Measurement standards laboratory in the United States
POPULARITY
Categories
CBS EYE ON THE WORLD WITH JOHN BATCHELOR 1900 KYIV THE SHOW BEGINS IN THE DOUBTS THAT CONGRESS IS CAPABLE OF CUTTING SPENDING..... 10-8-25 FIRST HOUR 9-915 HEADLINE: Arab Intellectuals Fail Palestinians by Prioritizing Populism and Victimhood Narrative in Gaza ConflictGUEST NAME: Hussain Abdul-Hussain SUMMARY: John Batchelor speaks with Hussain Abdul-Hussain about Hamas utilizing the power of victimhood to justify atrocities and vilify opponents. Arab and Muslim intellectuals have failed Palestinians by prioritizing populism over introspection and self-critique. Regional actors like Egypt prioritize populist narratives over national interests, exemplified by refusing to open the Sinai border despite humanitarian suffering. The key recommendation is challenging the narrative and fostering a reliable, mature Palestinian government. 915-930 HEADLINE: Arab Intellectuals Fail Palestinians by Prioritizing Populism and Victimhood Narrative in Gaza ConflictGUEST NAME: Hussain Abdul-Hussain SUMMARY: John Batchelor speaks with Hussain Abdul-Hussain about Hamas utilizing the power of victimhood to justify atrocities and vilify opponents. Arab and Muslim intellectuals have failed Palestinians by prioritizing populism over introspection and self-critique. Regional actors like Egypt prioritize populist narratives over national interests, exemplified by refusing to open the Sinai border despite humanitarian suffering. The key recommendation is challenging the narrative and fostering a reliable, mature Palestinian government. 930-945 HEADLINE: Russian Oil and Gas Revenue Squeezed as Prices Drop, Turkey Shifts to US LNG, and China Delays Pipeline GUEST NAME: Michael Bernstam SUMMARY: John Batchelor speaks with Michael Bernstam about Russia facing severe budget pressure due to declining oil prices projected to reach $40 per barrel for Russian oil and global oil surplus. Turkey, a major buyer, is abandoning Russian natural gas after signing a 20-year LNG contract with the US. Russia refuses Indian rupee payments, demanding Chinese renminbi, which India lacks. China has stalled the major Power of Siberia 2 gas pipeline project indefinitely. Russia utilizes stablecoin and Bitcoin via Central Asian banks to circumvent payment sanctions. 945-1000 HEADLINE: UN Snapback Sanctions Imposed on Iran; Debate Over Nuclear Dismantlement and Enrichment GUEST NAME: Andrea Stricker SUMMARY: John Batchelor speaks with Andrea Stricker about the US and Europe securing the snapback of UN sanctions against Iran after 2015 JCPOA restrictions expired. Iran's non-compliance with inspection demands triggered these severe sanctions. The discussion covers the need for full dismantlement of Iran's nuclear program, including both enrichment and weaponization capabilities, to avoid future conflict. Concerns persist about Iran potentially retaining enrichment capabilities through low-level enrichment proposals and its continued non-cooperation with IAEA inspections. SECOND HOUR 10-1015 HEADLINE: Commodities Rise and UK Flag Controversy: French Weather, Market Trends, and British Politics GUEST NAME: Simon Constable SUMMARY: John Batchelor speaks with Simon Constable about key commodities like copper up 16% and steel up 15% signaling strong economic demand. Coffee prices remain very high at 52% increase. The conversation addresses French political turmoil, though non-citizens cannot vote. In the UK, the St. George's flag has become highly controversial, viewed by some as associated with racism, unlike the Union Jack. This flag controversy reflects a desire among segments like the white working class to assert English identity. 1015-1030 HEADLINE: Commodities Rise and UK Flag Controversy: French Weather, Market Trends, and British Politics GUEST NAME: Simon Constable SUMMARY: John Batchelor speaks with Simon Constable about key commodities like copper up 16% and steel up 15% signaling strong economic demand. Coffee prices remain very high at 52% increase. The conversation addresses French political turmoil, though non-citizens cannot vote. In the UK, the St. George's flag has become highly controversial, viewed by some as associated with racism, unlike the Union Jack. This flag controversy reflects a desire among segments like the white working class to assert English identity. 