Podcasts about firewalls

  • 1,329PODCASTS
  • 4,577EPISODES
  • 33mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Mar 11, 2026LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about firewalls

Show all podcasts related to firewalls

Latest podcast episodes about firewalls

Cyber Morning Call
966 - IABs atacam firewalls Fortinet

Cyber Morning Call

Play Episode Listen Later Mar 11, 2026 5:15


Referências do EpisódioMicrosoft Patch Tuesday security updates for March 2026 fixed 84 bugsAdobe - Security Bulletins and Advisories - last updated on Mar 10, 2026Security update available for Adobe Commerce | APSB26-05Zoom Bulletin: ZSB-26005FortiGate Edge Intrusions | Stolen Service Accounts Lead to Rogue Workstations and Deep AD CompromiseRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia

The Unity Center
Living With Presence in a Chaotic and Changing World | The Soul's Firewall

The Unity Center

Play Episode Listen Later Mar 9, 2026 31:03


Rev. Wendy Craig-Purcell's talk teaches that in a chaotic, digitally saturated world, our attention acts as a “soul's firewall,” filtering what we allow into our consciousness and protecting our inner peace. Excessive digital consumption can fragment attention, weaken real relationships, and contribute to loneliness, so living with presence requires intentional digital boundaries and mindful use of technology. By consciously directing our attention and practicing discernment—through habits like reducing notifications and taking regular breaks from screens—we become the gatekeepers of our own peace.Website: http://www.theunitycenter.net Download Our New App: https://theunitycenter.churchcenter.com/setupAsk Yourself This: https://www.amazon.com/Ask-Yourself-This-Questions-Expand/dp/087159336XSubscribe to our YouTube channel: http://bit.ly/2hBqp7F Purchase Lesson Series Packages: https://theunitycenter.net/sunday-series-packagesListen to our Podcast: https://open.spotify.com/show/6YJWcAhQUnkEHFqBXQmz1G

The Power Of Orange
Wir sprechen Security. Und SAP.

The Power Of Orange

Play Episode Listen Later Mar 6, 2026 27:41


Cybersecurity ist längst mehr als Firewalls und Hackerabwehr. Gerade in SAP-Systemen – dem Herzstück vieler Unternehmen – geht es um den Schutz hochsensibler Daten und zentraler Geschäftsprozesse.In dieser Folge sprechen wir mit Jessica Wolf, Beraterin im SAP Security Umfeld, und Oliver Villwock, Consulting Director des Bereichs bei cbs und beantworten unter anderem die Fragen:

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Thursday, March 5th, 2026: XWorm Analysis; Cisco “Secure” Firewall Managmeent Center; LastPass Phishing

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Mar 5, 2026 7:38


Want More XWorm? https://isc.sans.edu/diary/Want%20More%20XWorm%3F/32766 Cisco Secure Firewall Management Center Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-onprem-fmc-authbypass-5JPp45V2 LastPass Phishing https://www.securityweek.com/lastpass-users-targeted-with-backup-themed-phishing-emails/

Paul's Security Weekly
Airsnitch, Claude, Hacking Firewalls - PSW #916

Paul's Security Weekly

Play Episode Listen Later Mar 5, 2026 123:50


In the security news this week: Remembering "FX" Finding and analyzing Windows drivers Network monitoring with Gibson the backdoor in your PAM The edge is fraying - and attackers have the advantage Age verification for Linux? Banning AI TPMS tracking BLE tracking weird strings Airsnitch RESURGE in and on Ivanti Attackers using Claude Government iPhone hacking kits Cisco SD-WAN, Linux, and 2023 Leakbase leaks and Bro, upgrade your solar panel! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-916

Firewall
Man with a Scan

Firewall

Play Episode Listen Later Mar 5, 2026 34:39


Does fixing America's $5 trillion healthcare crisis start with taking a single picture? Bradley sits down with Andrew Lacy, founder and CEO of Prenuvo, to explore how full-body MRI scans are shifting healthcare from reactive to proactive — and why that shift could be the most important change in medicine today. They discuss Lacy's 80/20 approach to personal longevity (sleep first, everything else follows), his vision of patient-driven healthcare spending and why AI promises to make world-class diagnostics accessible to everyone.Firewall listeners can go to prenuvo.com/firewall to get $300 off a scan from Prenuvo.This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.

Paul's Security Weekly TV
Airsnitch, Claude, Hacking Firewalls - PSW #916

Paul's Security Weekly TV

Play Episode Listen Later Mar 5, 2026 123:50


In the security news this week: Remembering "FX" Finding and analyzing Windows drivers Network monitoring with Gibson the backdoor in your PAM The edge is fraying - and attackers have the advantage Age verification for Linux? Banning AI TPMS tracking BLE tracking weird strings Airsnitch RESURGE in and on Ivanti Attackers using Claude Government iPhone hacking kits Cisco SD-WAN, Linux, and 2023 Leakbase leaks and Bro, upgrade your solar panel! Show Notes: https://securityweekly.com/psw-916

Paul's Security Weekly (Podcast-Only)
Airsnitch, Claude, Hacking Firewalls - PSW #916

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Mar 5, 2026 123:50


In the security news this week: Remembering "FX" Finding and analyzing Windows drivers Network monitoring with Gibson the backdoor in your PAM The edge is fraying - and attackers have the advantage Age verification for Linux? Banning AI TPMS tracking BLE tracking weird strings Airsnitch RESURGE in and on Ivanti Attackers using Claude Government iPhone hacking kits Cisco SD-WAN, Linux, and 2023 Leakbase leaks and Bro, upgrade your solar panel! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-916

Paul's Security Weekly (Video-Only)
Airsnitch, Claude, Hacking Firewalls - PSW #916

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Mar 5, 2026 123:50


In the security news this week: Remembering "FX" Finding and analyzing Windows drivers Network monitoring with Gibson the backdoor in your PAM The edge is fraying - and attackers have the advantage Age verification for Linux? Banning AI TPMS tracking BLE tracking weird strings Airsnitch RESURGE in and on Ivanti Attackers using Claude Government iPhone hacking kits Cisco SD-WAN, Linux, and 2023 Leakbase leaks and Bro, upgrade your solar panel! Show Notes: https://securityweekly.com/psw-916

Cyber Morning Call
962 - CVSS 10.0: Cisco publica patches para vulnerabilidades críticas no Secure Firewall Management Center

Cyber Morning Call

Play Episode Listen Later Mar 5, 2026 5:19


Referências do EpisódioCVE-2026-20079 - Cisco Secure Firewall Management Center Software Authentication Bypass VulnerabilityCVE-2026-20131 - Cisco Secure Firewall Management Center Software Remote Code Execution VulnerabilitySilver Dragon Targets Organizations in Southeast Asia and EuropeRetaliatory Hacktivist DDoS Activity Following Operation Epic Fury/Roaring LionDefending the gates: How a global coalition disrupted Tycoon 2FA, a major driver of initial access and large-scale online impersonationRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia

Richard Syrett's Strange Planet
1328 EPSTEIN UNSEALED: The Names, The Firewall, and the Elite Panic Nobody Wants You to See

