POPULARITY
Categories
Jenny Montgomery is a New Yorker on a mission — scouring galleries for art she loves and can afford to buy. Bradley talks to her about the city's art scene, where to see great work right now, and how to think about starting your own collection. Get rich quick? Forget about it. But live a richer cultural life? That's well within your reach.Discussed on today's episode:Printed Matter's NY Art Book Fair at MoMA PS1: https://printedmatterartbookfairs.org/Join Bradley on Sept. 20 at P&T Knitwear as we celebrate Russ & Daughters Day to mark the legendary shop's first-ever cookbook in their 111 years on the Lower East Side. We'll be hosting a live Firewall recording at 3PM where Bradley will interview Russ & Daughters' fourth generation co-owners, Niki Russ Federman and Josh Russ Tupper. For more details and to RSVP, visit https://www.russanddaughtersday.com/This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
Now that Trump has decided to restore the throwback name of the Department of Defense (now the Department of War), maybe it's time we started calling all federal agencies according to what they really do — so Bradley plays an epic name game. Plus, he assesses the looming real-world conditions that will test Zohran Mamdani's commitment to his progressive agenda, throws a flag on football's talking heads, and divulges his personal Emmy picks.Discussed on today's episode:Zohran Mamdani's Year One: A Time for Testing, by Bradley Tusk, Vital City, (09/04/25)Join Bradley on September 20 at P&T Knitwear as we celebrate Russ & Daughters Day to mark the legendary shop's first-ever cookbook in their 111 years on the Lower East Side. We'll be hosting a live Firewall recording at 3PM where Bradley will interview Russ & Daughters' fourth generation co-owners, Niki Russ Federman and Josh Russ Tupper. For more details and to RSVP, visit https://www.russanddaughtersday.com/This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
**Please subscribe to Matt's Substack at https://worthknowing.substack.com/*** The Judicial Branch Is Our Last Line of Defense Against Trump. Is It Holding?Join Matt Robison and legal expert Kim Wehle as they explore the judiciary's role in countering the unprecedented consolidation of power and abuse of the law by the Trump administration. Amid the collapse of checks from the executive and legislative branches, the conversation delves into whether the judicial branch can stand firm or if it's on the brink of collapse. This episode is a deep-dive into recent rulings, constitutional law, and the imperative for collective civic engagement to uphold democracy.00:00 Introduction and Overview06:26 The Supreme Court's Abdication of Duty18:25 Emergency Powers and Presidential Overreach26:34 The Role of Lower Courts32:53 The Importance of Rule of Law38:31 Supreme Court Rulings and Their Implications44:47 The Need for Constitutional Protections49:20 Engaging in Constructive Dialogue54:33 Final Thoughts and Call to Unity
Here's one thing we know about the Democratic Party right now — they are practically in a death spiral and must do something heroic to have any shot at the White House in 2028. If they think they can go about picking a candidate the regular, super-boring way, they're toast. So Bradley has a plan to bring fun and genuine excitement into the process, based on, yes, Battle of the Network Stars. Plus, he delivers a sharp verdict on the question of whether business school is worth it, and analyzes what the slowing growth of millionaires in New York City means for the next mayor.Join Bradley on Sept. 20 at P&T Knitwear as we celebrate Russ & Daughters Day to mark the legendary shop's first-ever cookbook in their 111 years on the Lower East Side. We'll be hosting a live Firewall recording at 3PM where Bradley will interview Russ & Daughters' fourth generation co-owners, Niki Russ Federman and Josh Russ Tupper. For more details and to RSVP, visit https://www.russanddaughtersday.com/.This episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
We often think of censorship as governments removing material or harshly punishing people who spread or access information. But Margaret E. Roberts' new book Censored: Distraction and Diversion Inside China's Great Firewall (Princeton University Press, 2020) reveals the nuances of censorship in the age of the internet. She identifies 3 types of censorship: fear (threatening punishment to deter the spread or access of information); friction (increasing the time or money necessary to access information); and flooding (publishing information to distract, confuse, or dilute). Roberts shows how China customizes repression by using friction and flooding (censorship that is porous) to deter the majority of citizens whose busy schedules and general lack of interest in politics make it difficult to spend extra time and money accessing information. Highly motivated elites (e.g. journalists, activists) who are willing to spend the extra time and money to overcome the boundaries of both friction and flooding meanwhile may face fear and punishment. The two groups end up with very different information – complicating political coordination between the majority and elites. Roberts's highly accessible book negotiates two extreme positions (the internet will bring government accountability v. extreme censorship) to provide a more nuanced understanding of digital politics, the politics of repression, and political communication. Even if there is better information available, governments can create friction on distribution or flood the internet with propaganda. Looking at how China manages censorship provides insights not only for other authoritarian governments but also democratic governments. Liberal democracies might not use fear but they can affect access and availability – and they may find themselves (as the United States did in the 2016 presidential election) subject to flooding from external sources. The podcast includes Roberts' insights on how the Chinese censored information on COVID-19 and the effect that had on the public. Foreign Affairs named Censored one of its Best Books of 2018 and it was also honored with the Goldsmith Award and the Best Book in Human Rights Section and Information Technology and Politics section of the American Political Science Association. Susan Liebell is associate professor of political science at Saint Joseph's University in Philadelphia. She is the author of Democracy, Intelligent Design, and Evolution: Science for Citizenship (Routledge, 2013). Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/east-asian-studies
We often think of censorship as governments removing material or harshly punishing people who spread or access information. But Margaret E. Roberts' new book Censored: Distraction and Diversion Inside China's Great Firewall (Princeton University Press, 2020) reveals the nuances of censorship in the age of the internet. She identifies 3 types of censorship: fear (threatening punishment to deter the spread or access of information); friction (increasing the time or money necessary to access information); and flooding (publishing information to distract, confuse, or dilute). Roberts shows how China customizes repression by using friction and flooding (censorship that is porous) to deter the majority of citizens whose busy schedules and general lack of interest in politics make it difficult to spend extra time and money accessing information. Highly motivated elites (e.g. journalists, activists) who are willing to spend the extra time and money to overcome the boundaries of both friction and flooding meanwhile may face fear and punishment. The two groups end up with very different information – complicating political coordination between the majority and elites. Roberts's highly accessible book negotiates two extreme positions (the internet will bring government accountability v. extreme censorship) to provide a more nuanced understanding of digital politics, the politics of repression, and political communication. Even if there is better information available, governments can create friction on distribution or flood the internet with propaganda. Looking at how China manages censorship provides insights not only for other authoritarian governments but also democratic governments. Liberal democracies might not use fear but they can affect access and availability – and they may find themselves (as the United States did in the 2016 presidential election) subject to flooding from external sources. The podcast includes Roberts' insights on how the Chinese censored information on COVID-19 and the effect that had on the public. Foreign Affairs named Censored one of its Best Books of 2018 and it was also honored with the Goldsmith Award and the Best Book in Human Rights Section and Information Technology and Politics section of the American Political Science Association. Susan Liebell is associate professor of political science at Saint Joseph's University in Philadelphia. She is the author of Democracy, Intelligent Design, and Evolution: Science for Citizenship (Routledge, 2013). Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/new-books-network
