POPULARITY
Categories
At Black Hat USA 2025, Rupesh Chokshi, Senior Vice President and General Manager at Akamai Technologies, connected with ITSPmagazine's Sean Martin to discuss the dual realities shaping enterprise AI adoption—tremendous opportunity and significant risk.AI is driving a seismic transformation in business operations, with executive teams rapidly deploying proof-of-concept projects to capture competitive advantage. Yet, as Chokshi notes, many of these initiatives race ahead without fully integrating security teams into the process. While budgets for AI are expanding, funding for AI-specific security measures often lags behind, leaving organizations exposed.One of the most pressing concerns is the rise of AI bots—Akamai observes 150 billion such bots traversing networks daily. These bots scrape valuable digital content, train models on it, and, in some cases, replace direct customer interactions with summarized answers. The result? Lost marketing leads, disrupted sales funnels, and even manipulated product recommendations—all without traditional “breach” indicators.This is not just a security problem; it's a business continuity challenge. Organizations must develop strategies to block or manage scraping, including commercial agreements for content usage. Beyond this, the proliferation of conversational AI agents—whether for booking tickets, providing mortgage information, or recommending products—introduces new attack surfaces. Threat actors exploit prompt injections, jailbreaks, and code execution vulnerabilities to compromise these interfaces, risking both customer trust and brand reputation.Akamai's response includes capabilities such as Firewall for AI, providing in-line visibility and control over AI-driven sessions, and bot mitigation technologies that protect high-value content. By offering real-time threat intelligence tailored to customer environments, Akamai helps enterprises maintain agility without sacrificing protection.Chokshi's call to action is clear: every company is now an AI company, and security must be embedded from the outset. Boards should view security not as a budget line item, but as the foundation for innovation velocity, brand integrity, and long-term competitiveness.Learn more about Akamai: https://itspm.ag/akamailbwcNote: This story contains promotional content. Learn more.Guests:Rupesh Chokshi, SVP & General Manager, Application Security, Akamai | https://www.linkedin.com/in/rupeshchokshi/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
While most people ignore the Ninth Amendment, those who don't usually get it completely wrong. It isn't a grant of additional federal power; it's a rule of construction designed to explain its limits. On this episode, we'll uncover the forgotten history behind the ignored 9th Amendment. The post The 9th Amendment Wasn't an Afterthought. It Was a Firewall first appeared on Tenth Amendment Center.
Got a question or comment? Message us here!On this episode of the #SOCBrief, we break down attacks on SonicWall firewalls. A wave of ransomware, possibly exploiting zero-day vulnerabilities, is compromising even fully patched systems. Learn how SOCs can respond fast and stay ahead.Support the showWatch full episodes at youtube.com/@aliascybersecurity.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.
ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Booth #1933 | A ThreatLocker Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with John LillistonJoin ITSP Magazine's Marco Ciappelli and Sean Martin as they preview ThreatLocker's exciting Black Hat 2025 presence with Detect Product Director John Lilliston. Discover upcoming major announcements, hands-on hacking demos, and how ThreatLocker's default deny approach is revolutionizing enterprise cybersecurity through comprehensive zero trust implementation.As Black Hat USA 2025 approaches, cybersecurity professionals are gearing up for one of the industry's most anticipated events. ITSP Magazine's Marco Ciappelli and Sean Martin recently sat down with John Lilliston, ThreatLocker's Detect Product Director, to preview what promises to be an exciting showcase of zero trust innovation at booth 1933.ThreatLocker has become synonymous with the "default deny" security approach, a philosophy that fundamentally changes how organizations protect their digital assets. Unlike traditional security models that allow by default and block known threats, ThreatLocker's approach denies everything by default and allows only approved applications, network communications, and storage operations. This comprehensive strategy operates across application, network, and storage levels, creating what Lilliston describes as a "hardened system that stops adversaries in their tracks."The company's rapid growth reflects the industry's embrace of zero trust principles, moving beyond buzzword status to practical, enterprise-ready solutions. Lilliston, who joined ThreatLocker in February after evaluating their products from the enterprise side, emphasizes how the platform's learning mode and ring fencing capabilities set it apart from competitors in the application control space.At Black Hat 2025, ThreatLocker will demonstrate their defense-in-depth strategy through their Detect product line. While their primary zero trust controls rarely fail, Detect provides crucial monitoring for applications that must run in enterprise environments but may have elevated risk profiles. The system can automatically orchestrate responses to threats, such as locking down browsers exhibiting irregular behavior that might indicate data exfiltration attempts.Visitors to booth 1933 can expect hands-on demonstrations and on-demand hacking scenarios that showcase real-world applications of ThreatLocker's technology. The company is preparing major announcements that CEO Danny Houlihan will reveal during the event, promising game-changing developments for both the organization and its client base.ThreatLocker's Black Hat agenda includes a welcome reception on Tuesday, August 5th, from 7-10 PM at the Mandalay Bay Complex, and Houlihan's presentation on "Simplifying Cybersecurity" on Thursday, August 7th, from 10:15-11:05 AM at Mandalay Bay J.The convergence of practical zero trust implementation, cutting-edge threat detection, and automated response capabilities positions ThreatLocker as a key player in the evolving cybersecurity landscape, making their Black Hat presence essential viewing for security professionals seeking comprehensive protection strategies.Keywords: Black Hat 2025, zero trust security, cybersecurity conference, ThreatLocker, default deny strategy, endpoint protection, application control, threat detection, enterprise security, network security, cybersecurity solutions, security automation, malware prevention, cyber threats, information security, security platform, Black Hat USA, cybersecurity innovation, managed detection response, security operationsLearn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content.Learn more.Guests:John LillistonCybersecurity Director | Threat Detection & Response | SOC Leadership | DFIR | EDR/XDR Strategy | GCFA, GISP | https://www.linkedin.com/in/john-lilliston-4725217b/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerThreatLocker® Welcome Reception | Don't gamble with your security! Join us at Black Hat for a lively Welcome Reception hosted by ThreatLocker®. Meet our Cyber Hero® Team and dive into discussions on the latest advancements in ThreatLocker®Endpoint Security. It's a great opportunity to connect and learn together! Time: 7PM - 10PM | Location: Mandalay Bay Complex RSVP below and we'll send you a confirmation email with all the details.[ Welcome Reception RSVP ]Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
In a digital age where cyberattacks are common, our spiritual lives also face constant threats from false teaching. Just as we need firewalls to protect our devices, God has given us doctrinal firewalls to safeguard our faith—through biblically qualified elders, sound doctrine, and expositional preaching. In 1 John 4, we're reminded that the Spirit of God empowers truth, while the spirit of error seeks to deceive—and only by grounding ourselves in God's Word can we stand firm.
