POPULARITY
Categories
What if you could eat at a place where the food was fresh and healthy, prices were geared to what customers could afford and the staff was treated equitably? Legendary food writer Mark Bittman joins Firewall to discuss the imminent launch of Community Kitchen, his nonprofit corrective to a food world gone awry.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Join Bradley at P&T Knitwear as we celebrate Russ & Daughters Day on September 20, to mark the legendary shop's first-ever cookbook in their 111 years on the Lower East Side. For more details and to RSVP, visit https://www.russanddaughtersday.com/.
Microsoft has launched Project IR, an advanced AI capable of reverse-engineering malware with a remarkable 90% accuracy rate. This autonomous agent utilizes a combination of large language models and specialized cybersecurity tools to identify threats effectively, achieving a low false positive rate of just 2%. Recent tests demonstrated its capability to analyze thousands of unclassified files and accurately flag a significant majority as malicious. However, as cybersecurity technology advances, so do the tactics of cybercriminals, with a notable increase in phishing attacks targeting managed service providers (MSPs), which now account for over half of all phishing incidents.The rise of AI-powered phishing and social engineering tactics has been highlighted in a recent Acronis report, revealing that 52% of phishing attacks are aimed at MSPs. Additionally, new research indicates that AI browsers may inadvertently assist scammers, as they can overlook red flags that human users would typically catch. A survey from One Password further emphasizes the challenges organizations face with the rapid adoption of AI tools, with many lacking visibility and control over these applications, leading to potential security vulnerabilities.Gartner has issued a warning to corporate leaders, stating that they have a limited timeframe to integrate AI agents into their operations or risk falling behind competitors. Despite the urgency, Gartner also acknowledges that a significant percentage of AI projects fail, raising concerns about the pressure vendors may place on businesses to adopt these technologies hastily. Meanwhile, XAI's claims regarding its Grok 2.5 model being open-sourced have been criticized as misleading, as the licensing terms impose restrictions that contradict open-source principles.In the realm of cybersecurity solutions, companies like SonicWall and VMware are introducing new tools and technologies to enhance security and operational efficiency. SonicWall has launched a new generation of firewalls with a unique cyber warranty, while VMware is focusing on ARM architecture to meet the growing demand for energy-efficient servers. However, the podcast emphasizes the importance of cutting through vendor noise and focusing on solutions that genuinely improve business operations, rather than getting caught up in marketing hype.Three things to know today 00:00 Microsoft's Project Ire Shows AI Can Catch Malware, But Attacks on MSPs Are Rising Faster06:36 AI Urgency, Open-Washing, and Federal Adoption: Sorting Hype From Reality10:09 From Billing Fixes to Firewalls and VMware's Arm Gamble: What Really Matters for MSPs Supported by: https://getnerdio.com/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
While all of you were enjoying a Firewall-free week, Bradley was undergoing Transcranial Magnetic Stimulation, a therapy designed to mitigate obsessive-compulsive disorder. "They put this thing over your head, and effectively, every two seconds, you get 30 pulses or shocks," he says. "They call them pulses because shock sounds bad. If you are a listener and you really do suffer from OCD or depression, this is a tool that I had not been aware of before that I'm very glad I tried." Plus, Bradley dissects the incentives for peace in Ukraine, explains why Democrats still haven't found a message to counter Trump, and floats a plan to make life better for baseball fans.Discussed on today's episode:How to Be a Good Intelligence AnalystThis episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
In this episode of Reboot IT, host Dave Coriale, President of DelCor, sits down with Adam Kuhn, IT Director and DelCor alum, to discuss the evolving role of IT in associations. From foundational infrastructure to advanced cybersecurity strategies, Adam shares lessons learned from both sides of the fence—being an internal influencer and a business partner. The conversation explores how IT leaders can move beyond “keeping the lights on” to proactively shaping organizational maturity, especially in the face of overwhelming system data and increasing security demands.Summary:Cybersecurity as a Strategic InvestmentCybersecurity tools like Arctic Wolf elevate IT maturity beyond basic infrastructure.Associations must move from reactive to proactive security strategies.Cyber insurance requirements are evolving and often unclear, requiring IT guidance.IT Maturity: From Core Requirements to ElectivesAdam compares IT infrastructure to college coursework—core requirements vs. electives.Core includes cloud migration, Microsoft 365, and basic security tools.Electives like threat detection systems represent strategic growth and investment.Information Overload & the Need for SynthesisDevices generate massive amounts of data that are impossible to interpret manually.Security operations centers help synthesize logs and alerts across systems.IT teams need tools to manage and interpret this data effectively.IT's Role in Business Decision-MakingIT should be a trusted advisor, not a gatekeeper or veto power.Excluding IT from technology selection leads to costly integration surprises.IT's involvement ensures better alignment, risk mitigation, and long-term success.Building Cross-Departmental PartnershipsIT needs access to systems it doesn't own to ensure full security coverage.Business units must understand their role in cybersecurity and collaborate with IT.Partnership is essential—not optional—for organizational safety and resilience.Influencing Leadership & Budget DecisionsIT leaders must make cogent cases for investment in security and infrastructure.Budget support depends on trust and clear communication with leadership.Adam emphasizes gratitude for working in a supportive environment that values IT input.