We often think of censorship as governments removing material or harshly punishing people who spread or access information. But Margaret E. Roberts' new book Censored: Distraction and Diversion Inside China's Great Firewall (Princeton University Press, 2020) reveals the nuances of censorship in the age of the internet. She identifies 3 types of censorship: fear (threatening punishment to deter the spread or access of information); friction (increasing the time or money necessary to access information); and flooding (publishing information to distract, confuse, or dilute). Roberts shows how China customizes repression by using friction and flooding (censorship that is porous) to deter the majority of citizens whose busy schedules and general lack of interest in politics make it difficult to spend extra time and money accessing information. Highly motivated elites (e.g. journalists, activists) who are willing to spend the extra time and money to overcome the boundaries of both friction and flooding meanwhile may face fear and punishment. The two groups end up with very different information – complicating political coordination between the majority and elites. Roberts's highly accessible book negotiates two extreme positions (the internet will bring government accountability v. extreme censorship) to provide a more nuanced understanding of digital politics, the politics of repression, and political communication. Even if there is better information available, governments can create friction on distribution or flood the internet with propaganda. Looking at how China manages censorship provides insights not only for other authoritarian governments but also democratic governments. Liberal democracies might not use fear but they can affect access and availability – and they may find themselves (as the United States did in the 2016 presidential election) subject to flooding from external sources. The podcast includes Roberts' insights on how the Chinese censored information on COVID-19 and the effect that had on the public. Foreign Affairs named Censored one of its Best Books of 2018 and it was also honored with the Goldsmith Award and the Best Book in Human Rights Section and Information Technology and Politics section of the American Political Science Association. Susan Liebell is associate professor of political science at Saint Joseph's University in Philadelphia. She is the author of Democracy, Intelligent Design, and Evolution: Science for Citizenship (Routledge, 2013). Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/chinese-studies
We often think of censorship as governments removing material or harshly punishing people who spread or access information. But Margaret E. Roberts' new book Censored: Distraction and Diversion Inside China's Great Firewall (Princeton University Press, 2020) reveals the nuances of censorship in the age of the internet. She identifies 3 types of censorship: fear (threatening punishment to deter the spread or access of information); friction (increasing the time or money necessary to access information); and flooding (publishing information to distract, confuse, or dilute). Roberts shows how China customizes repression by using friction and flooding (censorship that is porous) to deter the majority of citizens whose busy schedules and general lack of interest in politics make it difficult to spend extra time and money accessing information. Highly motivated elites (e.g. journalists, activists) who are willing to spend the extra time and money to overcome the boundaries of both friction and flooding meanwhile may face fear and punishment. The two groups end up with very different information – complicating political coordination between the majority and elites. Roberts's highly accessible book negotiates two extreme positions (the internet will bring government accountability v. extreme censorship) to provide a more nuanced understanding of digital politics, the politics of repression, and political communication. Even if there is better information available, governments can create friction on distribution or flood the internet with propaganda. Looking at how China manages censorship provides insights not only for other authoritarian governments but also democratic governments. Liberal democracies might not use fear but they can affect access and availability – and they may find themselves (as the United States did in the 2016 presidential election) subject to flooding from external sources. The podcast includes Roberts' insights on how the Chinese censored information on COVID-19 and the effect that had on the public. Foreign Affairs named Censored one of its Best Books of 2018 and it was also honored with the Goldsmith Award and the Best Book in Human Rights Section and Information Technology and Politics section of the American Political Science Association. Susan Liebell is associate professor of political science at Saint Joseph's University in Philadelphia. She is the author of Democracy, Intelligent Design, and Evolution: Science for Citizenship (Routledge, 2013).
We often think of censorship as governments removing material or harshly punishing people who spread or access information. But Margaret E. Roberts' new book Censored: Distraction and Diversion Inside China's Great Firewall (Princeton University Press, 2020) reveals the nuances of censorship in the age of the internet. She identifies 3 types of censorship: fear (threatening punishment to deter the spread or access of information); friction (increasing the time or money necessary to access information); and flooding (publishing information to distract, confuse, or dilute). Roberts shows how China customizes repression by using friction and flooding (censorship that is porous) to deter the majority of citizens whose busy schedules and general lack of interest in politics make it difficult to spend extra time and money accessing information. Highly motivated elites (e.g. journalists, activists) who are willing to spend the extra time and money to overcome the boundaries of both friction and flooding meanwhile may face fear and punishment. The two groups end up with very different information – complicating political coordination between the majority and elites. Roberts's highly accessible book negotiates two extreme positions (the internet will bring government accountability v. extreme censorship) to provide a more nuanced understanding of digital politics, the politics of repression, and political communication. Even if there is better information available, governments can create friction on distribution or flood the internet with propaganda. Looking at how China manages censorship provides insights not only for other authoritarian governments but also democratic governments. Liberal democracies might not use fear but they can affect access and availability – and they may find themselves (as the United States did in the 2016 presidential election) subject to flooding from external sources. The podcast includes Roberts' insights on how the Chinese censored information on COVID-19 and the effect that had on the public. Foreign Affairs named Censored one of its Best Books of 2018 and it was also honored with the Goldsmith Award and the Best Book in Human Rights Section and Information Technology and Politics section of the American Political Science Association. Susan Liebell is associate professor of political science at Saint Joseph's University in Philadelphia. She is the author of Democracy, Intelligent Design, and Evolution: Science for Citizenship (Routledge, 2013). Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/communications
We often think of censorship as governments removing material or harshly punishing people who spread or access information. But Margaret E. Roberts' new book Censored: Distraction and Diversion Inside China's Great Firewall (Princeton University Press, 2020) reveals the nuances of censorship in the age of the internet. She identifies 3 types of censorship: fear (threatening punishment to deter the spread or access of information); friction (increasing the time or money necessary to access information); and flooding (publishing information to distract, confuse, or dilute). Roberts shows how China customizes repression by using friction and flooding (censorship that is porous) to deter the majority of citizens whose busy schedules and general lack of interest in politics make it difficult to spend extra time and money accessing information. Highly motivated elites (e.g. journalists, activists) who are willing to spend the extra time and money to overcome the boundaries of both friction and flooding meanwhile may face fear and punishment. The two groups end up with very different information – complicating political coordination between the majority and elites. Roberts's highly accessible book negotiates two extreme positions (the internet will bring government accountability v. extreme censorship) to provide a more nuanced understanding of digital politics, the politics of repression, and political communication. Even if there is better information available, governments can create friction on distribution or flood the internet with propaganda. Looking at how China manages censorship provides insights not only for other authoritarian governments but also democratic governments. Liberal democracies might not use fear but they can affect access and availability – and they may find themselves (as the United States did in the 2016 presidential election) subject to flooding from external sources. The podcast includes Roberts' insights on how the Chinese censored information on COVID-19 and the effect that had on the public. Foreign Affairs named Censored one of its Best Books of 2018 and it was also honored with the Goldsmith Award and the Best Book in Human Rights Section and Information Technology and Politics section of the American Political Science Association. Susan Liebell is associate professor of political science at Saint Joseph's University in Philadelphia. She is the author of Democracy, Intelligent Design, and Evolution: Science for Citizenship (Routledge, 2013). Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/law
