POPULARITY
Categories
Cybersecurity is an essential aspect of our increasingly digital world, focusing on the protection of information systems and networks from unauthorized access, data breaches, and cyber threats. With the rapid advancement of technology, the need for robust cybersecurity measures has become paramount. It involves a combination of proactive measures like implementing firewalls, encryption techniques, and access controls, as well as reactive measures such as incident response and threat intelligence analysis. Cybersecurity professionals work diligently to identify vulnerabilities, develop safeguards, and stay one step ahead of malicious actors, helping to ensure the integrity, confidentiality, and availability of digital assets. As our reliance on technology grows, cybersecurity plays a crucial role in preserving the trust and security of individuals, organizations, and society as a whole.Become a supporter of this podcast: https://www.spreaker.com/podcast/the-x-zone-radio-tv-show--1078348/support.Please note that all XZBN radio and/or television shows are Copyright © REL-MAR McConnell Meda Company, Niagara, Ontario, Canada – www.rel-mar.com. For more Episodes of this show and all shows produced, broadcasted and syndicated from REL-MAR McConell Media Company and The 'X' Zone Broadcast Network and the 'X' Zone TV Channell, visit www.xzbn.net. For programming, distribution, and syndication inquiries, email programming@xzbn.net.We are proud to announce the we have launched TWATNews.com, launched in August 2025.TWATNews.com is an independent online news platform dedicated to uncovering the truth about Donald Trump and his ongoing influence in politics, business, and society. Unlike mainstream outlets that often sanitize, soften, or ignore stories that challenge Trump and his allies, TWATNews digs deeper to deliver hard-hitting articles, investigative features, and sharp commentary that mainstream media won't touch.These are stories and articles that you will not read anywhere else.Our mission is simple: to expose corruption, lies, and authoritarian tendencies while giving voice to the perspectives and evidence that are often marginalized or buried by corporate-controlled media
In this JuvoHub Podcast episode, Jonathan Saar brings cybersecurity down to earth for property management professionals. Instead of diving into tech jargon, he compares digital safety to something we all understand,fire prevention. Just like fire extinguishers and alarms, cybersecurity tools only work if we know how to use and maintain them. Jonathan explores how awareness, company policies, and phishing tests can help keep resident, employee, and prospect information safe from growing digital threats, including those powered by AI. TL;DR: You don't need to be a tech expert to protect your property's data—just stay aware, stay informed, and follow your company's safety practices. Key Takeaways 00:00 – Hook: Why cybersecurity matters for everyone—not just IT. 00:36 – The Analogy: Fire extinguishers, alarms, and data protection. 01:20 – Understanding vs. Implementation: Awareness is your first defense. 02:00 – AI and New Threats: How technology creates new cybersecurity risks. 02:27 – Personal Awareness: How your daily habits protect resident data. 03:05 – Phishing Tests: Why your company might be “testing” you for a reason. 03:45 – Final Thought: Caring for residents means caring for their digital safety. Awareness Is the Best Firewall You don't need to code to care about cybersecurity—just like you don't need to build a fire extinguisher to know it saves lives. In property management, protecting data starts with awareness, consistent training, and everyday vigilance. Stay informed, stay safe, and lead with care for your residents and team. Class Dismissed!
So what happened last night? In this co-production with Firewall friend Jamie Rubin and his After Hours podcast, Bradley, Jamie, and Chris Coffey (Tusk Strategies CEO) analyze the historic win of NYC's next mayor, Zohran Mamdani. What does it mean for Gov. Hochul's re-election next year? Will NYPD commissioner Jessica Tisch stay at the helm — despite major policy differences with Mamdani? And could the secret to affordability be the victorious ballot proposals to build more housing across the five boroughs?Discussed on today's episode:The Mamdani Mayoralty: A Six Part Mini-Magazine On What Comes Next by Bradley Tusk (11/05/25)Be sure to subscribe to After Hours, a Vital City podcast, wherever you get your podcasts.This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
LISTEN and SUBSCRIBE on:Apple Podcasts: https://podcasts.apple.com/us/podcast/watchdog-on-wall-street-with-chris-markowski/id570687608 Spotify: https://open.spotify.com/show/2PtgPvJvqc2gkpGIkNMR5i WATCH and SUBSCRIBE on:https://www.youtube.com/@WatchdogOnWallstreet/featured Donald Trump huddles with Senate Republicans, demanding they ditch the filibuster and end the shutdown so he can push a sweeping agenda he claims will secure permanent GOP dominance. Critics warn the move could backfire, pointing to history and party-switching senators as reminders that power swings both ways. A tense debate over strategy, legacy, and the future of congressional guardrails unfolds on Watchdog on Wall Street.
China-Linked hackers target Cisco firewalls. MIT Sloan withdraws controversial “AI-Driven Ransomware” paper. A new study questions the value of cybersecurity training. Hackers exploit OpenAI's API as a malware command channel. Apple patches over 100 Security flaws across devices. A Florida-based operator of mental health and addiction treatment centers exposes sensitive patient information. OPM plans a “mass deferment” for Cybercorps scholars affected by the government shutdown. Lawmakers urge the FTC to investigate Flock Safety's cybersecurity gaps. Cybercriminals team with organized crime for high-tech cargo thefts. Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies discussing ICE's controversial facial scanning initiative. A priceless theft meets a worthless password. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest We are joined by Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies discussing ICE's controversial facial scanning initiative. You can read more about Ben's topic from 404 Media: You Can't Refuse To Be Scanned by ICE's Facial Recognition App, DHS Document Says. Selected Reading China-Linked Hackers Target Cisco Firewalls in Global Campaign (Hackread) MIT Sloan shelves paper about AI-driven ransomware (The Register) CyberSlop — meet the new threat actor, MIT and Safe Security (DoublePulsar) Study concludes cybersecurity training doesn't work (KPBS Public Media) Microsoft: OpenAI API moonlights as malware HQ (The Register) Apple Patches 19 WebKit Vulnerabilities (SecurityWeek) Data Theft Hits Behavioral Health Network in 3 States (Bank Infosecurity) OPM plans to give CyberCorps members more time to find jobs after shutdown ends (CyberScoop) Lawmakers ask FTC to probe Flock Safety's cybersecurity practices (The Record) Cybercriminals, OCGs team up on lucrative cargo thefts (The Register) Louvre Robbery: Security Flaws: The (Obviously) Password Was "Louvre" (L'Unione Sarda) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Australia warns of BADCANDY attacks exploiting Cisco IOS XE Chinese hackers exploiting Cisco ASA firewalls used by governments worldwide OpenAI's Aardvark GPT-5 agent finds and fixes code flaws automatically Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero-trust endpoint protection platform, ThreatLocker fills the gaps traditional solutions leave behind, giving your business stronger security and control. Don't just react to threats — stop them with ThreatLocker. Find the stories behind the headlines at CISOseries.com.