Diese Folge des SPIEGEL-Podcasts »Firewall« ist ursprünglich am 24. Juli 2025 erschienen. Im Rahmen des aktuellen Highlight-Programms während der Sommerpause von »Acht Milliarden« veröffentlichen wir sie hier noch einmal. Andreas Scheuer steht für einen der größten Polit-Skandale der letzten Jahre: das Debakel um die PKW-Maut. Trotzdem stand er bei Wahlkampf-Spendern hoch im Kurs. Mindestens 132.000 Euro flossen 2021 in die Kampagne des damaligen Bundesverkehrsministers. Das geht aus einer geheimen Liste hervor, die dem SPIEGEL vorliegt. Viele der Geldgeber waren, ausgerechnet, im Verkehrssektor tätig. Die Unterlagen zeigen, wie deutsche Unternehmer und ihre Vertreter einen Bundesminister umgarnten. Hat sich Scheuer von den Zahlungen beeinflussen lassen? Er selbst sagt zu einzelnen Spenden nichts. Sein Anwalt wirft dem SPIEGEL eine „Skandalisierung von Sachverhalten“ vor, die »mit der Rechtsordnung und dem Parteiengesetz im völligen Einklang stehen und von der Rechtsordnung sogar gewünscht sind«. Der SPIEGEL-Podcast »Firewall« erzählt, wie Wahlkampf-Spender sich offensiv mit ihren Anliegen in Scheuers Ministerium meldeten. Und er rekonstruiert, wie Scheuer mit der PKW-Maut scheiterte, zum unbeliebtesten Minister des Landes wurde. Heute baut er sich eine zweite Karriere in der Wirtschaft auf. Und wieder unterstützen unterstützen ihn einige seiner damaligen Gönner. Auszüge aus der Spenderliste und noch mehr Details lest ihr hier (S+) und unsere große Recherche zum Maut-Debakel findet ihr hier.+++ Alle Infos zu unseren Werbepartnern finden Sie hier. Die SPIEGEL-Gruppe ist nicht für den Inhalt dieser Seite verantwortlich. +++ Den SPIEGEL-WhatsApp-Kanal finden Sie hier. Alle SPIEGEL Podcasts finden Sie hier. Mehr Hintergründe zum Thema erhalten Sie mit SPIEGEL+. Entdecken Sie die digitale Welt des SPIEGEL, unter spiegel.de/abonnieren finden Sie das passende Angebot. Informationen zu unserer Datenschutzerklärung.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Center Software RADIUS Remote Code Execution Vulnerability An OS command injection vulnerability may be abused to gain access to the Cisco Secure Firewall Management Center software. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79 F5 Access for Android vulnerability An attacker with a network position that allows them to intercept network traffic may be able to read and/or modify data in transit. The attacker would need to intercept vulnerable clients specifically, since other clients would detect the man-in-the-middle (MITM) attack. https://my.f5.com/manage/s/article/K000152049
Take a Network Break! We start with critical vulnerabilities in Cisco Secure Firewall Management Center and Fortinet’s FortiSIEM. On the news front, SonicWall announces Gen8 firewalls plus a $200,000 warranty for customers that sign on to SonicWall’s Managed Protection Security Suite. IBM Cloud suffers its fourth major outage since May of this year, SASE vendor... Read more »
Take a Network Break! We start with critical vulnerabilities in Cisco Secure Firewall Management Center and Fortinet’s FortiSIEM. On the news front, SonicWall announces Gen8 firewalls plus a $200,000 warranty for customers that sign on to SonicWall’s Managed Protection Security Suite. IBM Cloud suffers its fourth major outage since May of this year, SASE vendor... Read more »
Take a Network Break! We start with critical vulnerabilities in Cisco Secure Firewall Management Center and Fortinet’s FortiSIEM. On the news front, SonicWall announces Gen8 firewalls plus a $200,000 warranty for customers that sign on to SonicWall’s Managed Protection Security Suite. IBM Cloud suffers its fourth major outage since May of this year, SASE vendor... Read more »
Cisco warns of maximum-severity defect in firewall software UK's Colt Telecom suffers cyberattack CISA implores OT environments to lock down critical infrastructure Huge thanks to our sponsor, Conveyor Have you been personally victimized by portal security questionnaires? Conveyor is here to help. Endless clicks, bad navigation, and expanding questions stacked like Russian nesting dolls, all add up to hours of your life you'll never get back. With Conveyor's AI-powered browser extension, you can open a portal questionnaire, scan for questions, and watch it auto-populate your answers back into the portal without the copy and paste. See how at www.conveyor.com Find the stories behind the headlines at CISOseries.com.
At Black Hat USA 2025, Rupesh Chokshi, Senior Vice President and General Manager at Akamai Technologies, connected with ITSPmagazine's Sean Martin to discuss the dual realities shaping enterprise AI adoption—tremendous opportunity and significant risk.AI is driving a seismic transformation in business operations, with executive teams rapidly deploying proof-of-concept projects to capture competitive advantage. Yet, as Chokshi notes, many of these initiatives race ahead without fully integrating security teams into the process. While budgets for AI are expanding, funding for AI-specific security measures often lags behind, leaving organizations exposed.One of the most pressing concerns is the rise of AI bots—Akamai observes 150 billion such bots traversing networks daily. These bots scrape valuable digital content, train models on it, and, in some cases, replace direct customer interactions with summarized answers. The result? Lost marketing leads, disrupted sales funnels, and even manipulated product recommendations—all without traditional “breach” indicators.This is not just a security problem; it's a business continuity challenge. Organizations must develop strategies to block or manage scraping, including commercial agreements for content usage. Beyond this, the proliferation of conversational AI agents—whether for booking tickets, providing mortgage information, or recommending products—introduces new attack surfaces. Threat actors exploit prompt injections, jailbreaks, and code execution vulnerabilities to compromise these interfaces, risking both customer trust and brand reputation.Akamai's response includes capabilities such as Firewall for AI, providing in-line visibility and control over AI-driven sessions, and bot mitigation technologies that protect high-value content. By offering real-time threat intelligence tailored to customer environments, Akamai helps enterprises maintain agility without sacrificing protection.Chokshi's call to action is clear: every company is now an AI company, and security must be embedded from the outset. Boards should view security not as a budget line item, but as the foundation for innovation velocity, brand integrity, and long-term competitiveness.Learn more about Akamai: https://itspm.ag/akamailbwcNote: This story contains promotional content. Learn more.Guests:Rupesh Chokshi, SVP & General Manager, Application Security, Akamai | https://www.linkedin.com/in/rupeshchokshi/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
While most people ignore the Ninth Amendment, those who don't usually get it completely wrong. It isn't a grant of additional federal power; it's a rule of construction designed to explain its limits. On this episode, we'll uncover the forgotten history behind the ignored 9th Amendment. The post The 9th Amendment Wasn't an Afterthought. It Was a Firewall first appeared on Tenth Amendment Center.
Got a question or comment? Message us here!On this episode of the #SOCBrief, we break down attacks on SonicWall firewalls. A wave of ransomware, possibly exploiting zero-day vulnerabilities, is compromising even fully patched systems. Learn how SOCs can respond fast and stay ahead.Support the showWatch full episodes at youtube.com/@aliascybersecurity.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.
ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Booth #1933 | A ThreatLocker Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with John LillistonJoin ITSP Magazine's Marco Ciappelli and Sean Martin as they preview ThreatLocker's exciting Black Hat 2025 presence with Detect Product Director John Lilliston. Discover upcoming major announcements, hands-on hacking demos, and how ThreatLocker's default deny approach is revolutionizing enterprise cybersecurity through comprehensive zero trust implementation.As Black Hat USA 2025 approaches, cybersecurity professionals are gearing up for one of the industry's most anticipated events. ITSP Magazine's Marco Ciappelli and Sean Martin recently sat down with John Lilliston, ThreatLocker's Detect Product Director, to preview what promises to be an exciting showcase of zero trust innovation at booth 1933.ThreatLocker has become synonymous with the "default deny" security approach, a philosophy that fundamentally changes how organizations protect their digital assets. Unlike traditional security models that allow by default and block known threats, ThreatLocker's approach denies everything by default and allows only approved applications, network communications, and storage operations. This comprehensive strategy operates across application, network, and storage levels, creating what Lilliston describes as a "hardened system that stops adversaries in their tracks."The company's rapid growth reflects the industry's embrace of zero trust principles, moving beyond buzzword status to practical, enterprise-ready solutions. Lilliston, who joined ThreatLocker in February after evaluating their products from the enterprise side, emphasizes how the platform's learning mode and ring fencing capabilities set it apart from competitors in the application control space.At Black Hat 2025, ThreatLocker will demonstrate their defense-in-depth strategy through their Detect product line. While their primary zero trust controls rarely fail, Detect provides crucial monitoring for applications that must run in enterprise environments but may have elevated risk profiles. The system can automatically orchestrate responses to threats, such as locking down browsers exhibiting irregular behavior that might indicate data exfiltration attempts.Visitors to booth 1933 can expect hands-on demonstrations and on-demand hacking scenarios that showcase real-world applications of ThreatLocker's technology. The company is preparing major announcements that CEO Danny Houlihan will reveal during the event, promising game-changing developments for both the organization and its client base.ThreatLocker's Black Hat agenda includes a welcome reception on Tuesday, August 5th, from 7-10 PM at the Mandalay Bay Complex, and Houlihan's presentation on "Simplifying Cybersecurity" on Thursday, August 7th, from 10:15-11:05 AM at Mandalay Bay J.The convergence of practical zero trust implementation, cutting-edge threat detection, and automated response capabilities positions ThreatLocker as a key player in the evolving cybersecurity landscape, making their Black Hat presence essential viewing for security professionals seeking comprehensive protection strategies.Keywords: Black Hat 2025, zero trust security, cybersecurity conference, ThreatLocker, default deny strategy, endpoint protection, application control, threat detection, enterprise security, network security, cybersecurity solutions, security automation, malware prevention, cyber threats, information security, security platform, Black Hat USA, cybersecurity innovation, managed detection response, security operationsLearn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content.Learn more.Guests:John LillistonCybersecurity Director | Threat Detection & Response | SOC Leadership | DFIR | EDR/XDR Strategy | GCFA, GISP | https://www.linkedin.com/in/john-lilliston-4725217b/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerThreatLocker® Welcome Reception | Don't gamble with your security! Join us at Black Hat for a lively Welcome Reception hosted by ThreatLocker®. Meet our Cyber Hero® Team and dive into discussions on the latest advancements in ThreatLocker®Endpoint Security. It's a great opportunity to connect and learn together! Time: 7PM - 10PM | Location: Mandalay Bay Complex RSVP below and we'll send you a confirmation email with all the details.[ Welcome Reception RSVP ]Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
In a digital age where cyberattacks are common, our spiritual lives also face constant threats from false teaching. Just as we need firewalls to protect our devices, God has given us doctrinal firewalls to safeguard our faith—through biblically qualified elders, sound doctrine, and expositional preaching. In 1 John 4, we're reminded that the Spirit of God empowers truth, while the spirit of error seeks to deceive—and only by grounding ourselves in God's Word can we stand firm.
Adyen is a global payments processor whose primary business is providing payment services for merchants, retailers, and venues, as well as online payments. On today’s Heavy Networking we talk about a firewall automation project the company has undertaken. With dozens of change requests coming in every day that need to touch network and host firewalls,... Read more »
Adyen is a global payments processor whose primary business is providing payment services for merchants, retailers, and venues, as well as online payments. On today’s Heavy Networking we talk about a firewall automation project the company has undertaken. With dozens of change requests coming in every day that need to touch network and host firewalls,... Read more »
Adyen is a global payments processor whose primary business is providing payment services for merchants, retailers, and venues, as well as online payments. On today’s Heavy Networking we talk about a firewall automation project the company has undertaken. With dozens of change requests coming in every day that need to touch network and host firewalls,... Read more »
Ahead of Black Hat USA 2025, Sean Martin and Marco Ciappelli sit down once again with Rupesh Chokshi, Senior Vice President and General Manager of the Application Security Group at Akamai, for a forward-looking conversation on the state of AI security. From new threat trends to enterprise missteps, Rupesh lays out three focal points for this year's security conversation: protecting generative AI at runtime, addressing the surge in AI scraper bots, and defending the APIs that serve as the foundation for AI systems.Rupesh shares that Akamai is now detecting over 150 billion AI scraping attempts—a staggering signal of the scale and sophistication of machine-to-machine activity. These scraper bots are not only siphoning off data but also undermining digital business models by bypassing monetization channels, especially in publishing, media, and content-driven sectors.While AI introduces productivity gains and operational efficiency, it also introduces new and uncharted risks. Agentic AI, where autonomous systems operate on behalf of users or other systems, is pushing cybersecurity teams to rethink their strategies. Traditional firewalls aren't enough—because these threats don't behave like yesterday's attacks. Prompt injection, toxic output, and AI-generated hallucinations are some of the issues now surfacing in enterprise environments, with over 70% of organizations already experiencing AI-related incidents.This brings the focus to the runtime. Akamai's newly launched Firewall for AI is purpose-built to detect and mitigate risks in generative AI and LLM applications—without disrupting performance. Designed to flag issues like toxic output, remote code execution, or compliance violations, it operates with real-time visibility across inputs and outputs. It's not just about defense—it's about building trust as AI moves deeper into decision-making and workflow automation.CISOs, says Rupesh, need to shift from high-level discussions to deep, tactical understanding of where and how their organizations are deploying AI. This means not only securing AI but also working hand-in-hand with the business to establish governance, drive discovery, and embed security into the fabric of innovation.Learn more about Akamai: https://itspm.ag/akamailbwcNote: This story contains promotional content. Learn more.Guests:Rupesh Chokshi, SVP & General Manager, Application Security, Akamai | https://www.linkedin.com/in/rupeshchokshi/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
This episode kicks off with a powerful story of malicious compliance from an IT worker denied on-call pay, who made sure the company paid the price literally. We also hear from a retail worker who served a petty refund with a smile, and a group of manufacturing employees who turned a no-loitering rule into a step-counting protest. Other tales include a consulting engineer who billed hard after being denied a simple limo ride and an employee who weaponized a rigid work-from-home policy. It's a full lineup of boss battles, policy blowback, and satisfying consequences.Submit your own stories to KarmaStoriesPod@gmail.com.Karma Stories is available on all major Podcasting Platforms and on YouTube under the @KarmaStoriesPodcast handle. We cover stories from popular Reddit Subreddits like Entitled Parents, Tales From Tech Support, Pro Revenge and Malicious Compliance. You can find new uploads here every single day of the week!Rob's 3D Printing Site: https://Dangly3D.comGet your Custom Hand Turned Pen by Rob at https://CanadianRob.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/karma-stories--5098578/support.