We often think of censorship as governments removing material or harshly punishing people who spread or access information. But Margaret E. Roberts' new book Censored: Distraction and Diversion Inside China's Great Firewall (Princeton University Press, 2020) reveals the nuances of censorship in the age of the internet. She identifies 3 types of censorship: fear (threatening punishment to deter the spread or access of information); friction (increasing the time or money necessary to access information); and flooding (publishing information to distract, confuse, or dilute). Roberts shows how China customizes repression by using friction and flooding (censorship that is porous) to deter the majority of citizens whose busy schedules and general lack of interest in politics make it difficult to spend extra time and money accessing information. Highly motivated elites (e.g. journalists, activists) who are willing to spend the extra time and money to overcome the boundaries of both friction and flooding meanwhile may face fear and punishment. The two groups end up with very different information – complicating political coordination between the majority and elites. Roberts's highly accessible book negotiates two extreme positions (the internet will bring government accountability v. extreme censorship) to provide a more nuanced understanding of digital politics, the politics of repression, and political communication. Even if there is better information available, governments can create friction on distribution or flood the internet with propaganda. Looking at how China manages censorship provides insights not only for other authoritarian governments but also democratic governments. Liberal democracies might not use fear but they can affect access and availability – and they may find themselves (as the United States did in the 2016 presidential election) subject to flooding from external sources. The podcast includes Roberts' insights on how the Chinese censored information on COVID-19 and the effect that had on the public. Foreign Affairs named Censored one of its Best Books of 2018 and it was also honored with the Goldsmith Award and the Best Book in Human Rights Section and Information Technology and Politics section of the American Political Science Association. Susan Liebell is associate professor of political science at Saint Joseph's University in Philadelphia. She is the author of Democracy, Intelligent Design, and Evolution: Science for Citizenship (Routledge, 2013). Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/journalism
What if you could eat at a place where the food was fresh and healthy, prices were geared to what customers could afford and the staff was treated equitably? Legendary food writer Mark Bittman joins Firewall to discuss the imminent launch of Community Kitchen, his nonprofit corrective to a food world gone awry.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's new TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Join Bradley at P&T Knitwear as we celebrate Russ & Daughters Day on September 20, to mark the legendary shop's first-ever cookbook in their 111 years on the Lower East Side. For more details and to RSVP, visit https://www.russanddaughtersday.com/.
Microsoft has launched Project IR, an advanced AI capable of reverse-engineering malware with a remarkable 90% accuracy rate. This autonomous agent utilizes a combination of large language models and specialized cybersecurity tools to identify threats effectively, achieving a low false positive rate of just 2%. Recent tests demonstrated its capability to analyze thousands of unclassified files and accurately flag a significant majority as malicious. However, as cybersecurity technology advances, so do the tactics of cybercriminals, with a notable increase in phishing attacks targeting managed service providers (MSPs), which now account for over half of all phishing incidents.The rise of AI-powered phishing and social engineering tactics has been highlighted in a recent Acronis report, revealing that 52% of phishing attacks are aimed at MSPs. Additionally, new research indicates that AI browsers may inadvertently assist scammers, as they can overlook red flags that human users would typically catch. A survey from One Password further emphasizes the challenges organizations face with the rapid adoption of AI tools, with many lacking visibility and control over these applications, leading to potential security vulnerabilities.Gartner has issued a warning to corporate leaders, stating that they have a limited timeframe to integrate AI agents into their operations or risk falling behind competitors. Despite the urgency, Gartner also acknowledges that a significant percentage of AI projects fail, raising concerns about the pressure vendors may place on businesses to adopt these technologies hastily. Meanwhile, XAI's claims regarding its Grok 2.5 model being open-sourced have been criticized as misleading, as the licensing terms impose restrictions that contradict open-source principles.In the realm of cybersecurity solutions, companies like SonicWall and VMware are introducing new tools and technologies to enhance security and operational efficiency. SonicWall has launched a new generation of firewalls with a unique cyber warranty, while VMware is focusing on ARM architecture to meet the growing demand for energy-efficient servers. However, the podcast emphasizes the importance of cutting through vendor noise and focusing on solutions that genuinely improve business operations, rather than getting caught up in marketing hype.Three things to know today 00:00 Microsoft's Project Ire Shows AI Can Catch Malware, But Attacks on MSPs Are Rising Faster06:36 AI Urgency, Open-Washing, and Federal Adoption: Sorting Hype From Reality10:09 From Billing Fixes to Firewalls and VMware's Arm Gamble: What Really Matters for MSPs Supported by: https://getnerdio.com/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
While all of you were enjoying a Firewall-free week, Bradley was undergoing Transcranial Magnetic Stimulation, a therapy designed to mitigate obsessive-compulsive disorder. "They put this thing over your head, and effectively, every two seconds, you get 30 pulses or shocks," he says. "They call them pulses because shock sounds bad. If you are a listener and you really do suffer from OCD or depression, this is a tool that I had not been aware of before that I'm very glad I tried." Plus, Bradley dissects the incentives for peace in Ukraine, explains why Democrats still haven't found a message to counter Trump, and floats a plan to make life better for baseball fans.Discussed on today's episode:How to Be a Good Intelligence AnalystThis episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Be sure to watch Bradley's TED Talk on Mobile Voting at https://go.ted.com/bradleytusk.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
In this episode of Reboot IT, host Dave Coriale, President of DelCor, sits down with Adam Kuhn, IT Director and DelCor alum, to discuss the evolving role of IT in associations. From foundational infrastructure to advanced cybersecurity strategies, Adam shares lessons learned from both sides of the fence—being an internal influencer and a business partner. The conversation explores how IT leaders can move beyond “keeping the lights on” to proactively shaping organizational maturity, especially in the face of overwhelming system data and increasing security demands.Summary:Cybersecurity as a Strategic InvestmentCybersecurity tools like Arctic Wolf elevate IT maturity beyond basic infrastructure.Associations must move from reactive to proactive security strategies.Cyber insurance requirements are evolving and often unclear, requiring IT guidance.IT Maturity: From Core Requirements to ElectivesAdam compares IT infrastructure to college coursework—core requirements vs. electives.Core includes cloud migration, Microsoft 365, and basic security tools.Electives like threat detection systems represent strategic growth and investment.Information Overload & the Need for SynthesisDevices generate massive amounts of data that are impossible to interpret manually.Security operations centers help synthesize logs and alerts across systems.IT teams need tools to manage and interpret this data effectively.IT's Role in Business Decision-MakingIT should be a trusted advisor, not a gatekeeper or veto power.Excluding IT from technology selection leads to costly integration surprises.IT's involvement ensures better alignment, risk mitigation, and long-term success.Building Cross-Departmental PartnershipsIT needs access to systems it doesn't own to ensure full security coverage.Business units must understand their role in cybersecurity and collaborate with IT.Partnership is essential—not optional—for organizational safety and resilience.Influencing Leadership & Budget DecisionsIT leaders must make cogent cases for investment in security and infrastructure.Budget support depends on trust and clear communication with leadership.Adam emphasizes gratitude for working in a supportive environment that values IT input.