1030-1045 HEADLINE: China's Economic Contradictions: Deflation and Consumer Wariness Undermine GDP Growth ClaimsGUEST NAME: Fraser Howie SUMMARY: John Batchelor speaks with Fraser Howie about China facing severe economic contradictions despite high World Bank forecasts. Deflation remains rampant with frequently negative CPI and PPI figures. Consumer wariness and high youth unemployment at one in seven persist throughout the economy. The GDP growth figure is viewed as untrustworthy, manufactured through debt in a command economy. Decreased container ship arrivals point to limited actual growth, exacerbated by higher US tariffs. Economic reforms appear unlikely as centralization under Xi Jinping continues. 1045-1100 HEADLINE: Takaichi Sanae Elected LDP Head, Faces Coalition Challenge to Become Japan's First Female Prime Minister GUEST NAME: Lance Gatling SUMMARY: John Batchelor speaks with Lance Gatling about Takaichi Sanae being elected head of Japan's LDP, positioning her to potentially become the first female Prime Minister. A conservative figure, she supports visits to the controversial Yasukuni Shrine. Her immediate challenge is forming a majority coalition, as the junior partner Komeito disagrees with her conservative positions and social policies. President Trump praised her election, signaling potential for strong bilateral relations. THIRD HOUR 1100-1115 VHEADLINE: DeepSeek AI: Chinese LLM Performance and Security Flaws Revealed Amid Semiconductor Export Circumvention GUEST NAME: Jack Burnham SUMMARY: John Batchelor speaks with Jack Burnham about competition in Large Language Models between the US and China's DeepSeek. A NIST study found US models superior in software engineering, though DeepSeek showed parity in scientific questions. Critically, DeepSeek models exhibited significant security flaws. China attempts to circumvent US export controls on GPUs by smuggling and using cloud computing centers in Southeast Asia. Additionally, China aims to dominate global telecommunications through control of supply chains and legal mechanisms granting the CCP access to firm data.E V 1115-1130 HEADLINE: DeepSeek AI: Chinese LLM Performance and Security Flaws Revealed Amid Semiconductor Export Circumvention GUEST NAME: Jack Burnham SUMMARY: John Batchelor speaks with Jack Burnham about competition in Large Language Models between the US and China's DeepSeek. A NIST study found US models superior in software engineering, though DeepSeek showed parity in scientific questions. Critically, DeepSeek models exhibited significant security flaws. China attempts to circumvent US export controls on GPUs by smuggling and using cloud computing centers in Southeast Asia. Additionally, China aims to dominate global telecommunications through control of supply chains and legal mechanisms granting the CCP access to firm data. 1130-1145 HEADLINE: Taiwanese Influencer Charged for Threatening President; Mainland Chinese Influence Tactics ExposedGUEST NAME: Mark Simon SUMMARY: John Batchelor speaks with Mark Simon about internet personality Holger Chen under investigation in Taiwan for calling for President William Lai's decapitation. This highlights mainland Chinese influence operations utilizing influencers who push themes of military threat and Chinese greatness. Chen is suspected of having a mainland-affiliated paymaster due to lack of local commercial support. Taiwan's population primarily identifies as Taiwanese and is unnerved by constant military threats. A key propaganda goal is convincing Taiwan that the US will not intervene. 1145-1200 HEADLINE: Sentinel ICBM Modernization is Critical and Cost-Effective Deterrent Against Great Power CompetitionGUEST NAME: Peter Huessy SUMMARY: John Batchelor speaks with Peter Huessy about the Sentinel program replacing aging 55-year-old Minuteman ICBMs, aiming for lower operating costs and improved capabilities. Cost overruns stem from necessary infrastructure upgrades, including replacing thousands of miles of digital command and control cabling and building new silos. Maintaining the ICBM deterrent is financially and strategically crucial, saving hundreds of billions compared to relying solely on submarines. The need for modernization reflects the end of the post-Cold War "holiday from history," requiring rebuilding against threats from China and Russia. FOURTH HOUR 12-1215 HEADLINE: Supreme Court Battles Over Presidential Impoundment Authority and the Separation of Powers GUEST NAME: Josh Blackman SUMMARY: John Batchelor speaks with Josh Blackman about Supreme Court eras focusing on the separation of powers. Currently, the court is addressing presidential impoundment—the executive's authority to withhold appropriated funds. Earlier rulings, particularly 1975's Train v. City of New York, constrained this power. The Roberts Court appears sympathetic to reclaiming presidential authority lost during the Nixon era. The outcome of this ongoing litigation will determine the proper balance between executive and legislative branches. 