POPULARITY
Categories
OPINION: The unthinkable alliance: Why a Marcos-backed Robredo-Torre ticket may be the only firewall against Duterte 2.0 in 2028 | Jan. 1, 2026Subscribe to The Manila Times Channel - https://tmt.ph/YTSubscribeVisit our website at https://www.manilatimes.net Follow us: Facebook - https://tmt.ph/facebook Instagram - https://tmt.ph/instagram Twitter - https://tmt.ph/twitter DailyMotion - https://tmt.ph/dailymotion Subscribe to our Digital Edition - https://tmt.ph/digital Check out our Podcasts: Spotify - https://tmt.ph/spotify Apple Podcasts - https://tmt.ph/applepodcasts Amazon Music - https://tmt.ph/amazonmusic Deezer: https://tmt.ph/deezer Stitcher: https://tmt.ph/stitcherTune In: https://tmt.ph/tunein#TheManilaTimes#KeepUpWithTheTimes Hosted on Acast. See acast.com/privacy for more information.
In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (CRS) project. Felipe has been at the forefront of open-source security, leading the development of one of the world's most widely deployed WAF rule sets, trusted by organizations globally to protect their web applications. Felipe explains why WAFs remain a critical layer in modern defense-in-depth strategies. We'll explore what makes OWASP CRS the go-to choice for security teams, dive into the project's current innovations, and discuss how traditional rule-based security is evolving to work alongside — not against — AI. Segment Resources: github.com/coreruleset/coreruleset coreruleset.org The future of CycloneDX is defined by modularity, API-first design, and deeper contextual insight, enabling transparency that is not just comprehensive, but actionable. At its heart is the Transparency Exchange API, which delivers a normalized, format-agnostic model for sharing SBOMs, attestations, risks, and more across the software supply chain. As genAI transforms every sector of modern business, the security community faces a question: how do we protect systems we can't fully see or understand? In this fireside chat, Aruneesh Salhotra, Project Lead for OWASP AIBOM and Co-Lead of OWASP AI Exchange, discusses two groundbreaking initiatives that are reshaping how organizations approach AI security and supply chain transparency. OWASP AI Exchange has emerged as the go-to single resource for AI security and privacy, providing over 200 pages of practical advice on protecting AI and data-centric systems from threats. Through its official liaison partnership with CEN/CENELEC, the project has contributed 70 pages to ISO/IEC 27090 and 40 pages to the EU AI Act security standard OWASP, achieving OWASP Flagship project status in March 2025. Meanwhile, the OWASP AIBOM Project is establishing a comprehensive framework to provide transparency into how AI models are built, trained, and deployed, extending OWASP's mission of making security visible to the rapidly evolving AI ecosystem. This conversation explores how these complementary initiatives are addressing real-world challenges—from prompt injection and data poisoning to model provenance and supply chain risks—while actively shaping international standards and regulatory frameworks. We'll discuss concrete achievements, lessons learned from global collaboration, and the ambitious roadmap ahead as these projects continue to mature and expand their impact across the AI security landscape. Segment Resources: https://owasp.org/www-project-aibom/ https://www.linkedin.com/posts/aruneeshsalhotra_owasp-ai-aisecurity-activity-7364649799800766465-DJGM/ https://www.youtube.com/@OWASPAIBOM https://www.youtube.com/@RobvanderVeer-ex3gj https://owaspai.org/ Agentic AI introduces unique and complex security challenges that render traditional risk management frameworks insufficient. In this keynote, Ken Huang, CEO of Distributedapps.ai and a key contributor to AI security standards, outlines a new approach to manage these emerging threats. The session will present a practical strategy that integrates the NIST AI Risk Management Framework with specialized tools to address the full lifecycle of Agentic AI. Segment Resources: aivss.owasp.org https://kenhuangus.substack.com/p/owasp-aivss-the-new-framework-for https://cloudsecurityalliance.org/blog/2025/02/06/agentic-ai-threat-modeling-framework-maestro This interview is sponsored by the OWASP GenAI Security Project. Visit https://securityweekly.com/owaspappsec to watch all of CyberRisk TV's interviews from the OWASP 2025 Global AppSec Conference! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-363
In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (CRS) project. Felipe has been at the forefront of open-source security, leading the development of one of the world's most widely deployed WAF rule sets, trusted by organizations globally to protect their web applications. Felipe explains why WAFs remain a critical layer in modern defense-in-depth strategies. We'll explore what makes OWASP CRS the go-to choice for security teams, dive into the project's current innovations, and discuss how traditional rule-based security is evolving to work alongside — not against — AI. Segment Resources: github.com/coreruleset/coreruleset coreruleset.org The future of CycloneDX is defined by modularity, API-first design, and deeper contextual insight, enabling transparency that is not just comprehensive, but actionable. At its heart is the Transparency Exchange API, which delivers a normalized, format-agnostic model for sharing SBOMs, attestations, risks, and more across the software supply chain. As genAI transforms every sector of modern business, the security community faces a question: how do we protect systems we can't fully see or understand? In this fireside chat, Aruneesh Salhotra, Project Lead for OWASP AIBOM and Co-Lead of OWASP AI Exchange, discusses two groundbreaking initiatives that are reshaping how organizations approach AI security and supply chain transparency. OWASP AI Exchange has emerged as the go-to single resource for AI security and privacy, providing over 200 pages of practical advice on protecting AI and data-centric systems from threats. Through its official liaison partnership with CEN/CENELEC, the project has contributed 70 pages to ISO/IEC 27090 and 40 pages to the EU AI Act security standard OWASP, achieving OWASP Flagship project status in March 2025. Meanwhile, the OWASP AIBOM Project is establishing a comprehensive framework to provide transparency into how AI models are built, trained, and deployed, extending OWASP's mission of making security visible to the rapidly evolving AI ecosystem. This conversation explores how these complementary initiatives are addressing real-world challenges—from prompt injection and data poisoning to model provenance and supply chain risks—while actively shaping international standards and regulatory frameworks. We'll discuss concrete achievements, lessons learned from global collaboration, and the ambitious roadmap ahead as these projects continue to mature and expand their impact across the AI security landscape. Segment Resources: https://owasp.org/www-project-aibom/ https://www.linkedin.com/posts/aruneeshsalhotra_owasp-ai-aisecurity-activity-7364649799800766465-DJGM/ https://www.youtube.com/@OWASPAIBOM https://www.youtube.com/@RobvanderVeer-ex3gj https://owaspai.org/ Agentic AI introduces unique and complex security challenges that render traditional risk management frameworks insufficient. In this keynote, Ken Huang, CEO of Distributedapps.ai and a key contributor to AI security standards, outlines a new approach to manage these emerging threats. The session will present a practical strategy that integrates the NIST AI Risk Management Framework with specialized tools to address the full lifecycle of Agentic AI. Segment Resources: aivss.owasp.org https://kenhuangus.substack.com/p/owasp-aivss-the-new-framework-for https://cloudsecurityalliance.org/blog/2025/02/06/agentic-ai-threat-modeling-framework-maestro This interview is sponsored by the OWASP GenAI Security Project. Visit https://securityweekly.com/owaspappsec to watch all of CyberRisk TV's interviews from the OWASP 2025 Global AppSec Conference! Show Notes: https://securityweekly.com/asw-363