Diese Folge des SPIEGEL-Podcasts »Firewall« ist ursprünglich am 24. Juli 2025 erschienen. Im Rahmen des aktuellen Highlight-Programms während der Sommerpause von »Acht Milliarden« veröffentlichen wir sie hier noch einmal. Andreas Scheuer steht für einen der größten Polit-Skandale der letzten Jahre: das Debakel um die PKW-Maut. Trotzdem stand er bei Wahlkampf-Spendern hoch im Kurs. Mindestens 132.000 Euro flossen 2021 in die Kampagne des damaligen Bundesverkehrsministers. Das geht aus einer geheimen Liste hervor, die dem SPIEGEL vorliegt. Viele der Geldgeber waren, ausgerechnet, im Verkehrssektor tätig. Die Unterlagen zeigen, wie deutsche Unternehmer und ihre Vertreter einen Bundesminister umgarnten. Hat sich Scheuer von den Zahlungen beeinflussen lassen? Er selbst sagt zu einzelnen Spenden nichts. Sein Anwalt wirft dem SPIEGEL eine „Skandalisierung von Sachverhalten“ vor, die »mit der Rechtsordnung und dem Parteiengesetz im völligen Einklang stehen und von der Rechtsordnung sogar gewünscht sind«. Der SPIEGEL-Podcast »Firewall« erzählt, wie Wahlkampf-Spender sich offensiv mit ihren Anliegen in Scheuers Ministerium meldeten. Und er rekonstruiert, wie Scheuer mit der PKW-Maut scheiterte, zum unbeliebtesten Minister des Landes wurde. Heute baut er sich eine zweite Karriere in der Wirtschaft auf. Und wieder unterstützen unterstützen ihn einige seiner damaligen Gönner. Auszüge aus der Spenderliste und noch mehr Details lest ihr hier (S+) und unsere große Recherche zum Maut-Debakel findet ihr hier.+++ Alle Infos zu unseren Werbepartnern finden Sie hier. Die SPIEGEL-Gruppe ist nicht für den Inhalt dieser Seite verantwortlich. +++ Den SPIEGEL-WhatsApp-Kanal finden Sie hier. Alle SPIEGEL Podcasts finden Sie hier. Mehr Hintergründe zum Thema erhalten Sie mit SPIEGEL+. Entdecken Sie die digitale Welt des SPIEGEL, unter spiegel.de/abonnieren finden Sie das passende Angebot. Informationen zu unserer Datenschutzerklärung.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Center Software RADIUS Remote Code Execution Vulnerability An OS command injection vulnerability may be abused to gain access to the Cisco Secure Firewall Management Center software. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79 F5 Access for Android vulnerability An attacker with a network position that allows them to intercept network traffic may be able to read and/or modify data in transit. The attacker would need to intercept vulnerable clients specifically, since other clients would detect the man-in-the-middle (MITM) attack. https://my.f5.com/manage/s/article/K000152049
Take a Network Break! We start with critical vulnerabilities in Cisco Secure Firewall Management Center and Fortinet’s FortiSIEM. On the news front, SonicWall announces Gen8 firewalls plus a $200,000 warranty for customers that sign on to SonicWall’s Managed Protection Security Suite. IBM Cloud suffers its fourth major outage since May of this year, SASE vendor... Read more »
Take a Network Break! We start with critical vulnerabilities in Cisco Secure Firewall Management Center and Fortinet’s FortiSIEM. On the news front, SonicWall announces Gen8 firewalls plus a $200,000 warranty for customers that sign on to SonicWall’s Managed Protection Security Suite. IBM Cloud suffers its fourth major outage since May of this year, SASE vendor... Read more »
Take a Network Break! We start with critical vulnerabilities in Cisco Secure Firewall Management Center and Fortinet’s FortiSIEM. On the news front, SonicWall announces Gen8 firewalls plus a $200,000 warranty for customers that sign on to SonicWall’s Managed Protection Security Suite. IBM Cloud suffers its fourth major outage since May of this year, SASE vendor... Read more »
Cisco warns of maximum-severity defect in firewall software UK's Colt Telecom suffers cyberattack CISA implores OT environments to lock down critical infrastructure Huge thanks to our sponsor, Conveyor Have you been personally victimized by portal security questionnaires? Conveyor is here to help. Endless clicks, bad navigation, and expanding questions stacked like Russian nesting dolls, all add up to hours of your life you'll never get back. With Conveyor's AI-powered browser extension, you can open a portal questionnaire, scan for questions, and watch it auto-populate your answers back into the portal without the copy and paste. See how at www.conveyor.com Find the stories behind the headlines at CISOseries.com.