Richard Syrett's Strange Planet

Play Episode Listen Later Mar 4, 2026 55:18


FOLLOW RICHARD Website: https://www.strangeplanet.ca YouTube: @strangeplanetradio Instagram: @richardsyrettstrangeplanet TikTok: @therealstrangeplanet EP. #1328 EPSTEIN UNSEALED: The Names, The Firewall, and the Elite Panic Nobody Wants You to See The Epstein scandal refuses to die — it mutates. Just as pressure builds with looming depositions, subpoenas, and Congressman Thomas Massie naming powerful figures tied to Jeffrey Epstein, global crises suddenly dominate the headlines. Coincidence… or choreography? Investigative journalist Nick Bryant has spent nearly two decades exposing the hidden architecture behind Epstein's empire — the money, the protection, and the silence. Tonight, he returns to Strange Planet to ask the question no one in power wants answered. GUEST: Nick Bryant is an investigative journalist and author best known for exposing elite sexual abuse networks and the power structures that protect them. He broke major stories in the Jeffrey Epstein scandal and successfully fought to unseal Epstein victim depositions that revealed the scope of the trafficking operation. Bryant is the author of The Franklin Scandal and Epstein's Black Book, and the founder of EpsteinJustice.com. His work has appeared in outlets including The Washington Times, Salon, and CounterPunch. WEBSITE: https://epsteinjustice.com BOOK: The Franklin Scandal: A Story of Powerbrokers, Child Abuse & Betrayal SUPPORT OUR SPONSORS!!! QUINCE Luxury, European linen that gets softer with every wash! Turn up the luxury when you turn in with Quince. Go to Quince dot com slash RSSP for free shipping on your order and 365-day returns. Now available in Canada, too. CARGURUS CarGurus is the #1 rated car shopping app in Canada on the Apple App and Google Play store. They've got hundreds of thousands of cars from top-rated dealers, plus advanced search tools that let you zero in on exactly what you want. And you can set real-time alerts for price drops and new listings — so you never miss a great deal. Buy your next car today with CarGurus at cargurus dot ca. Go to cargurus dot ca to make sure your big deal is the best deal. ⁠ BECOME A PREMIUM SUBSCRIBER!!!⁠ ⁠https://strangeplanet.supportingcast.fm⁠ Three monthly subscriptions to choose from. Commercial Free Listening, Bonus Episodes and a Subscription to my monthly newsletter, InnerSanctum. Visit ⁠https://strangeplanet.supportingcast.fm⁠ Use the discount code "Planet" to receive $5 OFF any subscription. We and our partners use cookies to personalize your experience, to show you ads based on your interests, and for measurement and analytics purposes. By using our website and services, you agree to our use of cookies as described in our Cookie Policy. Learn more about your ad choices. Visit ⁠megaphone.fm/adchoices Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://strangeplanet.supportingcast.fm/

Trance Experience Podcast
Tommy Pi pres. Trance Experience – Episode 838 (03-03-2026)

Trance Experience Podcast

Play Episode Listen Later Mar 4, 2026 125:51


01. Alexander Komarov & JO – Lost in Space (Extended Mix) 02. Staysis – Red Pear (Extended Mix) 03. SMR LVE & Sue Mclaren – Until Then (Extended Mix) 04. DaWTone – The Sun Pattern (Extended Mix) 05. Alexander Popov & Terry Golden – Could Be Loved (Extended Mix) 06. Max Denoise & GoC – Nostalgia (Extended Mix) 07. Inners – Quantum (Extended Mix) 08. Rospy – Endless Dream (Extended Mix) 09. Tirami Han & SINKin – Once More With Memory (Extended Mix) 10. ZERO – Cut You Deep (Extended Mix) 11. Itonica – Save My Life (Extended Mix) 12. Deme3us & Tycoos – Oceano 2026 (Extended Mix) 13. DJ Tony Magic, ILYIN & Darix – Transcend Realities (Extended Mix) 14. ELV – Rave Splash (Extended Mix) 15. Etasonic & LR Uplift – True Angel (Extended Mix) 16. Stormline – Globalization 2026 (Extended Mix) 17. Regulus – Phantom Flame (Extended Mix) 18. Fernweh – Voices (Extended Mix) 19. Noah Seven & Moonrider – Till the End (Extended Mix) 20. Drival – Hammers of Fire (Extended Mix) 21. MiNDLEX – Eclipsis (Extended Mix) 22. Max Denoise, Rinkarna & Joanna Angelina – Goodbye (David McRae Extended Remix) 23. Georgio Safo – My Love (Extended Mix) 24. VoN Divin3 – Stella Nova (Extended Mix) 25. TekCloud – Maximus (Extended Mix) 26. Firewall – Sincere (Pulser Remix) The post Tommy Pi pres. Trance Experience – Episode 838 (03-03-2026) first appeared on Tommy-Pi.com.

trance globalization hammers firewalls extended mix oceano fernweh alexander popov elv regulus goc sue mclaren tycoos smr lve drival moonrider etasonic fire extended mix max denoise alexander komarov deme3us lr uplift rospy
Hacking Humans
Web Application Firewall (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Mar 3, 2026 8:59


Please enjoy this encore of Word Notes. A layer seven firewall designed to block threats at the application layer of the open system interconnection model, the OSI model.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/web-application-firewall⁠ Audio reference link: “VCF East 9.1 - Ches' Computer Security Adventures - Bill Cheswick.” YouTube, 29 Dec. 2015, ⁠https://youtu.be/trR1cuBtcPs⁠. 

firewalls noun ches osi web applications web application firewall vcf east
The Cybersecurity Defenders Podcast
North Korean malware interviews, FortiGate firewall compromised, Cisco zero-day & Citrini Research AI future / Intel Chat [#298]

The Cybersecurity Defenders Podcast

Play Episode Listen Later Mar 3, 2026 42:30


In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.GitLab's Threat Intelligence Team published detailed findings on North Korean activity associated with the Contagious Interview campaign and broader IT worker operations.A financially motivated, Russian-speaking threat actor used generative AI tools to compromise more than 600 Fortinet FortiGate firewall instances between January and February, according to Amazon Web Services.Cisco has released emergency patches for a critical zero-day vulnerability in its Catalyst SD-WAN products that has been actively exploited in the wild.Citrini Research presents a forward-looking scenario framed as a June 2028 macro memo describing a “Global Intelligence Crisis” triggered by abundant AI-driven intelligence.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.

Word Notes
Web Application Firewall (noun)

Word Notes

Play Episode Listen Later Mar 3, 2026 8:59


Please enjoy this encore of Word Notes. A layer seven firewall designed to block threats at the application layer of the open system interconnection model, the OSI model.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/web-application-firewall⁠ Audio reference link: “VCF East 9.1 - Ches' Computer Security Adventures - Bill Cheswick.” YouTube, 29 Dec. 2015, ⁠https://youtu.be/trR1cuBtcPs⁠.  Learn more about your ad choices. Visit megaphone.fm/adchoices

firewalls noun ches osi web applications web application firewall vcf east
Packet Pushers - Full Podcast Feed
PP098: What Goes On Inside a Firewall?