1215-1230 HEADLINE: Supreme Court Battles Over Presidential Impoundment Authority and the Separation of Powers GUEST NAME: Josh Blackman SUMMARY: John Batchelor speaks with Josh Blackman about Supreme Court eras focusing on the separation of powers. Currently, the court is addressing presidential impoundment—the executive's authority to withhold appropriated funds. Earlier rulings, particularly 1975's Train v. City of New York, constrained this power. The Roberts Court appears sympathetic to reclaiming presidential authority lost during the Nixon era. The outcome of this ongoing litigation will determine the proper balance between executive and legislative branches. 1230-1245 HEADLINE: Space Force Awards Contracts to SpaceX and ULA; Juno Mission Ending, Launch Competition Heats UpGUEST NAME: Bob Zimmerman SUMMARY: John Batchelor speaks with Bob Zimmerman about Space Force awarding over $1 billion in launch contracts to SpaceX for five launches and ULA for two launches, highlighting growing demand for launch services. ULA's non-reusable rockets contrast with SpaceX's cheaper, reusable approach, while Blue Origin continues to lag behind. Other developments include Firefly entering defense contracting through its Scitec acquisition, Rocket Lab securing additional commercial launches, and the likely end of the long-running Juno Jupiter mission due to budget constraints. 1245-100 AM HEADLINE: Space Force Awards Contracts to SpaceX and ULA; Juno Mission Ending, Launch Competition Heats UpGUEST NAME: Bob Zimmerman SUMMARY: John Batchelor speaks with Bob Zimmerman about Space Force awarding over $1 billion in launch contracts to SpaceX for five launches and ULA for two launches, highlighting growing demand for launch services. ULA's non-reusable rockets contrast with SpaceX's cheaper, reusable approach, while Blue Origin continues to lag behind. Other developments include Firefly entering defense contracting through its Scitec acquisition, Rocket Lab securing additional commercial launches, and the likely end of the long-running Juno Jupiter mission due to budget constraints.
VHEADLINE: DeepSeek AI: Chinese LLM Performance and Security Flaws Revealed Amid Semiconductor Export Circumvention GUEST NAME: Jack Burnham SUMMARY: John Batchelor speaks with Jack Burnham about competition in Large Language Models between the US and China's DeepSeek. A NIST study found US models superior in software engineering, though DeepSeek showed parity in scientific questions. Critically, DeepSeek models exhibited significant security flaws. China attempts to circumvent US export controls on GPUs by smuggling and using cloud computing centers in Southeast Asia. Additionally, China aims to dominate global telecommunications through control of supply chains and legal mechanisms granting the CCP access to firm data.E 1959
VHEADLINE: DeepSeek AI: Chinese LLM Performance and Security Flaws Revealed Amid Semiconductor Export Circumvention GUEST NAME: Jack Burnham SUMMARY: John Batchelor speaks with Jack Burnham about competition in Large Language Models between the US and China's DeepSeek. A NIST study found US models superior in software engineering, though DeepSeek showed parity in scientific questions. Critically, DeepSeek models exhibited significant security flaws. China attempts to circumvent US export controls on GPUs by smuggling and using cloud computing centers in Southeast Asia. Additionally, China aims to dominate global telecommunications through control of supply chains and legal mechanisms granting the CCP access to firm data. 1942
Tyler chats with Andrew Black, co-founder and CEO of Kovr.ai and former AWS Emerging Tech lead, about the unsexy work that makes mission software real: turning security and compliance into something fast, predictable, and built into the dev loop. Andrew explains how Kovr.ai reads system docs, maps to NIST 800-53, drafts control implementations, flags gaps, and recommends fixes, so engineers focus on high-judgment problems while AOs and risk owners get reliable packages that move.What's happening on the Second Front:The true Valley of Death, speed and scale in productionAI that automates SSPs, findings, and control mappingHow to make compliance native to CI and CD with JIRA, Jenkins, SIEMWhy fixed-price software and clear architecture matter for customersCulture over strategy, setting weekly “big rocks,” hiring for gritConnect with AndrewLinkedIn: Andrew BlackConnect with TylerLinkedIn: Tyler Sweatt