In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (CRS) project. Felipe has been at the forefront of open-source security, leading the development of one of the world's most widely deployed WAF rule sets, trusted by organizations globally to protect their web applications. Felipe explains why WAFs remain a critical layer in modern defense-in-depth strategies. We'll explore what makes OWASP CRS the go-to choice for security teams, dive into the project's current innovations, and discuss how traditional rule-based security is evolving to work alongside — not against — AI. Segment Resources: github.com/coreruleset/coreruleset coreruleset.org The future of CycloneDX is defined by modularity, API-first design, and deeper contextual insight, enabling transparency that is not just comprehensive, but actionable. At its heart is the Transparency Exchange API, which delivers a normalized, format-agnostic model for sharing SBOMs, attestations, risks, and more across the software supply chain. As genAI transforms every sector of modern business, the security community faces a question: how do we protect systems we can't fully see or understand? In this fireside chat, Aruneesh Salhotra, Project Lead for OWASP AIBOM and Co-Lead of OWASP AI Exchange, discusses two groundbreaking initiatives that are reshaping how organizations approach AI security and supply chain transparency. OWASP AI Exchange has emerged as the go-to single resource for AI security and privacy, providing over 200 pages of practical advice on protecting AI and data-centric systems from threats. Through its official liaison partnership with CEN/CENELEC, the project has contributed 70 pages to ISO/IEC 27090 and 40 pages to the EU AI Act security standard OWASP, achieving OWASP Flagship project status in March 2025. Meanwhile, the OWASP AIBOM Project is establishing a comprehensive framework to provide transparency into how AI models are built, trained, and deployed, extending OWASP's mission of making security visible to the rapidly evolving AI ecosystem. This conversation explores how these complementary initiatives are addressing real-world challenges—from prompt injection and data poisoning to model provenance and supply chain risks—while actively shaping international standards and regulatory frameworks. We'll discuss concrete achievements, lessons learned from global collaboration, and the ambitious roadmap ahead as these projects continue to mature and expand their impact across the AI security landscape. Segment Resources: https://owasp.org/www-project-aibom/ https://www.linkedin.com/posts/aruneeshsalhotra_owasp-ai-aisecurity-activity-7364649799800766465-DJGM/ https://www.youtube.com/@OWASPAIBOM https://www.youtube.com/@RobvanderVeer-ex3gj https://owaspai.org/ Agentic AI introduces unique and complex security challenges that render traditional risk management frameworks insufficient. In this keynote, Ken Huang, CEO of Distributedapps.ai and a key contributor to AI security standards, outlines a new approach to manage these emerging threats. The session will present a practical strategy that integrates the NIST AI Risk Management Framework with specialized tools to address the full lifecycle of Agentic AI. Segment Resources: aivss.owasp.org https://kenhuangus.substack.com/p/owasp-aivss-the-new-framework-for https://cloudsecurityalliance.org/blog/2025/02/06/agentic-ai-threat-modeling-framework-maestro This interview is sponsored by the OWASP GenAI Security Project. Visit https://securityweekly.com/owaspappsec to watch all of CyberRisk TV's interviews from the OWASP 2025 Global AppSec Conference! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-363
In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (CRS) project. Felipe has been at the forefront of open-source security, leading the development of one of the world's most widely deployed WAF rule sets, trusted by organizations globally to protect their web applications. Felipe explains why WAFs remain a critical layer in modern defense-in-depth strategies. We'll explore what makes OWASP CRS the go-to choice for security teams, dive into the project's current innovations, and discuss how traditional rule-based security is evolving to work alongside — not against — AI. Segment Resources: github.com/coreruleset/coreruleset coreruleset.org The future of CycloneDX is defined by modularity, API-first design, and deeper contextual insight, enabling transparency that is not just comprehensive, but actionable. At its heart is the Transparency Exchange API, which delivers a normalized, format-agnostic model for sharing SBOMs, attestations, risks, and more across the software supply chain. As genAI transforms every sector of modern business, the security community faces a question: how do we protect systems we can't fully see or understand? In this fireside chat, Aruneesh Salhotra, Project Lead for OWASP AIBOM and Co-Lead of OWASP AI Exchange, discusses two groundbreaking initiatives that are reshaping how organizations approach AI security and supply chain transparency. OWASP AI Exchange has emerged as the go-to single resource for AI security and privacy, providing over 200 pages of practical advice on protecting AI and data-centric systems from threats. Through its official liaison partnership with CEN/CENELEC, the project has contributed 70 pages to ISO/IEC 27090 and 40 pages to the EU AI Act security standard OWASP, achieving OWASP Flagship project status in March 2025. Meanwhile, the OWASP AIBOM Project is establishing a comprehensive framework to provide transparency into how AI models are built, trained, and deployed, extending OWASP's mission of making security visible to the rapidly evolving AI ecosystem. This conversation explores how these complementary initiatives are addressing real-world challenges—from prompt injection and data poisoning to model provenance and supply chain risks—while actively shaping international standards and regulatory frameworks. We'll discuss concrete achievements, lessons learned from global collaboration, and the ambitious roadmap ahead as these projects continue to mature and expand their impact across the AI security landscape. Segment Resources: https://owasp.org/www-project-aibom/ https://www.linkedin.com/posts/aruneeshsalhotra_owasp-ai-aisecurity-activity-7364649799800766465-DJGM/ https://www.youtube.com/@OWASPAIBOM https://www.youtube.com/@RobvanderVeer-ex3gj https://owaspai.org/ Agentic AI introduces unique and complex security challenges that render traditional risk management frameworks insufficient. In this keynote, Ken Huang, CEO of Distributedapps.ai and a key contributor to AI security standards, outlines a new approach to manage these emerging threats. The session will present a practical strategy that integrates the NIST AI Risk Management Framework with specialized tools to address the full lifecycle of Agentic AI. Segment Resources: aivss.owasp.org https://kenhuangus.substack.com/p/owasp-aivss-the-new-framework-for https://cloudsecurityalliance.org/blog/2025/02/06/agentic-ai-threat-modeling-framework-maestro This interview is sponsored by the OWASP GenAI Security Project. Visit https://securityweekly.com/owaspappsec to watch all of CyberRisk TV's interviews from the OWASP 2025 Global AppSec Conference! Show Notes: https://securityweekly.com/asw-363