In this bonus episode of Firewall, Rev. Al Sharpton, a major figure in Jonathan Mahler's book The Gods of New York: Egotists, Idealists, Opportunists, and the Birth of the Modern City: 1986-1990, joined the author and Tusk Strategies CEO Chris Coffey earlier in October for a spirited conversation about New York in the 1980s and how it set the stage for the politics of today.This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
Why aren't we happy? Chris Westbrook October 26nd, 2025
When cybercriminals lock up a children's hospital, denying treatment to kids with cancer, you realize just how dark the world of ransomware has become. Healthcare isn't just another target, it's the lifeline of our society, and it's under siege. In this episode of the Thales Security Sessions, Dr. Adrian Mayers, CISO of Premera Blue Cross, joins me to expose the reality of this growing “feeding frenzy” of cyberattacks on healthcare, the rise of AI-driven threats, and what it truly takes to defend the systems, and the people, who keep us alive. It is a lesson on the human element of defense that can be applied to any industry.
Wenn von IT-Sicherheit die Rede ist, denken viele zuerst an Cyberangriffe, Firewalls oder Datenverschlüsselung. Doch zahlreiche Risiken für den zuverlässigen IT-Betrieb kommen oft aus der physischen Welt: Feuer, Stromausfälle, unbefugter Zutritt oder schlicht menschliches Fehlverhalten. In dieser Folge des eco Podcasts “Das Ohr am Netz” widmen sich Sidonie und Sven der Frage, wie moderne Rechenzentren sich gegen solche realen Gefahren absichern. Ihre Gäste geben einen tiefen Einblick in ihre Praxis: Gemeinsam sprechen sie darüber, welche physischen Risiken in Rechenzentren heute im Fokus stehen und welche Sicherheitsaspekte in der IT-Welt häufig unterschätzt werden, gerade im Vergleich zur Cyber- oder Prozesssicherheit. Joachim Astel (noris network) erklärt, wie ein durchdachtes Sicherheitsmodell aussieht und warum es mehr braucht als nur abgeschlossene Türen. Er berichtet, welche Rolle regelmäßige Auditierungen, Zertifizierungen und Red-Team-Übungen spielen und wie sich physische Resilienz im Alltag überprüfen lässt. Auch Standortfaktoren wie Energieversorgung, Kühlung und Georedundanz sind zentrale Bausteine eines robusten Sicherheitskonzepts. Brandschutzexpertin Anne Omar (Fogtec) zeigt, warum Feuer in modernen Rechenzentren noch immer ein ernstzunehmendes Risiko ist und welche technologischen Entwicklungen dabei helfen, Daten und Infrastruktur effektiv zu schützen. Sie erklärt, wie sich Wassernebel- und Hochdrucklöschsysteme von klassischen Gaslöschanlagen unterscheiden und welche Vorteile sie gerade in sensiblen IT-Umgebungen bieten. Außerdem geht es darum, wie sich bestehende Anlagen im laufenden Betrieb nachrüsten lassen, welche Herausforderungen Lithium-Ionen-Batterien mit sich bringen und wie sich Sicherheit und Nachhaltigkeit im Brandschutz vereinen lassen. Weitere Informationen: Mehr zum DSC-Beirat eco Studie “Die Internetwirtschaft in Deutschland 2025-2030” Artikel zum großen KI-Innovationspark IPAI Erdbebensichere Rechenzentren Das unterirdische Rechenzentrum in Stockholm --------- Moderation: Sidonie Krug, Sven Oswald Schnitt: David Grassinger Redaktion: Christin Müller, Irmeline Uhlmann, Laura Rodenbeck, Anja Wittenburg Produktion: eco – Verband der Internetwirtschaft e.V.