This is a recap of the top 10 posts on Hacker News on October 05, 2025. This podcast was generated by wondercraft.ai (00:30): Fire destroys S. Korean government's cloud storage system, no backups availableOriginal post: https://news.ycombinator.com/item?id=45483386&utm_source=wondercraft_ai(01:54): Americans increasingly see legal sports betting as a bad thing for societyOriginal post: https://news.ycombinator.com/item?id=45478749&utm_source=wondercraft_ai(03:18): Social Cooling (2017)Original post: https://news.ycombinator.com/item?id=45479165&utm_source=wondercraft_ai(04:42): Personal data storage is an idea whose time has comeOriginal post: https://news.ycombinator.com/item?id=45480106&utm_source=wondercraft_ai(06:06): The deadline isn't when AI outsmarts us – it's when we stop using our own mindsOriginal post: https://news.ycombinator.com/item?id=45480622&utm_source=wondercraft_ai(07:30): Way past its prime: how did Amazon get so rubbish?Original post: https://news.ycombinator.com/item?id=45479103&utm_source=wondercraft_ai(08:54): Beginner Guide to VPS Hetzner and CoolifyOriginal post: https://news.ycombinator.com/item?id=45480506&utm_source=wondercraft_ai(10:18): Ambigr.amOriginal post: https://news.ycombinator.com/item?id=45478780&utm_source=wondercraft_ai(11:42): Retiring Test-Ipv6.comOriginal post: https://news.ycombinator.com/item?id=45481609&utm_source=wondercraft_ai(13:06): NIST's DeepSeek "evaluation" is a hit pieceOriginal post: https://news.ycombinator.com/item?id=45482106&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Major federal cybersecurity programs expire amidst the government shutdown. Global leaders and experts convene in Riyadh for the Global Cybersecurity Forum. NIST tackles removable media. ICE buys vast troves of smartphone location data. Researchers claim a newly patched VMware vulnerability has been a zero-day for nearly a year. ClickFix-style attacks surge and spread across platforms. Battering RAM defeats memory encryption and boot-time defenses. A new phishing toolkit converts ordinary PDFs into interactive lures. A trio of breaches exposes data of 3.7 million across North America. Tim Starks from CyberScoop unpacks a report from Senate Democrats on DOGE. The Lone Star State proves even the internet isn't bulletproof. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Tim Starks, Senior Reporter from CyberScoop, is back and joins Dave to discuss a report from Senate Democrats on the Department of Government Efficiency (DOGE). You can read Tim's article on the subject here. Selected Reading Cyber information-sharing law and state grants set to go dark as Congress stalls over funding (The Record) Live - Global Cybersecurity Forum in Riyadh tackles how technology can shape future of cyberspace (Euronews) NIST Publishes Guide for Protecting ICS Against USB-Borne Threats (SecurityWeek) ICE to Buy Tool that Tracks Locations of Hundreds of Millions of Phones Every Day (404 Media) Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability (SecurityWeek) Don't Sweat the ClickFix Techniques: Variants & Detection Evolution (Huntress) Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device (SecurityWeek) New MatrixPDF toolkit turns PDFs into phishing and malware lures (Bleeping Computer) 3.7M breach notification letters set to flood North America's mailboxes (The Register) A Bullet Crashed the Internet in Texas (404 Media) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
This week on Crime, Cocktails & BS, we're joined by the radiant Theresa Nist, fresh from Golden Bachelor fame, to break down Season 2, Episode 1. From first impressions and standout entrances to the biggest surprises of the night, Theresa shares her unique perspective on the Golden journey, life after the spotlight, and what it really feels like to step into Bachelor Nation.Grab a cocktail and settle in as Kajsa and Alex mix laughs, hot takes, and a little BS with one of the most beloved women in Bachelor history. Whether you're here for the roses, the drama, or the insider tea, this is an episode you won't want to miss.
