR4zNG2sVnMXLWOxs8MM-RXg7vtMcBJaopYjgSbIsxWwVVR-BFQfGKuXQpQLBw_aem_UvzF7d12ATRcGJU2ANigbw NIST is rethinking its role in analyzing software vulnerabilities https://www.cybersecuritydive.com/news/nist-cve-vulnerability-analysis-nvd-review/810300/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExc2ZadnRKZVlEaXlTeTRlaHNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR7wjrhzyAjeLiPLM5_qQetFLvJqxmeDqcZITNgYVvnSL-DzHhuVASRfERf1jw_aem_EqgqYT3by4gcSFrxg_IzUg Buy the guide: https://www.theothersideofthefirewall.com/ Please LISTEN

This Week in Neuroscience
TWiN 68: Firewall for the brain

This Week in Neuroscience

Play Episode Listen Later Jan 27, 2026 74:21


TWiN explores the use of speech brain-computer interfaces to restore communication to people with paralysis, and reveals strategies for protecting private inner speech. Hosts: Vincent Racaniello, Vivianne Morrison, and Tim Cheung Subscribe (free): Apple Podcasts, Google Podcasts, RSS Links for this episode MicrobeTV Discord Server Keeping private inner speech from brain-computer interfaces (Cell) Mind-reading brain implant with password protection (Nature) Timestamps by Jolene Ramsey. Thanks! Music is by Ronald Jenkees Send your neuroscience questions and comments to twin@microbe.tv

Reversim Podcast
511 AI Protection and Governance with Nimrod from BigID

Reversim Podcast

Play Episode Listen Later Jan 25, 2026


פרק מספר 511 של רברס עם פלטפורמה, שהוקלט ב-18 בינואר 2026. אורי ורן מקליטים בכרכור (הגשומה והקרה) ומארחים את נמרוד וקס - CPO ו-Co-Founder של BigID - שחצה את כביש 6 בגשם זלעפות כדי לדבר על אתגרים טכנולוגיים בעולם המופלא של Data Production ו-Security.

Risky Business News
Risky Bulletin: Improperly patched bug exploited again in Fortinet firewalls

Risky Business News

Play Episode Listen Later Jan 22, 2026 6:39


A poorly patched bug is being exploited in Fortinet firewalls, hackers go after security testing environments, Jordanian police used Cellebrite against activists, and new Cisco and SmarterMail zero-days. Show notes Risky Bulletin: Improperly patched bug exploited again in Fortinet firewalls

Security Now (MP3)
SN 1061: More GhostPosting - RAM Crisis Hits Firewalls

Security Now (MP3)

Play Episode Listen Later Jan 21, 2026 164:10


oaring RAM prices are about to hit your security gear where it hurts, and the fallout could change what's protecting your network. Find out who's about to pay and why the AI gold rush is reshaping more than just your server specs. RAM pricing to affect enterprise firewall equipment. Anthropic provides sizeable support to Python Foundation. The FTC clamps down on GM's secret sale of driving data. "ANCHOR" replaces "CIPAC" for industry-government sharing. Germany planning to legislate total access to global data. Grubhub becomes the latest ShinyHunters extortion victim. Let's Encrypt's 6-Day certs are available to everyone. Iran planning to permanently take itself off the Internet. HD Tune before and after a SpinRite Level 3 refresh. Some great listener feedback, and More trouble from GhostPoster malicious browser extensions Show Notes - https://www.grc.com/sn/SN-1061-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit canary.tools/twit - use code: TWIT threatlocker.com/twit meter.com/securitynow joindeleteme.com/twit promo code TWIT

Security Now (Video HD)
SN 1061: More GhostPosting - RAM Crisis Hits Firewalls

Security Now (Video HD)

Play Episode Listen Later Jan 21, 2026 164:10 Transcription Available


Soaring RAM prices are about to hit your security gear where it hurts, and the fallout could change what's protecting your network. Find out who's about to pay and why the AI gold rush is reshaping more than just your server specs. RAM pricing to affect enterprise firewall equipment. Anthropic provides sizeable support to Python Foundation. The FTC clamps down on GM's secret sale of driving data. "ANCHOR" replaces "CIPAC" for industry-government sharing. Germany planning to legislate total access to global data. Grubhub becomes the latest ShinyHunters extortion victim. Let's Encrypt's 6-Day certs are available to everyone. Iran planning to permanently take itself off the Internet. HD Tune before and after a SpinRite Level 3 refresh. Some great listener feedback, and More trouble from GhostPoster malicious browser extensions Show Notes - https://www.grc.com/sn/SN-1061-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit canary.tools/twit - use code: TWIT threatlocker.com/twit meter.com/securitynow joindeleteme.com/twit promo code TWIT

Security Now (Video HI)
SN 1061: More GhostPosting - RAM Crisis Hits Firewalls

Security Now (Video HI)

Play Episode Listen Later Jan 21, 2026 164:10 Transcription Available


Soaring RAM prices are about to hit your security gear where it hurts, and the fallout could change what's protecting your network. Find out who's about to pay and why the AI gold rush is reshaping more than just your server specs. RAM pricing to affect enterprise firewall equipment. Anthropic provides sizeable support to Python Foundation. The FTC clamps down on GM's secret sale of driving data. "ANCHOR" replaces "CIPAC" for industry-government sharing. Germany planning to legislate total access to global data. Grubhub becomes the latest ShinyHunters extortion victim. Let's Encrypt's 6-Day certs are available to everyone. Iran planning to permanently take itself off the Internet. HD Tune before and after a SpinRite Level 3 refresh. Some great listener feedback, and More trouble from GhostPoster malicious browser extensions Show Notes - https://www.grc.com/sn/SN-1061-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit canary.tools/twit - use code: TWIT threatlocker.com/twit meter.com/securitynow joindeleteme.com/twit promo code TWIT

Security Now (Video LO)
SN 1061: More GhostPosting - RAM Crisis Hits Firewalls

Security Now (Video LO)