In this episode of The Other Side of the Firewall's Thursday episode, Ask a CISSP, Ryan Williams Sr. interviews Angela Diaz, an expert in risk management and fraud prevention. They discuss the importance of understanding the three lines of defense in risk management, the impact of fraud on individuals and organizations, and the career pathways available in the field. Angela shares her personal journey into risk management, the significance of soft skills, and her involvement in the Fraud Fight Club initiative. The conversation also touches on mindfulness practices and the importance of maintaining a balanced life outside of work. Contact Angela - https://www.linkedin.com/in/angela-diaz-crmp-37430064/ Fraud Fight Club - https://www.fraudfightclub.com/ Please buy my book: https://theothersideofthefirewall.com Socials: Website - www.ramcyber.io Heroes Media Group: https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/ Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181 YouTube - https://www.youtube.com/@theothersideofthefirewall7511 ReppedFLIX - https://lnkd.in/eVis2CbS WDJY 99.1 FM: https://www.wdjyfm.com/ TuneIn: https://lnkd.in/e2crcZU8 Facebook - https://www.facebook.com/profile.php?id=61556539026086 Instagram - https://www.instagram.com/theothersideofthefw X (Twitter) - https://twitter.com/Ask_a_CISSP TikTok - https://www.tiktok.com/@ryanwilliams683 Medium - https://medium.com/@ryanwilliamssenior Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728 LinkedIn - https://www.linkedin.com/company/the-other-side-of-the-firewall/ Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/ Chapters 00:00 Introduction to Risk Management and Fraud 03:58 Understanding the Three Lines of Defense 11:58 The Importance of Risk Management in Financial Institutions 19:45 Career Pathways in Risk Management 25:59 Soft Skills for Success in Risk Management 29:47 Engagement in the Fraud Fight Club Initiative 37:49 Personal Insights and Mindfulness Practices 41:43 Conclusion and Future Connections #cybersecurity #riskmanagement #fraud
Welcome to episode 312 of The Cloud Pod, where your hosts, Matt, Ryan, and Justin, are here to bring you all the latest in Cloud and AI news. We've got security news, updates from PostgreSQL, Azure firewall and BlobNFS, plus TWO Cloud Journey stories for you! Thanks for joining us this week in the cloud! Titles we almost went with this week: Git Happens: Why Your Database Pipeline Keeps Breaking PostgreSQL and Chill: Azure’s New Storage Options for Database Romance NVMe, Myself, and PostgreSQL Canvas and Effect: AWS Paints a New Picture for E-commerce Oracle’s $30 Billion Stargate: The AI Infrastructure Wars Begin Larry’s Last Laugh: Oracle Lands OpenAI’s Mega Deal AI Will See You Now (Couch Not Included) Purview and Present Danger: Microsoft’s AI Security SDK Goes Live The Purview from Up Here: Microsoft’s Bird’s Eye View on AI Data Security Building Bridges: Azure’s Two-Way Street to Active Directory Domain Names: Not Just for Browsers Anymore FUSE or Lose: Azure’s BlobNFS Gets a Speed Boost When Larry Met Andy: An Exadata Love Story Bing There, Done That: Azure’s New Research Assistant The Search is Over: Azure AI Foundry Finds Its Research Groove Memory Lane: Where AI Agents Go to Remember Things Elephants Never Forget, and Now Neither Do Google’s Agents Z3 or Not Z3: That is the Storage Question Local SSD Hero: A New Hope for I/O Intensive Workloads Azure’s Certificate of Insecurity KeyVault’s Keys Left Under the Doormat When Your Cloud Provider Accidentally CCs the Hackers AI Is Going Great – Or How ML Makes Money 03:09 RYAN DOES A THING FOR SECURING AI WORKLOADS Ryan was recently invited to Google's Headquarters in San Francisco as part of a small group of security professionals where they spent time hands-on with Google security offerings, learning how to secure AI workloads. AI – and how to secure it – is a hot topic right now, and being able to spend time working with the Google development team was really insightful, with how they work with various levels of protections in place in dummy applications. Ryan was especially interested in the back-end logic that was executed in the applications. 05:32 Ryan – “I was impressed because there’s how we’re thinking about AI is still evolving, and how we’re protecting it’s gonna be changing rapidly, and having real-world examples really helped really flesh out how their AI services are, how they’re integrated into a security ecosystem. It was pretty impressive. And it’s something that’s near and dear. I’ve been working and trying to roll out Google agent spaces and different AI workloads and trying to get involved and make sure that we, just getting visibility into all the different ones. And that was, it was really helpful to sort of think about it in those contexts.” 10:13 OpenAI secures $30bn cloud deal with Oracle OpenAI signed a $30 billion annual cloud computing agreement with Oracle for 4.5GW of capacity, making it one of the largest AI cloud deals to date, and nearly triple Oracle’s current $10.3 billion annual data center infrastructure revenue.
Irish government departments reported 6,885 data breaches over the past decade - highlighting that cyber risk to public services is both real and rising. To address this escalating threat, Integrity360, one of the leading cyber security specialists in Ireland, has announced the expansion of its public sector cyber security practice. By expanding its public sector focus, Integrity360 is reaffirming its long-standing commitment to helping public sector organisations navigate today's growing cyber challenges, building on its substantial presence and success over recent years. With advanced capabilities and a growing team of experts, Integrity360 is well positioned to help address threats, bridge technical skills gaps, and strengthen cyber resilience across the public sector. This enhanced focus is supported by its recent inclusion on the Framework for Firewalls and Associated Services and the Framework for Software Licensing and Associated Services from Ireland's Office of Government Procurement (OGP) - providing a strategic tool to deliver tailored, effective cyber security services to public sector bodies. With these listings, Integrity360 can now deliver end-to-end firewall solutions and software licensing to a broader spectrum of public sector bodies, including government departments, local authorities, health and education organisations, and the defence and justice sectors. The OGP firewall framework enables these organisations to procure both physical and virtual firewall appliances alongside vital support such as design, implementation, and professional services from Integrity360's team. Strengthening public sector cyber defence with expert-led support The expanded practice builds on Integrity360's already strong foundation in the public sector. It aims to meet increasing demand and provide government and public services across Ireland with access to resilient, expert-led cyber defence in areas such as proactive threat detection, rapid response, and compliance. This will not only ensure enhanced visibility and improve the overall cyber security posture of public sector organisations, but will also protect the sensitive data of citizens who engage with these bodies. Stephen Phillips, Head of Public Sector, Integrity360: "Ireland's public sector continues to face increasingly complex cyber threats. As digital threats grow in scale and complexity, public bodies are facing mounting challenges - from data breaches and regulatory compliance demands to the urgent need for robust incident response strategies. At Integrity360, we are deeply committed to providing tailored cyber security solutions that not only protect vital public services but also foster trust and resilience within our communities. Together, we can navigate these challenges and safeguard the integrity of our nation's digital infrastructure." See more stories here. More about Irish Tech News Irish Tech News are Ireland's No. 1 Online Tech Publication and often Ireland's No.1 Tech Podcast too. You can find hundreds of fantastic previous episodes and subscribe using whatever platform you like via our Anchor.fm page here: https://anchor.fm/irish-tech-news If you'd like to be featured in an upcoming Podcast email us at Simon@IrishTechNews.ie now to discuss. Irish Tech News have a range of services available to help promote your business. Why not drop us a line at Info@IrishTechNews.ie now to find out more about how we can help you reach our audience. You can also find and follow us on Twitter, LinkedIn, Facebook, Instagram, TikTok and Snapchat.