It's been over a year since we've talked about cybersecurity on Manufacturing Happy Hour, and with AI changing the game completely, we're overdue for a refresh. Around 80-85% of the global industry doesn't have basic defense at the edge of their networks; that's a sobering statistic.Felipe Sabino Costa, Senior Product Manager for Networking and Cybersecurity at Moxa, joins the show to break down why Operational Technology (OT) security matters more than ever. Manufacturers need to transmit massive amounts of data for AI and predictive analytics, but they're working with 15–20-year-old infrastructure that wasn't built for this.The good news is, Felipe shares practical frameworks like NIST and IEC 62443 (which he compares to nutrition labels) that help manufacturers build security into their operations. The key takeaway? There's no silver bullet; it's about building layers of defense and finding the right partners.In this episode, find out:Why OT data has shifted from historical logging to real-time predictive powerThe bandwidth issue hitting intelligent transportation systems and semiconductor manufacturingHow AI enables attackers to adapt their attacks in real-timeWhy 80-85% of global industry lacks protectionFelipe's nutrition label analogy for understanding security certificationsThe difference between thinking your air-gapped and actually being air-gappedWhy defense requires multiple layers of securityFelipe's outlook on the future of OT networksEnjoying the show? Please leave us a review here. Even one sentence helps. It's feedback from Manufacturing All-Stars like you that keeps us going!Tweetable Quotes:“We used to be air-gapped or isolated. And many of the companies, they still think that they are, but they are not anymore. To be really air-gapped, I shouldn't have any way to send data.”“Give and take, 80% of the global industry, including the US, does not have these specific layers of defense. They have some defense, but they have nearly zero protection close to the process itself.”“There is no silver bullet. We are seeing this shift right from how we used to do security. A strategy should be way more sophisticated.”Links & mentions:OT Network Security: Investment & Segmentation Strategies, a webinar that addresses the financial and operational risks posed by cyber threats while offering hands-on guidance for OT network security Futureproof Industrial Networks, a website shares how to design and implement a robust, secure, and efficient network infrastructure that can meet the demands of modern industrial environments and optimize operational processesMoxa, delivering the reliable and secure connectivity foundation that advanced analytics and AI depend on, with solutions in edge connectivity, industrial computing, and network infrastructure Make sure to visit http://manufacturinghappyhour.com for detailed show notes and a full list of resources mentioned in this episode. Stay Innovative, Stay Thirsty.