When it was time for Adam's birthday, he wanted to do as he always does; spread Eclipse Phase terror upon us. A group of Firewall agents are at an AGI research center. They have their target, an AGI named Idris. On the other side of the door is a Reaper Morph, however. Using their skills, and some handy flashbacks, can the agents keep their objective, and their heads...?Idris is a one shot designed by Adam for Eclipse Phase 2E, a game of transhumanism, horror, and science fiction. Eclipse Phase 2E is available at Posthuman's website, along with 1E and various supplements and merch.Adam - GMDan - EllisJared - Amaru TimotiLaura - BerkVince - Pivo
On this week's Ask a CISSP special episode of The Other Side of the Firewall, I talk with Air Force veteran and cybersecurity leader Ahmad Rashaan Austin about his journey from zero computer skills to founder of Cy3 Security, LLC. We explore risk management, responsible AI adoption, leadership communication, and his new book, The Boundaryless Enterprise. If you're building a cyber career or leading tech teams, this episode delivers actionable insights straight from the front lines. Check it out on your favorite podcast platform! Buy Ahmad R. Austin's The Boundaryless Enterprise: Redesigning Oversight for the Age of Intelligent Systems https://a.co/d/dfCToig Please LISTEN
In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss the latest cybersecurity news, focusing on North Korea's significant cryptocurrency thefts, the detection of cyber threats through keystroke analysis, and the implications of AI in cybersecurity. They also touch on personal experiences and reflections on the evolving landscape of technology and security. Article: North Korea just had its biggest year ever stealing cryptocurrency https://finance.yahoo.com/news/north-korea-just-had-its-biggest-year-ever-stealing-cryptocurrency-130002485.html Keystroke Ghost: How Amazon's 110ms Delay Exposed a North Korean IT Infiltrator https://www.webpronews.com/keystroke-ghost-how-amazons-110ms-delay-exposed-a-north-korean-it-infiltrator/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExeFNQWGZZSjhSdjBUbnJVTnNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR42Plpw46V61Fak4n0ubUbJaCyah2NbNbHfqqB80TTgjM4-O89CH0K8nIlBYA_aem_1j6DNfdyHXuwi7ByRXEBeQ Avoiding AI Pitfalls in 2026: Lessons Learned from Top 2025 Incidents https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2025/avoiding-ai-pitfalls-in-2026-lessons-learned-from-top-2025-incidents?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExeFNQWGZZSjhSdjBUbnJVTnNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR4cDDWs3bszO8C-146-cBvsjDkO7sqcDBab9sWF8muWCeYu4GW4diRuAjYrvA_aem_aFLSBv4pbCqMCSFMIzzq0w Buy the guide: https://www.theothersideofthefirewall.com/ Please LISTEN
Privacy-Serie Teil 6: In dieser Episode werfen wir einen Blick hinter die Kulissen des Internets: Wie funktioniert es technisch? Was sind ISPs, IPs und DNS? Und vor allem – welche Risiken für unsere Privatsphäre lauern auf dem Weg ins Netz? Wir erzählen die Geschichte vom ARPANET bis zur Glasfaser, hören Originaltöne von Bill Gates und Senator Ted Stevens und erklären verständlich, wie VPNs, Tor und DNS-Verschlüsselung helfen können, auch im WWW Privatsphäre zu wahren. Dazu gibt's ein Gespräch mit einem alten Nodesignal-Bekannten – Cerca! Von Cerca erfahren wir, wie wir selbstbestimmt online gehen können.Von und mit: - Chris - CercatrovaProduziert und geschnitten: ChrisHier könnt ihr uns eine Spende über Lightning da lassen: ⚡️nodesignal@getalby.comNeben dem Podcast findet ihr uns auch auf YouTubeFür Feedback und weitergehenden Diskussionen kommt gerne in die Telegramgruppe von Nodesignal und bewertet uns bei Spotify und Apple Podcasts, das hilft uns sehr. Folgt uns auch gerne bei Nostr:npub1n0devk3h2l3rx6vmt24a3lz4hsxp7j8rn3x44jkx6daj7j8jzc0q2u02cy und Twitter.Blockzeit: 928298Cerca auf Nostr: npub1nxzp3zn90r44z07aeajc7wyah4fju49c9d3g45mxvmm64rmnrdusffch7mSRF - Die Cookie Falle Nodesignal-Talk - E204 - Hey Calso, why privacy matters!Nodesignal-Talk - E211 - Mobiltelefon mag Metadaten(1) mit Max HillebrandNodesignal-Talk – E215 – DAS MEGA-META-DATEN-RABBIT-HOLENodesignal-Talk - E222 - GrapheneOS mit JohannesNodesignal-Talk - E250 - Privacy 5 - Linux im GymInternet Society – A Brief History of the InternetKompakter Überblick zur technischen und sozialen Entwicklung des Internets seit den 1960ern.A Brief History of the InternetYouTube: Bill Gates erklärt 1995 das Internet bei LettermanLegendäres Talkshow-Interview – Gates beschreibt das Internet, Publikum reagiert skeptisch.https://www.youtube.com/watch?v=JUs7iG1mNjIWikipedia – “Series of tubes” (Ted Stevens, 2006)Ursprung und Folgen der berühmten „Röhren“-Analogie aus dem US-Senat.Series of tubes - WikipediaCloudflare Lernzentrum – Wie funktioniert das Internet?Übersicht über Routing, DNS, Backbone, Protokolle, IP und mehr.How does the Internet work? | CloudflareMullvad Blog: Hausdurchsuchung 2023 – Keine Nutzerdaten vorhandenReale Prüfung des No-Logs-Versprechens.https://mullvad.net/en/blog/2023/5/3/mullvad-vpn-was-subjected-to-a-search-warrant/Tor Project – Offizielle Einführung und technische ErklärungFunktionsweise, Onion-Routing, Sicherheit, Anwendungsbereiche.About TorMozilla: Was ist DNS-over-HTTPS (DoH)?Technische Einführung zur verschlüsselten DNS-Auflösung im Browser.https://support.mozilla.org/de/kb/dns-ueber-https-doVerivox – Geschichte der Internet-Flatrate in DeutschlandEntwicklung von Minutenabrechnung über Volumentarife bis zur Flatrate.https://www.verivox.de/themen/internet/internet-flatrate/Bundesnetzagentur – Netzneutralität und VerkehrsmanagementAktuelle rechtliche Lage und Diskussion in Deutschland und der EU.https://www.bundesnetzagentur.de/DE/Sachgebiete/Telekommunikation/Unternehmen_Institutionen/Netzneutralitaet/netzneutralitaet-node.htmlMusik - alle Songs sind Royalty Free – Danke für den guten Sound!!!Aaron Kenny - The curious kitten Emmit Fenn - AloneYung Logos - Mysterious Strange Things Qincas Moreira - Bunny Hop pATCHES - Consciousness Rabbit True Cuckoo - This is Not a dolphinJohn Patitucci - On the DeltaThe Soundlings - Moving in the shadows John Patitucci - Spaghetti EasternTimestamps:(00:00:00) Intro(00:00:22) Intro Internet(00:04:50) Die Geschichte des Internets(00:09:08) Wie funktioniert das Internet?(00:12:42) Angriffspunkte für Überwachung und Tracking(00:18:15) Alternative Zugänge zum Internet(00:19:11) Tools für mehr Privatsphäre(00:27:10) Zusammenfassung Intro & Start Interview mit Cerca(00:30:04) Cerca, wie funktioniert das Internet?(00:34:11) Wie gläsern macht uns der Internetanbieter(00:36:38) Wie sicher sind VPNs?(00:40:29) OPNsens(00:42:34) DNS?(00:51:50) TOR Browser und Onion Routing(00:58:07) Wo nutze ich VPN und wo TOR?(01:01:13) Firewall(01:06:22) Was ist der alltagstaugliche Mittelweg?(01:21:46) Wie steht es um die Regulierung in der CH?(01:26:18) Danke an Cerca und Focus on the ...