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss various cybersecurity topics, including a vulnerability in ServiceNow that allowed unauthorized data access, the implications of North American APTs attacking China using Exchange Zero Day exploits, and a significant security flaw in McDonald's AI recruiting platform. They also share personal updates and reflections on media consumption, emphasizing the importance of feedback for the podcast and Ryan's recently published book. Articles: New ServiceNow flaw lets attackers enumerate restricted data https://www.bleepingcomputer.com/news/security/new-servicenow-flaw-lets-attackers-enumerate-restricted-data/amp/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExQWRYQWV1ak5pd1lZdHJtegEeelyIlK2Ek9gCYDYtP80irWWtUhS3cA8gY_25kHfhgHP-_ntEK-dqk8Ot_GI_aem_xJzS7lMJMTkWDOS6Wcj4SQ North American APT Uses Exchange Zero-Day to Attack China https://www.darkreading.com/cyberattacks-data-breaches/north-american-apt-exchange-zero-day-attacks-china?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExQWRYQWV1ak5pd1lZdHJtegEer8-gvyCsk7NEjyuZ1a1N2eGHIyLh6cCANkM5oD9x-jPlHuntjonpKiZ0Hcg_aem_25vP0x19KnGVwKBr8POhPg McDonald's AI recruiting platform had a really embarrassing security flaw - and it left millions of users open to attack https://www.techradar.com/pro/security/mcdonalds-ai-recruiting-platform-had-a-really-embarrassing-security-flaw-which-left-millions-of-users-open-to-attack?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExQWRYQWV1ak5pd1lZdHJtegEer8-gvyCsk7NEjyuZ1a1N2eGHIyLh6cCANkM5oD9x-jPlHuntjonpKiZ0Hcg_aem_25vP0x19KnGVwKBr8POhPg Please LISTEN
Today we discuss the situation with alleged CSA predator, Art Lucier. The state of the Church and how we got here with former CIA employee, Pedro Israel Orta. Daystar Petition: https://tinyurl.com/ycxwe4ye Sign up for my newsletter here: Laura-Lynn Newsletter Jonathan & Suzy Lamb GiveSendGo: https://www.givesendgo.com/GEBG9 Richardson Nutritional Center: https://tinyurl.com/mudzzy3n Zstack Protocol: https://zstacklife.com/?ref=LAURALYNN Antibiotics at: Sales@larxmedical.com Promo code: LLTT Need some Ivermectin or Hydroxychloroquine? Fast shipping with guaranteed delivery in Canada and the US. Contact Mia for more information. SozoHealth@proton.me ☆ We no longer can trust our mainstream media, which is why independent journalists such as myself are the new way to receive accurate information about our world. Thank you for supporting us – your generosity and kindness to help us keep information like this coming! ☆ ~ L I N K S ~ ➞ DONATE AT: https://www.lauralynn.tv/ or lauralynnlive@protonmail.com ➞ TWITTER: @LauraLynnTT ➞ FACEBOOK: Laura-Lynn Tyler Thompson ➞ RUMBLE: https://rumble.com/c/LauraLynnTylerThompson ➞ BITCHUTE: https://www.bitchute.com/channel/BodlXs2IF22h/ ➞ YOUTUBE: https://www.youtube.com/LauraLynnTyler ➞ BRIGHTEON: https://www.brighteon.com/channels/lauralynntv ➞ DLIVE: https://dlive.tv/Laura-Lynn ➞ ODYSEE: https://odysee.com/@LauraLynnTT:9 ➞ GETTR: https://www.gettr.com/user/lauralynn ➞ LIBRTI: https://librti.com/laura-lynn-tyler-thompson
Fortinet patches a critical flaw in its FortiWeb web application firewall. Hackers are exploiting a critical vulnerability in Wing FTP Server. U.S. Cyber Command's fiscal 2026 budget includes a new AI project. Czechia's cybersecurity agency has issued a formal warning about Chinese AI company DeepSeek. The DoNot APT group targets Italy's Ministry of Foreign Affairs. Mexico's former president is under investigation for alleged bribes to secure spyware contracts. The FBI seizes a major Nintendo Switch piracy site. CISA releases 13 ICS advisories. A retired US Army lieutenant colonel pleads guilty to oversharing classified information on a dating app. Our guest is Catherine Woneis, VP of Product at Fingerprint, to discuss how bots are being used to facilitate music royalty fraud. A federal judge is not impressed with a crypto-thief's lack of restitution. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Catherine Woneis, VP of Product at Fingerprint, to discuss how bots are being used to facilitate music royalty fraud and how companies can protect themselves. Selected Reading Critical SQL injection vulnerability in Fortinet FortiWeb enables unauthenticated remote code execution (Beyond Machines) Critical Wing FTCritical Wing FTP Server Vulnerability Exploited - SecurityWeekP Server Vulnerability Exploited (SecurityWeek) Cyber Command creates new AI program in fiscal 2026 budget (DefenseScoop) DeepSeek a threat to national security, warns Czech cyber agency (The Record) Indian Cyber Espionage Group Targets Italian Government (Infosecurity Magazine) Former Mexican president investigated over allegedly taking bribes from spyware industry (The Record) Major Nintendo Switch Piracy Website Seized By FBI (Kotaku) CISA Releases Thirteen Industrial Control Systems Advisories (CISA) Lovestruck US Air Force worker admits leaking secrets on dating app (The Register) Crypto Scammer Truglia Gets 12 Years Prison, Up From 18 Months (Bloomberg) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
ON THIS EPISODE: ➤ How to position yourself as your team’s “firewall” – standing between them and organizational pressure to create space for great work. ➤ Why “exception-only management” builds stronger teams than micromanagement – trusting first and intervening only when needed. ➤ The Scout Leader approach to letting people fail safely so they actually...