Podcast: Manufacturing Happy Hour (LS 43 · TOP 1% what is this?)Episode: 255: How AI is Reshaping Security and OT Network Requirements featuring Felipe Sabino Costa, Sr. Product Manager for Networking & Cybersecurity at MoxaPub date: 2025-09-30Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIt's been over a year since we've talked about cybersecurity on Manufacturing Happy Hour, and with AI changing the game completely, we're overdue for a refresh. Around 80-85% of the global industry doesn't have basic defense at the edge of their networks; that's a sobering statistic.Felipe Sabino Costa, Senior Product Manager for Networking and Cybersecurity at Moxa, joins the show to break down why Operational Technology (OT) security matters more than ever. Manufacturers need to transmit massive amounts of data for AI and predictive analytics, but they're working with 15–20-year-old infrastructure that wasn't built for this.The good news is, Felipe shares practical frameworks like NIST and IEC 62443 (which he compares to nutrition labels) that help manufacturers build security into their operations. The key takeaway? There's no silver bullet; it's about building layers of defense and finding the right partners.In this episode, find out:Why OT data has shifted from historical logging to real-time predictive powerThe bandwidth issue hitting intelligent transportation systems and semiconductor manufacturingHow AI enables attackers to adapt their attacks in real-timeWhy 80-85% of global industry lacks protectionFelipe's nutrition label analogy for understanding security certificationsThe difference between thinking your air-gapped and actually being air-gappedWhy defense requires multiple layers of securityFelipe's outlook on the future of OT networksEnjoying the show? Please leave us a review here. Even one sentence helps. It's feedback from Manufacturing All-Stars like you that keeps us going!Tweetable Quotes:“We used to be air-gapped or isolated. And many of the companies, they still think that they are, but they are not anymore. To be really air-gapped, I shouldn't have any way to send data.”“Give and take, 80% of the global industry, including the US, does not have these specific layers of defense. They have some defense, but they have nearly zero protection close to the process itself.”“There is no silver bullet. We are seeing this shift right from how we used to do security. A strategy should be way more sophisticated.”Links & mentions:OT Network Security: Investment & Segmentation Strategies, a webinar that addresses the financial and operational risks posed by cyber threats while offering hands-on guidance for OT network security Futureproof Industrial Networks, a website shares how to design and implement a robust, secure, and efficient network infrastructure that can meet the demands of modern industrial environments and optimize operational processesMoxa, delivering the reliable and secure connectivity foundation that advanced analytics and AI depend on, with solutions in edge connectivity, industrial computing, and network infrastructure Make sure to visit http://manufacturinghappyhour.com for detailed show notes and a full list of resources mentioned in this episode. Stay Innovative, Stay Thirsty.The podcast and artwork embedded on this page are from Chris Luecke, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Topics covered in this episode: * pandas is getting pd.col expressions* * Cline, At-Cost Agentic IDE Tooling* * uv cheatsheet* Ducky Network UI Extras Joke Watch on YouTube About the show Sponsored by us! Support our work through: Our courses at Talk Python Training The Complete pytest Course Patreon Supporters Connect with the hosts Michael: @mkennedy@fosstodon.org / @mkennedy.codes (bsky) Brian: @brianokken@fosstodon.org / @brianokken.bsky.social Show: @pythonbytes@fosstodon.org / @pythonbytes.fm (bsky) Join us on YouTube at pythonbytes.fm/live to be part of the audience. Usually Monday at 10am PT. Older video versions available there too. Finally, if you want an artisanal, hand-crafted digest of every week of the show notes in email form? Add your name and email to our friends of the show list, we'll never share it. Brian #1: pandas is getting pd.col expressions Marco Gorelli Next release of Pandas will have pd.col(), inspired by some of the other frameworks I'm guessing Pandas 2.3.3? or 2.4.0? or 3.0.0? (depending on which version they bump?) “The output of pd.col is called an expression. You can think of it as a delayed column - it only produces a result once it's evaluated inside a dataframe context.” It replaces many contexts where lambda expressions were used Michael #2: Cline, At-Cost Agentic IDE Tooling Free and open-source Probably supports your IDE (if your IDE isn't a terminal) VS Code VS Code Insiders Cursor Windsurf