Cyber attacks are no longer a future problem or a Silicon Valley issue. They are happening right now across the United States, quietly and relentlessly, targeting local governments, public agencies, schools, police departments, fire services, and critical infrastructure that most people rely on every day. In this episode of the Security Squawk Podcast, we break down the uncomfortable truth about the current cyber threat landscape and why much of it is flying under the radar. We start with a major data breach involving 700Credit, a financial services company widely used by car dealerships across the country. The breach impacted an estimated 5.8 million consumers, exposing sensitive personal information including names, addresses, birth dates, and Social Security numbers. What makes this incident especially troubling is that it originated through a third-party integration and went undetected until it was too late. This is a textbook example of how supply chain risk, weak API oversight, and poor third-party visibility continue to plague organizations of all sizes. For business owners, IT leaders, and managed service providers, this breach highlights a critical lesson. Security controls inside your own environment are meaningless if your partners, vendors, or integrations are not held to the same standard. Attackers know this, and they are exploiting it aggressively. Next, we shift to a growing and deeply concerning trend involving nation-state threat actors, particularly Russian-backed groups targeting network edge devices. Firewalls, VPN appliances, routers, and other edge infrastructure are now prime targets because they offer direct access to internal networks and often remain poorly monitored or improperly configured. These attacks are not always sophisticated zero-day exploits. In many cases, they succeed because of exposed management interfaces, outdated firmware, or weak credentials. This matters because edge devices sit at the front door of nearly every organization. Once compromised, they allow attackers to persist quietly, move laterally, and stage future attacks without triggering traditional endpoint defenses. The takeaway is clear. If you are not actively inventorying, patching, and monitoring your edge infrastructure, you are already behind. Then we pull the lens back even further and focus on what may be the most underreported cyber crisis happening today. Public sector organizations across the United States are under sustained cyber attack. Cities, towns, school districts, emergency services, and municipal agencies are being hit week after week. These incidents rarely make national headlines. Instead, they show up in small local news outlets, if they are reported at all. We discuss a real-world incident in Attleboro, Massachusetts, where a cybersecurity event disrupted online municipal services and briefly appeared on local television. Stories like this are happening everywhere. From ransomware attacks that shut down city services to breaches that expose resident data, public organizations are being targeted because attackers know they are often underfunded, understaffed, and slow to recover. Using data from ransomware.live and other tracking resources, we highlight how widespread these attacks really are. Thousands of U.S.-based victims are logged publicly, many of them tied to government or quasi-government entities. This is not random. It is a calculated strategy by cybercriminals who understand the pressure public agencies face to restore services quickly, often making them more likely to pay ransoms or quietly rebuild without public disclosure. Throughout the episode, we connect these stories to practical lessons for businesses, MSPs, and IT professionals. Cybersecurity is no longer about preventing every breach. It is about resilience, visibility, and response. It is about understanding where your real risk lies and taking proactive steps before an incident forces your hand. If you work in IT, run an MSP, manage infrastructure, or support public organizations, this episode delivers insight you can use immediately. We cut through the noise, skip the fear marketing, and focus on what actually matters in today's threat environment. Security Squawk exists to make cybersecurity real, relevant, and actionable. If this episode brings value to you, please subscribe, leave a review, and share it with someone who needs to hear it. And if you want to support the show directly, the easiest way is to buy us a coffee at https://buymeacoffee.com/securitysquawk Your support helps us keep producing honest conversations about the threats most people never see until it's too late.
Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China's Great Firewall. Across both parts, you break down thousands of leaked documents, source code repositories, diagrams, packet captures, and telemetry that reveal how systems like the Traffic Secure Gateway, MAAT, Redis-based analytics, and modular DPI engines work together to censor, surveil, and fingerprint users at scale. Taken together, the research shows how the Great Firewall functions not just as a technical system, but as a living censorship-industrial complex that adapts, learns, and coordinates across government, telecoms, and security vendors. The research can be found here: Inside the Great Firewall Part 1: The Dump Inside the Great Firewall Part 2: Technical Infrastructure Learn more about your ad choices. Visit megaphone.fm/adchoices
Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China's Great Firewall. Across both parts, you break down thousands of leaked documents, source code repositories, diagrams, packet captures, and telemetry that reveal how systems like the Traffic Secure Gateway, MAAT, Redis-based analytics, and modular DPI engines work together to censor, surveil, and fingerprint users at scale. Taken together, the research shows how the Great Firewall functions not just as a technical system, but as a living censorship-industrial complex that adapts, learns, and coordinates across government, telecoms, and security vendors. The research can be found here: Inside the Great Firewall Part 1: The Dump Inside the Great Firewall Part 2: Technical Infrastructure Learn more about your ad choices. Visit megaphone.fm/adchoices
FreeBSD 15 release, moving from OpenBSD to FreeBSD, ZFS Boot Environments explained, and more... NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines Welcome to the world FreeBSD 15.0-RELEASE Announcement (https://www.freebsd.org/releases/15.0R/announce/) and Release Notes (https://www.freebsd.org/releases/15.0R/relnotes/) We're (now) moving from OpenBSD to FreeBSD for Firewalls (https://utcc.utoronto.ca/~cks/space/blog/sysadmin/OpenBSDToFreeBSDMove) - Submitted by listener Gary News Roundup ZFS Boot Environments Explained (https://vermaden.wordpress.com/2025/11/25/zfs-boot-environments-explained/) Why I (still) love Linux (https://it-notes.dragas.net/2025/11/24/why-i-still-love-linux/) rocinante - A configuration management tool by the BastilleBSD team (https://github.com/BastilleBSD/rocinante) A Grown-up ZFS Data Corruption Bug (https://github.com/oxidecomputer/oxide-and-friends/blob/master/2025_11_24.md) and YouTube (https://www.youtube.com/watch?v=srKYxF66A0c) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Claudio - A Silent Reflection (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/641/feedback/Claudio%20-%20Reflection.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
What does it take to unseat a 20-year incumbent? Raj Goyle — fresh off his successful campaign to ban smartphones in New York schools — returns to Firewall to discuss why and how he's running for state comptroller. First step: Convincing voters that the often overlooked position has untapped power to make real progress on affordability.This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
Got a question or comment? Message us here!This week's #SOCBrief dives into the FortiWeb zero-day that's letting attackers create admin accounts with a single unauthenticated HTTP request. With exploitation spiking and Fortinet pushing out a quiet fix, SOC teams are under pressure to lock down configs, audit firewalls, and patch fast. We break down what happened, who's affected, and how to defend before attackers pivot deeper into your network.Support the showWatch full episodes at youtube.com/@aliascybersecurity.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.
Cyberangriffe werden härter, schneller und professioneller – doch wie sieht echte Abwehrarbeit im Alltag aus? In dieser Folge sprechen wir mit Dirk Reimers und Jannik Pewny von secunet über Pentesting, Incident Response und die Realität moderner Cybersecurity. Dirk erklärt, wie sich Pentests entwickelt haben, warum „einmal von außen auf die Firewall schauen“ selten ausreicht und wo Unternehmen heute den größten Impact erzielen. Jannik nimmt uns mit in den Ernstfall: Wie läuft ein Incident ab, welche Datenquellen zählen wirklich und wie bringt man Systeme wieder hoch? Außerdem sprechen wir über Teamkultur, den Einstieg in Pentest/IR/Forensik, gesuchte Profile und die On-Call-Realität im IR-Team. Wenn du wissen willst, wie moderne Cyberabwehr wirklich funktioniert – hör rein!