In 1948, as the Cold War was taking shape, the United States passed the Smith–Mundt Act, officially known as the U.S. Information and Educational Exchange Act. Its purpose was simple but profound: empower the U.S. government to produce and distribute information and cultural programming abroad to promote American values, while explicitly forbidding the use of those same propaganda tools on the American public. This legal firewall reflected a deep suspicion of government-run information campaigns at home, rooted in lessons from World War II.During the war, the U.S. and its allies had learned firsthand how powerful propaganda could be. Britain's BBC World Service provided trusted broadcasts into occupied Europe. Japan's “Tokyo Rose” and Germany's “Lord Haw-Haw” used radio to weaken enemy morale. The U.S. Office of War Information produced posters, films, and broadcasts for both domestic and foreign audiences. By 1948, lawmakers wanted America to compete in the global battle for hearts and minds—but without turning those tools inward.Under Smith–Mundt, outlets like Voice of America (VOA) and Radio Free Europe could beam uncensored news into the Eastern Bloc, Africa, and Asia. U.S. embassies could distribute pamphlets promoting democracy abroad. But none of this material could legally be disseminated to Americans at home. The separation was strict: VOA could broadcast to Cuba or the USSR—but not to Kansas. This was about trust. Citizens needed to believe their news media was independent of government influence.For decades, the system held. Propaganda was for “export only.” Domestic audiences got their information from private media, foreign audiences from U.S. state-sponsored broadcasters. But the digital revolution eroded these boundaries. By the early 2000s, a radio segment for Afghan listeners could be uploaded to YouTube and viewed in Cleveland the same day. Social media made it impossible to stop foreign-directed content from “boomeranging” back home.In 2013, the Smith–Mundt Modernization Act took effect, removing the ban on domestic access to foreign-targeted U.S. content. The State Department and U.S. Agency for Global Media (USAGM) could now make VOA, Radio Free Asia, and other materials available in the United States. Supporters argued the change was about transparency—acknowledging the internet had already made the old firewall meaningless. Critics saw a dangerous precedent: legalizing domestic exposure to state-crafted narratives.The stakes are high because propaganda is not just a relic of the past—it's a core pillar of modern statecraft. Political scientist Joseph Nye's concept of “soft power” captures the idea: nations shape outcomes through attraction and persuasion, not just coercion. During the Cold War, the U.S. invested heavily in cultural diplomacy, educational exchanges like Fulbright, and media operations like Radio Liberty. Other nations played the same game: Britain's BBC World Service, Russia's Radio Moscow and later RT, China's CGTN, and even North Korea's border loudspeakers aimed at the South.Today, the boundaries have vanished. U.S. government content streams online alongside private news and foreign state media. Russian social media campaigns, Chinese video platforms, and American-funded broadcasters all compete for attention in the same feeds. In 2025, North Korea dismantled its last propaganda loudspeaker—but the global information war has only grown louder in digital form.The Smith–Mundt firewall was designed for a world of clear borders and controlled media channels. That world is gone. The 2013 rollback aligned the law with technological reality, but it also erased the formal assurance that Americans would be free from their own government's influence campaigns. In the 21st century, the battle for hearts and minds has no borders—every message is now for everyone, everywhere, all at once.
At Black Hat USA 2025, Rupesh Chokshi, Senior Vice President and General Manager at Akamai Technologies, connected with ITSPmagazine's Sean Martin to discuss the dual realities shaping enterprise AI adoption—tremendous opportunity and significant risk.AI is driving a seismic transformation in business operations, with executive teams rapidly deploying proof-of-concept projects to capture competitive advantage. Yet, as Chokshi notes, many of these initiatives race ahead without fully integrating security teams into the process. While budgets for AI are expanding, funding for AI-specific security measures often lags behind, leaving organizations exposed.One of the most pressing concerns is the rise of AI bots—Akamai observes 150 billion such bots traversing networks daily. These bots scrape valuable digital content, train models on it, and, in some cases, replace direct customer interactions with summarized answers. The result? Lost marketing leads, disrupted sales funnels, and even manipulated product recommendations—all without traditional “breach” indicators.This is not just a security problem; it's a business continuity challenge. Organizations must develop strategies to block or manage scraping, including commercial agreements for content usage. Beyond this, the proliferation of conversational AI agents—whether for booking tickets, providing mortgage information, or recommending products—introduces new attack surfaces. Threat actors exploit prompt injections, jailbreaks, and code execution vulnerabilities to compromise these interfaces, risking both customer trust and brand reputation.Akamai's response includes capabilities such as Firewall for AI, providing in-line visibility and control over AI-driven sessions, and bot mitigation technologies that protect high-value content. By offering real-time threat intelligence tailored to customer environments, Akamai helps enterprises maintain agility without sacrificing protection.Chokshi's call to action is clear: every company is now an AI company, and security must be embedded from the outset. Boards should view security not as a budget line item, but as the foundation for innovation velocity, brand integrity, and long-term competitiveness.Learn more about Akamai: https://itspm.ag/akamailbwcNote: This story contains promotional content. Learn more.Guests:Rupesh Chokshi, SVP & General Manager, Application Security, Akamai | https://www.linkedin.com/in/rupeshchokshi/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
This episode explores the symbolic and philosophical layers of computer science, blending in ideas like firewalls, “The Matrix,” and how digital concepts mirror human systems.
While most people ignore the Ninth Amendment, those who don't usually get it completely wrong. It isn't a grant of additional federal power; it's a rule of construction designed to explain its limits. On this episode, we'll uncover the forgotten history behind the ignored 9th Amendment. The post The 9th Amendment Wasn't an Afterthought. It Was a Firewall first appeared on Tenth Amendment Center.
Got a question or comment? Message us here!On this episode of the #SOCBrief, we break down attacks on SonicWall firewalls. A wave of ransomware, possibly exploiting zero-day vulnerabilities, is compromising even fully patched systems. Learn how SOCs can respond fast and stay ahead.Support the showWatch full episodes at youtube.com/@aliascybersecurity.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.
ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Booth #1933 | A ThreatLocker Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with John LillistonJoin ITSP Magazine's Marco Ciappelli and Sean Martin as they preview ThreatLocker's exciting Black Hat 2025 presence with Detect Product Director John Lilliston. Discover upcoming major announcements, hands-on hacking demos, and how ThreatLocker's default deny approach is revolutionizing enterprise cybersecurity through comprehensive zero trust implementation.As Black Hat USA 2025 approaches, cybersecurity professionals are gearing up for one of the industry's most anticipated events. ITSP Magazine's Marco Ciappelli and Sean Martin recently sat down with John Lilliston, ThreatLocker's Detect Product Director, to preview what promises to be an exciting showcase of zero trust innovation at booth 1933.ThreatLocker has become synonymous with the "default deny" security approach, a philosophy that fundamentally changes how organizations protect their digital assets. Unlike traditional security models that allow by default and block known threats, ThreatLocker's approach denies everything by default and allows only approved applications, network communications, and storage operations. This comprehensive strategy operates across application, network, and storage levels, creating what Lilliston describes as a "hardened system that stops adversaries in their tracks."The company's rapid growth reflects the industry's embrace of zero trust principles, moving beyond buzzword status to practical, enterprise-ready solutions. Lilliston, who joined ThreatLocker in February after evaluating their products from the enterprise side, emphasizes how the platform's learning mode and ring fencing capabilities set it apart from competitors in the application control space.At Black Hat 2025, ThreatLocker will demonstrate their defense-in-depth strategy through their Detect product line. While their primary zero trust controls rarely fail, Detect provides crucial monitoring for applications that must run in enterprise environments but may have elevated risk profiles. The system can automatically orchestrate responses to threats, such as locking down browsers exhibiting irregular behavior that might indicate data exfiltration attempts.Visitors to booth 1933 can expect hands-on demonstrations and on-demand hacking scenarios that showcase real-world applications of ThreatLocker's technology. The company is preparing major announcements that CEO Danny Houlihan will reveal during the event, promising game-changing developments for both the organization and its client base.ThreatLocker's Black Hat agenda includes a welcome reception on Tuesday, August 5th, from 7-10 PM at the Mandalay Bay Complex, and Houlihan's presentation on "Simplifying Cybersecurity" on Thursday, August 7th, from 10:15-11:05 AM at Mandalay Bay J.The convergence of practical zero trust implementation, cutting-edge threat detection, and automated response capabilities positions ThreatLocker as a key player in the evolving cybersecurity landscape, making their Black Hat presence essential viewing for security professionals seeking comprehensive protection strategies.Keywords: Black Hat 2025, zero trust security, cybersecurity conference, ThreatLocker, default deny strategy, endpoint protection, application control, threat detection, enterprise security, network security, cybersecurity solutions, security automation, malware prevention, cyber threats, information security, security platform, Black Hat USA, cybersecurity innovation, managed detection response, security operationsLearn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content.Learn more.Guests:John LillistonCybersecurity Director | Threat Detection & Response | SOC Leadership | DFIR | EDR/XDR Strategy | GCFA, GISP | https://www.linkedin.com/in/john-lilliston-4725217b/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerThreatLocker® Welcome Reception | Don't gamble with your security! Join us at Black Hat for a lively Welcome Reception hosted by ThreatLocker®. Meet our Cyber Hero® Team and dive into discussions on the latest advancements in ThreatLocker®Endpoint Security. It's a great opportunity to connect and learn together! Time: 7PM - 10PM | Location: Mandalay Bay Complex RSVP below and we'll send you a confirmation email with all the details.[ Welcome Reception RSVP ]Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
In a digital age where cyberattacks are common, our spiritual lives also face constant threats from false teaching. Just as we need firewalls to protect our devices, God has given us doctrinal firewalls to safeguard our faith—through biblically qualified elders, sound doctrine, and expositional preaching. In 1 John 4, we're reminded that the Spirit of God empowers truth, while the spirit of error seeks to deceive—and only by grounding ourselves in God's Word can we stand firm.
Adyen is a global payments processor whose primary business is providing payment services for merchants, retailers, and venues, as well as online payments. On today’s Heavy Networking we talk about a firewall automation project the company has undertaken. With dozens of change requests coming in every day that need to touch network and host firewalls,... Read more »
Adyen is a global payments processor whose primary business is providing payment services for merchants, retailers, and venues, as well as online payments. On today’s Heavy Networking we talk about a firewall automation project the company has undertaken. With dozens of change requests coming in every day that need to touch network and host firewalls,... Read more »
Adyen is a global payments processor whose primary business is providing payment services for merchants, retailers, and venues, as well as online payments. On today’s Heavy Networking we talk about a firewall automation project the company has undertaken. With dozens of change requests coming in every day that need to touch network and host firewalls,... Read more »
Ahead of Black Hat USA 2025, Sean Martin and Marco Ciappelli sit down once again with Rupesh Chokshi, Senior Vice President and General Manager of the Application Security Group at Akamai, for a forward-looking conversation on the state of AI security. From new threat trends to enterprise missteps, Rupesh lays out three focal points for this year's security conversation: protecting generative AI at runtime, addressing the surge in AI scraper bots, and defending the APIs that serve as the foundation for AI systems.Rupesh shares that Akamai is now detecting over 150 billion AI scraping attempts—a staggering signal of the scale and sophistication of machine-to-machine activity. These scraper bots are not only siphoning off data but also undermining digital business models by bypassing monetization channels, especially in publishing, media, and content-driven sectors.While AI introduces productivity gains and operational efficiency, it also introduces new and uncharted risks. Agentic AI, where autonomous systems operate on behalf of users or other systems, is pushing cybersecurity teams to rethink their strategies. Traditional firewalls aren't enough—because these threats don't behave like yesterday's attacks. Prompt injection, toxic output, and AI-generated hallucinations are some of the issues now surfacing in enterprise environments, with over 70% of organizations already experiencing AI-related incidents.This brings the focus to the runtime. Akamai's newly launched Firewall for AI is purpose-built to detect and mitigate risks in generative AI and LLM applications—without disrupting performance. Designed to flag issues like toxic output, remote code execution, or compliance violations, it operates with real-time visibility across inputs and outputs. It's not just about defense—it's about building trust as AI moves deeper into decision-making and workflow automation.CISOs, says Rupesh, need to shift from high-level discussions to deep, tactical understanding of where and how their organizations are deploying AI. This means not only securing AI but also working hand-in-hand with the business to establish governance, drive discovery, and embed security into the fabric of innovation.Learn more about Akamai: https://itspm.ag/akamailbwcNote: This story contains promotional content. Learn more.Guests:Rupesh Chokshi, SVP & General Manager, Application Security, Akamai | https://www.linkedin.com/in/rupeshchokshi/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
This episode kicks off with a powerful story of malicious compliance from an IT worker denied on-call pay, who made sure the company paid the price literally. We also hear from a retail worker who served a petty refund with a smile, and a group of manufacturing employees who turned a no-loitering rule into a step-counting protest. Other tales include a consulting engineer who billed hard after being denied a simple limo ride and an employee who weaponized a rigid work-from-home policy. It's a full lineup of boss battles, policy blowback, and satisfying consequences.Submit your own stories to KarmaStoriesPod@gmail.com.Karma Stories is available on all major Podcasting Platforms and on YouTube under the @KarmaStoriesPodcast handle. We cover stories from popular Reddit Subreddits like Entitled Parents, Tales From Tech Support, Pro Revenge and Malicious Compliance. You can find new uploads here every single day of the week!Rob's 3D Printing Site: https://Dangly3D.comGet your Custom Hand Turned Pen by Rob at https://CanadianRob.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/karma-stories--5098578/support.