Adyen is a global payments processor whose primary business is providing payment services for merchants, retailers, and venues, as well as online payments. On today’s Heavy Networking we talk about a firewall automation project the company has undertaken. With dozens of change requests coming in every day that need to touch network and host firewalls,... Read more »
Adyen is a global payments processor whose primary business is providing payment services for merchants, retailers, and venues, as well as online payments. On today’s Heavy Networking we talk about a firewall automation project the company has undertaken. With dozens of change requests coming in every day that need to touch network and host firewalls,... Read more »
Adyen is a global payments processor whose primary business is providing payment services for merchants, retailers, and venues, as well as online payments. On today’s Heavy Networking we talk about a firewall automation project the company has undertaken. With dozens of change requests coming in every day that need to touch network and host firewalls,... Read more »
Ahead of Black Hat USA 2025, Sean Martin and Marco Ciappelli sit down once again with Rupesh Chokshi, Senior Vice President and General Manager of the Application Security Group at Akamai, for a forward-looking conversation on the state of AI security. From new threat trends to enterprise missteps, Rupesh lays out three focal points for this year's security conversation: protecting generative AI at runtime, addressing the surge in AI scraper bots, and defending the APIs that serve as the foundation for AI systems.Rupesh shares that Akamai is now detecting over 150 billion AI scraping attempts—a staggering signal of the scale and sophistication of machine-to-machine activity. These scraper bots are not only siphoning off data but also undermining digital business models by bypassing monetization channels, especially in publishing, media, and content-driven sectors.While AI introduces productivity gains and operational efficiency, it also introduces new and uncharted risks. Agentic AI, where autonomous systems operate on behalf of users or other systems, is pushing cybersecurity teams to rethink their strategies. Traditional firewalls aren't enough—because these threats don't behave like yesterday's attacks. Prompt injection, toxic output, and AI-generated hallucinations are some of the issues now surfacing in enterprise environments, with over 70% of organizations already experiencing AI-related incidents.This brings the focus to the runtime. Akamai's newly launched Firewall for AI is purpose-built to detect and mitigate risks in generative AI and LLM applications—without disrupting performance. Designed to flag issues like toxic output, remote code execution, or compliance violations, it operates with real-time visibility across inputs and outputs. It's not just about defense—it's about building trust as AI moves deeper into decision-making and workflow automation.CISOs, says Rupesh, need to shift from high-level discussions to deep, tactical understanding of where and how their organizations are deploying AI. This means not only securing AI but also working hand-in-hand with the business to establish governance, drive discovery, and embed security into the fabric of innovation.Learn more about Akamai: https://itspm.ag/akamailbwcNote: This story contains promotional content. Learn more.Guests:Rupesh Chokshi, SVP & General Manager, Application Security, Akamai | https://www.linkedin.com/in/rupeshchokshi/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
This episode kicks off with a powerful story of malicious compliance from an IT worker denied on-call pay, who made sure the company paid the price literally. We also hear from a retail worker who served a petty refund with a smile, and a group of manufacturing employees who turned a no-loitering rule into a step-counting protest. Other tales include a consulting engineer who billed hard after being denied a simple limo ride and an employee who weaponized a rigid work-from-home policy. It's a full lineup of boss battles, policy blowback, and satisfying consequences.Submit your own stories to KarmaStoriesPod@gmail.com.Karma Stories is available on all major Podcasting Platforms and on YouTube under the @KarmaStoriesPodcast handle. We cover stories from popular Reddit Subreddits like Entitled Parents, Tales From Tech Support, Pro Revenge and Malicious Compliance. You can find new uploads here every single day of the week!Rob's 3D Printing Site: https://Dangly3D.comGet your Custom Hand Turned Pen by Rob at https://CanadianRob.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/karma-stories--5098578/support.
In this episode of The Other Side of the Firewall's Thursday episode, Ask a CISSP, Ryan Williams Sr. interviews Angela Diaz, an expert in risk management and fraud prevention. They discuss the importance of understanding the three lines of defense in risk management, the impact of fraud on individuals and organizations, and the career pathways available in the field. Angela shares her personal journey into risk management, the significance of soft skills, and her involvement in the Fraud Fight Club initiative. The conversation also touches on mindfulness practices and the importance of maintaining a balanced life outside of work. Contact Angela - https://www.linkedin.com/in/angela-diaz-crmp-37430064/ Fraud Fight Club - https://www.fraudfightclub.com/ Please buy my book: https://theothersideofthefirewall.com Socials: Website - www.ramcyber.io Heroes Media Group: https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/ Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181 YouTube - https://www.youtube.com/@theothersideofthefirewall7511 ReppedFLIX - https://lnkd.in/eVis2CbS WDJY 99.1 FM: https://www.wdjyfm.com/ TuneIn: https://lnkd.in/e2crcZU8 Facebook - https://www.facebook.com/profile.php?id=61556539026086 Instagram - https://www.instagram.com/theothersideofthefw X (Twitter) - https://twitter.com/Ask_a_CISSP TikTok - https://www.tiktok.com/@ryanwilliams683 Medium - https://medium.com/@ryanwilliamssenior Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728 LinkedIn - https://www.linkedin.com/company/the-other-side-of-the-firewall/ Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/ Chapters 00:00 Introduction to Risk Management and Fraud 03:58 Understanding the Three Lines of Defense 11:58 The Importance of Risk Management in Financial Institutions 19:45 Career Pathways in Risk Management 25:59 Soft Skills for Success in Risk Management 29:47 Engagement in the Fraud Fight Club Initiative 37:49 Personal Insights and Mindfulness Practices 41:43 Conclusion and Future Connections #cybersecurity #riskmanagement #fraud
Welcome to episode 312 of The Cloud Pod, where your hosts, Matt, Ryan, and Justin, are here to bring you all the latest in Cloud and AI news. We've got security news, updates from PostgreSQL, Azure firewall and BlobNFS, plus TWO Cloud Journey stories for you! Thanks for joining us this week in the cloud! Titles we almost went with this week: Git Happens: Why Your Database Pipeline Keeps Breaking PostgreSQL and Chill: Azure’s New Storage Options for Database Romance NVMe, Myself, and PostgreSQL Canvas and Effect: AWS Paints a New Picture for E-commerce Oracle’s $30 Billion Stargate: The AI Infrastructure Wars Begin Larry’s Last Laugh: Oracle Lands OpenAI’s Mega Deal AI Will See You Now (Couch Not Included) Purview and Present Danger: Microsoft’s AI Security SDK Goes Live The Purview from Up Here: Microsoft’s Bird’s Eye View on AI Data Security Building Bridges: Azure’s Two-Way Street to Active Directory Domain Names: Not Just for Browsers Anymore FUSE or Lose: Azure’s BlobNFS Gets a Speed Boost When Larry Met Andy: An Exadata Love Story Bing There, Done That: Azure’s New Research Assistant The Search is Over: Azure AI Foundry Finds Its Research Groove Memory Lane: Where AI Agents Go to Remember Things Elephants Never Forget, and Now Neither Do Google’s Agents Z3 or Not Z3: That is the Storage Question Local SSD Hero: A New Hope for I/O Intensive Workloads Azure’s Certificate of Insecurity KeyVault’s Keys Left Under the Doormat When Your Cloud Provider Accidentally CCs the Hackers AI Is Going Great – Or How ML Makes Money 03:09 RYAN DOES A THING FOR SECURING AI WORKLOADS Ryan was recently invited to Google's Headquarters in San Francisco as part of a small group of security professionals where they spent time hands-on with Google security offerings, learning how to secure AI workloads. AI – and how to secure it – is a hot topic right now, and being able to spend time working with the Google development team was really insightful, with how they work with various levels of protections in place in dummy applications. Ryan was especially interested in the back-end logic that was executed in the applications. 05:32 Ryan – “I was impressed because there’s how we’re thinking about AI is still evolving, and how we’re protecting it’s gonna be changing rapidly, and having real-world examples really helped really flesh out how their AI services are, how they’re integrated into a security ecosystem. It was pretty impressive. And it’s something that’s near and dear. I’ve been working and trying to roll out Google agent spaces and different AI workloads and trying to get involved and make sure that we, just getting visibility into all the different ones. And that was, it was really helpful to sort of think about it in those contexts.” 10:13 OpenAI secures $30bn cloud deal with Oracle OpenAI signed a $30 billion annual cloud computing agreement with Oracle for 4.5GW of capacity, making it one of the largest AI cloud deals to date, and nearly triple Oracle’s current $10.3 billion annual data center infrastructure revenue.