professorjrod@gmail.comThe mic feels heavier at 100—not from gear, but from history. We started with a doctoral dare, a $40 class, and a shaky first recording. We built a library that helped learners pass A+, Network+, and Security+ while connecting the dots between hardware, operating systems, storage, networking, and the human choices behind every device and policy. Along the way, our mission sharpened: pair skill with story, prioritize curiosity over checkboxes, and keep ethics at the center of cybersecurity and cloud.We revisit the moments that defined the journey: early fundamentals that formed a base, a pivot into security architecture and zero trust, and the realization that protocols carry purpose. DHCP becomes resource allocation. Firewalls express trust. Wireshark reveals perspective. The show grew with the audience—from notes to narratives to lived stories sent from classrooms, help desks, and late-night study sessions. A single email about subnets “finally clicking” mattered more than download spikes, shaping how we teach: simpler words, stronger analogies, and transparent context.Five pillars now anchor everything we make: accessibility for every learner and veteran, context that grounds acronyms in origin, curiosity that asks better questions, community that turns listeners into collaborators, and reflection that slows tech long enough for wisdom to land. We also share the personal side—health resets, renewed consistency, and the choice to keep going when the stats dip—because sustainable teaching requires a sustainable teacher.Looking ahead, we're doubling down on practical Q&A, live sessions, and clear paths through Network+, Security+, and cloud that never lose sight of ethics and inclusion. If you found value in the archive—from storage myths to authentication breakthroughs—help steer the next hundred. Subscribe, share with a friend who's studying, and send your biggest question for episode 101. Your curiosity sets the agenda.Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifySupport the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Hallo ihr Mannis und Mannienchen,Der Podcast eures Vertrauens, eurer Herzen, eurer Leidenschaft...usw. ist wieder mit neuer Folge am Start.Unter anderem mit diesen Themen :Blitzer gehören verboten?Pilze sammeln mit KI gute Idee?Firewall Firma hat ne schlechte Firewall?neue Runde Fakt oder Fake?Das und vieles mehr, exklusiv nur bei uns! Dem wohl wichtigsten Podcast aller Zeiten.Link zum Shop von "Das Bier"https://www.das-bier.com/maennerrundeKontakt: diemaennerrunde@web.deUnterstützt uns bei Patreon.comhttps://www.patreon.com/diemaennerrundeTwitter: @DieMaennerundeInstagram:https://www.instagram.com/die_maennerrunde_podcastFacebook:https://www.facebook.com/Maennerrunde.PodcastYouTube Kanal:https://www.youtube.com/channel/UCk6hDwJfdAyJa71gFS_UsEAWir verwenden gemafreie Musik von bluevalley.de the music companyhttps://www.bluevalley.de/index.php
Infosec Decoded Season 5 #84: Sophos' Secure FirewallWith sambowne@infosec.exchangeLinks: https://samsclass.info/news/news_102425.htmlRecorded Fri, Oct 24, 2025
☁️ Amazon Web Services (AWS)-Ausfall & die Cloud-Nabelschnur EuropasAm Ende ist es wohl immer DNS. Warum wir so viele Ragebait-Posts gesehen haben, wie Souveränität reflexartig diskutiert wird und was das über unsere Abhängigkeiten aussagt.
It was right in the middle of a Transcranial Magnetic Stimulation session that Bradley had a brainstorm — an idea for a TV drama built around a conniving New York politico who hatches a plan to manipulate prediction markets. He titled it THE PREDICTORS, and in this Firewall episode, the audience (you) gets to play the part of a streaming executive as Bradley pitches us the show.RSVP to join Bradley this Thursday evening 10/23 at P&T Knitwear for a live event with Rev. Al Sharpton in conversation with NYT Magazine Staff Writer Jonathan Mahler, author of the new book, THE GODS OF NEW YORK: https://bit.ly/GodsOfNewYorkThis episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
曾被譽為國際金融中心,香港的繁榮並非單純仰賴勤奮的人民或單一的制度要素,而是歷史機遇、資本累積和制度設計在特定時空特殊性下的交集產物。香港成功的「時空特殊性」與「自由港」基因戰後香港急速發展,得益於兩個關鍵外在環境因素:資本與人力輸入: 1949 年中共建政後,大量來自上海等地的企業家攜帶資本、技術和商業網絡湧入香港;隨後數十年,中國大陸的動亂提供了源源不斷的廉價勞動力。這兩大生產要素的集中,為香港的工業化和貿易奠定了基礎。值得注意的是,湧入的上海資本不僅提供了資金,更帶來了當時中國最先進的營商知識和國際市場的脈絡,尤其在紡織和製造業方面。這批精英與本地既有的活躍商業社會結合,迅速提升了香港在國際貿易體系中的層級。廉價勞動力的持續供應,則使香港在亞洲其他國家尚未完成戰後復甦時,擁有巨大的生產成本優勢。區域競爭真空: 在 1950 至 1960 年代,亞洲其他主要競爭對手(如韓國、台灣和新加坡)尚處於戰後重建、內戰威脅或尋求獨立的階段,未能形成有效競爭。香港在冷戰格局下,享有近乎獨特的發展機遇。香港的制度核心是自由港(Free Port)精神,不僅是沒有關稅,更重要是有公平的司法制度。這種制度承諾,任何國家或政治勢力的資本,都能在香港進行可預期的商業活動。;公平待遇甚至延伸至宗主國的敵對勢力。例如在韓戰時期,香港商人依然能夠在禁運背景下與中國大陸進行貿易。儘管此舉在政治上具有爭議,但它體現了殖民地政府對商業利益與法治承諾的優先級,使香港成為一個能有效規避地緣政治風險的特殊交易節點。法治作為商業契約的最終仲裁者法治是維持其商業信任和國際地位的基石。法治的定義,並非僅指政府依法治國。通俗的理解,是個人與政府發生進行訴訟時,人民有合理勝訴的機會。法庭作為獨立的裁判者,能夠基於可推論的法理原則作出判決,從而制衡政府的行政權力不至為所欲為。英國殖民地時代,倫敦對香港是鞭長莫及的。英國政府的有效管治,必須仰賴香港本地社會精英。包括後來的商界與「地產黨」的合作與平衡。港英政府必須仰賴這些精英階層進行「協商式管治」,這間接使得權力無法集中於單一行政主體。這種多方勢力相互制衡的結構,導致了司法獨立作為一個相對中立的裁判機制得以強化。它的存在正正是建立在各方不可能有絕對的政治信任,反而令建立在制度的監督力量,成為所有人的最大公約數;透過一套可預見的規則體系,以制衡任何一方(包括政府自身)的越權以及對契約的反悔,也成為了商業社會的必要條件。然而,以上的這一套制衡機制,逐漸出現顯著崩壞。司法覆核等案件中市民勝訴率的驟降,正是制度衰退的量化體現。