Play Episode Listen Later Jan 21, 2026 164:10 Transcription Available


Soaring RAM prices are about to hit your security gear where it hurts, and the fallout could change what's protecting your network. Find out who's about to pay and why the AI gold rush is reshaping more than just your server specs. RAM pricing to affect enterprise firewall equipment. Anthropic provides sizeable support to Python Foundation. The FTC clamps down on GM's secret sale of driving data. "ANCHOR" replaces "CIPAC" for industry-government sharing. Germany planning to legislate total access to global data. Grubhub becomes the latest ShinyHunters extortion victim. Let's Encrypt's 6-Day certs are available to everyone. Iran planning to permanently take itself off the Internet. HD Tune before and after a SpinRite Level 3 refresh. Some great listener feedback, and More trouble from GhostPoster malicious browser extensions Show Notes - https://www.grc.com/sn/SN-1061-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit canary.tools/twit - use code: TWIT threatlocker.com/twit meter.com/securitynow joindeleteme.com/twit promo code TWIT

The Other Side Of The Firewall
Cybercrime, AI Gaps, and Burned-Out CISOs

The Other Side Of The Firewall

Play Episode Listen Later Jan 20, 2026 56:49


Summary In this episode of "The Other Side of the Firewall" podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon delve into the latest cybersecurity news, starting with a case involving a Tennessee man who pleaded guilty to hacking the Supreme Court's filing system. The discussion highlights the inadequacies of current cybersecurity laws, particularly the leniency of a one-year maximum sentence for such a serious crime. The hosts express their frustration over the perceived lack of accountability and the need for stricter penalties to deter cybercriminals. They also explore the implications of social engineering in this case, suggesting that the hacker exploited weak security practices rather than sophisticated techniques. The conversation then shifts to a significant AI vulnerability discovered in ServiceNow, emphasizing the risks associated with rapid AI implementation without adequate security measures. The hosts stress the importance of thorough testing and the need for organizations to adopt a cautious approach when integrating AI technologies. They conclude by discussing the challenges faced by Chief Information Security Officers (CISOs), particularly the high turnover rates and burnout associated with the role, which often leaves them as scapegoats in corporate environments. The episode wraps up with personal anecdotes and reflections on the pressures of cybersecurity leadership. Articles: Tennessee man pleads guilty to repeatedly hacking Supreme Court's filing system https://apnews.com/article/nicholas-moore-supreme-court-hacked-filing-system-49fc196ba3f3914f869e85c8cd30edbc?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExMFNoNHNlSWZJcm9lMkVJMXNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR7RUOMEMjC56VAHadGiVzfJKqwUHTZf-tVkbEIrpSGmKE6Md68CYDu6T25m4g_aem_cLud7-4lk1KzFtew52MmBw#computersecurity 'Most Severe AI Vulnerability to Date' Hits ServiceNow https://www.darkreading.com/remote-workforce/ai-vulnerability-servicenow?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExMFNoNHNlSWZJcm9lMkVJMXNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR6FWHWUgoldkYV-CoKWpxY4-FsuO_YJo93zYeutqPJYLSA68tSXCAX9JjlO6w_aem_9Xb8m066AHXDRsxb-8NnOA CISO Succession Crisis Highlights How Turnover Amplifies Security Risks https://www.darkreading.com/cyber-risk/ciso-succession-crisis-highlights-turnover-amplifies-security-risks?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExMFNoNHNlSWZJcm9lMkVJMXNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR5bP-FD-J-gfZDCw-Cy4M4v2jsZEKjfq_TaAkCgJVVxugvIvUxKVSKXtryXUQ_aem_aQ2cXEn0I5_jGDR4luvj1g Buy the guide: https://www.theothersideofthefirewall.com/ Please LISTEN

The Electorette Podcast
Shock, Awe, and the Constitution: The ACLU When the Law Is Tested

The Electorette Podcast

Play Episode Listen Later Jan 13, 2026 27:37


As The Electorette returns with a new season, there was only one place to start: the front lines of civil liberties. In this episode, Jen Taylor-Skinner is joined by Deirdre Schifeling, Chief Political & Advocacy Officer at the American Civil Liberties Union, for a wide-ranging and urgent conversation about what Trump's second term really represents—not chaos, but a calculated “shock and awe” strategy designed to overwhelm the law, the courts, and the public. They discuss the ACLU's unprecedented legal response, the escalating attacks on immigrant communities, and why the Supreme Court's upcoming birthright citizenship case could fundamentally redefine what it means to be American. Deirdre also explains how coordinated legal and civic pressure can slow executive overreach, why public engagement still matters in moments like this, and what people can do right now to meaningfully defend civil liberties and the rule of law. Mentioned in this episode: Firewall For Freedom: States Must Safeguard Our Rights Stop ICE's Attack On Our Communities Episode Chapters & Timestamps 00:00 — Season Return & Why the ACLU Now Jen kicks off the new season of The Electorette and explains why beginning with the ACLU is both urgent and necessary. 02:00 — “Shock and Awe” as a Governing Strategy Deirdre Schifeling explains why the current moment isn't chaos, but a deliberate strategy designed to overwhelm the law and civil society. 06:30 — The Scale of the ACLU's Legal Response How the ACLU mobilized immediately—and what it means to file hundreds of legal actions in a single year. 09:30 — Immigration Enforcement, Due Process, and Escalation A look at aggressive immigration tactics, racial profiling, and why conditions may intensify as new funding takes effect. 14:30 — Public Backlash and the Limits of Fear Politics Why demonizing immigrant communities has consequences—and where public resistance is already visible. 18:30 — Are the Courts Holding Up? An assessment of how the judicial system is responding, where it's working, and where the risks remain. 22:30 — Birthright Citizenship and the Supreme Court Test Why the birthright citizenship case is so consequential—and what's at stake for the Constitution if it fails. 28:30 — What Birthright Citizenship Really Means Historical context on why birthright citizenship exists and how it defines American equality. 33:30 — Executive Power and the Role of the Courts How recent court decisions have expanded executive authority—and where guardrails are most needed. 38:30 — What Comes Next for Civil Liberties Looking ahead: where pressure points are likely to emerge and how rights are most vulnerable. 42:30 — Civic Engagement Beyond the Courts How public participation, organizing, and legal advocacy intersect outside electoral politics. 46:30 — The ACLU's “Firewall for Freedom” Strategy How state and local governments can act as safeguards—and what that looks like in practice. 51:30 — What Individuals Can Do Right Now Concrete ways people can support civil liberties, engage locally, and stay involved. 55:30 — Final Thoughts & The Work Ahead Closing reflections on this moment, the long view, and why sustained engagement matters. Learn more about your ad choices. Visit megaphone.fm/adchoices

5bytespodcast
Firewall Config Issues! MDT Retirement! Software Update from Hell!