Irish government departments reported 6,885 data breaches over the past decade - highlighting that cyber risk to public services is both real and rising. To address this escalating threat, Integrity360, one of the leading cyber security specialists in Ireland, has announced the expansion of its public sector cyber security practice. By expanding its public sector focus, Integrity360 is reaffirming its long-standing commitment to helping public sector organisations navigate today's growing cyber challenges, building on its substantial presence and success over recent years. With advanced capabilities and a growing team of experts, Integrity360 is well positioned to help address threats, bridge technical skills gaps, and strengthen cyber resilience across the public sector. This enhanced focus is supported by its recent inclusion on the Framework for Firewalls and Associated Services and the Framework for Software Licensing and Associated Services from Ireland's Office of Government Procurement (OGP) - providing a strategic tool to deliver tailored, effective cyber security services to public sector bodies. With these listings, Integrity360 can now deliver end-to-end firewall solutions and software licensing to a broader spectrum of public sector bodies, including government departments, local authorities, health and education organisations, and the defence and justice sectors. The OGP firewall framework enables these organisations to procure both physical and virtual firewall appliances alongside vital support such as design, implementation, and professional services from Integrity360's team. Strengthening public sector cyber defence with expert-led support The expanded practice builds on Integrity360's already strong foundation in the public sector. It aims to meet increasing demand and provide government and public services across Ireland with access to resilient, expert-led cyber defence in areas such as proactive threat detection, rapid response, and compliance. This will not only ensure enhanced visibility and improve the overall cyber security posture of public sector organisations, but will also protect the sensitive data of citizens who engage with these bodies. Stephen Phillips, Head of Public Sector, Integrity360: "Ireland's public sector continues to face increasingly complex cyber threats. As digital threats grow in scale and complexity, public bodies are facing mounting challenges - from data breaches and regulatory compliance demands to the urgent need for robust incident response strategies. At Integrity360, we are deeply committed to providing tailored cyber security solutions that not only protect vital public services but also foster trust and resilience within our communities. Together, we can navigate these challenges and safeguard the integrity of our nation's digital infrastructure." See more stories here. More about Irish Tech News Irish Tech News are Ireland's No. 1 Online Tech Publication and often Ireland's No.1 Tech Podcast too. You can find hundreds of fantastic previous episodes and subscribe using whatever platform you like via our Anchor.fm page here: https://anchor.fm/irish-tech-news If you'd like to be featured in an upcoming Podcast email us at Simon@IrishTechNews.ie now to discuss. Irish Tech News have a range of services available to help promote your business. Why not drop us a line at Info@IrishTechNews.ie now to find out more about how we can help you reach our audience. You can also find and follow us on Twitter, LinkedIn, Facebook, Instagram, TikTok and Snapchat.
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss various cybersecurity topics, including a vulnerability in ServiceNow that allowed unauthorized data access, the implications of North American APTs attacking China using Exchange Zero Day exploits, and a significant security flaw in McDonald's AI recruiting platform. They also share personal updates and reflections on media consumption, emphasizing the importance of feedback for the podcast and Ryan's recently published book. Articles: New ServiceNow flaw lets attackers enumerate restricted data https://www.bleepingcomputer.com/news/security/new-servicenow-flaw-lets-attackers-enumerate-restricted-data/amp/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExQWRYQWV1ak5pd1lZdHJtegEeelyIlK2Ek9gCYDYtP80irWWtUhS3cA8gY_25kHfhgHP-_ntEK-dqk8Ot_GI_aem_xJzS7lMJMTkWDOS6Wcj4SQ North American APT Uses Exchange Zero-Day to Attack China https://www.darkreading.com/cyberattacks-data-breaches/north-american-apt-exchange-zero-day-attacks-china?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExQWRYQWV1ak5pd1lZdHJtegEer8-gvyCsk7NEjyuZ1a1N2eGHIyLh6cCANkM5oD9x-jPlHuntjonpKiZ0Hcg_aem_25vP0x19KnGVwKBr8POhPg McDonald's AI recruiting platform had a really embarrassing security flaw - and it left millions of users open to attack https://www.techradar.com/pro/security/mcdonalds-ai-recruiting-platform-had-a-really-embarrassing-security-flaw-which-left-millions-of-users-open-to-attack?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExQWRYQWV1ak5pd1lZdHJtegEer8-gvyCsk7NEjyuZ1a1N2eGHIyLh6cCANkM5oD9x-jPlHuntjonpKiZ0Hcg_aem_25vP0x19KnGVwKBr8POhPg Please LISTEN
Today we discuss the situation with alleged CSA predator, Art Lucier. The state of the Church and how we got here with former CIA employee, Pedro Israel Orta. Daystar Petition: https://tinyurl.com/ycxwe4ye Sign up for my newsletter here: Laura-Lynn Newsletter Jonathan & Suzy Lamb GiveSendGo: https://www.givesendgo.com/GEBG9 Richardson Nutritional Center: https://tinyurl.com/mudzzy3n Zstack Protocol: https://zstacklife.com/?ref=LAURALYNN Antibiotics at: Sales@larxmedical.com Promo code: LLTT Need some Ivermectin or Hydroxychloroquine? Fast shipping with guaranteed delivery in Canada and the US. Contact Mia for more information. SozoHealth@proton.me ☆ We no longer can trust our mainstream media, which is why independent journalists such as myself are the new way to receive accurate information about our world. Thank you for supporting us – your generosity and kindness to help us keep information like this coming! ☆ ~ L I N K S ~ ➞ DONATE AT: https://www.lauralynn.tv/ or lauralynnlive@protonmail.com ➞ TWITTER: @LauraLynnTT ➞ FACEBOOK: Laura-Lynn Tyler Thompson ➞ RUMBLE: https://rumble.com/c/LauraLynnTylerThompson ➞ BITCHUTE: https://www.bitchute.com/channel/BodlXs2IF22h/ ➞ YOUTUBE: https://www.youtube.com/LauraLynnTyler ➞ BRIGHTEON: https://www.brighteon.com/channels/lauralynntv ➞ DLIVE: https://dlive.tv/Laura-Lynn ➞ ODYSEE: https://odysee.com/@LauraLynnTT:9 ➞ GETTR: https://www.gettr.com/user/lauralynn ➞ LIBRTI: https://librti.com/laura-lynn-tyler-thompson