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Feb 24, 2026 57:47


On today's show, we pop the lid off of a firewall (figuratively speaking) to understand what’s inside. We talk about how a packet moves through various packet-processing elements inside a firewall, how header analysis and de-encapsulation work, which hardware component has the biggest impact on performance, why stateful inspection still matters in an age of... Read more »

Packet Pushers - Fat Pipe
PP098: What Goes On Inside a Firewall?

Packet Pushers - Fat Pipe

Play Episode Listen Later Feb 24, 2026 57:47


On today's show, we pop the lid off of a firewall (figuratively speaking) to understand what’s inside. We talk about how a packet moves through various packet-processing elements inside a firewall, how header analysis and de-encapsulation work, which hardware component has the biggest impact on performance, why stateful inspection still matters in an age of... Read more »

Cybercrime Magazine Podcast
Cybercrime News For Feb. 24, 2026. AI Used to Hack 600+ Fortinet Firewalls. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Feb 24, 2026 3:05


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

Awakening
#409 Will Good beat Evil in AI with Manuj Aggarwal

Awakening

Play Episode Listen Later Feb 23, 2026 21:26


Manuj Aggarwal, is the founder and Chief Innovation Officer TetraNoodle Technologies, an elite AI consulting company. Join my PodFather Podcast Coaching Community https://www.skool.com/podfather/about Start Your Own SKOOL Communityhttps://www.skool.com/signup?ref=c72a37fe832f49c584d7984db9e54b71  #manujaggarwal #ai #TetraNoodleAwakening Podcast Social Media / Coaching My Other Podcasts  ⁠⁠⁠https://roycoughlan.com/⁠⁠ About my Guest:Manuj Aggarwal, is the founder and Chief Innovation Officer TetraNoodle Technologies, an elite AI consulting company. With a remarkable track record of driving transformative change, Manuj, through TetraNoodle, has touched at least 10 million lives and generated over $500M in value through his expertise in technology and AI. He has shared his insights at the United Nations alongside distinguished figures like the Secretary-General and Nobel Peace Prize winners, while President Obama and Bill Gates have recognized his work. With four AI patents to his name, Manuj is the perfect mentor to guide you through the transformative potential of AI and its benefits for businesses. Join us and discover the limitless possibilities of AI under the guidance of this visionary industry influencer.What we Discussed: 00:00 Who is Manuj Aggarwal 01:45 Where did the Name TetraNoodle Technologies come from?01:47 His 4 Patents05:00 Making $2 a day to a Successful Entrepreneur06:48 Will Good beat Evil in AI10:25 Will AI take over Humanity11:05 Ai does not always tell you the Truth12:50 The 2 Books he wrote13: 12 Firewalls to Protect our Data15:10 What has Meditation and Ai got in Common16:40 What AI tools he uses for his Podcast19:30 Have the AI can interact with your knowledge How to Contact Manuj Aggarwal https://manujaggarwal.com/ https://www.facebook.com/manuj.aggarwalhttps://x.com/manujagrohttps://www.youtube.com/@manujagrohttps://www.instagram.com/manujagro/https://www.linkedin.com/in/manujaggarwal/https://www.tiktok.com/@manujagro------------------------------More about the Awakening Podcast:All Episodes can be found at www.awakeningpodcast.org Awakening Podcast Social Media / Coaching My Other Podcasts  ⁠⁠⁠https://roycoughlan.com/⁠⁠ Our Facebook Group can be found at https://www.facebook.com/royawakening #podfather #roycoughlan #firewall #aitools

Speaking with Roy Coughlan
#348 Will Good beat Evil in AI with Manuj Aggarwal

Speaking with Roy Coughlan

Play Episode Listen Later Feb 23, 2026 21:26


Manuj Aggarwal, is the founder and Chief Innovation Officer TetraNoodle Technologies, an elite AI consulting company. Join my PodFather Podcast Coaching Community ⁠https://www.skool.com/podfather/about⁠   Start Your Own SKOOL Community ⁠https://www.skool.com/signup?ref=c72a37fe832f49c584d7984db9e54b71⁠    #manujaggarwal #ai #TetraNoodle Awakening Podcast Social Media / Coaching My Other Podcasts    ⁠⁠⁠⁠https://roycoughlan.com/⁠⁠⁠   About my Guest: Manuj Aggarwal, is the founder and Chief Innovation Officer TetraNoodle Technologies, an elite AI consulting company. With a remarkable track record of driving transformative change, Manuj, through TetraNoodle, has touched at least 10 million lives and generated over $500M in value through his expertise in technology and AI. He has shared his insights at the United Nations alongside distinguished figures like the Secretary-General and Nobel Peace Prize winners, while President Obama and Bill Gates have recognized his work. With four AI patents to his name, Manuj is the perfect mentor to guide you through the transformative potential of AI and its benefits for businesses. Join us and discover the limitless possibilities of AI under the guidance of this visionary industry influencer. What we Discussed:   00:00 Who is Manuj Aggarwal   01:45 Where did the Name TetraNoodle Technologies come from? 01:47 His 4 Patents 05:00 Making $2 a day to a Successful Entrepreneur 06:48 Will Good beat Evil in AI 10:25 Will AI take over Humanity 11:05 Ai does not always tell you the Truth 12:50 The 2 Books he wrote 13: 12 Firewalls to Protect our Data 15:10 What has Meditation and Ai got in Common 16:40 What AI tools he uses for his Podcast 19:30 Have the AI can interact with your knowledge   How to Contact Manuj Aggarwal  ⁠https://manujaggarwal.com/⁠  ⁠https://www.facebook.com/manuj.aggarwal⁠ ⁠https://x.com/manujagro⁠ ⁠https://www.youtube.com/@manujagro⁠ ⁠https://www.instagram.com/manujagro/⁠ ⁠https://www.linkedin.com/in/manujaggarwal/⁠ ⁠https://www.tiktok.com/@manujagro⁠ ------------------------------ More about the Awakening Podcast: All Episodes can be found at ⁠www.awakeningpodcast.org⁠   Awakening Podcast Social Media / Coaching My Other Podcasts    ⁠⁠⁠⁠https://roycoughlan.com/⁠⁠⁠   Our Facebook Group can be found at ⁠https://www.facebook.com/royawakening⁠   #podfather #roycoughlan #firewall #aitools

Cyber Security Headlines
Arkanix was POC, 600 Fortinet firewalls breach, Russia heightens tension

Cyber Security Headlines

Play Episode Listen Later Feb 23, 2026 8:03


Arkanix Stealer – the new AI info-stealer experiment AI-assisted hacker breached 600 Fortinet firewalls in 5 weeks Russia stepping up hybrid attacks, preparing for confrontation with West Get links to all of today's news in our show notes here: https://cisoseries.com/cybersecurity-news-arkanix-was-poc-600-fortinet-firewalls-breach-russia-heightens-tension/ Thanks to today's episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first security awareness platform built to stop AI-powered social engineering. Deepfakes aren't science fiction anymore; they're a daily threat. Quick tip: if your voicemail greeting is your real voice, switch it to the default robot voice. A few seconds of audio can be enough to clone you. Adaptive helps teams spot and stop these AI-powered social engineering attacks. Learn more at adaptivesecurity.com.  