JetBrains IDEs (including PyCharm) You pick plan or act (very important) It shows you the price as the AI works, per request, right in the UI Brian #3: uv cheatsheet Rodgrigo at mathspp.com Nice compact cheat sheet of commands for Creating projects Managing dependencies Lifecycle stuff like build, publish, bumping version uv tool (uvx) commands working with scripts Installing and updating Python versions plus venv, pip, format, help and update Michael #4: Ducky Network UI Ducky is a powerful, open-source, all-in-one desktop application built with Python and PySide6. It is designed to be the perfect companion for network engineers, students, and tech enthusiasts, combining several essential utilities into a single, intuitive graphical interface. Features Multi-Protocol Terminal: Connect via SSH, Telnet, and Serial (COM) in a modern, tabbed interface. SNMP Topology Mapper: Automatically discover your network with a ping and SNMP sweep. See a graphical map of your devices, color-coded by type, and click to view detailed information. Network Diagnostics: A full suite of tools including a Subnet Calculator, Network Monitor (Ping, Traceroute), and a multi-threaded Port Scanner. Security Toolkit: Look up CVEs from the NIST database, check password strength, and calculate file hashes (MD5, SHA1, SHA256, SHA512). Rich-Text Notepad: Keep notes and reminders in a dockable widget with formatting tools and auto-save. Customizable UI: Switch between a sleek dark theme and a clean light theme. Customize terminal colors and fonts to your liking. Extras Brian: Where are the cool kids hosting static sites these days? Moving from Netlify to Cloudflare Pages - Will Vincent from Feb 2024 Traffic is a concern now for even low-ish traffic sites since so many bots are out there Netlify free plan is less than 30 GB/mo allowed (grandfathered plans are 100 GB/mo) GH Pages have a soft limit of 100 GB/mo Cloudflare pages says unlimited Michael: PyCon Brazil needs some help with reduced funding from the PSF Get a ticket to donate for a student to attend (at the button of the buy ticket checkout dialog) I upgraded to macOS Tahoe Loving it so far. Only issue I've seen so far has been with alt-tab for macOS Joke: Hiring in 2025 vs 2021 2021: “Do you have an in-house kombucha sommelier?” “Let's talk about pets, are you donkey-friendly?”, “Oh you think this is a joke?” 2025: “Round 8/7” “Out of 12,000 resumes, the AI picked yours” “Binary tree? Build me a foundational model!” “Healthcare? What, you want to live forever?”
In this episode, James Maude sits down with Kevin E. Green, Chief Security Strategist at BeyondTrust, whose 25+ year career stretches from configuring Nokia firewalls in basements to shaping federal research initiatives. Kevin recalls how crashing systems during penetration tests at Ernst & Young was once considered a win - a “capture the flag” moment - and how he crossed paths with future industry leaders like Stuart McClure and George Kurtz, who went on to found Cylance. He shares his pivotal work in mapping NIST 800-53 controls to the MITRE ATT&CK framework, transforming static security catalogs into threat-informed heat maps that show which defenses light up against real-world attacks. Blending technical depth with cultural insight, Kevin also draws unexpected parallels between cybersecurity and hip-hop — from how attacker techniques echo rapper “signatures” to why his alter ego "Kevtorious" and his "Secure Coding by Nature" brand reflect the creativity and pattern recognition needed in both fields.
Od zemětřesení na jihovýchodě Afghánistánu uplynuly více než dva týdny. Během několika dní přišla řada silných otřesů, které si podle vládnoucího hnutí Tálibán vyžádaly víc než dva tisíce obětí, další tisícovky osob byly zraněny. „V prvních dnech byla koordinace pomoci pod organizací The Afghanistan National Disaster Management Authority (ANDMA), kteří fungují překvapivě dobře," říká ve Výtahu Respektu regionální ředitel pro Blízký východ z Člověka v tísni Tomáš Kocian. „Není to jako v prvních měsících, kdy se do úřadu dostávali lidé, kteří žádnou kompetenci kromě dlouhého vousu, zacházení s kalašnikovem a čtení z koránu neměli. I Tálibán se učí vládnout. V prvních dnech tedy naskočili okamžitě, hodně se angažovala i armáda. Vláda se soustředila na tu bezprostřední pomoc tam, kam humanitární organizace nedosáhnou," vysvětluje s tím, že největší problém je v současnosti se zapojením ženských doktorek: „Obecně v Afghánistánu je jich málo a situace bude jen horší, protože zakazují ženám nejen pracovat v některých oborech, ale především studovat," doplňuje Kocian. Je naděje, že by se situace žen a dívek v Afghánistánu zlepšila? Jak v zemi mohou fungovat humanitární organizace? A jaký vliv mělo zastavení americké pomoci po nástupu administrativy Donalda Trumpa?