5bytespodcast

Play Episode Listen Later Jan 13, 2026 28:34


I cover issues in Intune relating to Firewall configurations, the retirement of MDT, a reboot loop issue on Cisco switches, a software update from hell story plus much more! Reference Links: https://www.rorymon.com/blog/firewall-config-issues-mdt-retirement-software-update-from-hell/

The Steve Gruber Show
Janice Trey | Tear Down the Firewall

The Steve Gruber Show

Play Episode Listen Later Jan 7, 2026 11:00


Steve is joined by Janice Trey, Board Chair of The Epoch Times and NTD TV, a survivor of a Chinese labor camp during Mao's Cultural Revolution, and a fearless advocate for free speech. She exposes Big Tech censorship, explains why secure platforms like SafeMeet matter, and issues a powerful call for President Trump to tell Xi Jinping to tear down China's digital firewall. From America's First Amendment to religious persecution under communism, this is a firsthand warning about how censorship spreads, and why it must be stopped.

AlmostSideways Podcast
CCCLIII: A KNIGHT'S TALE 25TH ANNIVERSARY DEEP DIVE, Eden

AlmostSideways Podcast

Play Episode Listen Later Jan 5, 2026 119:55


Recorded - 1/4/2026 On Episode 353 of the Almost Sideways Movie Podcast, we have our first deep dive of 2026! We go back 25 years to a classic Heath Ledger flick, A Knight's Tale! Terry, Todd, and Adam go into all the details, as well as review some of the movies they have watched in the last week. Here are the highlights:What We've Been Watching(3:45) "Year of the Dragon" - Todd Director Blindspot Review(7:55) "Firewall" - Adam Ford Explorer Review(14:00) "Cartel Land" - Terry Oscar Anniversary Review(19:15) "Sirat" - Todd Indie Screener Review(22:20) "We Bury the Dead" - Adam Review(27:00) "The Dutchman" - Terry Review(30:25) "Goodbye June" - Terry Review(32:20) "Eden" - Featured Review"A KNIGHT'S TALE" 25TH ANNIVERSARY DEEP DIVE(42:00) "A Knight's Tale" Trivia(55:50) First Impressions(1:06:50) Mt. Rushmore: Uses of Queen Songs in Film(1:14:05) Recasting "A Knight's Tale"(1:31:00) Highest WAR, Worst Performance(1:36:10) Minor Character Triumvirate, Tripod of Depravity(1:45:50) Best Scene, Gripes and Conspiracies(1:54:40) LVP, MVP, Quote of the DayFind AlmostSideways everywhere!⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠almostsideways.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.facebook.com/AlmostSidewayscom-130953353614569/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠AlmostSideways Twitter⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠: @almostsideways⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Terry's Twitter⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠: @almostsideterry⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Zach's Letterboxd⁠⁠⁠: https://letterboxd.com/pro_zach36/Todd: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Too Cool for Twitter⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Adam's Twitter⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠: @adamsideways⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Apple Podcast⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://podcasts.apple.com/us/podcast/almostsideways-podcast/id1270959022⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Spotify⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://open.spotify.com/show/7oVcx7Y9U2Bj2dhTECzZ4m⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠YouTube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/channel/UCfEoLqGyjn9M5Mr8umWiktA/featured?view_as=subscriber⁠⁠⁠⁠⁠⁠

The Manila Times Podcasts
OPINION: The unthinkable alliance: Why a Marcos-backed Robredo-Torre ticket may be the only firewall against Duterte 2.0 in 2028 | Jan. 1, 2026

The Manila Times Podcasts

Play Episode Listen Later Dec 31, 2025 6:18


OPINION: The unthinkable alliance: Why a Marcos-backed Robredo-Torre ticket may be the only firewall against Duterte 2.0 in 2028 | Jan. 1, 2026Subscribe to The Manila Times Channel - https://tmt.ph/YTSubscribeVisit our website at https://www.manilatimes.net Follow us: Facebook - https://tmt.ph/facebook Instagram - https://tmt.ph/instagram Twitter - https://tmt.ph/twitter DailyMotion - https://tmt.ph/dailymotion Subscribe to our Digital Edition - https://tmt.ph/digital Check out our Podcasts: Spotify - https://tmt.ph/spotify Apple Podcasts - https://tmt.ph/applepodcasts Amazon Music - https://tmt.ph/amazonmusic Deezer: https://tmt.ph/deezer Stitcher: https://tmt.ph/stitcherTune In: https://tmt.ph/tunein#TheManilaTimes#KeepUpWithTheTimes Hosted on Acast. See acast.com/privacy for more information.

Paul's Security Weekly
AI-Era AppSec: Transparency, Trust, and Risk Beyond the Firewall - Felipe Zipitria, Steve Springett, Aruneesh Salhotra, Ken Huang - ASW #363

Paul's Security Weekly

Play Episode Listen Later Dec 30, 2025 66:43


In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (CRS) project. Felipe has been at the forefront of open-source security, leading the development of one of the world's most widely deployed WAF rule sets, trusted by organizations globally to protect their web applications. Felipe explains why WAFs remain a critical layer in modern defense-in-depth strategies. We'll explore what makes OWASP CRS the go-to choice for security teams, dive into the project's current innovations, and discuss how traditional rule-based security is evolving to work alongside — not against — AI. Segment Resources: github.com/coreruleset/coreruleset coreruleset.org The future of CycloneDX is defined by modularity, API-first design, and deeper contextual insight, enabling transparency that is not just comprehensive, but actionable. At its heart is the Transparency Exchange API, which delivers a normalized, format-agnostic model for sharing SBOMs, attestations, risks, and more across the software supply chain. As genAI transforms every sector of modern business, the security community faces a question: how do we protect systems we can't fully see or understand? In this fireside chat, Aruneesh Salhotra, Project Lead for OWASP AIBOM and Co-Lead of OWASP AI Exchange, discusses two groundbreaking initiatives that are reshaping how organizations approach AI security and supply chain transparency. OWASP AI Exchange has emerged as the go-to single resource for AI security and privacy, providing over 200 pages of practical advice on protecting AI and data-centric systems from threats. Through its official liaison partnership with CEN/CENELEC, the project has contributed 70 pages to ISO/IEC 27090 and 40 pages to the EU AI Act security standard OWASP, achieving OWASP Flagship project status in March 2025. Meanwhile, the OWASP AIBOM Project is establishing a comprehensive framework to provide transparency into how AI models are built, trained, and deployed, extending OWASP's mission of making security visible to the rapidly evolving AI ecosystem. This conversation explores how these complementary initiatives are addressing real-world challenges—from prompt injection and data poisoning to model provenance and supply chain risks—while actively shaping international standards and regulatory frameworks. We'll discuss concrete achievements, lessons learned from global collaboration, and the ambitious roadmap ahead as these projects continue to mature and expand their impact across the AI security landscape. Segment Resources: https://owasp.org/www-project-aibom/ https://www.linkedin.com/posts/aruneeshsalhotra_owasp-ai-aisecurity-activity-7364649799800766465-DJGM/ https://www.youtube.com/@OWASPAIBOM https://www.youtube.com/@RobvanderVeer-ex3gj https://owaspai.org/ Agentic AI introduces unique and complex security challenges that render traditional risk management frameworks insufficient. In this keynote, Ken Huang, CEO of Distributedapps.ai and a key contributor to AI security standards, outlines a new approach to manage these emerging threats. The session will present a practical strategy that integrates the NIST AI Risk Management Framework with specialized tools to address the full lifecycle of Agentic AI. Segment Resources: aivss.owasp.org https://kenhuangus.substack.com/p/owasp-aivss-the-new-framework-for https://cloudsecurityalliance.org/blog/2025/02/06/agentic-ai-threat-modeling-framework-maestro This interview is sponsored by the OWASP GenAI Security Project. Visit https://securityweekly.com/owaspappsec to watch all of CyberRisk TV's interviews from the OWASP 2025 Global AppSec Conference! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-363