In this episode of The Other Side of the Firewall's Thursday episode, Ask a CISSP, Ryan Williams Sr. interviews Angela Diaz, an expert in risk management and fraud prevention. They discuss the importance of understanding the three lines of defense in risk management, the impact of fraud on individuals and organizations, and the career pathways available in the field. Angela shares her personal journey into risk management, the significance of soft skills, and her involvement in the Fraud Fight Club initiative. The conversation also touches on mindfulness practices and the importance of maintaining a balanced life outside of work. Contact Angela - https://www.linkedin.com/in/angela-diaz-crmp-37430064/ Fraud Fight Club - https://www.fraudfightclub.com/ Please buy my book: https://theothersideofthefirewall.com Socials: Website - www.ramcyber.io Heroes Media Group: https://www.heroesmediagroup.com/shows/the-other-side-of-the-firewall/ Audio - https://podcasts.apple.com/us/podcast/the-other-side-of-the-firewall/id1542479181 YouTube - https://www.youtube.com/@theothersideofthefirewall7511 ReppedFLIX - https://lnkd.in/eVis2CbS WDJY 99.1 FM: https://www.wdjyfm.com/ TuneIn: https://lnkd.in/e2crcZU8 Facebook - https://www.facebook.com/profile.php?id=61556539026086 Instagram - https://www.instagram.com/theothersideofthefw X (Twitter) - https://twitter.com/Ask_a_CISSP TikTok - https://www.tiktok.com/@ryanwilliams683 Medium - https://medium.com/@ryanwilliamssenior Subscribe to LinkedIn Newsletter - https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7172626552545865728 LinkedIn - https://www.linkedin.com/company/the-other-side-of-the-firewall/ Ryan on Twitter, LinkedIn, Clubhouse, and Threads - @ryrysecurityguy Chris on LinkedIn - https://www.linkedin.com/in/chrisabacon/ Chapters 00:00 Introduction to Risk Management and Fraud 03:58 Understanding the Three Lines of Defense 11:58 The Importance of Risk Management in Financial Institutions 19:45 Career Pathways in Risk Management 25:59 Soft Skills for Success in Risk Management 29:47 Engagement in the Fraud Fight Club Initiative 37:49 Personal Insights and Mindfulness Practices 41:43 Conclusion and Future Connections #cybersecurity #riskmanagement #fraud
Welcome to episode 312 of The Cloud Pod, where your hosts, Matt, Ryan, and Justin, are here to bring you all the latest in Cloud and AI news. We've got security news, updates from PostgreSQL, Azure firewall and BlobNFS, plus TWO Cloud Journey stories for you! Thanks for joining us this week in the cloud! Titles we almost went with this week: Git Happens: Why Your Database Pipeline Keeps Breaking PostgreSQL and Chill: Azure’s New Storage Options for Database Romance NVMe, Myself, and PostgreSQL Canvas and Effect: AWS Paints a New Picture for E-commerce Oracle’s $30 Billion Stargate: The AI Infrastructure Wars Begin Larry’s Last Laugh: Oracle Lands OpenAI’s Mega Deal AI Will See You Now (Couch Not Included) Purview and Present Danger: Microsoft’s AI Security SDK Goes Live The Purview from Up Here: Microsoft’s Bird’s Eye View on AI Data Security Building Bridges: Azure’s Two-Way Street to Active Directory Domain Names: Not Just for Browsers Anymore FUSE or Lose: Azure’s BlobNFS Gets a Speed Boost When Larry Met Andy: An Exadata Love Story Bing There, Done That: Azure’s New Research Assistant The Search is Over: Azure AI Foundry Finds Its Research Groove Memory Lane: Where AI Agents Go to Remember Things Elephants Never Forget, and Now Neither Do Google’s Agents Z3 or Not Z3: That is the Storage Question Local SSD Hero: A New Hope for I/O Intensive Workloads Azure’s Certificate of Insecurity KeyVault’s Keys Left Under the Doormat When Your Cloud Provider Accidentally CCs the Hackers AI Is Going Great – Or How ML Makes Money 03:09 RYAN DOES A THING FOR SECURING AI WORKLOADS Ryan was recently invited to Google's Headquarters in San Francisco as part of a small group of security professionals where they spent time hands-on with Google security offerings, learning how to secure AI workloads. AI – and how to secure it – is a hot topic right now, and being able to spend time working with the Google development team was really insightful, with how they work with various levels of protections in place in dummy applications. Ryan was especially interested in the back-end logic that was executed in the applications. 05:32 Ryan – “I was impressed because there’s how we’re thinking about AI is still evolving, and how we’re protecting it’s gonna be changing rapidly, and having real-world examples really helped really flesh out how their AI services are, how they’re integrated into a security ecosystem. It was pretty impressive. And it’s something that’s near and dear. I’ve been working and trying to roll out Google agent spaces and different AI workloads and trying to get involved and make sure that we, just getting visibility into all the different ones. And that was, it was really helpful to sort of think about it in those contexts.” 10:13 OpenAI secures $30bn cloud deal with Oracle OpenAI signed a $30 billion annual cloud computing agreement with Oracle for 4.5GW of capacity, making it one of the largest AI cloud deals to date, and nearly triple Oracle’s current $10.3 billion annual data center infrastructure revenue.