David Bombal
#550: Firewall Demo of Red Team vs Blue Team: Hacking Finance Apps with AI Chatbots

David Bombal

Play Episode Listen Later Feb 22, 2026 28:38


In this video, we dive into a real-world Red Team vs. Blue Team scenario. We simulate a cyberattack on a Finance Application that has integrated a new LLM Chatbot. You'll see firsthand how attackers use Prompt Injection to bypass standard rules, how they move laterally through Kubernetes clusters, and how they attempt to execute Zero Day exploits. More importantly, we show you how to defend against it. Using Cisco's Hybrid Mesh Firewall, AI Defense, and Secure Workload, we demonstrate how to: 1. Detect & Block Prompt Injections: safeguarding your LLMs from manipulation. 2. Secure Kubernetes: using micro-segmentation to isolate threats in the cloud. 3. Inspect Encrypted Traffic: utilizing the Encrypted Visibility Engine (EVE) to spot malware in TLS flows without decryption. Whether you are a Network Engineer, Security Analyst, or just interested in how AI is changing the cybersecurity landscape, this demo is packed with practical insights Big thank you to Cisco for sponsoring my trip to Cisco Live Amsterdam. // Ant Ducker SOCIALS // LinkedIn: / ant-ducker-0052801 YouTube channel dCloud: / @ciscodcloud // Website REFERENCE // Cisco Security Cloud control: https://sign-on.security.cisco.com/ Cisco.com: https://www.cisco.com/site/us/en/solu... // YouTube Video REFERENCE // Rick Miles' video will be linked at a later stage once published. / David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:29 - Intro 02:20 - Demo Overview 03:57 - Demo Begins 09:35 - Adding Guardrails 11:45 - Secure Workloads 14:30 - Segmentation Workflow 18:33 - Overviewing Finance App 21:02 - Encrypted Visibility Engine 24:34 - Firewall Obversability and Control 25:44 - Ant's Advice For The Youth 26:40 - How to Learn Hybrid Mesh Firewall 28:16 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #ciscolive #ciscoemea

Jubal Phone Pranks from The Jubal Show
Trevor Took Down The Company Firewall...

Jubal Phone Pranks from The Jubal Show

Play Episode Listen Later Feb 21, 2026 4:44 Transcription Available


What would you do if your brand-new IT employee called to say he accidentally took down the company firewall… forgot his password… and replaced the homepage with a llama?

Phone Pranks with Jubal Fresh
Trevor Took Down The Company Firewall...

Phone Pranks with Jubal Fresh

Play Episode Listen Later Feb 21, 2026 4:44 Transcription Available


What would you do if your brand-new IT employee called to say he accidentally took down the company firewall… forgot his password… and replaced the homepage with a llama?

Software Engineering Daily
Inside China's Great Firewall with Jackson Sippe

Software Engineering Daily

Play Episode Listen Later Feb 19, 2026 58:00


China's Great Firewall is often spoken about but is rarely understood. It is one of the most sophisticated and opaque censorship systems on the planet, and it shapes how over a billion people interact with the global internet, influences the design of privacy and proxy tools worldwide, and continues to evolve in ways that challenge The post Inside China's Great Firewall with Jackson Sippe appeared first on Software Engineering Daily.

china firewalls great firewall inside china sippe software engineering daily
Packet Pushers - Full Podcast Feed
N4N049: Understanding Firewalls

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Feb 19, 2026 70:05


Today, Ethan and Holly provide an overview of firewalls. While cybersecurity is a separate discipline from network engineering, much of what happens in cybersecurity is interesting at the packet level, so there’s a good deal of overlap. It's likely that as a network engineer, you'll be managing, or at least dealing with, firewalls in your... Read more »

Packet Pushers - Fat Pipe
N4N049: Understanding Firewalls

Packet Pushers - Fat Pipe

Play Episode Listen Later Feb 19, 2026 70:05


Today, Ethan and Holly provide an overview of firewalls. While cybersecurity is a separate discipline from network engineering, much of what happens in cybersecurity is interesting at the packet level, so there’s a good deal of overlap. It's likely that as a network engineer, you'll be managing, or at least dealing with, firewalls in your... Read more »

Podcast – Software Engineering Daily
Inside China's Great Firewall with Jackson Sippe

Podcast – Software Engineering Daily

Play Episode Listen Later Feb 19, 2026 58:00


China’s Great Firewall is often spoken about but is rarely understood. It is one of the most sophisticated and opaque censorship systems on the planet, and it shapes how over a billion people interact with the global internet, influences the design of privacy and proxy tools worldwide, and continues to evolve in ways that challenge The post Inside China's Great Firewall with Jackson Sippe appeared first on Software Engineering Daily.

china firewalls great firewall inside china sippe software engineering daily
ETDPODCAST
CIA richtet sich mit Video an KPCh-Militärüberläufer – viral trotz Firewall | Nr. 8842

ETDPODCAST

Play Episode Listen Later Feb 17, 2026 8:59 Transcription Available


Die CIA veröffentlichte ein chinesischsprachiges Video, in dem ein fiktiver KPCh-Militäroffizier von der Partei abkehrt und Kontakt zu den USA sucht, um sein Land und seine Familie zu schützen. Das Video thematisiert interne Spannungen, Loyalitätskonflikte und militärische Unzufriedenheit innerhalb der KPCh und erreicht trotz der „Großen Firewall“ Hunderttausende Nutzer.

I Speak Jeep
Comfort is Optional, from Frostbite to Firewalls

I Speak Jeep

Play Episode Listen Later Feb 11, 2026 78:24


We want to hear from you, Send us a TextWelcome to the arctic! The team is facing off with penguins as they talk creature comforts in Jeeps. That's right from the sub zero temperatures of the Great Lake Erie, our team is bundled up and talking about heat! How does your heater system work but more importantly, how will Scott relate this to horses. Tune in to find out and learn about Jeff's big announcement at the end. Support the showThanks for listening, give us a review and check us out on YouTube -SFJ4x4 and visit our website to grab some great gear or products for your Jeep, SFJ4x4.com. Don't forget, you can email Jeffc@sfj4x4.com for special content requests, blind react videos, suggestions, special guests, or general questions. Check out our Patreon patreon.com/ISpeakJeep