當市民與政府打官司時不再有合理的勝算機會,法院作為最終仲裁者的功能自然隨之瓦解。「一國兩制」的北京視角:體制防火牆與剩餘價值從北京的角度來看,「一國兩制」從來都不是為了保護香港人的自由生活方式,而是作為一個體制防火牆(Firewall),保護中國大陸的「內循環」免受自由市場與政治開放帶來的衝擊。香港曾是北京吸納國際資金、技術和賺取創匯唯一的門戶。而「創匯」一詞有雙重意義:一是為中國提供稀缺的外匯(如美元),用以在全球市場購買資源與技術;二是作為一個國際貿易窗口,將其產品輸出。香港作為活口,允許中國在保持內部政治高度控制的同時,能夠享受到國際金融和自由市場秩序的好處。然而,香港的存在由 2012 年後發生質變。一旦北京認為其經濟體量已足夠強大,或香港作為創匯平台的利用價值減弱,同時香港的自由氛圍開始對其內部構成政治風險(如太子黨資產在港曝光、異見書籍出版、民間政治動員),香港便從「經濟資產」轉變為「政治負債」。在這種權力邏輯下,當政治風險高於經濟效益時,全面控制便成為首要任務,體現了「可一不可再」的環境特殊性已然終結。這種控制的最終邏輯,是為固存政權的統治基礎。當經濟增長放緩,利益分配內捲(Involution)加劇,政權會傾向於打出民族主義(Nationalism)牌,以轉移內部矛盾。為了維護民族主義「洗刷百年屈辱」的敘事,必須徹底否定香港的殖民地過去(Colonial Past)以及由該歷史孕育出的制度優越性。這一否定過程導致了本地親北京的地產黨等社會精英被視為「用完即棄」的工具,因為維護其利益的必要性,已低於維護政權統治合法性的迫切性。只有在沒有絕對權力(Absence of Absolute Power)的社會狀態,人民才享有真正的自由(Liberty);尤其當行政、立法和司法三者之間存在有效制衡,且每一方都可能被司法機構挑戰時,公民權利和商業契約才得以保障。香港制度的衰落,是「絕對權力」(Absolute Power)進入一個本應由制衡力量維護的體制後,所導致的必然結果。 This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit leesimon.substack.com/subscribe
For years, China’s government has used what’s known as the “Great Firewall” to censor the internet inside its country and block access to select foreign websites. Now, a document leak shows that a little-known Chinese company is exporting these tools to other countries, including Myanmar, Pakistan, Kazakhstan and Ethiopia. Ali Rogin speaks with WIRED senior writer Zeyi Yang to learn more. PBS News is supported by - https://www.pbs.org/newshour/about/funders. Hosted on Acast. See acast.com/privacy
For years, China’s government has used what’s known as the “Great Firewall” to censor the internet inside its country and block access to select foreign websites. Now, a document leak shows that a little-known Chinese company is exporting these tools to other countries, including Myanmar, Pakistan, Kazakhstan and Ethiopia. Ali Rogin speaks with WIRED senior writer Zeyi Yang to learn more. PBS News is supported by - https://www.pbs.org/newshour/about/funders. Hosted on Acast. See acast.com/privacy
In this episode of Defending the Edge, we cover breaches to breakthroughs, unpacking the Great Firewall of China data leak, the looming consequences of the CISA Act's lapse, the rise of the “Shai-Hulud” worm, bold cybersecurity predictions, and the arrival of Sora 2, the AI platform reshaping the digital frontier.
In this episode of The Other Side of the Firewall podcast, Ryan Williams Sr. and Shannon Tynes host a discussion with, Cyber Coffee Hour's, Dr. Joseph Burt-Miller Jr. and Alfredo Nash about the current state of cybersecurity, focusing on the rise of Common Vulnerabilities and Exposures (CVEs), the challenges faced by cyber insurers, and the implications of AI vulnerabilities, particularly with Google's Gemini. The conversation emphasizes the importance of responsible AI usage, data sharing concerns, and the need for proactive measures in cybersecurity. Article: Despite More CVEs, Cyber Insurers Aren't Altering Policies https://www.darkreading.com/cyber-risk/more-cves-cyber-insurers-arent-altering-policies?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExajN5amZVMWpibElPY2V4eQEec7YqnFZKChC13sYroUwfPniTctt7fmHUuFDWCO8NT5qxZimY92rqX6FBcsw_aem_GG7xSAOwsjq1f7PKHtPJ2w 'Trifecta' of Google Gemini Flaws Turn AI Into Attack Vehicle https://www.darkreading.com/vulnerabilities-threats/trifecta-google-gemini-flaws-ai-attack-vehicle Buy the guide: https://www.theothersideofthefirewall.com/ Please LISTEN
You've likely heard of Pareto's Principle or the 80/20 rule. Is there a way to achieve most of the benefits of crypto-agility with minimal effort? Palo Alto Networks has undoubtedly made its mark with firewalls and security detection and response offerings. We learn how they can also provide a rapid head start to PQC migration, covering everything from cryptographic inventory to creating wrappers for legacy app communications that need to remain secure against quantum computing threats. Even the latest version of their PAN-OS is PQC enabled. And you won't believe what they're seeing in network traffic: PQC used to hide hacking attacks? Join host Konstantinos Karagiannis for a wide-ranging chat with Rich Campagna from Palo Alto Networks where they cover practical ways to get your company ready for tomorrow. For more information on Palo Alto Networks, visit https://www.paloaltonetworks.com/. Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
OPINION: Beyond firewalls: Measuring the morality of nations | Oct. 16, 2025Subscribe to The Manila Times Channel - https://tmt.ph/YTSubscribe Visit our website at https://www.manilatimes.net Follow us: Facebook - https://tmt.ph/facebook Instagram - https://tmt.ph/instagram Twitter - https://tmt.ph/twitter DailyMotion - https://tmt.ph/dailymotion Subscribe to our Digital Edition - https://tmt.ph/digital Check out our Podcasts: Spotify - https://tmt.ph/spotify Apple Podcasts - https://tmt.ph/applepodcasts Amazon Music - https://tmt.ph/amazonmusic Deezer: https://tmt.ph/deezer Stitcher: https://tmt.ph/stitcherTune In: https://tmt.ph/tunein#TheManilaTimes#KeepUpWithTheTimes Hosted on Acast. See acast.com/privacy for more information.