Paul's Security Weekly TV
AI-Era AppSec: Transparency, Trust, and Risk Beyond the Firewall - Felipe Zipitria, Steve Springett, Aruneesh Salhotra, Ken Huang - ASW #363

Paul's Security Weekly TV

Play Episode Listen Later Dec 30, 2025 66:43


In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (CRS) project. Felipe has been at the forefront of open-source security, leading the development of one of the world's most widely deployed WAF rule sets, trusted by organizations globally to protect their web applications. Felipe explains why WAFs remain a critical layer in modern defense-in-depth strategies. We'll explore what makes OWASP CRS the go-to choice for security teams, dive into the project's current innovations, and discuss how traditional rule-based security is evolving to work alongside — not against — AI. Segment Resources: github.com/coreruleset/coreruleset coreruleset.org The future of CycloneDX is defined by modularity, API-first design, and deeper contextual insight, enabling transparency that is not just comprehensive, but actionable. At its heart is the Transparency Exchange API, which delivers a normalized, format-agnostic model for sharing SBOMs, attestations, risks, and more across the software supply chain. As genAI transforms every sector of modern business, the security community faces a question: how do we protect systems we can't fully see or understand? In this fireside chat, Aruneesh Salhotra, Project Lead for OWASP AIBOM and Co-Lead of OWASP AI Exchange, discusses two groundbreaking initiatives that are reshaping how organizations approach AI security and supply chain transparency. OWASP AI Exchange has emerged as the go-to single resource for AI security and privacy, providing over 200 pages of practical advice on protecting AI and data-centric systems from threats. Through its official liaison partnership with CEN/CENELEC, the project has contributed 70 pages to ISO/IEC 27090 and 40 pages to the EU AI Act security standard OWASP, achieving OWASP Flagship project status in March 2025. Meanwhile, the OWASP AIBOM Project is establishing a comprehensive framework to provide transparency into how AI models are built, trained, and deployed, extending OWASP's mission of making security visible to the rapidly evolving AI ecosystem. This conversation explores how these complementary initiatives are addressing real-world challenges—from prompt injection and data poisoning to model provenance and supply chain risks—while actively shaping international standards and regulatory frameworks. We'll discuss concrete achievements, lessons learned from global collaboration, and the ambitious roadmap ahead as these projects continue to mature and expand their impact across the AI security landscape. Segment Resources: https://owasp.org/www-project-aibom/ https://www.linkedin.com/posts/aruneeshsalhotra_owasp-ai-aisecurity-activity-7364649799800766465-DJGM/ https://www.youtube.com/@OWASPAIBOM https://www.youtube.com/@RobvanderVeer-ex3gj https://owaspai.org/ Agentic AI introduces unique and complex security challenges that render traditional risk management frameworks insufficient. In this keynote, Ken Huang, CEO of Distributedapps.ai and a key contributor to AI security standards, outlines a new approach to manage these emerging threats. The session will present a practical strategy that integrates the NIST AI Risk Management Framework with specialized tools to address the full lifecycle of Agentic AI. Segment Resources: aivss.owasp.org https://kenhuangus.substack.com/p/owasp-aivss-the-new-framework-for https://cloudsecurityalliance.org/blog/2025/02/06/agentic-ai-threat-modeling-framework-maestro This interview is sponsored by the OWASP GenAI Security Project. Visit https://securityweekly.com/owaspappsec to watch all of CyberRisk TV's interviews from the OWASP 2025 Global AppSec Conference! Show Notes: https://securityweekly.com/asw-363

Application Security Weekly (Audio)
AI-Era AppSec: Transparency, Trust, and Risk Beyond the Firewall - Felipe Zipitria, Steve Springett, Aruneesh Salhotra, Ken Huang - ASW #363

Application Security Weekly (Audio)