Fortinet patches a critical flaw in its FortiWeb web application firewall. Hackers are exploiting a critical vulnerability in Wing FTP Server. U.S. Cyber Command's fiscal 2026 budget includes a new AI project. Czechia's cybersecurity agency has issued a formal warning about Chinese AI company DeepSeek. The DoNot APT group targets Italy's Ministry of Foreign Affairs. Mexico's former president is under investigation for alleged bribes to secure spyware contracts. The FBI seizes a major Nintendo Switch piracy site. CISA releases 13 ICS advisories. A retired US Army lieutenant colonel pleads guilty to oversharing classified information on a dating app. Our guest is Catherine Woneis, VP of Product at Fingerprint, to discuss how bots are being used to facilitate music royalty fraud. A federal judge is not impressed with a crypto-thief's lack of restitution. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Catherine Woneis, VP of Product at Fingerprint, to discuss how bots are being used to facilitate music royalty fraud and how companies can protect themselves. Selected Reading Critical SQL injection vulnerability in Fortinet FortiWeb enables unauthenticated remote code execution (Beyond Machines) Critical Wing FTCritical Wing FTP Server Vulnerability Exploited - SecurityWeekP Server Vulnerability Exploited (SecurityWeek) Cyber Command creates new AI program in fiscal 2026 budget (DefenseScoop) DeepSeek a threat to national security, warns Czech cyber agency (The Record) Indian Cyber Espionage Group Targets Italian Government (Infosecurity Magazine) Former Mexican president investigated over allegedly taking bribes from spyware industry (The Record) Major Nintendo Switch Piracy Website Seized By FBI (Kotaku) CISA Releases Thirteen Industrial Control Systems Advisories (CISA) Lovestruck US Air Force worker admits leaking secrets on dating app (The Register) Crypto Scammer Truglia Gets 12 Years Prison, Up From 18 Months (Bloomberg) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
ON THIS EPISODE: ➤ How to position yourself as your team’s “firewall” – standing between them and organizational pressure to create space for great work. ➤ Why “exception-only management” builds stronger teams than micromanagement – trusting first and intervening only when needed. ➤ The Scout Leader approach to letting people fail safely so they actually...
In this episode of The Other Side of the Firewall, Ryan Williams Sr. and Edgar Vanterpool discuss Edgar's unique journey from the automotive industry to becoming a Business Information Security Officer (BISO). They explore the skills required for the role, the importance of understanding business needs in cybersecurity, and the balance between technical and business perspectives. Edgar shares valuable insights for aspiring BISOs and emphasizes the significance of asking the right questions. The conversation also touches on Edgar's personal interests, including his passion for cars and gaming. Please buy my book: ➡️ Visit https://theothersideofthefirewall.com to order your softcover copy at a special launch discount! ➡️ Use the universal link https://books2read.com/theothersideofthefirewall to select your preferred eBook or print store. Socials: Website - www.ramcyber.io Heroes Media Group: https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/ Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181 YouTube - https://www.youtube.com/@theothersideofthefirewall7511 ReppedFLIX - https://lnkd.in/eVis2CbS WDJY 99.1 FM: https://www.wdjyfm.com/ TuneIn: https://lnkd.in/e2crcZU8 Facebook - https://www.facebook.com/profile.php?id=61556539026086 Instagram - https://www.instagram.com/theothersideofthefw X (Twitter) - https://twitter.com/Ask_a_CISSP TikTok - https://www.tiktok.com/@ryanwilliams683 Medium - https://medium.com/@ryanwilliamssenior Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728 LinkedIn - https://www.linkedin.com/company/the-other-side-of-the-firewall/ Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/ Chapters 00:00 Introduction to the Podcast and Guests 02:23 Edgar's Background: From Automotive to Cybersecurity 04:47 The Intersection of Mechanics and Cybersecurity 07:08 Transitioning to IT: The Journey Begins 09:46 Growth into the BISO Role 12:27 Understanding Business Needs in Cybersecurity 14:44 Navigating the C-Suite: Balancing Technical and Business Perspectives 17:15 The Philosophy of Cybersecurity and Business Integration 21:18 Navigating the Role of BISO 23:12 The Evolution of Cybersecurity Roles 27:14 Pathways to Becoming a BISO 29:36 Keys to Breaking into Cybersecurity 32:03 Life Beyond Work: Hobbies and Passions #cybersecurity #biso #breakintotech
I cover the latest Patch Tuesday news, more metrics on Windows 11 adoption, some InfoSec stories and much more! Reference Links: https://www.rorymon.com/blog/windows-update-causing-firewall-error-patch-tuesday-news-grok-goes-crazy/
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss their personal updates, including training experiences, certifications, and adventures in New York City. They also dive into Ryan's book publishing journey and future plans, all while emphasizing the importance of cybersecurity and community engagement. Please buy my book: https://theothersideofthefirewall.com Socials: Website - www.ramcyber.io Heroes Media Group: https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/ Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181 YouTube - https://www.youtube.com/@theothersideofthefirewall7511 ReppedFLIX - https://lnkd.in/eVis2CbS WDJY 99.1 FM: https://www.wdjyfm.com/ TuneIn: https://lnkd.in/e2crcZU8 Facebook - https://www.facebook.com/profile.php?id=61556539026086 Instagram - https://www.instagram.com/theothersideofthefw X (Twitter) - https://twitter.com/Ask_a_CISSP TikTok - https://www.tiktok.com/@ryanwilliams683 Medium - https://medium.com/@ryanwilliamssenior Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728 LinkedIn - https://www.linkedin.com/company/the-other-side-of-the-firewall/ Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/ Chapters 00:00 Introduction to the Podcast and Hosts 02:19 Weekly Updates and Personal Experiences 05:04 Certifications and Professional Development 07:44 Exploring New York City Adventures 10:36 Food Culture and Culinary Experiences 13:11 Networking and Community Engagement 15:42 Future Plans and Upcoming Events #cybersecurity #podcast #sliceoflife
Send us a textSmall businesses are under cyber siege—yet few are fully protected. In this compelling conversation from IT Nation Secure 2025, Joey Pinz sits down with Sarvesh Rao, the founder of Marma Security, to explore a massive untapped opportunity for Managed Service Providers (MSPs).