Input
Bildschirmzeit bei Kindern: Regeln, Konflikte, Lösungen

Input

Play Episode Listen Later Feb 11, 2026 37:50


«Sie verschwendet ihre Zeit», sagt Corine. Und ihre Teenager-Tochter meint: «Meine Eltern verstehen mich nicht.» Über die Hälfte der Schweizer Familien streitet wegen der Bildschirmzeit. Was hilft? Regeln, sagt der Medienpädagoge – und eine Haltung aus Vertrauen, Neugier, Humor und Selbstdisziplin. «Input» besucht zwei Familien mit Kindern zwischen 6 und 15 Jahren, darunter Romy. Sie konnte die Zeitlimits für Youtube und Snapchat selbst ändern. «Weil Kinder Eltern technisch oft überlegen sind», erklärt der Medienpädagoge, «zählt am Ende vor allem das Vertrauen, das über Jahre aufgebaut wurde.» ____________________ Habt ihr Feedback, Fragen oder Wünsche? Wir freuen uns auf eure Nachrichten an input@srf.ch – und wenn ihr euren Freund:innen und Kolleg:innen von uns erzählt. ____________________ 00:00 Intro 01:44 Lea und ihre drei Söhne (11, 9 und 6) 06:50 Medienpädagoge Beat Richert über Firewalls, Begleitung und Vertrauen 10:42 Zeitlimits und Handyentzug bei Lea und ihren Söhnen 14:52 Medienerziehung, Streit und Regeln (Medienpädagoge Beat Richert) 22:17 Vorbildrolle der Eltern 25:43 Corina und ihre Teenagertöchter über Streit und Einsicht 35:08 Fazit ____________________ In dieser Episode zu hören - Corina (45), Mutter von Aline (15) und Romy (14) - Lea (37), Mutter von Damian (11), Nino (9) und Gian (6) - Beat Richert, Medienpädagoge ____________________ - Autorin: Mariel Kreis - Publizistische Leitung: Anita Richner ____________________ Das ist «Input»: Dem Leben in der Schweiz auf der Spur – mit all seinen Widersprüchen und Fragen. Der Podcast «Input» liefert jede Woche eine Reportage zu den Themen, die euch bewegen.

CISSP Cyber Training Podcast - CISSP Training Program
CCT 322: From Firewalls To AI: Building A Smarter Defense - CISSP Domain 7.7

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Feb 9, 2026 36:02 Transcription Available


Send us a textThe weakest link is often sitting on the edge, blinking away with expired firmware and no vendor support. We kick off with a blunt reality check on outdated firewalls, load balancers, and IoT gateways, and why waiting two years to retire them is a gift to attackers. From there, we guide you through Domain 7.7 with a practical blueprint for operating and maintaining detective and preventive measures that actually hold up under pressure.We unpack firewall fundamentals with clear, real‑world tradeoffs: when a simple packet filter is enough, when stateful inspection and deep packet inspection earn their keep, and how a WAF stops the web attacks your L3/L4 controls will miss. You'll hear how RTBH can deflect denial‑of‑service floods upstream, and why segmentation is your best friend for reducing blast radius—whether you use internal segmentation firewalls for R&D, Purdue‑style tiers for industrial networks, or controlled air gaps for the most sensitive systems. In the cloud, we separate security groups from true firewalls and show how to stitch policies across hybrid environments without creating blind spots.Detection makes prevention smarter, so we break down IDS versus IPS in plain language. Baseline first, then block with intent to avoid outages. We compare host‑based and network‑based sensors, explain where to place them, and share tactics for cutting alert noise. You'll also get straight talk on allowlists and blacklists, the right way to maintain them, and why stale entries cause the ugliest outages. We explore sandboxing for safe detonation and learning, and give an unvarnished take on honeypots and honeynets—where they help, where they waste time, and what legal lines to respect.Not every team can build a 24x7 SOC, so we outline how MSSPs can extend your coverage with clear SLAs and ownership. Endpoint anti‑malware remains non‑negotiable, but tool sprawl is a trap—choose a strong EDR and manage it well. Finally, we dive into AI and machine learning: how they supercharge detection, triage, and response—and how adversaries use them too. The throughline is simple: shrink attack surface, raise signal quality, and respond faster than threats can pivot. If this helps you secure one more edge box or tune one more control, share it with a teammate, subscribe for more practical walkthroughs, and drop a review so we can keep raising the bar together.Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

Hacker Public Radio
HPR4567: Movie Recommendations for Hackers

Hacker Public Radio

Play Episode Listen Later Feb 3, 2026


This show has been flagged as Clean by the host. Warning, this episode containers some spoilers for movies. The following movies are in my cybersecurity movie library. The ones marked * are included in review in this episode. 2001: A Space Odyssey (1968) * AntiTrust (2001) Blackhat (2015) Blade Runner (1982) Catch Me If You Can (2002) Citizenfour (2015) CSI: Cyber (2015) Enemy of the State (1998) Firewall (2006) Gattaca (1997) * Ghost in the Shell (1995) Hackers (1995) * Heartbreakers (2001) The Imitation Game (2014) I, Robot (2004) Johnny Mnemonic (1995) Jurassic Park (1993) * The KGB, the Computer and Me (1990) * - Youtube link The Lives of Others (2006) * Lo and Behold, Reveries of the Connected World (2016) The Matrix (1999) The Matrix Reloaded (2003) * The Matrix Revolutions (2003) Minority Report (2002) Mission: Impossible (1996) * Mr. Robot (2015) The Net (1995) * The Net 2.0 (2006) Ocean's Eleven (2001) Office Space (1999) * Person of Interest (2011) * Revolution OS (2001) The Social Network (2010) Sneakers (1992) * Superman III (1983) * Surrogates (2009) Swordfish (2001) Takedown (2000) Tron (1982) * WarGames (1983) * Slashdot "Best Hacker movie" poll (August 2001): https://slashdot.org/poll/683/best-hacker-flick This episode contains short except clips from some of these movies used under free use for demonstration. Provide feedback on this episode.

The Other Side Of The Firewall
The Cybersecurity Ecosystem We've All Been Waiting For Ft. Mary N. Chaney, Esq

The Other Side Of The Firewall

Play Episode Listen Later Feb 3, 2026 52:58


In this episode of The Other Side of the Firewall's, Ask a CISSP, host Ryan Williams Sr. welcomes Mary N. Chaney, Esq, a multifaceted professional in cybersecurity and law. Mary shares her inspiring journey from humble beginnings in Cincinnati to becoming a special agent for the FBI, where she investigated cyber crimes. As a law professional with extensive experience in corporate cybersecurity, she transitioned into entrepreneurship, founding multiple organizations aimed at empowering minorities in the tech space. Mary discusses her current initiatives, including Minorities in Cybersecurity (MiC), which focuses on leadership development and mentorship, and the Mary N. Chaney Cybersecurity Training Center (MNC-CTC), designed to provide hands-on training for aspiring cybersecurity professionals. Throughout the conversation, Mary emphasizes the importance of business fluency in cybersecurity, arguing that technical skills alone are insufficient for career advancement. She highlights the challenges faced by entry-level professionals in the industry, particularly the unrealistic expectations for experience. Mary also discusses her vision for creating a supportive ecosystem for aspiring cybersecurity professionals, including mentorship, training, and job placement services. The episode concludes with insights into her upcoming initiatives, including the 2026 MiC Annual Conference (March 22-26, 2026) and a residency program aimed at bridging the gap between education and employment in cybersecurity. Mary N. Channey Socials: LinkedIn: https://www.linkedin.com/in/marynchaney/ Minorities in Cybersecurity (MiC): https://www.mincybsec.org/ Mary N. Chaney Cybersecurity Training Center: https://www.mnc-ctc.com/ MiC Talent Solutions: https://www.mictalent.solutions/ Buy the guide: https://www.theothersideofthefirewall.com/ Please LISTEN

The Other Side Of The Firewall
Cybercrime, Human Exploitation, and Securing Global Events in 2026