Play Episode Listen Later Dec 30, 2025 66:43


In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (CRS) project. Felipe has been at the forefront of open-source security, leading the development of one of the world's most widely deployed WAF rule sets, trusted by organizations globally to protect their web applications. Felipe explains why WAFs remain a critical layer in modern defense-in-depth strategies. We'll explore what makes OWASP CRS the go-to choice for security teams, dive into the project's current innovations, and discuss how traditional rule-based security is evolving to work alongside — not against — AI. Segment Resources: github.com/coreruleset/coreruleset coreruleset.org The future of CycloneDX is defined by modularity, API-first design, and deeper contextual insight, enabling transparency that is not just comprehensive, but actionable. At its heart is the Transparency Exchange API, which delivers a normalized, format-agnostic model for sharing SBOMs, attestations, risks, and more across the software supply chain. As genAI transforms every sector of modern business, the security community faces a question: how do we protect systems we can't fully see or understand? In this fireside chat, Aruneesh Salhotra, Project Lead for OWASP AIBOM and Co-Lead of OWASP AI Exchange, discusses two groundbreaking initiatives that are reshaping how organizations approach AI security and supply chain transparency. OWASP AI Exchange has emerged as the go-to single resource for AI security and privacy, providing over 200 pages of practical advice on protecting AI and data-centric systems from threats. Through its official liaison partnership with CEN/CENELEC, the project has contributed 70 pages to ISO/IEC 27090 and 40 pages to the EU AI Act security standard OWASP, achieving OWASP Flagship project status in March 2025. Meanwhile, the OWASP AIBOM Project is establishing a comprehensive framework to provide transparency into how AI models are built, trained, and deployed, extending OWASP's mission of making security visible to the rapidly evolving AI ecosystem. This conversation explores how these complementary initiatives are addressing real-world challenges—from prompt injection and data poisoning to model provenance and supply chain risks—while actively shaping international standards and regulatory frameworks. We'll discuss concrete achievements, lessons learned from global collaboration, and the ambitious roadmap ahead as these projects continue to mature and expand their impact across the AI security landscape. Segment Resources: https://owasp.org/www-project-aibom/ https://www.linkedin.com/posts/aruneeshsalhotra_owasp-ai-aisecurity-activity-7364649799800766465-DJGM/ https://www.youtube.com/@OWASPAIBOM https://www.youtube.com/@RobvanderVeer-ex3gj https://owaspai.org/ Agentic AI introduces unique and complex security challenges that render traditional risk management frameworks insufficient. In this keynote, Ken Huang, CEO of Distributedapps.ai and a key contributor to AI security standards, outlines a new approach to manage these emerging threats. The session will present a practical strategy that integrates the NIST AI Risk Management Framework with specialized tools to address the full lifecycle of Agentic AI. Segment Resources: aivss.owasp.org https://kenhuangus.substack.com/p/owasp-aivss-the-new-framework-for https://cloudsecurityalliance.org/blog/2025/02/06/agentic-ai-threat-modeling-framework-maestro This interview is sponsored by the OWASP GenAI Security Project. Visit https://securityweekly.com/owaspappsec to watch all of CyberRisk TV's interviews from the OWASP 2025 Global AppSec Conference! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-363

Application Security Weekly (Video)
AI-Era AppSec: Transparency, Trust, and Risk Beyond the Firewall - Felipe Zipitria, Steve Springett, Aruneesh Salhotra, Ken Huang - ASW #363

Application Security Weekly (Video)

Play Episode Listen Later Dec 30, 2025 66:43


In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (CRS) project. Felipe has been at the forefront of open-source security, leading the development of one of the world's most widely deployed WAF rule sets, trusted by organizations globally to protect their web applications. Felipe explains why WAFs remain a critical layer in modern defense-in-depth strategies. We'll explore what makes OWASP CRS the go-to choice for security teams, dive into the project's current innovations, and discuss how traditional rule-based security is evolving to work alongside — not against — AI. Segment Resources: github.com/coreruleset/coreruleset coreruleset.org The future of CycloneDX is defined by modularity, API-first design, and deeper contextual insight, enabling transparency that is not just comprehensive, but actionable. At its heart is the Transparency Exchange API, which delivers a normalized, format-agnostic model for sharing SBOMs, attestations, risks, and more across the software supply chain. As genAI transforms every sector of modern business, the security community faces a question: how do we protect systems we can't fully see or understand? In this fireside chat, Aruneesh Salhotra, Project Lead for OWASP AIBOM and Co-Lead of OWASP AI Exchange, discusses two groundbreaking initiatives that are reshaping how organizations approach AI security and supply chain transparency. OWASP AI Exchange has emerged as the go-to single resource for AI security and privacy, providing over 200 pages of practical advice on protecting AI and data-centric systems from threats. Through its official liaison partnership with CEN/CENELEC, the project has contributed 70 pages to ISO/IEC 27090 and 40 pages to the EU AI Act security standard OWASP, achieving OWASP Flagship project status in March 2025. Meanwhile, the OWASP AIBOM Project is establishing a comprehensive framework to provide transparency into how AI models are built, trained, and deployed, extending OWASP's mission of making security visible to the rapidly evolving AI ecosystem. This conversation explores how these complementary initiatives are addressing real-world challenges—from prompt injection and data poisoning to model provenance and supply chain risks—while actively shaping international standards and regulatory frameworks. We'll discuss concrete achievements, lessons learned from global collaboration, and the ambitious roadmap ahead as these projects continue to mature and expand their impact across the AI security landscape. Segment Resources: https://owasp.org/www-project-aibom/ https://www.linkedin.com/posts/aruneeshsalhotra_owasp-ai-aisecurity-activity-7364649799800766465-DJGM/ https://www.youtube.com/@OWASPAIBOM https://www.youtube.com/@RobvanderVeer-ex3gj https://owaspai.org/ Agentic AI introduces unique and complex security challenges that render traditional risk management frameworks insufficient. In this keynote, Ken Huang, CEO of Distributedapps.ai and a key contributor to AI security standards, outlines a new approach to manage these emerging threats. The session will present a practical strategy that integrates the NIST AI Risk Management Framework with specialized tools to address the full lifecycle of Agentic AI. Segment Resources: aivss.owasp.org https://kenhuangus.substack.com/p/owasp-aivss-the-new-framework-for https://cloudsecurityalliance.org/blog/2025/02/06/agentic-ai-threat-modeling-framework-maestro This interview is sponsored by the OWASP GenAI Security Project. Visit https://securityweekly.com/owaspappsec to watch all of CyberRisk TV's interviews from the OWASP 2025 Global AppSec Conference! Show Notes: https://securityweekly.com/asw-363

Technical Difficulties Gaming Podcast
Eclipse Phase 2 - Idris

Technical Difficulties Gaming Podcast

Play Episode Listen Later Dec 24, 2025 107:51


When it was time for Adam's birthday, he wanted to do as he always does; spread Eclipse Phase terror upon us. A group of Firewall agents are at an AGI research center. They have their target, an AGI named Idris. On the other side of the door is a Reaper Morph, however. Using their skills, and some handy flashbacks, can the agents keep their objective, and their heads...?Idris is a one shot designed by Adam for Eclipse Phase 2E, a game of transhumanism, horror, and science fiction. Eclipse Phase 2E is available at Posthuman's website, along with 1E and various supplements and merch.Adam - GMDan - EllisJared - Amaru TimotiLaura - BerkVince - Pivo

The Other Side Of The Firewall
From Air Force Technology to Cyber CEO: Lessons in Risk, AI, and Leadership Ft. Ahmad Austin