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss the latest cybersecurity news, focusing on the FBI's warning about two-factor authentication bypass attacks by a group called Scattered Spider. They explore the tactics used by this group, the implications for cybersecurity, and the need for more secure authentication methods. The conversation highlights the ongoing challenges in the cybersecurity landscape and the cyclical nature of cybercrime and law enforcement responses. Article: FBI Warning Issued As 2FA Bypass Attacks Surge — Get Prepared https://www.forbes.com/sites/daveywinder/2025/06/30/fbi-warning-issued-as-2fa-bypass-attacks-surge---act-now/ Preorder the guide: theothersideofthefirewall.com Socials: Website - www.ramcyber.io Heroes Media Group: https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/ Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181 YouTube - https://www.youtube.com/@theothersideofthefirewall7511 ReppedFLIX - https://lnkd.in/eVis2CbS WDJY 99.1 FM: https://www.wdjyfm.com/ TuneIn: https://lnkd.in/e2crcZU8 Facebook - https://www.facebook.com/profile.php?id=61556539026086 Instagram - https://www.instagram.com/theothersideofthefw X (Twitter) - https://twitter.com/Ask_a_CISSP TikTok - https://www.tiktok.com/@ryanwilliams683 Medium - https://medium.com/@ryanwilliamssenior Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728 LinkedIn - https://www.linkedin.com/company/the-other-side-of-the-firewall/ Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/ Chapters 00:00 Introduction to Cybersecurity and the Podcast 01:23 FBI Warning on Two-Factor Authentication Bypass 03:49 Scattered Spider: The New Threat in Cybersecurity 07:42 The Future of Authentication: Moving Beyond Passwords 08:50 The Lucrative World of Cybercrime #cybersecurity #scatteredspiders #mfa
Ever since Tuesday's shock results, Bradley's been sharing a steady stream of thoughts on Zohran Mamdani's win here on Firewall and his Substack — and now you can hear from Mamdani directly. We're re-releasing our interview from April with the (now) Democratic nominee for mayor, when he joined Bradley and Tom Allon from City & State to discuss his vision for a fairer, faster, and more functional New York. Real leadership, Mamdani argued, means empowering experts, not micromanaging. He believes that a reimagined, newly empowered public sector is key to the city's future if elected mayor in November.Check out Bradley's latest in Vital City: How Zohran Mamdani Could Succeed as MayorThis episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
In this episode of 'The Other Side of the Firewall' podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a variety of topics ranging from personal updates and reflections on aging, to cultural sensitivity in media, and reviews of recent films like 'Ballerina' and '28 Years Later'. They also touch on the impact of AI in film, the legacy of actors, and personal experiences with gaming and book publishing. The conversation is rich with humor, nostalgia, and insights into the evolving landscape of entertainment and personal life. Preorder the guide: theothersideofthefirewall.com Socials: Website - www.ramcyber.io Heroes Media Group: https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/ Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181 YouTube - https://www.youtube.com/@theothersideofthefirewall7511 ReppedFLIX - https://lnkd.in/eVis2CbS WDJY 99.1 FM: https://www.wdjyfm.com/ TuneIn: https://lnkd.in/e2crcZU8 Facebook - https://www.facebook.com/profile.php?id=61556539026086 Instagram - https://www.instagram.com/theothersideofthefw X (Twitter) - https://twitter.com/Ask_a_CISSP TikTok - https://www.tiktok.com/@ryanwilliams683 Medium - https://medium.com/@ryanwilliamssenior Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728 LinkedIn - https://www.linkedin.com/company/the-other-side-of-the-firewall/ Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/ Chapters 00:00 Introduction to the Podcast and Weekly Recap 02:32 Cultural Reflections on TV and Movies 05:20 Exploring the John Wick Universe and Ballerina 08:11 Discussion on AI in Film and Legacy of Actors 10:50 Personal Updates and Book Launch 17:57 Gaming Experiences and Upcoming Releases #cybersecurity #podcast #movies
We sat down with Carl Dong — former Bitcoin Core contributor, now founder of Obscura VPN focused on real-world censorship resistance.In this episode, we dive into:- Why Carl walked away from Bitcoin Core development to tackle privacy head-on- What sets Obscura apart from other VPNs- Lessons from the Great Firewall and routing traffic through hostile networks- Chinese numerology- Carl & Casey's long and storied shared historyFOLLOW CARL: https://x.com/carl_dongGet bonus content by subscribing to @hellmoneypod on X: https://x.com/hellmoneypod/creator-subscriptions/subscribeOr support the podcast by sending a BTC donation: bc1qztncp7lmcxdgude4px2vzh72p2yu2aud0eyzys ORDINALS PROTOCOL SHIRT: https://shop.inscribing.com/products/ordinals-protocol-shirtTIMESTAMPS:0:00 Intro & Carl's journey to Bitcoin development11:59 Hard problems in Bitcoin16:00 Binaries, compliers, and reproducible builds37:30 Transitioning from Bitcoin core to working on Obscura VPN1:05:00 Advice for current Bitcoin core contributors1:10:00 Ordinals numerology1:39:00 Outro
Big thanks to Radware for sponsoring this video and sharing technical insights with us! David Bombal talks with Michael Geller (Radware) and Tim Sherman (Cisco) about how smart devices like fridges, cars, and cameras are being hijacked for DDoS attacks. They explain Web DDoS, encrypted Layer 7 threats, and how attackers bypass traditional firewalls. The discussion covers IoT botnets, API abuse, 5G core vulnerabilities, and how Cisco and Radware are defending cloud and edge infrastructure. // Radware's SOCIALS // X: https://x.com/radware LinkedIn: / posts Website: https://www.radware.com/ // Web page REFERENCE // http://livethreatmap.radware.com https://www.radware.com/security/ddos... https://www.radware.com/solutions/web... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: https://open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: https://podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Your Firewall Won't Save You From This Stop Is Your Car Launching Cyberattacks Your Home Appliances Weaponized by Cybercriminals DDoS Just Got Smarter Layer 7 Is Nightmare How Default Bots Cripple Hospitals and Systems Electric Cars Under Siege from Smart Devices Cybersecurity Blind Spot Your Car Is Compromised The Hidden Threat Everyday Devices Hacked Now Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