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Building Better Defenses: RedTail Observations Defending against attacks like RedTail is more then blocking IoCs, but instead one must focus on the techniques and tactics attackers use. https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Sonicwall: It wasn t the user s fault Sonicwall admits to a breach resulting in the loss of user configurations stored in its cloud service https://www.sonicwall.com/support/knowledge-base/mysonicwall-cloud-backup-file-incident/250915160910330 Crowdstrike has Issues Crowdstrike fixes two vulnerabilities in the Windows version of its Falcon sensor. https://www.crowdstrike.com/en-us/security-advisories/issues-affecting-crowdstrike-falcon-sensor-for-windows/ Interrogators: Attack Surface Mapping in an Agentic World A SANS.edu master s degree student research paper by Michael Samson https://isc.sans.edu/researchpapers/pdfs/michael_samson.pdf keywords: ai; agentic; attack surface; crowdstrike; sonicwall; ivanti; zero day; initiative; redline
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams and Shannon Tynes discuss the latest cybersecurity news, including the implications of the government shutdown on cybersecurity operations, emerging threats like Comet Jacking, and China's severe penalties for cybercriminals. They also share personal updates and reflections on their week, highlighting the importance of cybersecurity awareness and the impact of current events on the industry. Article: What Does the Government Shutdown Mean for Cybersecurity? https://www.techrepublic.com/article/news-government-shutdown-2025/ CometJacking: One Click Can Turn Perplexity's Comet AI Browser Into a Data Thief https://thehackernews.com/2025/10/cometjacking-one-click-can-turn.html?m=1 Scam kingpins who ran billion-dollar criminal empire sentenced to death in China https://www.cnn.com/2025/09/30/china/kokang-scam-center-china-myanmar-ming-family-intl-hnk Buy the guide: www.theothersideofthefirewall.com Please LISTEN
Ready to shield your digital marketing efforts from the pervasive threat of ad fraud? Join us as we sit down with Rich Kahn, the visionary co-founder and CEO of Anura. With over two decades of expertise, Rich takes us through his journey of identifying a critical gap in the market and developing a robust ad fraud solution. From bots to malware, discover how Anura innovatively tackles fraudulent activities, significantly safeguarding advertisers' investments. Rich unpacks the sophisticated nature of ad fraud, especially with the rise of AI, and highlights the staggering financial implications that call for urgent attention. This episode promises to equip you with the knowledge to better understand and combat ad fraud, enhancing your ROI in the competitive landscape of digital marketing. Moreover, we navigate the complexities of pricing SaaS solutions, shedding light on the balance between development costs and competitive pricing. Rich shares invaluable insights into the strategic pricing journey, from establishing credibility with initial low prices to the importance of ROI in setting rates. As we explore the ever-evolving fraud detection landscape, Rich emphasizes the necessity of standardized approaches and the potential industry growth. With only a fraction of websites employing fraud detection solutions, we delve into the future risks that digital marketing expenditures face. Tune in to learn more about Anura's groundbreaking work and its pivotal role in the ongoing battle against ad fraud. Don't miss this opportunity to stay ahead of the curve in effectively managing your digital marketing investments. Timestamps 00:00:01 - Introduction and Welcome to Business Legacy Podcast 00:00:45 - Introduction to Rich Kahn and Anura's Origins 00:02:15 - Rich Kahn's Early Days and the Genesis of Anura 00:03:30 - Understanding Ad Fraud: Bots, Malware, and Human Actors 00:05:10 - The Role of AI in Fraud Detection and Challenges Faced 00:06:45 - Financial Impacts of Ad Fraud on Digital Marketing 00:09:03 - Introduction to Pricing Strategies for SaaS Solutions 00:10:00 - Balancing Development Costs and Competitive Pricing 00:11:30 - Importance of ROI in SaaS Pricing Models 00:12:45 - Grassroots Approach to Building an Initial Client Base 00:14:15 - Enhancing Fraud Detection Accuracy and Industry Challenges 00:15:30 - Importance of Standardization in Fraud Detection 00:16:45 - Anura's Commitment to Accuracy and Reliability 00:18:00 - Growth Potential in Fraud Detection and Industry Insights 00:19:30 - Parallels Between Digital Marketing Expenditure and the Dot-Com Bubble 00:20:45 - Conclusion and Final Thoughts from Rich Kahn 00:21:30 - Where to Find More Information About Anura Episode Resources: Connect with Rich here and find more out about fraud with an ebook and guides: https://www.anura.io/ Legacy Podcast: For more information about the Legacy Podcast and its co-hosts, visit businesslegacypodcast.com. Leave a Review: If you enjoyed the episode, leave a review and rating on your preferred podcast platform. For more information: Visit businesslegacypodcast.com to access the shownotes and additional resources on the episode.