Join Wendy and Nate as they battle robot headaches, wrangle 3D printers, and bring tech holiday spirit to life! From migraine workarounds and sodium science, through epic 3D printing adventures (featuring OctoEverywhere!), to home automation, Docker disasters, and retro gaming resurrection, this episode is packed with open-source laughs and memorable tangents. Whether you love building robots or naming your Wi-Fi something wild, you'll find plenty of creative fuel—and team banter—in this jam-packed ride! Find the rest of the show notes at: https://tuxdigital.com/podcasts/linux-out-loud/lol-117/
Cyber Command names a new head of AI. The UK introduces its long-delayed Cyber Security and Resilience Bill. Researchers highlight a critical Oracle Identity Manager flaw. Salesforce warns customers of a third-party data breach. Italy's state-owned railway operator leaks sensitive information. SonicWall patches firewalls and email security devices. The US charges four individuals with conspiring to illegally export restricted Nvidia AI chips to China. The SEC drops its lawsuit against SolarWinds. NSO group claims a permanent injunction could cause irreparable and potentially existential harm. Maria Varmazis of the T-Minus Space Daily show sits down with General Daniel Karbler (Ret.) to discuss his consulting work for A House of Dynamite, the newly released Netflix film. Roses are red, violets are blue, this poem just jailbroke your AI too. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Maria Varmazis of the T-Minus Space Daily show sits down with Lt. General Daniel Karbler (Ret.) to discuss his consulting work for A House of Dynamite, the newly released Netflix film. This is an excerpt of T-Minus Deep Space airing tomorrow in all of your favorite podcast app. Selected Reading Cyber Command Taps Reid Novotny as New AI Chief (MeriTalk) UK's New Cybersecurity Bill Takes Aim at Ransomware Gangs and State-Backed Hackers (Fortra) Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day (SecurityWeek) Salesforce alerts customers of data breach traced to a supply chain partner (CXOtoday) Massive data leak hits Italian railway operator Ferrovie dello Stato via Almaviva hack (Security Affairs) SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance (SecurityWeek) Four charged with plotting to sneak Nvidia chips into China (The Register) SEC voluntarily dismisses SolarWinds lawsuit (The Record) NSO Group argues WhatsApp injunction threatens existence, future U.S. government work (CyberScoop) Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models (Arxiv) Freesound Music Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Christopher und Sylvester knöpfen sich ein lange gewünschtes und äußerst umfangreiches Thema vor. Es geht um das System, mit dem China sein nationales Internet abschottet, die sogenannte Große Chinesische Firewall. Die Hosts erzählen, woher das System kommt, wie es technisch funktioniert und weiterentwickelt wird – und wie auch die Gegner ihre Anti-Zensur-Systeme um immer neue Tricks erweitern. Außerdem geht es im Podcast um die Kommerzialisierung der Zensur, denn China hat längst damit begonnen, Systeme wie die der chinesischen Firewall auch an andere Staaten zu verkaufen. - Chromes XSLT-Abschaltung: https://developer.chrome.com/docs/web-platform/deprecating-xslt - Report zum Geedge-Leak: https://interseclab.org/wp-content/uploads/2025/09/The-Internet-Coup_September2025.pdf - Analyseprojekte und Testwebseiten für die Firewall - GFWatch: https://gfwatch.org - GFWeb: https://gfweb.ca - Chinese Firewall Test: https://viewdns.info/chinesefirewall/ - Anti-Zensur-Werkzeuge: - Trojan: https://github.com/trojan-gfw/trojan - Shadowsocks: https://shadowsocks.org - Project V: https://www.v2fly.org/en_US/ - Outline: https://getoutline.org - Lantern: https://lantern.io - Psiphon: https://psiphon.ca - Conjure: https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/conjure - Folgt uns im Fediverse: - @christopherkunz@chaos.social - @syt@social.heise.de
This episode features Nathan Wenzler, Field Chief Information Security Officer at Optiv.With nearly 30 years of experience leading cybersecurity programs across government agencies, nonprofits, and Fortune 1000 companies, Nathan has spent his career at the intersection of people, process, and technology. He's helped organizations redefine what it means to build security cultures that actually work.In this episode, Nathan explains why communication (not technology) s a CISO's most important skill, how to create a culture that values security without slowing innovation, and why empathy may be the most underrated tool in cybersecurity.This is an insightful look at the people-first mindset behind stronger, more resilient security programs.Guest Bio Nathan Wenzler is a field chief information security officer at Optiv, where he advises clients on how to strengthen and optimize every aspect of their cybersecurity program. With nearly 30 years of experience, he has built and led security initiatives for government agencies, nonprofits and Fortune 1000 companies.Wenzler has served as a CISO, executive management consultant and senior analyst, holding leadership roles at Tenable, Moss Adams, AsTech and Thycotic. He also spent more than a decade in public sector IT and security roles with Monterey County, California, and supported state and federal agencies.He is known for helping security leaders better communicate the measurable value and benefit of a mature, effective cybersecurity program to executives, technical stakeholders and nontechnical business partners. His approach emphasizes not only technical excellence but also the human and organizational factors that drive long-term security success.Wenzler has spoken at more than 400 events worldwide, educating security leaders and professionals on how to excel in their role as an organization's risk expert. He has also served on advisory boards, including the Tombolo Institute at Bellevue College, and is a former member of the Forbes Technology Council. His areas of expertise include vulnerability and exposure management, privileged access management and identity governance, cyber risk management, incident response, and executive-level communications and program managementGuest Quote “If you can win the people over in your organization, you can make those big changes for better identity governance.”Time stamps 01:22 Meet Nathan Wenzler: Veteran CISO and Security Strategist 02:16 Redefining Identity in a World of Infinite Accounts 05:15 How Culture Can Make or Break Your Security Program 13:34 Winning Over the Business: Aligning Security and Culture 24:45 From “Department of No” to Trusted Partner: Fixing Cyber Communication 40:25 The Human Side of Incident Response 46:23 Leading with Empathy: Nathan's Advice for Security LeadersSponsorThe HIP Podcast is brought to you by Semperis, the leader in identity-driven cyber resilience for the hybrid enterprise. Trusted by the world's leading businesses, Semperis protects critical Active Directory environments from cyberattacks, ensuring rapid recovery and business continuity when every second counts. Visit semperis.com to learn more.LinksConnect with Nathan on LinkedInLearn more about OptivConnect with Sean on LinkedInDon't miss future episodesLearn more about Semperis
When the internet was created, the goal was the free-flowing of shared information for the good of humanity; what resulted was much more sinister than that. Every day, we use the internet to do our jobs, complete our shopping, and study our bible. However, if we are not careful, the internet can lead us to pornography, inappropriate relationships, gambling addictions, and more. We think we have the willpower to resist all the daily temptations on the internet, but statistics now prove we do not. Huge percentages of men and women, teens, and children have been exposed to pornography on the internet and find themselves driven to view more and more of it. Create a work and home environment where God can heal and stop this destruction. Put some digital armor in place, because the devil prowls around like a roaring lion looking for someone to devour.