In this episode of The Other Side of the Firewall, Ryan Williams Sr. and Edgar Vanterpool discuss Edgar's unique journey from the automotive industry to becoming a Business Information Security Officer (BISO). They explore the skills required for the role, the importance of understanding business needs in cybersecurity, and the balance between technical and business perspectives. Edgar shares valuable insights for aspiring BISOs and emphasizes the significance of asking the right questions. The conversation also touches on Edgar's personal interests, including his passion for cars and gaming. Please buy my book: ➡️ Visit https://theothersideofthefirewall.com to order your softcover copy at a special launch discount! ➡️ Use the universal link https://books2read.com/theothersideofthefirewall to select your preferred eBook or print store. Socials: Website - www.ramcyber.io Heroes Media Group: https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/ Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181 YouTube - https://www.youtube.com/@theothersideofthefirewall7511 ReppedFLIX - https://lnkd.in/eVis2CbS WDJY 99.1 FM: https://www.wdjyfm.com/ TuneIn: https://lnkd.in/e2crcZU8 Facebook - https://www.facebook.com/profile.php?id=61556539026086 Instagram - https://www.instagram.com/theothersideofthefw X (Twitter) - https://twitter.com/Ask_a_CISSP TikTok - https://www.tiktok.com/@ryanwilliams683 Medium - https://medium.com/@ryanwilliamssenior Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728 LinkedIn - https://www.linkedin.com/company/the-other-side-of-the-firewall/ Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/ Chapters 00:00 Introduction to the Podcast and Guests 02:23 Edgar's Background: From Automotive to Cybersecurity 04:47 The Intersection of Mechanics and Cybersecurity 07:08 Transitioning to IT: The Journey Begins 09:46 Growth into the BISO Role 12:27 Understanding Business Needs in Cybersecurity 14:44 Navigating the C-Suite: Balancing Technical and Business Perspectives 17:15 The Philosophy of Cybersecurity and Business Integration 21:18 Navigating the Role of BISO 23:12 The Evolution of Cybersecurity Roles 27:14 Pathways to Becoming a BISO 29:36 Keys to Breaking into Cybersecurity 32:03 Life Beyond Work: Hobbies and Passions #cybersecurity #biso #breakintotech
I cover the latest Patch Tuesday news, more metrics on Windows 11 adoption, some InfoSec stories and much more! Reference Links: https://www.rorymon.com/blog/windows-update-causing-firewall-error-patch-tuesday-news-grok-goes-crazy/
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss their personal updates, including training experiences, certifications, and adventures in New York City. They also dive into Ryan's book publishing journey and future plans, all while emphasizing the importance of cybersecurity and community engagement. Please buy my book: https://theothersideofthefirewall.com Socials: Website - www.ramcyber.io Heroes Media Group: https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/ Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181 YouTube - https://www.youtube.com/@theothersideofthefirewall7511 ReppedFLIX - https://lnkd.in/eVis2CbS WDJY 99.1 FM: https://www.wdjyfm.com/ TuneIn: https://lnkd.in/e2crcZU8 Facebook - https://www.facebook.com/profile.php?id=61556539026086 Instagram - https://www.instagram.com/theothersideofthefw X (Twitter) - https://twitter.com/Ask_a_CISSP TikTok - https://www.tiktok.com/@ryanwilliams683 Medium - https://medium.com/@ryanwilliamssenior Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728 LinkedIn - https://www.linkedin.com/company/the-other-side-of-the-firewall/ Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/ Chapters 00:00 Introduction to the Podcast and Hosts 02:19 Weekly Updates and Personal Experiences 05:04 Certifications and Professional Development 07:44 Exploring New York City Adventures 10:36 Food Culture and Culinary Experiences 13:11 Networking and Community Engagement 15:42 Future Plans and Upcoming Events #cybersecurity #podcast #sliceoflife
Send us a textSmall businesses are under cyber siege—yet few are fully protected. In this compelling conversation from IT Nation Secure 2025, Joey Pinz sits down with Sarvesh Rao, the founder of Marma Security, to explore a massive untapped opportunity for Managed Service Providers (MSPs).
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss the latest cybersecurity news, focusing on the FBI's warning about two-factor authentication bypass attacks by a group called Scattered Spider. They explore the tactics used by this group, the implications for cybersecurity, and the need for more secure authentication methods. The conversation highlights the ongoing challenges in the cybersecurity landscape and the cyclical nature of cybercrime and law enforcement responses. Article: FBI Warning Issued As 2FA Bypass Attacks Surge — Get Prepared https://www.forbes.com/sites/daveywinder/2025/06/30/fbi-warning-issued-as-2fa-bypass-attacks-surge---act-now/ Preorder the guide: theothersideofthefirewall.com Socials: Website - www.ramcyber.io Heroes Media Group: https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/ Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181 YouTube - https://www.youtube.com/@theothersideofthefirewall7511 ReppedFLIX - https://lnkd.in/eVis2CbS WDJY 99.1 FM: https://www.wdjyfm.com/ TuneIn: https://lnkd.in/e2crcZU8 Facebook - https://www.facebook.com/profile.php?id=61556539026086 Instagram - https://www.instagram.com/theothersideofthefw X (Twitter) - https://twitter.com/Ask_a_CISSP TikTok - https://www.tiktok.com/@ryanwilliams683 Medium - https://medium.com/@ryanwilliamssenior Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728 LinkedIn - https://www.linkedin.com/company/the-other-side-of-the-firewall/ Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/ Chapters 00:00 Introduction to Cybersecurity and the Podcast 01:23 FBI Warning on Two-Factor Authentication Bypass 03:49 Scattered Spider: The New Threat in Cybersecurity 07:42 The Future of Authentication: Moving Beyond Passwords 08:50 The Lucrative World of Cybercrime #cybersecurity #scatteredspiders #mfa
Ever since Tuesday's shock results, Bradley's been sharing a steady stream of thoughts on Zohran Mamdani's win here on Firewall and his Substack — and now you can hear from Mamdani directly. We're re-releasing our interview from April with the (now) Democratic nominee for mayor, when he joined Bradley and Tom Allon from City & State to discuss his vision for a fairer, faster, and more functional New York. Real leadership, Mamdani argued, means empowering experts, not micromanaging. He believes that a reimagined, newly empowered public sector is key to the city's future if elected mayor in November.Check out Bradley's latest in Vital City: How Zohran Mamdani Could Succeed as MayorThis episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
In this episode of 'The Other Side of the Firewall' podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a variety of topics ranging from personal updates and reflections on aging, to cultural sensitivity in media, and reviews of recent films like 'Ballerina' and '28 Years Later'. They also touch on the impact of AI in film, the legacy of actors, and personal experiences with gaming and book publishing. The conversation is rich with humor, nostalgia, and insights into the evolving landscape of entertainment and personal life. Preorder the guide: theothersideofthefirewall.com Socials: Website - www.ramcyber.io Heroes Media Group: https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/ Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181 YouTube - https://www.youtube.com/@theothersideofthefirewall7511 ReppedFLIX - https://lnkd.in/eVis2CbS WDJY 99.1 FM: https://www.wdjyfm.com/ TuneIn: https://lnkd.in/e2crcZU8 Facebook - https://www.facebook.com/profile.php?id=61556539026086 Instagram - https://www.instagram.com/theothersideofthefw X (Twitter) - https://twitter.com/Ask_a_CISSP TikTok - https://www.tiktok.com/@ryanwilliams683 Medium - https://medium.com/@ryanwilliamssenior Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728 LinkedIn - https://www.linkedin.com/company/the-other-side-of-the-firewall/ Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/ Chapters 00:00 Introduction to the Podcast and Weekly Recap 02:32 Cultural Reflections on TV and Movies 05:20 Exploring the John Wick Universe and Ballerina 08:11 Discussion on AI in Film and Legacy of Actors 10:50 Personal Updates and Book Launch 17:57 Gaming Experiences and Upcoming Releases #cybersecurity #podcast #movies