The Other Side Of The Firewall

Play Episode Listen Later Jan 28, 2026 57:08


In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams and Shannon Tynes discuss the latest cybersecurity news, including Ghana's crackdown on cybercrime, the cybersecurity challenges posed by the upcoming 2026 World Cup, and NIST's evolving role in analyzing software vulnerabilities. The conversation is enriched with personal anecdotes and reflections, making it relatable and engaging for listeners. The hosts emphasize the importance of collaboration in cybersecurity efforts and encourage audience engagement with the podcast. Articles: Ghana arrests Nigerians accused of running cyber-crime networks https://www.bbc.com/news/articles/cr4k35q6yr0o.amp?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExc2ZadnRKZVlEaXlTeTRlaHNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR7MVQYrOg2gWr49O9UvlvDZZe8VXut4EtyL-5WjyxERR3RlNhslh3nWd9KsSA_aem_aW6PFykQSmBzeCPWD3JroA 2026 World Cup to Stress-Test Cybersecurity, Business Continuity https://mexicobusiness.news/cybersecurity/news/2026-world-cup-stress-test-cybersecurity-business-continuity?tag=cybersecurity&fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExc2ZadnRKZVlEaXlTeTRlaHNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR4zNG2sVnMXLWOxs8MM-RXg7vtMcBJaopYjgSbIsxWwVVR-BFQfGKuXQpQLBw_aem_UvzF7d12ATRcGJU2ANigbw NIST is rethinking its role in analyzing software vulnerabilities https://www.cybersecuritydive.com/news/nist-cve-vulnerability-analysis-nvd-review/810300/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExc2ZadnRKZVlEaXlTeTRlaHNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR7wjrhzyAjeLiPLM5_qQetFLvJqxmeDqcZITNgYVvnSL-DzHhuVASRfERf1jw_aem_EqgqYT3by4gcSFrxg_IzUg Buy the guide: https://www.theothersideofthefirewall.com/ Please LISTEN

This Week in Neuroscience
TWiN 68: Firewall for the brain

This Week in Neuroscience

Play Episode Listen Later Jan 27, 2026 74:21


TWiN explores the use of speech brain-computer interfaces to restore communication to people with paralysis, and reveals strategies for protecting private inner speech. Hosts: Vincent Racaniello, Vivianne Morrison, and Tim Cheung Subscribe (free): Apple Podcasts, Google Podcasts, RSS Links for this episode MicrobeTV Discord Server Keeping private inner speech from brain-computer interfaces (Cell) Mind-reading brain implant with password protection (Nature) Timestamps by Jolene Ramsey. Thanks! Music is by Ronald Jenkees Send your neuroscience questions and comments to twin@microbe.tv

Reversim Podcast
511 AI Protection and Governance with Nimrod from BigID

Reversim Podcast

Play Episode Listen Later Jan 25, 2026


פרק מספר 511 של רברס עם פלטפורמה, שהוקלט ב-18 בינואר 2026. אורי ורן מקליטים בכרכור (הגשומה והקרה) ומארחים את נמרוד וקס - CPO ו-Co-Founder של BigID - שחצה את כביש 6 בגשם זלעפות כדי לדבר על אתגרים טכנולוגיים בעולם המופלא של Data Production ו-Security.

Risky Business News
Risky Bulletin: Improperly patched bug exploited again in Fortinet firewalls

Risky Business News

Play Episode Listen Later Jan 22, 2026 6:39


A poorly patched bug is being exploited in Fortinet firewalls, hackers go after security testing environments, Jordanian police used Cellebrite against activists, and new Cisco and SmarterMail zero-days. Show notes Risky Bulletin: Improperly patched bug exploited again in Fortinet firewalls

Security Now (MP3)
SN 1061: More GhostPosting - RAM Crisis Hits Firewalls

Security Now (MP3)

Play Episode Listen Later Jan 21, 2026 164:10


oaring RAM prices are about to hit your security gear where it hurts, and the fallout could change what's protecting your network. Find out who's about to pay and why the AI gold rush is reshaping more than just your server specs. RAM pricing to affect enterprise firewall equipment. Anthropic provides sizeable support to Python Foundation. The FTC clamps down on GM's secret sale of driving data. "ANCHOR" replaces "CIPAC" for industry-government sharing. Germany planning to legislate total access to global data. Grubhub becomes the latest ShinyHunters extortion victim. Let's Encrypt's 6-Day certs are available to everyone. Iran planning to permanently take itself off the Internet. HD Tune before and after a SpinRite Level 3 refresh. Some great listener feedback, and More trouble from GhostPoster malicious browser extensions Show Notes - https://www.grc.com/sn/SN-1061-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit canary.tools/twit - use code: TWIT threatlocker.com/twit meter.com/securitynow joindeleteme.com/twit promo code TWIT

Security Now (Video HD)
SN 1061: More GhostPosting - RAM Crisis Hits Firewalls

Security Now (Video HD)

Play Episode Listen Later Jan 21, 2026 164:10 Transcription Available


Soaring RAM prices are about to hit your security gear where it hurts, and the fallout could change what's protecting your network. Find out who's about to pay and why the AI gold rush is reshaping more than just your server specs. RAM pricing to affect enterprise firewall equipment. Anthropic provides sizeable support to Python Foundation. The FTC clamps down on GM's secret sale of driving data. "ANCHOR" replaces "CIPAC" for industry-government sharing. Germany planning to legislate total access to global data. Grubhub becomes the latest ShinyHunters extortion victim. Let's Encrypt's 6-Day certs are available to everyone. Iran planning to permanently take itself off the Internet. HD Tune before and after a SpinRite Level 3 refresh. Some great listener feedback, and More trouble from GhostPoster malicious browser extensions Show Notes - https://www.grc.com/sn/SN-1061-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit canary.tools/twit - use code: TWIT threatlocker.com/twit meter.com/securitynow joindeleteme.com/twit promo code TWIT

Security Now (Video HI)
SN 1061: More GhostPosting - RAM Crisis Hits Firewalls

Security Now (Video HI)

Play Episode Listen Later Jan 21, 2026 164:10 Transcription Available


Soaring RAM prices are about to hit your security gear where it hurts, and the fallout could change what's protecting your network. Find out who's about to pay and why the AI gold rush is reshaping more than just your server specs. RAM pricing to affect enterprise firewall equipment. Anthropic provides sizeable support to Python Foundation. The FTC clamps down on GM's secret sale of driving data. "ANCHOR" replaces "CIPAC" for industry-government sharing. Germany planning to legislate total access to global data. Grubhub becomes the latest ShinyHunters extortion victim. Let's Encrypt's 6-Day certs are available to everyone. Iran planning to permanently take itself off the Internet. HD Tune before and after a SpinRite Level 3 refresh. Some great listener feedback, and More trouble from GhostPoster malicious browser extensions Show Notes - https://www.grc.com/sn/SN-1061-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit canary.tools/twit - use code: TWIT threatlocker.com/twit meter.com/securitynow joindeleteme.com/twit promo code TWIT

Security Now (Video LO)
SN 1061: More GhostPosting - RAM Crisis Hits Firewalls

Security Now (Video LO)