The Other Side Of The Firewall

Play Episode Listen Later Dec 23, 2025 41:51


On this week's Ask a CISSP special episode of The Other Side of the Firewall, I talk with Air Force veteran and cybersecurity leader Ahmad Rashaan Austin about his journey from zero computer skills to founder of Cy3 Security, LLC. We explore risk management, responsible AI adoption, leadership communication, and his new book, The Boundaryless Enterprise. If you're building a cyber career or leading tech teams, this episode delivers actionable insights straight from the front lines. Check it out on your favorite podcast platform! Buy Ahmad R. Austin's The Boundaryless Enterprise: Redesigning Oversight for the Age of Intelligent Systems https://a.co/d/dfCToig Please LISTEN

The Other Side Of The Firewall
North Korea's Cryptocurrency Heists, AI Threats, and 2026 Lessons Learned

The Other Side Of The Firewall

Play Episode Listen Later Dec 22, 2025 57:54


In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss the latest cybersecurity news, focusing on North Korea's significant cryptocurrency thefts, the detection of cyber threats through keystroke analysis, and the implications of AI in cybersecurity. They also touch on personal experiences and reflections on the evolving landscape of technology and security. Article: North Korea just had its biggest year ever stealing cryptocurrency https://finance.yahoo.com/news/north-korea-just-had-its-biggest-year-ever-stealing-cryptocurrency-130002485.html Keystroke Ghost: How Amazon's 110ms Delay Exposed a North Korean IT Infiltrator https://www.webpronews.com/keystroke-ghost-how-amazons-110ms-delay-exposed-a-north-korean-it-infiltrator/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExeFNQWGZZSjhSdjBUbnJVTnNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR42Plpw46V61Fak4n0ubUbJaCyah2NbNbHfqqB80TTgjM4-O89CH0K8nIlBYA_aem_1j6DNfdyHXuwi7ByRXEBeQ Avoiding AI Pitfalls in 2026: Lessons Learned from Top 2025 Incidents https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2025/avoiding-ai-pitfalls-in-2026-lessons-learned-from-top-2025-incidents?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExeFNQWGZZSjhSdjBUbnJVTnNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR4cDDWs3bszO8C-146-cBvsjDkO7sqcDBab9sWF8muWCeYu4GW4diRuAjYrvA_aem_aFLSBv4pbCqMCSFMIzzq0w Buy the guide: https://www.theothersideofthefirewall.com/ Please LISTEN

Security Squawk
America's Hidden Cyber War Is Already Here

Security Squawk

Play Episode Listen Later Dec 17, 2025 38:05


Cyber attacks are no longer a future problem or a Silicon Valley issue. They are happening right now across the United States, quietly and relentlessly, targeting local governments, public agencies, schools, police departments, fire services, and critical infrastructure that most people rely on every day. In this episode of the Security Squawk Podcast, we break down the uncomfortable truth about the current cyber threat landscape and why much of it is flying under the radar. We start with a major data breach involving 700Credit, a financial services company widely used by car dealerships across the country. The breach impacted an estimated 5.8 million consumers, exposing sensitive personal information including names, addresses, birth dates, and Social Security numbers. What makes this incident especially troubling is that it originated through a third-party integration and went undetected until it was too late. This is a textbook example of how supply chain risk, weak API oversight, and poor third-party visibility continue to plague organizations of all sizes. For business owners, IT leaders, and managed service providers, this breach highlights a critical lesson. Security controls inside your own environment are meaningless if your partners, vendors, or integrations are not held to the same standard. Attackers know this, and they are exploiting it aggressively. Next, we shift to a growing and deeply concerning trend involving nation-state threat actors, particularly Russian-backed groups targeting network edge devices. Firewalls, VPN appliances, routers, and other edge infrastructure are now prime targets because they offer direct access to internal networks and often remain poorly monitored or improperly configured. These attacks are not always sophisticated zero-day exploits. In many cases, they succeed because of exposed management interfaces, outdated firmware, or weak credentials. This matters because edge devices sit at the front door of nearly every organization. Once compromised, they allow attackers to persist quietly, move laterally, and stage future attacks without triggering traditional endpoint defenses. The takeaway is clear. If you are not actively inventorying, patching, and monitoring your edge infrastructure, you are already behind. Then we pull the lens back even further and focus on what may be the most underreported cyber crisis happening today. Public sector organizations across the United States are under sustained cyber attack. Cities, towns, school districts, emergency services, and municipal agencies are being hit week after week. These incidents rarely make national headlines. Instead, they show up in small local news outlets, if they are reported at all. We discuss a real-world incident in Attleboro, Massachusetts, where a cybersecurity event disrupted online municipal services and briefly appeared on local television. Stories like this are happening everywhere. From ransomware attacks that shut down city services to breaches that expose resident data, public organizations are being targeted because attackers know they are often underfunded, understaffed, and slow to recover. Using data from ransomware.live and other tracking resources, we highlight how widespread these attacks really are. Thousands of U.S.-based victims are logged publicly, many of them tied to government or quasi-government entities. This is not random. It is a calculated strategy by cybercriminals who understand the pressure public agencies face to restore services quickly, often making them more likely to pay ransoms or quietly rebuild without public disclosure. Throughout the episode, we connect these stories to practical lessons for businesses, MSPs, and IT professionals. Cybersecurity is no longer about preventing every breach. It is about resilience, visibility, and response. It is about understanding where your real risk lies and taking proactive steps before an incident forces your hand. If you work in IT, run an MSP, manage infrastructure, or support public organizations, this episode delivers insight you can use immediately. We cut through the noise, skip the fear marketing, and focus on what actually matters in today's threat environment. Security Squawk exists to make cybersecurity real, relevant, and actionable. If this episode brings value to you, please subscribe, leave a review, and share it with someone who needs to hear it. And if you want to support the show directly, the easiest way is to buy us a coffee at https://buymeacoffee.com/securitysquawk Your support helps us keep producing honest conversations about the threats most people never see until it's too late.