Florian Jörgens, Chief Information Security Officer (CISO), spricht mit Christoph Burseg über die Sicherheit vernetzter Geräte wie den Thermomix, die Herausforderungen durch KI und die Wichtigkeit der "Human Firewall". Jörgens teilt seine unkonventionelle Strategie zur Erhöhung der Produktnähe und erklärt, wie Vorwerk in einer internationalen und schnelllebigen IT-Welt die Balance zwischen Sicherheit, Mitarbeiterakzeptanz und operativem Geschäft hält. Er beleuchtet das verschwimmende Feld zwischen physischer und digitaler Sicherheit und gibt Einblicke, wie man eine Sicherheitskultur im gesamten Unternehmen – bis hin zur Familie der Mitarbeitenden – aufbaut. In dieser Episode erfährst du: ● Warum Florian Jörgens als CISO eine Ausbildung in der Thermomix-Vertriebsmannschaft absolviert hat, um näher am Business zu sein. ● Wie Vorwerk die Produktsicherheit seines IoT-Geräts (Thermomix) gewährleistet, auch bei hohen Drehzahlen und Internetanschluss. ● Was unter Shadow AI zu verstehen ist und welche Risiken es birgt, wenn Mitarbeiter unwissentlich schützenswerte Informationen in Large Language Models eingeben. ● Wie Mitarbeiter-Awareness durch innovative Formate wie Live-Hacking, Tabletop-Simulationen und Schulungen zum Thema "Informationssicherheit für Familie und Kinder" geschaffen wird. ● Welche Rolle psychologische Faktoren wie Schuldgefühle und Angst bei Phishing-Angriffen spielen. ● Warum Multifaktor-Authentifizierung und regelmäßige Updates 80 Prozent der Angriffe im Keim ersticken können. ● Wie CISOs in einer Trusted Community voneinander lernen und so die Sicherheit in ihren Unternehmen verbessern. Christoph auf LinkedIn: https://www.linkedin.com/in/christophburseg Kontaktiere uns über Instagram: https://www.instagram.com/vodafonebusinessde/
Major federal cybersecurity programs expire amidst the government shutdown. Global leaders and experts convene in Riyadh for the Global Cybersecurity Forum. NIST tackles removable media. ICE buys vast troves of smartphone location data. Researchers claim a newly patched VMware vulnerability has been a zero-day for nearly a year. ClickFix-style attacks surge and spread across platforms. Battering RAM defeats memory encryption and boot-time defenses. A new phishing toolkit converts ordinary PDFs into interactive lures. A trio of breaches exposes data of 3.7 million across North America. Tim Starks from CyberScoop unpacks a report from Senate Democrats on DOGE. The Lone Star State proves even the internet isn't bulletproof. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Tim Starks, Senior Reporter from CyberScoop, is back and joins Dave to discuss a report from Senate Democrats on the Department of Government Efficiency (DOGE). You can read Tim's article on the subject here. Selected Reading Cyber information-sharing law and state grants set to go dark as Congress stalls over funding (The Record) Live - Global Cybersecurity Forum in Riyadh tackles how technology can shape future of cyberspace (Euronews) NIST Publishes Guide for Protecting ICS Against USB-Borne Threats (SecurityWeek) ICE to Buy Tool that Tracks Locations of Hundreds of Millions of Phones Every Day (404 Media) Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability (SecurityWeek) Don't Sweat the ClickFix Techniques: Variants & Detection Evolution (Huntress) Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device (SecurityWeek) New MatrixPDF toolkit turns PDFs into phishing and malware lures (Bleeping Computer) 3.7M breach notification letters set to flood North America's mailboxes (The Register) A Bullet Crashed the Internet in Texas (404 Media) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Critical Vulnerabilities and AI Voice Cloning Risks in Cybersecurity In this episode of Cybersecurity Today, host Jim Love discusses key cybersecurity threats, including critical vulnerabilities in Sudo and Cisco firewalls, and a remote command flaw in Western Digital MyCloud devices. The show highlights efforts by national security agencies in the US, Canada, France, Netherlands, and the UK to address these risks, urging immediate patching and system updates. Additionally, the episode covers the emerging threat of real-time AI voice cloning, stressing the need for stricter security measures to prevent social engineering attacks. Listeners are encouraged to implement robust verification processes to secure their organizations and personal communications. 00:00 Critical Sudo Flaw Warning 00:21 Cisco Firewalls Vulnerabilities 02:34 Western Digital MyCloud Devices at Risk 03:48 AI Voice Cloning Threat 05:16 Conclusion and Contact Information
There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federal... Read more »
There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federal... Read more »
There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federal... Read more »
Three Buddy Problem - Episode 65: We zero in on one of the biggest security stories of the year: the discovery of a persistent multi-stage bootkit implanting malware on Cisco ASA firewalls. Details on a new campaign, tied to the same threat actors behind ArcaneDoor, exploiting zero-days in Cisco's 5500-X series appliances, devices that sit at the heart of government and enterprise networks worldwide. Plus, Cisco's controversial handling of these disclosures, CISA's emergency deadlines for patching, the absence of IOCs and samples, and China's long-term positioning. Plus, thoughts on the Secret Service SIM farm discovery in New York and evidence of Russians APTs Turla and Gamaredon collaborating to hit Ukraine targets. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).