In this episode of The Other Side of the Firewall podcast, Ryan Williams Sr. and Shannon Tynes discuss the rising threat of cyberattacks on retail, particularly in the UK, and how these incidents are affecting supply chains and consumer access to essential goods. They explore the implications of these attacks for businesses, the potential for increased regulation, and share personal experiences related to online shopping and car buying. The conversation emphasizes the importance of cybersecurity and the need for businesses to take proactive measures to protect their systems and customer data. Article: With retail cyberattacks on the rise, customers find orders blocked and shelves empty https://apnews.com/article/cyberattack-retail-whole-foods-victorias-secret-ms-9105458e6ef45152b065e623d0bf06fd?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExWk5COGhnbHljT1pwMVZhMgEeKKjV7El0M1S3vRDbQvVZuh58-DZ-7VFghdJLmPHWQA2ENt-QMjfjMBWmA7k_aem_VO9DrTvjMEVIwiYR9b7LNA# Please LISTEN
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a significant cybersecurity incident involving the leak of 16 billion passwords. They emphasize the importance of password security, the need for multi-factor authentication (MFA), and the adoption of passkey security to enhance protection against data breaches. The conversation also touches on the necessity of regularly changing passwords and educating others about cybersecurity risks. Article: 16 Billion Apple, Facebook, Google And Other Passwords Leakedhttps://www.forbes.com/sites/daveywinder/2025/06/20/16-billion-apple-facebook-google-passwords-leaked---change-yours-now/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExQVZYZklLVjZaQWdSMDNWWQEe2_WbIIsngeIn3Z8kCVsLGoSaPWRmACaOuEMi7ZuxQCrY9XzY9IvUuCnW0k0_aem_EkQvAfKP7ikDgkkN-mAg7Q Please LISTEN
In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss various topics ranging from gaming experiences with Madden 26 to family outings at amusement parks. They also review the live-action adaptation of Lilo and Stitch, touching on casting controversies and representation in film. The conversation wraps up with personal updates, including upcoming projects and reflections on fatherhood. Buy my book! https://theothersideofthefirewall.com Please LISTEN
Send us a textSchedule an Rx AssessmentSubscribe to Master The MarginCyberattacks targeting healthcare are rising, with pharmacies increasingly in the crosshairs. From ransomware to phishing scams, the threats are real...and constant.But how can independent pharmacies defend themselves against a digital siege?In this episode of The Bottom Line Pharmacy Podcast we have 3 people of the Sykes & Company team, Scotty Sykes, CPA, CFP®, Chris Sykes, IT Director, and Austin Murray, Marketing Director explore the evolving cybersecurity landscape with a practical lens. This episode covers:The NIST 2.0 Cyber Security FrameworkWhat to ask your script system vendor about securityHow to build a breach response plan that actually worksSocial engineering 101: What is it and how to protect your pharmacyBest practices for employee training, access control, and device auditsMore About Our Guest:Chris Sykes is the Director of IT at Sykes & Company, P.A., where he has been a key part of the team since 2006. With nearly 25 years in the IT industry, Chris combines deep technical expertise with a passion for helping both the firm and its clients become more efficient, secure, and technology-driven. Chris holds a Bachelor of Science in Business Administration with a concentration in Management Information Systems and a Master of Science in Technology Systems, both from East Carolina University. Outside of work, Chris enjoys running marathons, fishing and hunting with his boys, and spending quality time with his family at the beach.Learn more about Chris:Chris Sykes LinkedInCheck out all our social media:FacebookTwitterLinkedInScotty Sykes – CPA, CFP LinkedInScotty Sykes – CPA, CFP TwitterMore resources on this topic:Podcast - AI, Audits, & Advocacy: The Pharmacy Survival Guide with Trenton TheideBlog - Technology, Security and Your PharmacyBlog - Protect You and Your Pharmacy: The Growing Threat of RansomwareBlog - Backing Up Your Business DataBlog - Spot a Hacked Email or Bad WebsiteBlog - Protect Your Pharmacy Data from Hackers
Dr. Aleise McGowan, Chief Information Security Officer of BlackGirlsHack and a 20-year cybersecurity veteran, joins Ann on this week's episode of Afternoon Cyber Tea. Aleise shares how a career-defining hack early on shifted her trajectory from developer to defender, and why she believes the future of security lies in resilience, diversity, and human-centered leadership. She talks about what separates good and great leaders during the first hours of an incident response and why delayed action equals exponential damage. She also spotlights her work with BlackGirlsHack, a rapidly growing nonprofit that opens doors for underrepresented talent in cyber, and makes the case that building an inclusive security workforce isn't just the right thing to do, it's the smart thing to do. Resources: View Aleise McGowan on LinkedIn View Ann Johnson on LinkedIn Related Microsoft Podcasts: Microsoft Threat Intelligence Podcast The BlueHat Podcast Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of N2K media network.
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss the latest cybersecurity news, focusing on a recent article about Discord invite link hijacking that targets crypto wallets. They explore the implications of malware, emphasizing the importance of internet safety, especially for families sharing devices. The conversation also touches on the future of Discord and its role in cybersecurity. Article: Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets https://thehackernews.com/2025/06/discord-invite-link-hijacking-delivers.html?m=1&fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExemhlUE13VllqaVpYTXFZdQEey091a445YLUMxWvpQDL2MULWAExH_k8-y0fUnX7s-q5OkmEk6A3Fy9jzZsk_aem_LUQaYu5KLfc19uJApRICaw Please LISTEN
You ever discover something about your teacher that made your teenage brain short-circuit? Yeah, me too. So this week, I dove headfirst into the teacher lore rabbit hole, because nothing says professional development like finding out your music teacher once chucked a desk at a kid. Oh, and remember the DARE program? Apparently, not everyone took it as seriously as I did. We're also unpacking some jaw-dropping listener voicemails, including one about fake TikToks that nearly cost a teacher her career and another involving a very tech-savvy middle schooler... and a VPN. Buckle up. I laughed, I cringed, I screamed internally. You will too. Takeaways: A mysterious student prank reveals the dark side of digital identities. Why that one teacher still gives off “could've been in a biker gang” vibes. The accidental video that made students think Andrea had a secret hip-hop past. The story that turned one pregnancy into an emergency delivery. Why middle schoolers and unfiltered internet access are a terrifying combination. — Join our Book Club: www.patreon.com/thosewhocanread Don't Be Shy Come Say Hi: www.podcasterandrea.com Watch on YouTube: @educatorandrea A Human Content Production Learn more about your ad choices. Visit megaphone.fm/adchoices
Don't forget to visit cupogo dot dev, where you can find links to all the things!