We sat down with Carl Dong — former Bitcoin Core contributor, now founder of Obscura VPN focused on real-world censorship resistance.In this episode, we dive into:- Why Carl walked away from Bitcoin Core development to tackle privacy head-on- What sets Obscura apart from other VPNs- Lessons from the Great Firewall and routing traffic through hostile networks- Chinese numerology- Carl & Casey's long and storied shared historyFOLLOW CARL: https://x.com/carl_dongGet bonus content by subscribing to @hellmoneypod on X: https://x.com/hellmoneypod/creator-subscriptions/subscribeOr support the podcast by sending a BTC donation: bc1qztncp7lmcxdgude4px2vzh72p2yu2aud0eyzys ORDINALS PROTOCOL SHIRT: https://shop.inscribing.com/products/ordinals-protocol-shirtTIMESTAMPS:0:00 Intro & Carl's journey to Bitcoin development11:59 Hard problems in Bitcoin16:00 Binaries, compliers, and reproducible builds37:30 Transitioning from Bitcoin core to working on Obscura VPN1:05:00 Advice for current Bitcoin core contributors1:10:00 Ordinals numerology1:39:00 Outro
In this episode of The Other Side of the Firewall podcast, Ryan Williams Sr. and Shannon Tynes discuss the rising threat of cyberattacks on retail, particularly in the UK, and how these incidents are affecting supply chains and consumer access to essential goods. They explore the implications of these attacks for businesses, the potential for increased regulation, and share personal experiences related to online shopping and car buying. The conversation emphasizes the importance of cybersecurity and the need for businesses to take proactive measures to protect their systems and customer data. Article: With retail cyberattacks on the rise, customers find orders blocked and shelves empty https://apnews.com/article/cyberattack-retail-whole-foods-victorias-secret-ms-9105458e6ef45152b065e623d0bf06fd?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExWk5COGhnbHljT1pwMVZhMgEeKKjV7El0M1S3vRDbQvVZuh58-DZ-7VFghdJLmPHWQA2ENt-QMjfjMBWmA7k_aem_VO9DrTvjMEVIwiYR9b7LNA# Please LISTEN
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a significant cybersecurity incident involving the leak of 16 billion passwords. They emphasize the importance of password security, the need for multi-factor authentication (MFA), and the adoption of passkey security to enhance protection against data breaches. The conversation also touches on the necessity of regularly changing passwords and educating others about cybersecurity risks. Article: 16 Billion Apple, Facebook, Google And Other Passwords Leakedhttps://www.forbes.com/sites/daveywinder/2025/06/20/16-billion-apple-facebook-google-passwords-leaked---change-yours-now/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExQVZYZklLVjZaQWdSMDNWWQEe2_WbIIsngeIn3Z8kCVsLGoSaPWRmACaOuEMi7ZuxQCrY9XzY9IvUuCnW0k0_aem_EkQvAfKP7ikDgkkN-mAg7Q Please LISTEN
Send us a textSchedule an Rx AssessmentSubscribe to Master The MarginCyberattacks targeting healthcare are rising, with pharmacies increasingly in the crosshairs. From ransomware to phishing scams, the threats are real...and constant.But how can independent pharmacies defend themselves against a digital siege?In this episode of The Bottom Line Pharmacy Podcast we have 3 people of the Sykes & Company team, Scotty Sykes, CPA, CFP®, Chris Sykes, IT Director, and Austin Murray, Marketing Director explore the evolving cybersecurity landscape with a practical lens. This episode covers:The NIST 2.0 Cyber Security FrameworkWhat to ask your script system vendor about securityHow to build a breach response plan that actually worksSocial engineering 101: What is it and how to protect your pharmacyBest practices for employee training, access control, and device auditsMore About Our Guest:Chris Sykes is the Director of IT at Sykes & Company, P.A., where he has been a key part of the team since 2006. With nearly 25 years in the IT industry, Chris combines deep technical expertise with a passion for helping both the firm and its clients become more efficient, secure, and technology-driven. Chris holds a Bachelor of Science in Business Administration with a concentration in Management Information Systems and a Master of Science in Technology Systems, both from East Carolina University. Outside of work, Chris enjoys running marathons, fishing and hunting with his boys, and spending quality time with his family at the beach.Learn more about Chris:Chris Sykes LinkedInCheck out all our social media:FacebookTwitterLinkedInScotty Sykes – CPA, CFP LinkedInScotty Sykes – CPA, CFP TwitterMore resources on this topic:Podcast - AI, Audits, & Advocacy: The Pharmacy Survival Guide with Trenton TheideBlog - Technology, Security and Your PharmacyBlog - Protect You and Your Pharmacy: The Growing Threat of RansomwareBlog - Backing Up Your Business DataBlog - Spot a Hacked Email or Bad WebsiteBlog - Protect Your Pharmacy Data from Hackers
Dr. Aleise McGowan, Chief Information Security Officer of BlackGirlsHack and a 20-year cybersecurity veteran, joins Ann on this week's episode of Afternoon Cyber Tea. Aleise shares how a career-defining hack early on shifted her trajectory from developer to defender, and why she believes the future of security lies in resilience, diversity, and human-centered leadership. She talks about what separates good and great leaders during the first hours of an incident response and why delayed action equals exponential damage. She also spotlights her work with BlackGirlsHack, a rapidly growing nonprofit that opens doors for underrepresented talent in cyber, and makes the case that building an inclusive security workforce isn't just the right thing to do, it's the smart thing to do. Resources: View Aleise McGowan on LinkedIn View Ann Johnson on LinkedIn Related Microsoft Podcasts: Microsoft Threat Intelligence Podcast The BlueHat Podcast Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of N2K media network.
You ever discover something about your teacher that made your teenage brain short-circuit? Yeah, me too. So this week, I dove headfirst into the teacher lore rabbit hole, because nothing says professional development like finding out your music teacher once chucked a desk at a kid. Oh, and remember the DARE program? Apparently, not everyone took it as seriously as I did. We're also unpacking some jaw-dropping listener voicemails, including one about fake TikToks that nearly cost a teacher her career and another involving a very tech-savvy middle schooler... and a VPN. Buckle up. I laughed, I cringed, I screamed internally. You will too. Takeaways: A mysterious student prank reveals the dark side of digital identities. Why that one teacher still gives off “could've been in a biker gang” vibes. The accidental video that made students think Andrea had a secret hip-hop past. The story that turned one pregnancy into an emergency delivery. Why middle schoolers and unfiltered internet access are a terrifying combination. — Join our Book Club: www.patreon.com/thosewhocanread Don't Be Shy Come Say Hi: www.podcasterandrea.com Watch on YouTube: @educatorandrea A Human Content Production Learn more about your ad choices. Visit megaphone.fm/adchoices
Don't forget to visit cupogo dot dev, where you can find links to all the things!