In this episode of Ask a CISSP, the Thursday episode of the Other Side of the Firewall podcast, Ryan Williams Sr. interviews Tim Tipton Jr., a cybersecurity architect, author, and Grammy-winning music producer. They discuss Tim's journey into cybersecurity, his military background, and the importance of making the field accessible to all. Tim shares insights on mentorship, community outreach, and his creative pursuits in writing and music. The conversation highlights the challenges and opportunities in cybersecurity, as well as Tim's aspirations to empower the next generation through education and support. Buy the guide: www.theothersideofthefirewall.com Please LISTEN
How do we get from today's AI copilots to true human-level intelligence? In this episode of Eye on AI, Craig Smith sits down with Eiso Kant, Co-Founder of Poolside, to explore why reinforcement learning + software development might be the fastest path to human-level AI. Eiso shares Poolside's mission to build AI that doesn't just autocomplete code — but learns like a real developer. You'll hear how Poolside uses reinforcement learning from code execution (RLCF), why software development is the perfect training ground for intelligence, and how agentic AI systems are about to transform the way we build and ship software. If you want to understand the future of AI, software engineering, and AGI, this conversation is packed with insights you won't want to miss. Stay Updated: Craig Smith on X:https://x.com/craigss Eye on A.I. on X: https://x.com/EyeOn_AI (00:00) The Missing Ingredient for Human-Level AI(01:02) Eiso Kant's Journey(05:30) Using Software Development to Reach AGI(07:48) Why Coding Is the Perfect Training Ground for Intelligence(10:11) Reinforcement Learning from Code Execution (RLCF) Explained(13:14) How Poolside Builds and Trains Its Foundation Models(17:35) The Rise of Agentic AI(21:08) Making Software Creation Accessible to Everyone(26:03) Overcoming Model Limitations(32:08) Training Models to Think(37:24) Building the Future of AI Agents(42:11) Poolside's Full-Stack Approach to AI Deployment(46:28) Enterprise Partnerships, Security & Customization Behind the Firewall(50:48) Giving Enterprises Transparency to Drive Adoption
Cutting Through the Matrix with Alan Watt Podcast (.xml Format)
--{ "Put a Firewall Around Your Mind"}-- Adam Curtis documentary, Can't Get You Out of My Head - What we're told and shown from talking heads about Charlie Kirk, Israel - Constant Conflict - CFR/RIIA and New American Century's Agenda - Psychological Operations, You are the Target - Microwave and Frequency Weapons, Psychotronic Technology - The Mind has No Firewall - Information Warfare, disabling and destruction of "Data Processors" (including human) - All Mass Media/Internet used for PsyOps - Information Noise - Weapons to induce emotional changes, nausea, epilepsy, cardiac arrest - Remote Brain-Wave Reading and "Correction" - Use of ultrasound and acoustic signals - Subliminal messaging in audio and video - HAARP/ELF - Brave New World - Predictive Programming.
Jan Marsalek – einer der meistgesuchten Männer Europas. Mutmaßlicher Betrüger in einem milliardenschweren Finanzskandal. Seit mehr als fünf Jahren ist er untergetaucht. Jetzt ist klar: Marsalek lebt in Moskau – scheinbar unauffällig. Tatsächlich aber: im Dienst des russischen Geheimdienstes. Reporter:innen vom SPIEGEL und vom STANDARD haben seine Spuren verfolgt. Sie führten zu Agentennetzwerken, bis ins ukrainische Kriegsgebiet – und zu Handys aus dem österreichischen Innenministerium. Die ganze Geschichte – wie Marsalek vom Wirecard-Wunderkind zu einem russischen Agenten wurde – erzählen Sandra Sperber und Roman Lehberger im SPIEGEL-Recherchepodcast Firewall. Fall ihr mehr Folgen von Firewall hören wollt: Den Podcast findet ihr bei Spotify, Applepodcasts und auf allen gängigen Podcast-Plattformen. In der Podcast-Serie Inside Austria rekonstruieren der SPIEGEL und der österreichische STANDARD gemeinsam Fälle, Skandale und politische Abgründe in Österreich. Wenn euch unser Podcast gefällt, folgt uns gerne und lasst uns ein paar Sterne da. Kritik, Feedback oder Themenideen gerne an insideaustria@spiegel.de oder an podcast@derstandard.at Den Inside Austria Newsletter findet ihr hier: https://www.spiegel.de/thema/die-lage-inside-austria/+++ Alle Infos zu unseren Werbepartnern finden Sie hier. Die SPIEGEL-Gruppe ist nicht für den Inhalt dieser Seite verantwortlich. +++ Den SPIEGEL-WhatsApp-Kanal finden Sie hier. Alle SPIEGEL Podcasts finden Sie hier. Mehr Hintergründe zum Thema erhalten Sie mit SPIEGEL+. Entdecken Sie die digitale Welt des SPIEGEL, unter spiegel.de/abonnieren finden Sie das passende Angebot. Informationen zu unserer Datenschutzerklärung.
A Power Trip Press Conference returns, Tom Pelissero joins with the latest Vikings injury news and other happenings around the NFL
A Power Trip Press Conference returns, Tom Pelissero joins with the latest Vikings injury news and other happenings around the NFLSee omnystudio.com/listener for privacy information.
When Danny Kim was nearly crushed by the 4,000-pound chassis of a truck he was working on, he had an epiphany. What if he could make an entirely new kind of car that combined the efficiency of a motorcycle with the safety of a regular car? Lit Motors was born. Bradley talks to Danny about his vision for a two-wheel vehicle with the soul of a spaceship.Join Bradley this Saturday, Sept. 20 at P&T Knitwear as we celebrate Russ & Daughters Day to mark the legendary shop's first-ever cookbook in their 111 years on the Lower East Side. We'll be hosting a live Firewall recording at 3PM where Bradley will interview Russ & Daughters' fourth generation co-owners, Niki Russ Federman and Josh Russ Tupper. For more details and to RSVP, visit https://www.russanddaughtersday.com/This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
The killing of Charlie Kirk has kicked the forces of political polarization into high gear. But it's worth taking a step back, says Bradley, to consider the degradation of everyday life that gives rise to such tragedies and think about what each one of us can do to ease the chaos. More locally, Bradley also discusses the data that proves that the ban on forced brokers fees is working, the race to replace Congressman Jerry Nadler, and the very un-Christian move by a local church to kick out a longtime soup kitchen. Discussed on today's episode:Indoor Ban Shuts Down Soup Kitchen at Downtown Manhattan Church, by Jonathan Custodio, The City, (09/15/25)Join Bradley on Sept. 20 at P&T Knitwear as we celebrate Russ & Daughters Day to mark the legendary shop's first-ever cookbook in their 111 years on the Lower East Side. We'll be hosting a live Firewall recording at 3PM where Bradley will interview Russ & Daughters' fourth generation co-owners, Niki Russ Federman and Josh Russ Tupper. For more details and to RSVP, visit https://www.russanddaughtersday.com/This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
In this week's episode of China Insider, Miles Yu covers the recent anti-corruption movement and Gen Z protests that ousted former Prime Minister Oli and government officials, and examine China's role in the transition to the new interim government. Next, Miles breaks down the latest from US-China trade talks in Madrid, as the US seeks to advance the TikTok divestiture and framework for a bilateral trade deal, while China seeks to avoid further tariffs related to purchases of Russian oil. Lastly, Miles unpacks the historical data breach from China's Great Firewall that compromised highly confidential and protected information regarding the CCP's extensive exports of censorship and surveillance technology to foreign countries. China Insider is a weekly podcast project from Hudson Institute's China Center, hosted by China Center Director and Senior Fellow, Dr. Miles Yu, who provides weekly news that mainstream American outlets often miss, as well as in-depth commentary and analysis on the China challenge and the free world's future.