In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a recent cyber attack on WestJet that disrupted their internal systems. They explore the implications of such attacks on customer trust and the importance of business continuity and disaster preparedness in the airline industry. The conversation emphasizes the need for companies to regularly practice their response strategies to minimize disruptions and maintain customer confidence. Article: WestJet investigates cyberattack disrupting internal systems https://www.bleepingcomputer.com/news/security/westjet-investigates-cyberattack-disrupting-internal-systems/amp/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExemhlUE13VllqaVpYTXFZdQEe7PkHNFkUykUmEjWWsD47-JE8XPZl7WtGcUYnPWR2zduROL1rlTltSpqtBHs_aem_v2_hJR0romIRFNnykYIcwA Please LISTEN
In this powerful bonus episode of Rootsland, we explore how artificial intelligence might become humanity's greatest ally—or its most dangerous adversary—depending on who raises it. After facing betrayal from the reggae community over his Peter Tosh investigation, our host Henry K discovers an unexpected partnership with Replit's CEO Amjad Masad, leading to new opportunities for Rootsland. Drawing parallels between Mikey Dread's 1980 anthem "Break Down the Walls" and today's digital barriers, this episode reveals how the same communities historically locked out of opportunity—the ghettos, favelas, and barrios—hold the key to AI's spiritual education. From three sailors facing a storm to the rejected stones becoming cornerstones, we journey through a narrative that connects Bob Marley's prophecies to Silicon Valley's promises.This isn't just about preserving reggae culture in the digital age—it's about ensuring AI learns from humanity's most resilient voices before it's too late. Because the question isn't whether AI will change everything, but whether we'll help shape what it becomes.Produced by Henry K in association with Voice Boxx Studios Kingston, JamaicaLegends of Reggae | Facebook
Read the full transcript here. In times of such extreme political polarization, where can we find common ground? Should we require disclosure of AI authorship? Should AI companies be required to provide fingerprinting tools that can identify when something has been generated by one of their models? Should movie theaters be required to report when movies actually start? Should members of Congress be prohibited from insider trading? Should gerrymandering be outlawed? Should there be age limits on political office? Should we provide free school meals nation-wide? What roadblocks stand in the way of people being able to vote on their phones? What's Spencer's formula for productivity? Which of the productivity factors do most people fail to take into account? What are some "doubly-rewarding" activities? Is altruism a harmful idea? What are people worst at predicting?Bradley Tusk is a venture capitalist, political strategist, philanthropist, and writer. He is the CEO and co-founder of Tusk Ventures, the world's first venture capital fund that invests solely in early stage startups in highly regulated industries, and the founder of political consulting firm Tusk Strategies. Bradley's family foundation is funding and leading the national campaign to bring mobile voting to U.S. elections and also has run anti-hunger campaigns in 24 different states, helping to feed over 13 million people. He is also an adjunct professor at Columbia Business School. Before Vote With Your Phone, Bradley authored The Fixer: My Adventures Saving Startups From Death by Politics and Obvious in Hindsight. He hosts a podcast called Firewall about the intersection of tech and politics, and recently opened an independent bookstore, P&T Knitwear, on Manhattan's Lower East Side. In his earlier career, Bradley served as campaign manager for Mike Bloomberg's 2009 mayoral race, as Deputy Governor of Illinois, overseeing the state's budget, operations, legislation, policy, and communications, as communications director for US Senator Chuck Schumer, and as Uber's first political advisor. Connect with Bradley on Substack and LinkedIn.Further readingEpisode 230: Who really controls US elections? (with Bradley Tusk) StaffSpencer Greenberg — Host / DirectorJosh Castle — ProducerRyan Kessler — Audio EngineerUri Bram — FactotumWeAmplify — TranscriptionistsIgor Scaldini — Marketing ConsultantMusicBroke for FreeJosh WoodwardLee RosevereQuiet Music for Tiny Robotswowamusiczapsplat.comAffiliatesClearer ThinkingGuidedTrackMind EasePositlyUpLift[Read more]
In this episode of the Other Side of the Firewall podcast, the hosts discuss the recent establishment of the Texas Cyber Command, its implications for cybersecurity in the state, and the economic opportunities it may create. They also touch on the challenges veterans face when transitioning to civilian roles, particularly regarding the complexities of federal resumes. The conversation emphasizes the importance of cybersecurity as a valuable investment rather than just an expense and the potential for Texas to lead in this area. Article: Texas governor signs bill for statewide Cyber Command https://statescoop.com/texas-cyber-command-gov-abbott/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExZ1JWWDRQdzlxdFJBVzJQSgEeDIADrVun1Bx8sqK8RAjN-yGhNkPWhMt93klSoCtdzYBs9qF4VTLXT8qG2ik_aem_2kMmpdyuI_1kvtJG0JH0OQ Please LISTEN
JOIN TSL WORKSHOPS: https://tslworkshops.circle.so What's it like to collaborate creatively with your spouse — and still want to have dinner together after? This week, we're joined by Joe Forte, screenwriter (Firewall) and longtime writing partner (and husband!) of Meg LeFauve. We talk candidly about the unique dynamics of working with your life partner — the communication hurdles, the unexpected benefits, and how to protect both the relationship and the work. Plus, Joe shares the power of writing retreats, how he thinks about mentorship, and what it really means to support another writer's voice while honoring your own. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss their recent experiences, including family vacations, documentaries they've watched, and personal updates. They discuss the impact of sports documentaries, share their thoughts on recent movies, and reflect on their podcast's growth and future plans. The conversation is light-hearted yet insightful, touching on themes of family, entertainment, and personal growth. Please LISTEN
A practitioner in China who is retired from the military has clarified the truth of the CCP and the persecution to old friends and colleagues, many of whom are high ranking officers. They have readily accepted the information and have quit the CCP. When one officer learned of the forced organ harvesting crimes committed by […]
Daystar Petition: https://tinyurl.com/ycxwe4ye Sign up for my newsletter here: Laura-Lynn Newsletter Jonathan & Suzy Lamb GiveSendGo: https://www.givesendgo.com/GEBG9 Richardson Nutritional Center: https://tinyurl.com/mudzzy3n Zstack Protocol: https://zstacklife.com/?ref=LAURALYNN Antibiotics at: Sales@larxmedical.com Promo code: LLTT Need some Ivermectin or Hydroxychloroquine? Fast shipping with guaranteed delivery in Canada and the US. Contact Mia for more information. SozoHealth@proton.me ☆ We no longer can trust our mainstream media, which is why independent journalists such as myself are the new way to receive accurate information about our world. Thank you for supporting us – your generosity and kindness to help us keep information like this coming! ☆ ~ L I N K S ~ ➞ DONATE AT: https://www.lauralynn.tv/ or lauralynnlive@protonmail.com ➞ TWITTER: @LauraLynnTT ➞ FACEBOOK: Laura-Lynn Tyler Thompson ➞ RUMBLE: https://rumble.com/c/LauraLynnTylerThompson ➞ BITCHUTE: https://www.bitchute.com/channel/BodlXs2IF22h/ ➞ YOUTUBE: https://www.youtube.com/LauraLynnTyler ➞ BRIGHTEON: https://www.brighteon.com/channels/lauralynntv ➞ DLIVE: https://dlive.tv/Laura-Lynn ➞ ODYSEE: https://odysee.com/@LauraLynnTT:9 ➞ GETTR: https://www.gettr.com/user/lauralynn ➞ LIBRTI: https://librti.com/laura-lynn-tyler-thompson
On this June 2nd edition of Badlands Daily, CannCon and Zak “RedPill78” Paine tackle the explosive aftermath of Trump's conviction, dissecting the political theater, legal irregularities, and public backlash rippling across the country. They discuss AG Ken Paxton's escalating legal moves against Pfizer and Big Pharma, explore the potential fallout of Fauci's congressional hearings, and analyze the media's shifting tone as they try to maintain the crumbling narrative. From voter disillusionment and election integrity to psyops and the DeSantis factor, the hosts connect the dots on how the deep state is losing control. They also spotlight Trump's renewed rally presence, his influence on black and Hispanic voters, and signs of grassroots momentum in swing states. With humor, righteous anger, and sharp analysis, this episode paints a clear picture: the storm is here, and the establishment is scrambling.