The CyberWire
Root access to the great firewall. [Research Saturday]

The CyberWire

Play Episode Listen Later Dec 13, 2025 26:06


Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China's Great Firewall. Across both parts, you break down thousands of leaked documents, source code repositories, diagrams, packet captures, and telemetry that reveal how systems like the Traffic Secure Gateway, MAAT, Redis-based analytics, and modular DPI engines work together to censor, surveil, and fingerprint users at scale. Taken together, the research shows how the Great Firewall functions not just as a technical system, but as a living censorship-industrial complex that adapts, learns, and coordinates across government, telecoms, and security vendors. The research can be found here: Inside the Great Firewall Part 1: The Dump Inside the Great Firewall Part 2: Technical Infrastructure Learn more about your ad choices. Visit megaphone.fm/adchoices

Research Saturday
Root access to the great firewall.

Research Saturday

Play Episode Listen Later Dec 13, 2025 26:06


Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China's Great Firewall. Across both parts, you break down thousands of leaked documents, source code repositories, diagrams, packet captures, and telemetry that reveal how systems like the Traffic Secure Gateway, MAAT, Redis-based analytics, and modular DPI engines work together to censor, surveil, and fingerprint users at scale. Taken together, the research shows how the Great Firewall functions not just as a technical system, but as a living censorship-industrial complex that adapts, learns, and coordinates across government, telecoms, and security vendors. The research can be found here: Inside the Great Firewall Part 1: The Dump Inside the Great Firewall Part 2: Technical Infrastructure Learn more about your ad choices. Visit megaphone.fm/adchoices

BSD Now
641: Open to Free

BSD Now

Play Episode Listen Later Dec 11, 2025 55:29


FreeBSD 15 release, moving from OpenBSD to FreeBSD, ZFS Boot Environments explained, and more... NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines Welcome to the world FreeBSD 15.0-RELEASE Announcement (https://www.freebsd.org/releases/15.0R/announce/) and Release Notes (https://www.freebsd.org/releases/15.0R/relnotes/) We're (now) moving from OpenBSD to FreeBSD for Firewalls (https://utcc.utoronto.ca/~cks/space/blog/sysadmin/OpenBSDToFreeBSDMove) - Submitted by listener Gary News Roundup ZFS Boot Environments Explained (https://vermaden.wordpress.com/2025/11/25/zfs-boot-environments-explained/) Why I (still) love Linux (https://it-notes.dragas.net/2025/11/24/why-i-still-love-linux/) rocinante - A configuration management tool by the BastilleBSD team (https://github.com/BastilleBSD/rocinante) A Grown-up ZFS Data Corruption Bug (https://github.com/oxidecomputer/oxide-and-friends/blob/master/2025_11_24.md) and YouTube (https://www.youtube.com/watch?v=srKYxF66A0c) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Claudio - A Silent Reflection (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/641/feedback/Claudio%20-%20Reflection.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)

Firewall
Taking on the Entrenched

Firewall

Play Episode Listen Later Nov 28, 2025 37:37


What does it take to unseat a 20-year incumbent? Raj Goyle — fresh off his successful campaign to ban smartphones in New York schools — returns to Firewall to discuss why and how he's running for state comptroller. First step: Convincing voters that the often overlooked position has untapped power to make real progress on affordability.This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.

SECURE AF
FortiWeb Zero-Day: Silent Patch and Firewall Wake-Up Call

SECURE AF

Play Episode Listen Later Nov 26, 2025 6:36


Got a question or comment? Message us here!This week's #SOCBrief dives into the FortiWeb zero-day that's letting attackers create admin accounts with a single unauthenticated HTTP request. With exploitation spiking and Fortinet pushing out a quiet fix, SOC teams are under pressure to lock down configs, audit firewalls, and patch fast. We break down what happened, who's affected, and how to defend before attackers pivot deeper into your network.Support the showWatch full episodes at youtube.com/@aliascybersecurity.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

DLN Xtend
215: Wifi Wars & Festive Firmware | Linux Out Loud 117

DLN Xtend

Play Episode Listen Later Nov 22, 2025 75:14


Join Wendy and Nate as they battle robot headaches, wrangle 3D printers, and bring tech holiday spirit to life! From migraine workarounds and sodium science, through epic 3D printing adventures (featuring OctoEverywhere!), to home automation, Docker disasters, and retro gaming resurrection, this episode is packed with open-source laughs and memorable tangents. Whether you love building robots or naming your Wi-Fi something wild, you'll find plenty of creative fuel—and team banter—in this jam-packed ride! Find the rest of the show notes at: https://tuxdigital.com/podcasts/linux-out-loud/lol-117/

The CyberWire
AI meets the chain of command.

The CyberWire

Play Episode Listen Later Nov 21, 2025 27:52


Cyber Command names a new head of AI. The UK introduces its long-delayed Cyber Security and Resilience Bill. Researchers highlight a critical Oracle Identity Manager flaw. Salesforce warns customers of a third-party data breach. Italy's state-owned railway operator leaks sensitive information. SonicWall patches firewalls and email security devices. The US charges four individuals with conspiring to illegally export restricted Nvidia AI chips to China. The SEC drops its lawsuit against SolarWinds. NSO group claims a permanent injunction could cause irreparable and potentially existential harm. Maria Varmazis of the T-Minus Space Daily show sits down with General Daniel Karbler (Ret.) to discuss his consulting work for A House of Dynamite, the newly released Netflix film. Roses are red, violets are blue, this poem just jailbroke your AI too. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Maria Varmazis of the T-Minus Space Daily show sits down with Lt. General Daniel Karbler (Ret.) to discuss his consulting work for A House of Dynamite, the newly released Netflix film. This is an excerpt of T-Minus Deep Space airing tomorrow in all of your favorite podcast app. Selected Reading Cyber Command Taps Reid Novotny as New AI Chief (MeriTalk) UK's New Cybersecurity Bill Takes Aim at Ransomware Gangs and State-Backed Hackers (Fortra) Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day (SecurityWeek) Salesforce alerts customers of data breach traced to a supply chain partner (CXOtoday) Massive data leak hits Italian railway operator Ferrovie dello Stato via Almaviva hack (Security Affairs) SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance (SecurityWeek) Four charged with plotting to sneak Nvidia chips into China (The Register) SEC voluntarily dismisses SolarWinds lawsuit (The Record) NSO Group argues WhatsApp injunction threatens existence, future U.S. government work (CyberScoop) Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models (Arxiv) Freesound Music Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

iWork4Him PowerThought
Spiritual Firewalls

iWork4Him PowerThought

Play Episode Listen Later Nov 17, 2025 1:01


When the internet was created, the goal was the free-flowing of shared information for the good of humanity; what resulted was much more sinister than that.  Every day, we use the internet to do our jobs, complete our shopping, and study our bible.  However, if we are not careful, the internet can lead us to pornography, inappropriate relationships, gambling addictions, and more.  We think we have the willpower to resist all the daily temptations on the internet, but statistics now prove we do not.  Huge percentages of men and women, teens, and children have been exposed to pornography on the internet and find themselves driven to view more and more of it.  Create a work and home environment where God can heal and stop this destruction.  Put some digital armor in place, because the devil prowls around like a roaring lion looking for someone to devour. 