Margherita Bassi -Regular contributor for Smithsonian Magazine, Gizmodo, Popular Science - AI Videos of animals could be dangerous, Did you fall for the Deepfake of NVIDIA CEO? My Insurance company used AI to estimate my car's damage. Going on-prem saved a company a ton of money! Can I add USB ports to my computer? Firewall dangers, Laptop Battery issues, Upgraded from cable to fiber and my network name is the same.
In this episode of Life of a CISO, Dr. Eric Cole sits down with Attila Torok, CISO at GoTo (formerly LogMeIn), to unpack what it really takes to move from security engineer to strategic leader. Attila shares his journey, the advice that shaped his career, and why "relationships matter more than engineering skills." From mastering executive communication in three bullet points to building your personal brand and navigating AI in the enterprise, this conversation is packed with practical insight for anyone aspiring to the C-suite in cybersecurity.
In this episode of Life of a CISO, Dr. Eric Cole sits down with Attila Torok, CISO at GoTo (formerly LogMeIn), to unpack what it really takes to move from security engineer to strategic leader. Attila shares his journey, the advice that shaped his career, and why "relationships matter more than engineering skills." From mastering executive communication in three bullet points to building your personal brand and navigating AI in the enterprise, this conversation is packed with practical insight for anyone aspiring to the C-suite in cybersecurity.
Today, while laying a wreath at the Tomb of the Unknown Soldier, Trump referred to those who serve in the military as "a mighty wall of flesh & blood." TDS sufferers get their undies in serious bundles.
Happy Veterans Day! In this episode of the Other Side of the Firewall podcast, host Ryan Williams Sr. interviews Bryce Englin, a retired Air Force veteran with extensive experience in IT and project management. They discuss the transition from military to civilian leadership, the importance of feedback and mentorship, and the challenges facing the IT and cybersecurity sectors today. Bryce emphasizes the need for organizations to empower their employees, build trust, and recognize individual contributions. The conversation also touches on the future of IT education, the role of certifications, and the significance of cybersecurity in a global context. Buy the guide: https://www.theothersideofthefirewall.com/ Please LISTEN
In this JuvoHub Podcast episode, Jonathan Saar brings cybersecurity down to earth for property management professionals. Instead of diving into tech jargon, he compares digital safety to something we all understand,fire prevention. Just like fire extinguishers and alarms, cybersecurity tools only work if we know how to use and maintain them. Jonathan explores how awareness, company policies, and phishing tests can help keep resident, employee, and prospect information safe from growing digital threats, including those powered by AI. TL;DR: You don't need to be a tech expert to protect your property's data—just stay aware, stay informed, and follow your company's safety practices. Key Takeaways 00:00 – Hook: Why cybersecurity matters for everyone—not just IT. 00:36 – The Analogy: Fire extinguishers, alarms, and data protection. 01:20 – Understanding vs. Implementation: Awareness is your first defense. 02:00 – AI and New Threats: How technology creates new cybersecurity risks. 02:27 – Personal Awareness: How your daily habits protect resident data. 03:05 – Phishing Tests: Why your company might be “testing” you for a reason. 03:45 – Final Thought: Caring for residents means caring for their digital safety. Awareness Is the Best Firewall You don't need to code to care about cybersecurity—just like you don't need to build a fire extinguisher to know it saves lives. In property management, protecting data starts with awareness, consistent training, and everyday vigilance. Stay informed, stay safe, and lead with care for your residents and team. Class Dismissed!
So what happened last night? In this co-production with Firewall friend Jamie Rubin and his After Hours podcast, Bradley, Jamie, and Chris Coffey (Tusk Strategies CEO) analyze the historic win of NYC's next mayor, Zohran Mamdani. What does it mean for Gov. Hochul's re-election next year? Will NYPD commissioner Jessica Tisch stay at the helm — despite major policy differences with Mamdani? And could the secret to affordability be the victorious ballot proposals to build more housing across the five boroughs?Discussed on today's episode:The Mamdani Mayoralty: A Six Part Mini-Magazine On What Comes Next by Bradley Tusk (11/05/25)Be sure to subscribe to After Hours, a Vital City podcast, wherever you get your podcasts.This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
LISTEN and SUBSCRIBE on:Apple Podcasts: https://podcasts.apple.com/us/podcast/watchdog-on-wall-street-with-chris-markowski/id570687608 Spotify: https://open.spotify.com/show/2PtgPvJvqc2gkpGIkNMR5i WATCH and SUBSCRIBE on:https://www.youtube.com/@WatchdogOnWallstreet/featured Donald Trump huddles with Senate Republicans, demanding they ditch the filibuster and end the shutdown so he can push a sweeping agenda he claims will secure permanent GOP dominance. Critics warn the move could backfire, pointing to history and party-switching senators as reminders that power swings both ways. A tense debate over strategy, legacy, and the future of congressional guardrails unfolds on Watchdog on Wall Street.
China-Linked hackers target Cisco firewalls. MIT Sloan withdraws controversial “AI-Driven Ransomware” paper. A new study questions the value of cybersecurity training. Hackers exploit OpenAI's API as a malware command channel. Apple patches over 100 Security flaws across devices. A Florida-based operator of mental health and addiction treatment centers exposes sensitive patient information. OPM plans a “mass deferment” for Cybercorps scholars affected by the government shutdown. Lawmakers urge the FTC to investigate Flock Safety's cybersecurity gaps. Cybercriminals team with organized crime for high-tech cargo thefts. Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies discussing ICE's controversial facial scanning initiative. A priceless theft meets a worthless password. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest We are joined by Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies discussing ICE's controversial facial scanning initiative. You can read more about Ben's topic from 404 Media: You Can't Refuse To Be Scanned by ICE's Facial Recognition App, DHS Document Says. Selected Reading China-Linked Hackers Target Cisco Firewalls in Global Campaign (Hackread) MIT Sloan shelves paper about AI-driven ransomware (The Register) CyberSlop — meet the new threat actor, MIT and Safe Security (DoublePulsar) Study concludes cybersecurity training doesn't work (KPBS Public Media) Microsoft: OpenAI API moonlights as malware HQ (The Register) Apple Patches 19 WebKit Vulnerabilities (SecurityWeek) Data Theft Hits Behavioral Health Network in 3 States (Bank Infosecurity) OPM plans to give CyberCorps members more time to find jobs after shutdown ends (CyberScoop) Lawmakers ask FTC to probe Flock Safety's cybersecurity practices (The Record) Cybercriminals, OCGs team up on lucrative cargo thefts (The Register) Louvre Robbery: Security Flaws: The (Obviously) Password Was "Louvre" (L'Unione Sarda) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Australia warns of BADCANDY attacks exploiting Cisco IOS XE Chinese hackers exploiting Cisco ASA firewalls used by governments worldwide OpenAI's Aardvark GPT-5 agent finds and fixes code flaws automatically Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero-trust endpoint protection platform, ThreatLocker fills the gaps traditional solutions leave behind, giving your business stronger security and control. Don't just react to threats — stop them with ThreatLocker. Find the stories behind the headlines at CISOseries.com.