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss various cybersecurity topics, including a vulnerability in ServiceNow that allowed unauthorized data access, the implications of North American APTs attacking China using Exchange Zero Day exploits, and a significant security flaw in McDonald's AI recruiting platform. They also share personal updates and reflections on media consumption, emphasizing the importance of feedback for the podcast and Ryan's recently published book. Articles: New ServiceNow flaw lets attackers enumerate restricted data https://www.bleepingcomputer.com/news/security/new-servicenow-flaw-lets-attackers-enumerate-restricted-data/amp/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExQWRYQWV1ak5pd1lZdHJtegEeelyIlK2Ek9gCYDYtP80irWWtUhS3cA8gY_25kHfhgHP-_ntEK-dqk8Ot_GI_aem_xJzS7lMJMTkWDOS6Wcj4SQ North American APT Uses Exchange Zero-Day to Attack China https://www.darkreading.com/cyberattacks-data-breaches/north-american-apt-exchange-zero-day-attacks-china?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExQWRYQWV1ak5pd1lZdHJtegEer8-gvyCsk7NEjyuZ1a1N2eGHIyLh6cCANkM5oD9x-jPlHuntjonpKiZ0Hcg_aem_25vP0x19KnGVwKBr8POhPg McDonald's AI recruiting platform had a really embarrassing security flaw - and it left millions of users open to attack https://www.techradar.com/pro/security/mcdonalds-ai-recruiting-platform-had-a-really-embarrassing-security-flaw-which-left-millions-of-users-open-to-attack?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExQWRYQWV1ak5pd1lZdHJtegEer8-gvyCsk7NEjyuZ1a1N2eGHIyLh6cCANkM5oD9x-jPlHuntjonpKiZ0Hcg_aem_25vP0x19KnGVwKBr8POhPg Please LISTEN
Today we discuss the situation with alleged CSA predator, Art Lucier. The state of the Church and how we got here with former CIA employee, Pedro Israel Orta. Daystar Petition: https://tinyurl.com/ycxwe4ye Sign up for my newsletter here: Laura-Lynn Newsletter Jonathan & Suzy Lamb GiveSendGo: https://www.givesendgo.com/GEBG9 Richardson Nutritional Center: https://tinyurl.com/mudzzy3n Zstack Protocol: https://zstacklife.com/?ref=LAURALYNN Antibiotics at: Sales@larxmedical.com Promo code: LLTT Need some Ivermectin or Hydroxychloroquine? Fast shipping with guaranteed delivery in Canada and the US. Contact Mia for more information. SozoHealth@proton.me ☆ We no longer can trust our mainstream media, which is why independent journalists such as myself are the new way to receive accurate information about our world. Thank you for supporting us – your generosity and kindness to help us keep information like this coming! ☆ ~ L I N K S ~ ➞ DONATE AT: https://www.lauralynn.tv/ or lauralynnlive@protonmail.com ➞ TWITTER: @LauraLynnTT ➞ FACEBOOK: Laura-Lynn Tyler Thompson ➞ RUMBLE: https://rumble.com/c/LauraLynnTylerThompson ➞ BITCHUTE: https://www.bitchute.com/channel/BodlXs2IF22h/ ➞ YOUTUBE: https://www.youtube.com/LauraLynnTyler ➞ BRIGHTEON: https://www.brighteon.com/channels/lauralynntv ➞ DLIVE: https://dlive.tv/Laura-Lynn ➞ ODYSEE: https://odysee.com/@LauraLynnTT:9 ➞ GETTR: https://www.gettr.com/user/lauralynn ➞ LIBRTI: https://librti.com/laura-lynn-tyler-thompson
Fortinet patches a critical flaw in its FortiWeb web application firewall. Hackers are exploiting a critical vulnerability in Wing FTP Server. U.S. Cyber Command's fiscal 2026 budget includes a new AI project. Czechia's cybersecurity agency has issued a formal warning about Chinese AI company DeepSeek. The DoNot APT group targets Italy's Ministry of Foreign Affairs. Mexico's former president is under investigation for alleged bribes to secure spyware contracts. The FBI seizes a major Nintendo Switch piracy site. CISA releases 13 ICS advisories. A retired US Army lieutenant colonel pleads guilty to oversharing classified information on a dating app. Our guest is Catherine Woneis, VP of Product at Fingerprint, to discuss how bots are being used to facilitate music royalty fraud. A federal judge is not impressed with a crypto-thief's lack of restitution. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Catherine Woneis, VP of Product at Fingerprint, to discuss how bots are being used to facilitate music royalty fraud and how companies can protect themselves. Selected Reading Critical SQL injection vulnerability in Fortinet FortiWeb enables unauthenticated remote code execution (Beyond Machines) Critical Wing FTCritical Wing FTP Server Vulnerability Exploited - SecurityWeekP Server Vulnerability Exploited (SecurityWeek) Cyber Command creates new AI program in fiscal 2026 budget (DefenseScoop) DeepSeek a threat to national security, warns Czech cyber agency (The Record) Indian Cyber Espionage Group Targets Italian Government (Infosecurity Magazine) Former Mexican president investigated over allegedly taking bribes from spyware industry (The Record) Major Nintendo Switch Piracy Website Seized By FBI (Kotaku) CISA Releases Thirteen Industrial Control Systems Advisories (CISA) Lovestruck US Air Force worker admits leaking secrets on dating app (The Register) Crypto Scammer Truglia Gets 12 Years Prison, Up From 18 Months (Bloomberg) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
ON THIS EPISODE: ➤ How to position yourself as your team’s “firewall” – standing between them and organizational pressure to create space for great work. ➤ Why “exception-only management” builds stronger teams than micromanagement – trusting first and intervening only when needed. ➤ The Scout Leader approach to letting people fail safely so they actually...
I cover the latest Patch Tuesday news, more metrics on Windows 11 adoption, some InfoSec stories and much more! Reference Links: https://www.rorymon.com/blog/windows-update-causing-firewall-error-patch-tuesday-news-grok-goes-crazy/
Send us a textSmall businesses are under cyber siege—yet few are fully protected. In this compelling conversation from IT Nation Secure 2025, Joey Pinz sits down with Sarvesh Rao, the founder of Marma Security, to explore a massive untapped opportunity for Managed Service Providers (MSPs).
Ever since Tuesday's shock results, Bradley's been sharing a steady stream of thoughts on Zohran Mamdani's win here on Firewall and his Substack — and now you can hear from Mamdani directly. We're re-releasing our interview from April with the (now) Democratic nominee for mayor, when he joined Bradley and Tom Allon from City & State to discuss his vision for a fairer, faster, and more functional New York. Real leadership, Mamdani argued, means empowering experts, not micromanaging. He believes that a reimagined, newly empowered public sector is key to the city's future if elected mayor in November.Check out Bradley's latest in Vital City: How Zohran Mamdani Could Succeed as MayorThis episode was taped at P&T Knitwear at 180 Orchard Street — New York City's only free podcast recording studio.Send us an email with your thoughts on today's episode: info@firewall.media.Subscribe to Bradley's weekly newsletter and follow Bradley on Linkedin + Substack + YouTube.
JOIN TSL WORKSHOPS: https://tslworkshops.circle.so What's it like to collaborate creatively with your spouse — and still want to have dinner together after? This week, we're joined by Joe Forte, screenwriter (Firewall) and longtime writing partner (and husband!) of Meg LeFauve. We talk candidly about the unique dynamics of working with your life partner — the communication hurdles, the unexpected benefits, and how to protect both the relationship and the work. Plus, Joe shares the power of writing retreats, how he thinks about mentorship, and what it really means to support another writer's voice while honoring your own. Learn more about your ad choices. Visit megaphone.fm/adchoices