Jenny Montgomery is a New Yorker on a mission — scouring galleries for art she loves and can afford to buy. Bradley talks to her about the city's art scene, where to see great work right now, and how to think about starting your own collection. Get rich quick? Forget about it. But live a richer cultural life? That's well within your reach.Discussed on today's episode:Printed Matter's NY Art Book Fair at MoMA PS1: https://printedmatterartbookfairs.org/Join Bradley on Sept. 20 at P&T Knitwear as we celebrate Russ & Daughters Day to mark the legendary shop's first-ever cookbook in their 111 years on the Lower East Side. We'll be hosting a live Firewall recording at 3PM where Bradley will interview Russ & Daughters' fourth generation co-owners, Niki Russ Federman and Josh Russ Tupper. For more details and to RSVP, visit https://www.russanddaughtersday.com/This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
Listen to 129 Future Now Apple Helio Ah yes, it’s that time of year when Apple Computer announces their latest offerings, the iPhone 17 series, the Apple Watch 11, Airpods Pro 3 and the iPhone Air. Sadly our Apple buddy, Taylor Barcroft, had a recent stroke and is currently recovering in a rehab center in nearby Capitola. But given the significance of this massive Apple event and Taylor deep love of their products, he rose to the occasion to give us his take on the near gear. Of special interests are the potential health benefits of the new devices, including 24/7 monitoring of biosignals like heart rate variability and blood pressure. We then branch into broader topics, such as the implications of AI on creativity and careers, discoveries in space exploration including the Voyager discovery of a solar system firewall surrounding us, and the latest with I3/ATLAS, our latest interstellar object passing by us. We then get a bit philosophical on time, reality, and human imagination, interspersed with our lighthearted banter, personal anecdotes, and insights. Enjoy!
Now that Trump has decided to restore the throwback name of the Department of Defense (now the Department of War), maybe it's time we started calling all federal agencies according to what they really do — so Bradley plays an epic name game. Plus, he assesses the looming real-world conditions that will test Zohran Mamdani's commitment to his progressive agenda, throws a flag on football's talking heads, and divulges his personal Emmy picks.Discussed on today's episode:Zohran Mamdani's Year One: A Time for Testing, by Bradley Tusk, Vital City, (09/04/25)Join Bradley on September 20 at P&T Knitwear as we celebrate Russ & Daughters Day to mark the legendary shop's first-ever cookbook in their 111 years on the Lower East Side. We'll be hosting a live Firewall recording at 3PM where Bradley will interview Russ & Daughters' fourth generation co-owners, Niki Russ Federman and Josh Russ Tupper. For more details and to RSVP, visit https://www.russanddaughtersday.com/This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
**Please subscribe to Matt's Substack at https://worthknowing.substack.com/*** The Judicial Branch Is Our Last Line of Defense Against Trump. Is It Holding?Join Matt Robison and legal expert Kim Wehle as they explore the judiciary's role in countering the unprecedented consolidation of power and abuse of the law by the Trump administration. Amid the collapse of checks from the executive and legislative branches, the conversation delves into whether the judicial branch can stand firm or if it's on the brink of collapse. This episode is a deep-dive into recent rulings, constitutional law, and the imperative for collective civic engagement to uphold democracy.00:00 Introduction and Overview06:26 The Supreme Court's Abdication of Duty18:25 Emergency Powers and Presidential Overreach26:34 The Role of Lower Courts32:53 The Importance of Rule of Law38:31 Supreme Court Rulings and Their Implications44:47 The Need for Constitutional Protections49:20 Engaging in Constructive Dialogue54:33 Final Thoughts and Call to Unity
Here's one thing we know about the Democratic Party right now — they are practically in a death spiral and must do something heroic to have any shot at the White House in 2028. If they think they can go about picking a candidate the regular, super-boring way, they're toast. So Bradley has a plan to bring fun and genuine excitement into the process, based on, yes, Battle of the Network Stars. Plus, he delivers a sharp verdict on the question of whether business school is worth it, and analyzes what the slowing growth of millionaires in New York City means for the next mayor.Join Bradley on Sept. 20 at P&T Knitwear as we celebrate Russ & Daughters Day to mark the legendary shop's first-ever cookbook in their 111 years on the Lower East Side. We'll be hosting a live Firewall recording at 3PM where Bradley will interview Russ & Daughters' fourth generation co-owners, Niki Russ Federman and Josh Russ Tupper. For more details and to RSVP, visit https://www.russanddaughtersday.com/.This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Center Software RADIUS Remote Code Execution Vulnerability An OS command injection vulnerability may be abused to gain access to the Cisco Secure Firewall Management Center software. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79 F5 Access for Android vulnerability An attacker with a network position that allows them to intercept network traffic may be able to read and/or modify data in transit. The attacker would need to intercept vulnerable clients specifically, since other clients would detect the man-in-the-middle (MITM) attack. https://my.f5.com/manage/s/article/K000152049