Play Episode Listen Later Jan 21, 2026 164:10 Transcription Available


Soaring RAM prices are about to hit your security gear where it hurts, and the fallout could change what's protecting your network. Find out who's about to pay and why the AI gold rush is reshaping more than just your server specs. RAM pricing to affect enterprise firewall equipment. Anthropic provides sizeable support to Python Foundation. The FTC clamps down on GM's secret sale of driving data. "ANCHOR" replaces "CIPAC" for industry-government sharing. Germany planning to legislate total access to global data. Grubhub becomes the latest ShinyHunters extortion victim. Let's Encrypt's 6-Day certs are available to everyone. Iran planning to permanently take itself off the Internet. HD Tune before and after a SpinRite Level 3 refresh. Some great listener feedback, and More trouble from GhostPoster malicious browser extensions Show Notes - https://www.grc.com/sn/SN-1061-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit canary.tools/twit - use code: TWIT threatlocker.com/twit meter.com/securitynow joindeleteme.com/twit promo code TWIT

The Other Side Of The Firewall
Cybercrime, AI Gaps, and Burned-Out CISOs

The Other Side Of The Firewall

Play Episode Listen Later Jan 20, 2026 56:49


Summary In this episode of "The Other Side of the Firewall" podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon delve into the latest cybersecurity news, starting with a case involving a Tennessee man who pleaded guilty to hacking the Supreme Court's filing system. The discussion highlights the inadequacies of current cybersecurity laws, particularly the leniency of a one-year maximum sentence for such a serious crime. The hosts express their frustration over the perceived lack of accountability and the need for stricter penalties to deter cybercriminals. They also explore the implications of social engineering in this case, suggesting that the hacker exploited weak security practices rather than sophisticated techniques. The conversation then shifts to a significant AI vulnerability discovered in ServiceNow, emphasizing the risks associated with rapid AI implementation without adequate security measures. The hosts stress the importance of thorough testing and the need for organizations to adopt a cautious approach when integrating AI technologies. They conclude by discussing the challenges faced by Chief Information Security Officers (CISOs), particularly the high turnover rates and burnout associated with the role, which often leaves them as scapegoats in corporate environments. The episode wraps up with personal anecdotes and reflections on the pressures of cybersecurity leadership. Articles: Tennessee man pleads guilty to repeatedly hacking Supreme Court's filing system https://apnews.com/article/nicholas-moore-supreme-court-hacked-filing-system-49fc196ba3f3914f869e85c8cd30edbc?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExMFNoNHNlSWZJcm9lMkVJMXNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR7RUOMEMjC56VAHadGiVzfJKqwUHTZf-tVkbEIrpSGmKE6Md68CYDu6T25m4g_aem_cLud7-4lk1KzFtew52MmBw#computersecurity 'Most Severe AI Vulnerability to Date' Hits ServiceNow https://www.darkreading.com/remote-workforce/ai-vulnerability-servicenow?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExMFNoNHNlSWZJcm9lMkVJMXNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR6FWHWUgoldkYV-CoKWpxY4-FsuO_YJo93zYeutqPJYLSA68tSXCAX9JjlO6w_aem_9Xb8m066AHXDRsxb-8NnOA CISO Succession Crisis Highlights How Turnover Amplifies Security Risks https://www.darkreading.com/cyber-risk/ciso-succession-crisis-highlights-turnover-amplifies-security-risks?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExMFNoNHNlSWZJcm9lMkVJMXNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR5bP-FD-J-gfZDCw-Cy4M4v2jsZEKjfq_TaAkCgJVVxugvIvUxKVSKXtryXUQ_aem_aQ2cXEn0I5_jGDR4luvj1g Buy the guide: https://www.theothersideofthefirewall.com/ Please LISTEN

The Electorette Podcast
Shock, Awe, and the Constitution: The ACLU When the Law Is Tested

The Electorette Podcast

Play Episode Listen Later Jan 13, 2026 27:37


As The Electorette returns with a new season, there was only one place to start: the front lines of civil liberties. In this episode, Jen Taylor-Skinner is joined by Deirdre Schifeling, Chief Political & Advocacy Officer at the American Civil Liberties Union, for a wide-ranging and urgent conversation about what Trump's second term really represents—not chaos, but a calculated “shock and awe” strategy designed to overwhelm the law, the courts, and the public. They discuss the ACLU's unprecedented legal response, the escalating attacks on immigrant communities, and why the Supreme Court's upcoming birthright citizenship case could fundamentally redefine what it means to be American. Deirdre also explains how coordinated legal and civic pressure can slow executive overreach, why public engagement still matters in moments like this, and what people can do right now to meaningfully defend civil liberties and the rule of law. Mentioned in this episode: Firewall For Freedom: States Must Safeguard Our Rights Stop ICE's Attack On Our Communities Episode Chapters & Timestamps 00:00 — Season Return & Why the ACLU Now Jen kicks off the new season of The Electorette and explains why beginning with the ACLU is both urgent and necessary. 02:00 — “Shock and Awe” as a Governing Strategy Deirdre Schifeling explains why the current moment isn't chaos, but a deliberate strategy designed to overwhelm the law and civil society. 06:30 — The Scale of the ACLU's Legal Response How the ACLU mobilized immediately—and what it means to file hundreds of legal actions in a single year. 09:30 — Immigration Enforcement, Due Process, and Escalation A look at aggressive immigration tactics, racial profiling, and why conditions may intensify as new funding takes effect. 14:30 — Public Backlash and the Limits of Fear Politics Why demonizing immigrant communities has consequences—and where public resistance is already visible. 18:30 — Are the Courts Holding Up? An assessment of how the judicial system is responding, where it's working, and where the risks remain. 22:30 — Birthright Citizenship and the Supreme Court Test Why the birthright citizenship case is so consequential—and what's at stake for the Constitution if it fails. 28:30 — What Birthright Citizenship Really Means Historical context on why birthright citizenship exists and how it defines American equality. 33:30 — Executive Power and the Role of the Courts How recent court decisions have expanded executive authority—and where guardrails are most needed. 38:30 — What Comes Next for Civil Liberties Looking ahead: where pressure points are likely to emerge and how rights are most vulnerable. 42:30 — Civic Engagement Beyond the Courts How public participation, organizing, and legal advocacy intersect outside electoral politics. 46:30 — The ACLU's “Firewall for Freedom” Strategy How state and local governments can act as safeguards—and what that looks like in practice. 51:30 — What Individuals Can Do Right Now Concrete ways people can support civil liberties, engage locally, and stay involved. 55:30 — Final Thoughts & The Work Ahead Closing reflections on this moment, the long view, and why sustained engagement matters. Learn more about your ad choices. Visit megaphone.fm/adchoices

5bytespodcast
Firewall Config Issues! MDT Retirement! Software Update from Hell!