Computer Talk with TAB
Computer Talk 11-15-25 HR 2

Computer Talk with TAB

Play Episode Listen Later Nov 15, 2025 37:41


Margherita Bassi -Regular contributor for Smithsonian Magazine, Gizmodo, Popular Science - AI Videos of animals could be dangerous, Did you fall for the Deepfake of NVIDIA CEO? My Insurance company used AI to estimate my car's damage. Going on-prem saved a company a ton of money! Can I add USB ports to my computer? Firewall dangers, Laptop Battery issues, Upgraded from cable to fiber and my network name is the same.

Evil Thoughts
FIREWALL

Evil Thoughts

Play Episode Listen Later Nov 11, 2025 18:20


Today, while laying a wreath at the Tomb of the Unknown Soldier, Trump referred to those who serve in the military as "a mighty wall of flesh & blood." TDS sufferers get their undies in serious bundles.

Firewall
The Mamdani Breakdown

Firewall

Play Episode Listen Later Nov 5, 2025 40:22


So what happened last night? In this co-production with Firewall friend Jamie Rubin and his After Hours podcast, Bradley, Jamie, and Chris Coffey (Tusk Strategies CEO) analyze the historic win of NYC's next mayor, Zohran Mamdani. What does it mean for Gov. Hochul's re-election next year? Will NYPD commissioner Jessica Tisch stay at the helm — despite major policy differences with Mamdani? And could the secret to affordability be the victorious ballot proposals to build more housing across the five boroughs?Discussed on today's episode:The Mamdani Mayoralty: A Six Part Mini-Magazine On What Comes Next by Bradley Tusk (11/05/25)Be sure to subscribe to After Hours, a Vital City podcast, wherever you get your podcasts.This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.

The CyberWire
A storm brews behind the firewall.

The CyberWire

Play Episode Listen Later Nov 4, 2025 25:02


China-Linked hackers target Cisco firewalls. MIT Sloan withdraws controversial “AI-Driven Ransomware” paper. A new study questions the value of cybersecurity training. Hackers exploit OpenAI's API as a malware command channel. Apple patches over 100 Security flaws across devices. A Florida-based operator of mental health and addiction treatment centers exposes sensitive patient information. OPM plans a “mass deferment” for Cybercorps scholars affected by the government shutdown. Lawmakers urge the FTC to investigate Flock Safety's cybersecurity gaps. Cybercriminals team with organized crime for high-tech cargo thefts. Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies discussing ICE's controversial facial scanning initiative. A priceless theft meets a worthless password.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest We are joined by Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies discussing ICE's controversial facial scanning initiative. You can read more about Ben's topic from 404 Media: You Can't Refuse To Be Scanned by ICE's Facial Recognition App, DHS Document Says. Selected Reading China-Linked Hackers Target Cisco Firewalls in Global Campaign (Hackread) MIT Sloan shelves paper about AI-driven ransomware (The Register) CyberSlop — meet the new threat actor, MIT and Safe Security (DoublePulsar) Study concludes cybersecurity training doesn't work (KPBS Public Media) Microsoft: OpenAI API moonlights as malware HQ (The Register) Apple Patches 19 WebKit Vulnerabilities (SecurityWeek) Data Theft Hits Behavioral Health Network in 3 States (Bank Infosecurity) OPM plans to give CyberCorps members more time to find jobs after shutdown ends (CyberScoop) Lawmakers ask FTC to probe Flock Safety's cybersecurity practices (The Record) Cybercriminals, OCGs team up on lucrative cargo thefts (The Register) Louvre Robbery: Security Flaws: The (Obviously) Password Was "Louvre" (L'Unione Sarda) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Firewall
LIVE FROM P&T: A Visit from an Actual God of New York

Firewall

Play Episode Listen Later Nov 1, 2025 71:02


In this bonus episode of Firewall, Rev. Al Sharpton, a major figure in Jonathan Mahler's book The Gods of New York: Egotists, Idealists, Opportunists, and the Birth of the Modern City: 1986-1990, joined the author and Tusk Strategies CEO Chris Coffey earlier in October for a spirited conversation about New York in the 1980s and how it set the stage for the politics of today.This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.

PBS NewsHour - Segments
Massive leak exposes how China’s ‘Great Firewall’ is being exported to other countries

PBS NewsHour - Segments

Play Episode Listen Later Oct 18, 2025 6:32


For years, China’s government has used what’s known as the “Great Firewall” to censor the internet inside its country and block access to select foreign websites. Now, a document leak shows that a little-known Chinese company is exporting these tools to other countries, including Myanmar, Pakistan, Kazakhstan and Ethiopia. Ali Rogin speaks with WIRED senior writer Zeyi Yang to learn more. PBS News is supported by - https://www.pbs.org/newshour/about/funders. Hosted on Acast. See acast.com/privacy

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Friday, October 10th, 2025: RedTail Defenses; SonicWall Breach; Crowdstrike “Issues”; Ivanti 0-days; Mapping Agentic Attack Surface (@sans_edu paper)

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Oct 10, 2025 15:12


Building Better Defenses: RedTail Observations Defending against attacks like RedTail is more then blocking IoCs, but instead one must focus on the techniques and tactics attackers use. https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Sonicwall: It wasn t the user s fault Sonicwall admits to a breach resulting in the loss of user configurations stored in its cloud service https://www.sonicwall.com/support/knowledge-base/mysonicwall-cloud-backup-file-incident/250915160910330 Crowdstrike has Issues Crowdstrike fixes two vulnerabilities in the Windows version of its Falcon sensor. https://www.crowdstrike.com/en-us/security-advisories/issues-affecting-crowdstrike-falcon-sensor-for-windows/ Interrogators: Attack Surface Mapping in an Agentic World A SANS.edu master s degree student research paper by Michael Samson https://isc.sans.edu/researchpapers/pdfs/michael_samson.pdf keywords: ai; agentic; attack surface; crowdstrike; sonicwall; ivanti; zero day; initiative; redline