In this bonus episode of Firewall, Rev. Al Sharpton, a major figure in Jonathan Mahler's book The Gods of New York: Egotists, Idealists, Opportunists, and the Birth of the Modern City: 1986-1990, joined the author and Tusk Strategies CEO Chris Coffey earlier in October for a spirited conversation about New York in the 1980s and how it set the stage for the politics of today.This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
Why aren't we happy? Chris Westbrook October 26nd, 2025
professorjrod@gmail.comThe mic feels heavier at 100—not from gear, but from history. We started with a doctoral dare, a $40 class, and a shaky first recording. We built a library that helped learners pass A+, Network+, and Security+ while connecting the dots between hardware, operating systems, storage, networking, and the human choices behind every device and policy. Along the way, our mission sharpened: pair skill with story, prioritize curiosity over checkboxes, and keep ethics at the center of cybersecurity and cloud.We revisit the moments that defined the journey: early fundamentals that formed a base, a pivot into security architecture and zero trust, and the realization that protocols carry purpose. DHCP becomes resource allocation. Firewalls express trust. Wireshark reveals perspective. The show grew with the audience—from notes to narratives to lived stories sent from classrooms, help desks, and late-night study sessions. A single email about subnets “finally clicking” mattered more than download spikes, shaping how we teach: simpler words, stronger analogies, and transparent context.Five pillars now anchor everything we make: accessibility for every learner and veteran, context that grounds acronyms in origin, curiosity that asks better questions, community that turns listeners into collaborators, and reflection that slows tech long enough for wisdom to land. We also share the personal side—health resets, renewed consistency, and the choice to keep going when the stats dip—because sustainable teaching requires a sustainable teacher.Looking ahead, we're doubling down on practical Q&A, live sessions, and clear paths through Network+, Security+, and cloud that never lose sight of ethics and inclusion. If you found value in the archive—from storage myths to authentication breakthroughs—help steer the next hundred. Subscribe, share with a friend who's studying, and send your biggest question for episode 101. Your curiosity sets the agenda.Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifySupport the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
It was right in the middle of a Transcranial Magnetic Stimulation session that Bradley had a brainstorm — an idea for a TV drama built around a conniving New York politico who hatches a plan to manipulate prediction markets. He titled it THE PREDICTORS, and in this Firewall episode, the audience (you) gets to play the part of a streaming executive as Bradley pitches us the show.RSVP to join Bradley this Thursday evening 10/23 at P&T Knitwear for a live event with Rev. Al Sharpton in conversation with NYT Magazine Staff Writer Jonathan Mahler, author of the new book, THE GODS OF NEW YORK: https://bit.ly/GodsOfNewYorkThis episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
曾被譽為國際金融中心,香港的繁榮並非單純仰賴勤奮的人民或單一的制度要素,而是歷史機遇、資本累積和制度設計在特定時空特殊性下的交集產物。香港成功的「時空特殊性」與「自由港」基因戰後香港急速發展,得益於兩個關鍵外在環境因素:資本與人力輸入: 1949 年中共建政後,大量來自上海等地的企業家攜帶資本、技術和商業網絡湧入香港;隨後數十年,中國大陸的動亂提供了源源不斷的廉價勞動力。這兩大生產要素的集中,為香港的工業化和貿易奠定了基礎。值得注意的是,湧入的上海資本不僅提供了資金,更帶來了當時中國最先進的營商知識和國際市場的脈絡,尤其在紡織和製造業方面。這批精英與本地既有的活躍商業社會結合,迅速提升了香港在國際貿易體系中的層級。廉價勞動力的持續供應,則使香港在亞洲其他國家尚未完成戰後復甦時,擁有巨大的生產成本優勢。區域競爭真空: 在 1950 至 1960 年代,亞洲其他主要競爭對手(如韓國、台灣和新加坡)尚處於戰後重建、內戰威脅或尋求獨立的階段,未能形成有效競爭。香港在冷戰格局下,享有近乎獨特的發展機遇。香港的制度核心是自由港(Free Port)精神,不僅是沒有關稅,更重要是有公平的司法制度。這種制度承諾,任何國家或政治勢力的資本,都能在香港進行可預期的商業活動。;公平待遇甚至延伸至宗主國的敵對勢力。例如在韓戰時期,香港商人依然能夠在禁運背景下與中國大陸進行貿易。儘管此舉在政治上具有爭議,但它體現了殖民地政府對商業利益與法治承諾的優先級,使香港成為一個能有效規避地緣政治風險的特殊交易節點。法治作為商業契約的最終仲裁者法治是維持其商業信任和國際地位的基石。法治的定義,並非僅指政府依法治國。通俗的理解,是個人與政府發生進行訴訟時,人民有合理勝訴的機會。法庭作為獨立的裁判者,能夠基於可推論的法理原則作出判決,從而制衡政府的行政權力不至為所欲為。英國殖民地時代,倫敦對香港是鞭長莫及的。英國政府的有效管治,必須仰賴香港本地社會精英。包括後來的商界與「地產黨」的合作與平衡。港英政府必須仰賴這些精英階層進行「協商式管治」,這間接使得權力無法集中於單一行政主體。這種多方勢力相互制衡的結構,導致了司法獨立作為一個相對中立的裁判機制得以強化。它的存在正正是建立在各方不可能有絕對的政治信任,反而令建立在制度的監督力量,成為所有人的最大公約數;透過一套可預見的規則體系,以制衡任何一方(包括政府自身)的越權以及對契約的反悔,也成為了商業社會的必要條件。然而,以上的這一套制衡機制,逐漸出現顯著崩壞。司法覆核等案件中市民勝訴率的驟降,正是制度衰退的量化體現。當市民與政府打官司時不再有合理的勝算機會,法院作為最終仲裁者的功能自然隨之瓦解。「一國兩制」的北京視角:體制防火牆與剩餘價值從北京的角度來看,「一國兩制」從來都不是為了保護香港人的自由生活方式,而是作為一個體制防火牆(Firewall),保護中國大陸的「內循環」免受自由市場與政治開放帶來的衝擊。香港曾是北京吸納國際資金、技術和賺取創匯唯一的門戶。而「創匯」一詞有雙重意義:一是為中國提供稀缺的外匯(如美元),用以在全球市場購買資源與技術;二是作為一個國際貿易窗口,將其產品輸出。香港作為活口,允許中國在保持內部政治高度控制的同時,能夠享受到國際金融和自由市場秩序的好處。然而,香港的存在由 2012 年後發生質變。一旦北京認為其經濟體量已足夠強大,或香港作為創匯平台的利用價值減弱,同時香港的自由氛圍開始對其內部構成政治風險(如太子黨資產在港曝光、異見書籍出版、民間政治動員),香港便從「經濟資產」轉變為「政治負債」。在這種權力邏輯下,當政治風險高於經濟效益時,全面控制便成為首要任務,體現了「可一不可再」的環境特殊性已然終結。這種控制的最終邏輯,是為固存政權的統治基礎。當經濟增長放緩,利益分配內捲(Involution)加劇,政權會傾向於打出民族主義(Nationalism)牌,以轉移內部矛盾。為了維護民族主義「洗刷百年屈辱」的敘事,必須徹底否定香港的殖民地過去(Colonial Past)以及由該歷史孕育出的制度優越性。這一否定過程導致了本地親北京的地產黨等社會精英被視為「用完即棄」的工具,因為維護其利益的必要性,已低於維護政權統治合法性的迫切性。只有在沒有絕對權力(Absence of Absolute Power)的社會狀態,人民才享有真正的自由(Liberty);尤其當行政、立法和司法三者之間存在有效制衡,且每一方都可能被司法機構挑戰時,公民權利和商業契約才得以保障。香港制度的衰落,是「絕對權力」(Absolute Power)進入一個本應由制衡力量維護的體制後,所導致的必然結果。 This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit leesimon.substack.com/subscribe
For years, China’s government has used what’s known as the “Great Firewall” to censor the internet inside its country and block access to select foreign websites. Now, a document leak shows that a little-known Chinese company is exporting these tools to other countries, including Myanmar, Pakistan, Kazakhstan and Ethiopia. Ali Rogin speaks with WIRED senior writer Zeyi Yang to learn more. PBS News is supported by - https://www.pbs.org/newshour/about/funders. Hosted on Acast. See acast.com/privacy
For years, China’s government has used what’s known as the “Great Firewall” to censor the internet inside its country and block access to select foreign websites. Now, a document leak shows that a little-known Chinese company is exporting these tools to other countries, including Myanmar, Pakistan, Kazakhstan and Ethiopia. Ali Rogin speaks with WIRED senior writer Zeyi Yang to learn more. PBS News is supported by - https://www.pbs.org/newshour/about/funders. Hosted on Acast. See acast.com/privacy