5bytespodcast

Play Episode Listen Later Jan 13, 2026 28:34


I cover issues in Intune relating to Firewall configurations, the retirement of MDT, a reboot loop issue on Cisco switches, a software update from hell story plus much more! Reference Links: https://www.rorymon.com/blog/firewall-config-issues-mdt-retirement-software-update-from-hell/

The Steve Gruber Show
Janice Trey | Tear Down the Firewall

The Steve Gruber Show

Play Episode Listen Later Jan 7, 2026 11:00


Steve is joined by Janice Trey, Board Chair of The Epoch Times and NTD TV, a survivor of a Chinese labor camp during Mao's Cultural Revolution, and a fearless advocate for free speech. She exposes Big Tech censorship, explains why secure platforms like SafeMeet matter, and issues a powerful call for President Trump to tell Xi Jinping to tear down China's digital firewall. From America's First Amendment to religious persecution under communism, this is a firsthand warning about how censorship spreads, and why it must be stopped.

AlmostSideways Podcast
CCCLIII: A KNIGHT'S TALE 25TH ANNIVERSARY DEEP DIVE, Eden

AlmostSideways Podcast

Play Episode Listen Later Jan 5, 2026 119:55


Recorded - 1/4/2026 On Episode 353 of the Almost Sideways Movie Podcast, we have our first deep dive of 2026! We go back 25 years to a classic Heath Ledger flick, A Knight's Tale! Terry, Todd, and Adam go into all the details, as well as review some of the movies they have watched in the last week. Here are the highlights:What We've Been Watching(3:45) "Year of the Dragon" - Todd Director Blindspot Review(7:55) "Firewall" - Adam Ford Explorer Review(14:00) "Cartel Land" - Terry Oscar Anniversary Review(19:15) "Sirat" - Todd Indie Screener Review(22:20) "We Bury the Dead" - Adam Review(27:00) "The Dutchman" - Terry Review(30:25) "Goodbye June" - Terry Review(32:20) "Eden" - Featured Review"A KNIGHT'S TALE" 25TH ANNIVERSARY DEEP DIVE(42:00) "A Knight's Tale" Trivia(55:50) First Impressions(1:06:50) Mt. Rushmore: Uses of Queen Songs in Film(1:14:05) Recasting "A Knight's Tale"(1:31:00) Highest WAR, Worst Performance(1:36:10) Minor Character Triumvirate, Tripod of Depravity(1:45:50) Best Scene, Gripes and Conspiracies(1:54:40) LVP, MVP, Quote of the DayFind AlmostSideways everywhere!⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠almostsideways.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.facebook.com/AlmostSidewayscom-130953353614569/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠AlmostSideways Twitter⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠: @almostsideways⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Terry's Twitter⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠: @almostsideterry⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Zach's Letterboxd⁠⁠⁠: https://letterboxd.com/pro_zach36/Todd: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Too Cool for Twitter⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Adam's Twitter⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠: @adamsideways⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Apple Podcast⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://podcasts.apple.com/us/podcast/almostsideways-podcast/id1270959022⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Spotify⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://open.spotify.com/show/7oVcx7Y9U2Bj2dhTECzZ4m⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠YouTube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/channel/UCfEoLqGyjn9M5Mr8umWiktA/featured?view_as=subscriber⁠⁠⁠⁠⁠⁠

Paul's Security Weekly
AI-Era AppSec: Transparency, Trust, and Risk Beyond the Firewall - Felipe Zipitria, Steve Springett, Aruneesh Salhotra, Ken Huang - ASW #363

Paul's Security Weekly

Play Episode Listen Later Dec 30, 2025 66:43


In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (CRS) project. Felipe has been at the forefront of open-source security, leading the development of one of the world's most widely deployed WAF rule sets, trusted by organizations globally to protect their web applications. Felipe explains why WAFs remain a critical layer in modern defense-in-depth strategies. We'll explore what makes OWASP CRS the go-to choice for security teams, dive into the project's current innovations, and discuss how traditional rule-based security is evolving to work alongside — not against — AI. Segment Resources: github.com/coreruleset/coreruleset coreruleset.org The future of CycloneDX is defined by modularity, API-first design, and deeper contextual insight, enabling transparency that is not just comprehensive, but actionable. At its heart is the Transparency Exchange API, which delivers a normalized, format-agnostic model for sharing SBOMs, attestations, risks, and more across the software supply chain. As genAI transforms every sector of modern business, the security community faces a question: how do we protect systems we can't fully see or understand? In this fireside chat, Aruneesh Salhotra, Project Lead for OWASP AIBOM and Co-Lead of OWASP AI Exchange, discusses two groundbreaking initiatives that are reshaping how organizations approach AI security and supply chain transparency. OWASP AI Exchange has emerged as the go-to single resource for AI security and privacy, providing over 200 pages of practical advice on protecting AI and data-centric systems from threats. Through its official liaison partnership with CEN/CENELEC, the project has contributed 70 pages to ISO/IEC 27090 and 40 pages to the EU AI Act security standard OWASP, achieving OWASP Flagship project status in March 2025. Meanwhile, the OWASP AIBOM Project is establishing a comprehensive framework to provide transparency into how AI models are built, trained, and deployed, extending OWASP's mission of making security visible to the rapidly evolving AI ecosystem. This conversation explores how these complementary initiatives are addressing real-world challenges—from prompt injection and data poisoning to model provenance and supply chain risks—while actively shaping international standards and regulatory frameworks. We'll discuss concrete achievements, lessons learned from global collaboration, and the ambitious roadmap ahead as these projects continue to mature and expand their impact across the AI security landscape. Segment Resources: https://owasp.org/www-project-aibom/ https://www.linkedin.com/posts/aruneeshsalhotra_owasp-ai-aisecurity-activity-7364649799800766465-DJGM/ https://www.youtube.com/@OWASPAIBOM https://www.youtube.com/@RobvanderVeer-ex3gj https://owaspai.org/ Agentic AI introduces unique and complex security challenges that render traditional risk management frameworks insufficient. In this keynote, Ken Huang, CEO of Distributedapps.ai and a key contributor to AI security standards, outlines a new approach to manage these emerging threats. The session will present a practical strategy that integrates the NIST AI Risk Management Framework with specialized tools to address the full lifecycle of Agentic AI. Segment Resources: aivss.owasp.org https://kenhuangus.substack.com/p/owasp-aivss-the-new-framework-for https://cloudsecurityalliance.org/blog/2025/02/06/agentic-ai-threat-modeling-framework-maestro This interview is sponsored by the OWASP GenAI Security Project. Visit https://securityweekly.com/owaspappsec to watch all of CyberRisk TV's interviews from the OWASP 2025 Global AppSec Conference! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-363

The CyberWire
Root access to the great firewall. [Research Saturday]

The CyberWire

Play Episode Listen Later Dec 13, 2025 26:06


Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China's Great Firewall. Across both parts, you break down thousands of leaked documents, source code repositories, diagrams, packet captures, and telemetry that reveal how systems like the Traffic Secure Gateway, MAAT, Redis-based analytics, and modular DPI engines work together to censor, surveil, and fingerprint users at scale. Taken together, the research shows how the Great Firewall functions not just as a technical system, but as a living censorship-industrial complex that adapts, learns, and coordinates across government, telecoms, and security vendors. The research can be found here: Inside the Great Firewall Part 1: The Dump Inside the Great Firewall Part 2: Technical Infrastructure Learn more about your ad choices. Visit megaphone.fm/adchoices