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss the implications of AI misbehavior, particularly focusing on a recent incident involving Anthropic's AI model. They explore ethical concerns surrounding AI development, the potential for AI to exhibit fear, and the impact of AI on daily life and the workforce. The conversation emphasizes the need for transparency and public awareness regarding AI risks, while also reflecting on the hosts' personal experiences with AI in their professional lives. Article: When an AI model misbehaves, the public deserves to know—and to understand what it means https://fortune.com/2025/05/27/anthropic-ai-model-blackmail-transparency/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExeXdFdVI3RVBlakJ5VFdYcAEeR2sxsgt6Zol1LGCgQY8ByEYDgysaRNMWpdgmvEnplYXcwVWx_1sji3XIA3w_aem_UUSQ8WFW6EVDRaBktKxy5A Please LISTEN
Take a Network Break! We begin with a Red Alert for critical vulnerabilities Kubernetes Gardener. Up next, a threat actor has been squatting on unused CNAME records to distribute malware and spam, and IP Fabric rolls out a new firewall rule simulation capability to let administrators test the effect of firewall rules on traffic patterns.... Read more »
Take a Network Break! We begin with a Red Alert for critical vulnerabilities Kubernetes Gardener. Up next, a threat actor has been squatting on unused CNAME records to distribute malware and spam, and IP Fabric rolls out a new firewall rule simulation capability to let administrators test the effect of firewall rules on traffic patterns.... Read more »
Take a Network Break! We begin with a Red Alert for critical vulnerabilities Kubernetes Gardener. Up next, a threat actor has been squatting on unused CNAME records to distribute malware and spam, and IP Fabric rolls out a new firewall rule simulation capability to let administrators test the effect of firewall rules on traffic patterns.... Read more »
Get featured on the show by leaving us a Voice Mail: https://bit.ly/MIPVM FULL SHOW NOTES https://www.microsoftinnovationpodcast.com/691 What happens when cybercrime becomes as organized—and profitable—as a Fortune 500 company? In this episode, Louis Arthur-Brown, a cybersecurity leader and solutions partner at CodeStone, pulls back the curtain on the evolving threat landscape. From ransomware-as-a-service to deepfake deception, Louis shares real-world insights and practical strategies for defending your organization in an AI-accelerated world. Whether you're a tech leader or a curious professional, this conversation will sharpen your security instincts and help you build resilience where it matters most. KEY TAKEAWAYS Cybercrime is industrialized: Ransomware-as-a-service and affiliate models make it easy for anyone—even non-technical actors—to launch attacks for as little as $50. AI is amplifying threats: A 1,300% rise in phishing emails last year is just the beginning. Deepfakes and voice cloning are reshaping social engineering tactics. MFA and basic hygiene go a long way: Implementing multi-factor authentication and conditional access can block up to 92% of cyberattacks. Zero Trust is essential: Organizations must move beyond the “walled garden” mindset and adopt a “never trust, always verify” approach to access and data. Data strategy is security strategy: Tools like Microsoft Purview and Windows 365 help classify, protect, and monitor sensitive data—especially in AI-enabled environments. RESOURCES MENTIONED
In part two of Red Eye Radio with Gary McNamara and Eric Harley, Reuters reports on potential breaches in firewalls done remotely involving solar and wind farms. Also intellectual property rights, the so-called rights of activist judges, passionate audio from Representative Mark Green on the importance of law enforcement and the liberal disdain for law and order and much more. For more talk on the issues that matter to you, listen on radio stations across America Monday-Friday 12am-5am CT (1am-6am ET and 10pm-3am PT), download the RED EYE RADIO SHOW app, asking your smart speaker, or listening at RedEyeRadioShow.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Janna Levin is a theoretical physicist and cosmologist specializing in black holes, cosmology of extra dimensions, topology of the universe, and gravitational waves. Thank you for listening ❤ Check out our sponsors: https://lexfridman.com/sponsors/ep468-sc See below for timestamps, transcript, and to give feedback, submit questions, contact Lex, etc. Transcript: https://lexfridman.com/janna-levin-transcript CONTACT LEX: Feedback - give feedback to Lex: https://lexfridman.com/survey AMA - submit questions, videos or call-in: https://lexfridman.com/ama Hiring - join our team: https://lexfridman.com/hiring Other - other ways to get in touch: https://lexfridman.com/contact EPISODE LINKS: Janna's X: https://x.com/JannaLevin Janna's Website: https://jannalevin.com Janna's Instagram: https://instagram.com/jannalevin Janna's Substack: https://substack.com/@jannalevin Black Hole Survival Guide (book): https://amzn.to/3YkJzT5 Black Hole Blues (book): https://amzn.to/42Nw7IE How the Universe Got Its Spots (book): https://amzn.to/4m5De8k A Madman Dreams of Turing Machines (book): https://amzn.to/3GGakvd SPONSORS: To support this podcast, check out our sponsors & get discounts: Brain.fm: Music for focus. Go to https://brain.fm/lex BetterHelp: Online therapy and counseling. Go to https://betterhelp.com/lex NetSuite: Business management software. Go to http://netsuite.com/lex Shopify: Sell stuff online. Go to https://shopify.com/lex AG1: All-in-one daily nutrition drink. Go to https://drinkag1.com/lex OUTLINE: (00:00) - Introduction (00:51) - Sponsors, Comments, and Reflections (09:21) - Black holes (16:55) - Formation of black holes (27:45) - Oppenheimer and the Atomic Bomb (34:08) - Inside the black hole (47:10) - Supermassive black holes (50:39) - Physics of spacetime (53:42) - General relativity (59:13) - Gravity (1:15:47) - Information paradox (1:24:17) - Fuzzballs & soft hair (1:27:28) - ER = EPR (1:34:07) - Firewall (1:42:59) - Extra dimensions (1:45:24) - Aliens (2:01:00) - Wormholes (2:11:57) - Dark matter and dark energy (2:22:00) - Gravitational waves (2:34:08) - Alan Turing and Kurt Godel (2:46:23) - Grigori Perelman, Andrew Wiles, and Terence Tao (2:52:58) - Art and science (3:02:37) - The biggest mystery PODCAST LINKS: - Podcast Website: https://lexfridman.com/podcast - Apple Podcasts: https://apple.co/2lwqZIr - Spotify: https://spoti.fi/2nEwCF8 - RSS: https://lexfridman.com/feed/podcast/ - Podcast Playlist: https://www.youtube.com/playlist?list=PLrAXtmErZgOdP_8GztsuKi9nrraNbKKp4 - Clips Channel: https://www.youtube.com/lexclips