You've likely heard of Pareto's Principle or the 80/20 rule. Is there a way to achieve most of the benefits of crypto-agility with minimal effort? Palo Alto Networks has undoubtedly made its mark with firewalls and security detection and response offerings. We learn how they can also provide a rapid head start to PQC migration, covering everything from cryptographic inventory to creating wrappers for legacy app communications that need to remain secure against quantum computing threats. Even the latest version of their PAN-OS is PQC enabled. And you won't believe what they're seeing in network traffic: PQC used to hide hacking attacks? Join host Konstantinos Karagiannis for a wide-ranging chat with Rich Campagna from Palo Alto Networks where they cover practical ways to get your company ready for tomorrow. For more information on Palo Alto Networks, visit https://www.paloaltonetworks.com/. Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Building Better Defenses: RedTail Observations Defending against attacks like RedTail is more then blocking IoCs, but instead one must focus on the techniques and tactics attackers use. https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Sonicwall: It wasn t the user s fault Sonicwall admits to a breach resulting in the loss of user configurations stored in its cloud service https://www.sonicwall.com/support/knowledge-base/mysonicwall-cloud-backup-file-incident/250915160910330 Crowdstrike has Issues Crowdstrike fixes two vulnerabilities in the Windows version of its Falcon sensor. https://www.crowdstrike.com/en-us/security-advisories/issues-affecting-crowdstrike-falcon-sensor-for-windows/ Interrogators: Attack Surface Mapping in an Agentic World A SANS.edu master s degree student research paper by Michael Samson https://isc.sans.edu/researchpapers/pdfs/michael_samson.pdf keywords: ai; agentic; attack surface; crowdstrike; sonicwall; ivanti; zero day; initiative; redline
Major federal cybersecurity programs expire amidst the government shutdown. Global leaders and experts convene in Riyadh for the Global Cybersecurity Forum. NIST tackles removable media. ICE buys vast troves of smartphone location data. Researchers claim a newly patched VMware vulnerability has been a zero-day for nearly a year. ClickFix-style attacks surge and spread across platforms. Battering RAM defeats memory encryption and boot-time defenses. A new phishing toolkit converts ordinary PDFs into interactive lures. A trio of breaches exposes data of 3.7 million across North America. Tim Starks from CyberScoop unpacks a report from Senate Democrats on DOGE. The Lone Star State proves even the internet isn't bulletproof. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Tim Starks, Senior Reporter from CyberScoop, is back and joins Dave to discuss a report from Senate Democrats on the Department of Government Efficiency (DOGE). You can read Tim's article on the subject here. Selected Reading Cyber information-sharing law and state grants set to go dark as Congress stalls over funding (The Record) Live - Global Cybersecurity Forum in Riyadh tackles how technology can shape future of cyberspace (Euronews) NIST Publishes Guide for Protecting ICS Against USB-Borne Threats (SecurityWeek) ICE to Buy Tool that Tracks Locations of Hundreds of Millions of Phones Every Day (404 Media) Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability (SecurityWeek) Don't Sweat the ClickFix Techniques: Variants & Detection Evolution (Huntress) Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device (SecurityWeek) New MatrixPDF toolkit turns PDFs into phishing and malware lures (Bleeping Computer) 3.7M breach notification letters set to flood North America's mailboxes (The Register) A Bullet Crashed the Internet in Texas (404 Media) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Critical Vulnerabilities and AI Voice Cloning Risks in Cybersecurity In this episode of Cybersecurity Today, host Jim Love discusses key cybersecurity threats, including critical vulnerabilities in Sudo and Cisco firewalls, and a remote command flaw in Western Digital MyCloud devices. The show highlights efforts by national security agencies in the US, Canada, France, Netherlands, and the UK to address these risks, urging immediate patching and system updates. Additionally, the episode covers the emerging threat of real-time AI voice cloning, stressing the need for stricter security measures to prevent social engineering attacks. Listeners are encouraged to implement robust verification processes to secure their organizations and personal communications. 00:00 Critical Sudo Flaw Warning 00:21 Cisco Firewalls Vulnerabilities 02:34 Western Digital MyCloud Devices at Risk 03:48 AI Voice Cloning Threat 05:16 Conclusion and Contact Information
There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federal... Read more »
There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federal... Read more »
There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federal... Read more »
Three Buddy Problem - Episode 65: We zero in on one of the biggest security stories of the year: the discovery of a persistent multi-stage bootkit implanting malware on Cisco ASA firewalls. Details on a new campaign, tied to the same threat actors behind ArcaneDoor, exploiting zero-days in Cisco's 5500-X series appliances, devices that sit at the heart of government and enterprise networks worldwide. Plus, Cisco's controversial handling of these disclosures, CISA's emergency deadlines for patching, the absence of IOCs and samples, and China's long-term positioning. Plus, thoughts on the Secret Service SIM farm discovery in New York and evidence of Russians APTs Turla and Gamaredon collaborating to hit Ukraine targets. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).
Cutting Through the Matrix with Alan Watt Podcast (.xml Format)
--{ "Put a Firewall Around Your Mind"}-- Adam Curtis documentary, Can't Get You Out of My Head - What we're told and shown from talking heads about Charlie Kirk, Israel - Constant Conflict - CFR/RIIA and New American Century's Agenda - Psychological Operations, You are the Target - Microwave and Frequency Weapons, Psychotronic Technology - The Mind has No Firewall - Information Warfare, disabling and destruction of "Data Processors" (including human) - All Mass Media/Internet used for PsyOps - Information Noise - Weapons to induce emotional changes, nausea, epilepsy, cardiac arrest - Remote Brain-Wave Reading and "Correction" - Use of ultrasound and acoustic signals - Subliminal messaging in audio and video - HAARP/ELF - Brave New World - Predictive Programming.
A Power Trip Press Conference returns, Tom Pelissero joins with the latest Vikings injury news and other happenings around the NFLSee omnystudio.com/listener for privacy information.
A Power Trip Press Conference returns, Tom Pelissero joins with the latest Vikings injury news and other happenings around the NFL