In this powerful bonus episode of Rootsland, we explore how artificial intelligence might become humanity's greatest ally—or its most dangerous adversary—depending on who raises it. After facing betrayal from the reggae community over his Peter Tosh investigation, our host Henry K discovers an unexpected partnership with Replit's CEO Amjad Masad, leading to new opportunities for Rootsland. Drawing parallels between Mikey Dread's 1980 anthem "Break Down the Walls" and today's digital barriers, this episode reveals how the same communities historically locked out of opportunity—the ghettos, favelas, and barrios—hold the key to AI's spiritual education. From three sailors facing a storm to the rejected stones becoming cornerstones, we journey through a narrative that connects Bob Marley's prophecies to Silicon Valley's promises.This isn't just about preserving reggae culture in the digital age—it's about ensuring AI learns from humanity's most resilient voices before it's too late. Because the question isn't whether AI will change everything, but whether we'll help shape what it becomes.Produced by Henry K in association with Voice Boxx Studios Kingston, JamaicaLegends of Reggae | Facebook
Read the full transcript here. In times of such extreme political polarization, where can we find common ground? Should we require disclosure of AI authorship? Should AI companies be required to provide fingerprinting tools that can identify when something has been generated by one of their models? Should movie theaters be required to report when movies actually start? Should members of Congress be prohibited from insider trading? Should gerrymandering be outlawed? Should there be age limits on political office? Should we provide free school meals nation-wide? What roadblocks stand in the way of people being able to vote on their phones? What's Spencer's formula for productivity? Which of the productivity factors do most people fail to take into account? What are some "doubly-rewarding" activities? Is altruism a harmful idea? What are people worst at predicting?Bradley Tusk is a venture capitalist, political strategist, philanthropist, and writer. He is the CEO and co-founder of Tusk Ventures, the world's first venture capital fund that invests solely in early stage startups in highly regulated industries, and the founder of political consulting firm Tusk Strategies. Bradley's family foundation is funding and leading the national campaign to bring mobile voting to U.S. elections and also has run anti-hunger campaigns in 24 different states, helping to feed over 13 million people. He is also an adjunct professor at Columbia Business School. Before Vote With Your Phone, Bradley authored The Fixer: My Adventures Saving Startups From Death by Politics and Obvious in Hindsight. He hosts a podcast called Firewall about the intersection of tech and politics, and recently opened an independent bookstore, P&T Knitwear, on Manhattan's Lower East Side. In his earlier career, Bradley served as campaign manager for Mike Bloomberg's 2009 mayoral race, as Deputy Governor of Illinois, overseeing the state's budget, operations, legislation, policy, and communications, as communications director for US Senator Chuck Schumer, and as Uber's first political advisor. Connect with Bradley on Substack and LinkedIn.Further readingEpisode 230: Who really controls US elections? (with Bradley Tusk) StaffSpencer Greenberg — Host / DirectorJosh Castle — ProducerRyan Kessler — Audio EngineerUri Bram — FactotumWeAmplify — TranscriptionistsIgor Scaldini — Marketing ConsultantMusicBroke for FreeJosh WoodwardLee RosevereQuiet Music for Tiny Robotswowamusiczapsplat.comAffiliatesClearer ThinkingGuidedTrackMind EasePositlyUpLift[Read more]
JOIN TSL WORKSHOPS: https://tslworkshops.circle.so What's it like to collaborate creatively with your spouse — and still want to have dinner together after? This week, we're joined by Joe Forte, screenwriter (Firewall) and longtime writing partner (and husband!) of Meg LeFauve. We talk candidly about the unique dynamics of working with your life partner — the communication hurdles, the unexpected benefits, and how to protect both the relationship and the work. Plus, Joe shares the power of writing retreats, how he thinks about mentorship, and what it really means to support another writer's voice while honoring your own. Learn more about your ad choices. Visit megaphone.fm/adchoices
A practitioner in China who is retired from the military has clarified the truth of the CCP and the persecution to old friends and colleagues, many of whom are high ranking officers. They have readily accepted the information and have quit the CCP. When one officer learned of the forced organ harvesting crimes committed by […]
Take a Network Break! We begin with a Red Alert for critical vulnerabilities Kubernetes Gardener. Up next, a threat actor has been squatting on unused CNAME records to distribute malware and spam, and IP Fabric rolls out a new firewall rule simulation capability to let administrators test the effect of firewall rules on traffic patterns.... Read more »
Take a Network Break! We begin with a Red Alert for critical vulnerabilities Kubernetes Gardener. Up next, a threat actor has been squatting on unused CNAME records to distribute malware and spam, and IP Fabric rolls out a new firewall rule simulation capability to let administrators test the effect of firewall rules on traffic patterns.... Read more »
In part two of Red Eye Radio with Gary McNamara and Eric Harley, Reuters reports on potential breaches in firewalls done remotely involving solar and wind farms. Also intellectual property rights, the so-called rights of activist judges, passionate audio from Representative Mark Green on the importance of law enforcement and the liberal disdain for law and order and much more. For more talk on the issues that matter to you, listen on radio stations across America Monday-Friday 12am-5am CT (1am-6am ET and 10pm-3am PT), download the RED EYE RADIO SHOW app, asking your smart speaker, or listening at RedEyeRadioShow.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Janna Levin is a theoretical physicist and cosmologist specializing in black holes, cosmology of extra dimensions, topology of the universe, and gravitational waves. Thank you for listening ❤ Check out our sponsors: https://lexfridman.com/sponsors/ep468-sc See below for timestamps, transcript, and to give feedback, submit questions, contact Lex, etc. Transcript: https://lexfridman.com/janna-levin-transcript CONTACT LEX: Feedback - give feedback to Lex: https://lexfridman.com/survey AMA - submit questions, videos or call-in: https://lexfridman.com/ama Hiring - join our team: https://lexfridman.com/hiring Other - other ways to get in touch: https://lexfridman.com/contact EPISODE LINKS: Janna's X: https://x.com/JannaLevin Janna's Website: https://jannalevin.com Janna's Instagram: https://instagram.com/jannalevin Janna's Substack: https://substack.com/@jannalevin Black Hole Survival Guide (book): https://amzn.to/3YkJzT5 Black Hole Blues (book): https://amzn.to/42Nw7IE How the Universe Got Its Spots (book): https://amzn.to/4m5De8k A Madman Dreams of Turing Machines (book): https://amzn.to/3GGakvd SPONSORS: To support this podcast, check out our sponsors & get discounts: Brain.fm: Music for focus. Go to https://brain.fm/lex BetterHelp: Online therapy and counseling. Go to https://betterhelp.com/lex NetSuite: Business management software. Go to http://netsuite.com/lex Shopify: Sell stuff online. Go to https://shopify.com/lex AG1: All-in-one daily nutrition drink. Go to https://drinkag1.com/lex OUTLINE: (00:00) - Introduction (00:51) - Sponsors, Comments, and Reflections (09:21) - Black holes (16:55) - Formation of black holes (27:45) - Oppenheimer and the Atomic Bomb (34:08) - Inside the black hole (47:10) - Supermassive black holes (50:39) - Physics of spacetime (53:42) - General relativity (59:13) - Gravity (1:15:47) - Information paradox (1:24:17) - Fuzzballs & soft hair (1:27:28) - ER = EPR (1:34:07) - Firewall (1:42:59) - Extra dimensions (1:45:24) - Aliens (2:01:00) - Wormholes (2:11:57) - Dark matter and dark energy (2:22:00) - Gravitational waves (2:34:08) - Alan Turing and Kurt Godel (2:46:23) - Grigori Perelman, Andrew Wiles, and Terence Tao (2:52:58) - Art and science (3:02:37) - The biggest mystery PODCAST LINKS: - Podcast Website: https://lexfridman.com/podcast - Apple Podcasts: https://apple.co/2lwqZIr - Spotify: https://spoti.fi/2nEwCF8 - RSS: https://lexfridman.com/feed/podcast/ - Podcast Playlist: https://www.youtube.com/playlist?list=PLrAXtmErZgOdP_8GztsuKi9nrraNbKKp4 - Clips Channel: https://www.youtube.com/lexclips