In this episode of Quality Hub – Chatting with ISO Experts, host Xavier Francis sits down with Brian Reich, Director of Technology, and Anne Siebert, Product Manager at CORE Business Solutions, to unpack the evolving world of password security. They explore how best practices have shifted from complicated character rules to the modern standard of longer passphrases, discuss the risks of password reuse, and share practical advice such as avoiding sticky notes, responding to breach alerts, and recognizing phishing attempts. The team also explains the role of NIST guidelines in shaping security standards, why “longer is stronger,” and how human psychology plays into password habits. The episode closes with a look ahead to Part 2, where they'll dive into multi-factor authentication, password managers, and additional ways to protect what matters most. Here is the link to our free download of the Cybersecurity Self-Assessment Glossary: https://getcertified.thecoresolution.com/cyber-glossary Helpful Resources: For All Things ISO 9001:2015: https://www.thecoresolution.com/iso-9001-2015 Cybersecurity: https://www.thecoresolution.com/cybersecurity CMMC: https://www.thecoresolution.com/cmmc-compliance-checklist ISO 27001: https://www.thecoresolution.com/iso-27001-certification Contact us at 866.354.0300 or email us at info@thecoresolution.com ISO 9001 Standards: https://www.thecoresolution.com/iso-90012015-standard-1 Articles: https://www.thecoresolution.com/free-learning-resources ISO 9001 Consulting: https://www.thecoresolution.com/iso-consulting
In this episode of the Curious Realm Podcast, Host Christopher Jordan ventures forth to the 2025 Turning the Tide 9/11 Justice Conference in Washington, DC. Sponsored by the International Center for 9/11 Justice, this one-of-a-kind conference brings together the best researchers in the world of 9/112 research with everything from presentations, to open forum debates on the topic and new data that has been found in recent years concerning the most tragic event to ever occur on US soil.In the first part of this episode we welcome Wayne Coste. We discuss his latest data regarding the attack on the Pentagon in Washington, DC on 9/11. From his research he has found that the case for the Pentagon being struck by a plane is absolute. From frames of video showing a plane, to damage on objects as well as the pentagon itself, which is indicative of a plane, not a missile, and even new discovered flight recorder data that confirms these data points. Our second guest is author and researcher, Madhava Setty, MD. We discuss his book Woke. An Anesthesiologist's View and how the principles discussed in it apply to field of 9/11 research as well as his work with the International Center for 9/11 Justice. How are we to discern fact from fiction? How we can begin to open minds to the reality of science, which shows the events of 9/112 and the fall of buildings in New York were NOT caused by fire. As well as how now, 25 years later, hearts and minds of not only the public, but survivors, and families of victims may be ready to face these hard truths. Our next guest is Dr Aaron Good, political scientist, and author of the book, American Exception: Empire and the Deep State. We discuss the many ways that the September 11th attacks were exploited by the national security state to justify more covert operations and expand US imperial power. As well as the long history of imperialistic actions by the United States across the globe and many ways that has led our country down a road of political self-destruction. Next, we welcome Dr Richard Elelfritz, assistant professor of sociology, and author of Gale Researcher Guide for: Social Media and Global Social Movements. We sit down to discuss the long-term sociologic and psychologic effects that the 9/11 attacks have had on society, as well as the ways in which personal belief and bias affect the way we take in data about world shaking catastrophic events like these. Up next, we sit down with physicist, physics teacher, and researcher with 911SpeakOut.org, David Chandler to discuss his expert analysis of the events of 9/11 and how the narrative provided in the National Institute of Science report provided on the twin towers and world trade center building seven do not add up scientifically. We also get into the physics of the building falls as they happened and the numerous anomalies not only in the NIST report, but on videos of the events themselves. Next, we welcome Dr Piers Robinson, research director of the International Center of 9/11 Justice, and board member and researcher for the Organisation for Propaganda Studies. We get into the media's involvement with pushing the false narratives presented after the 9/11 disasters. We also discuss the long-time relationship of the media with the CIA and other propaganda creating groups and the numerous cases throughout US history of propaganda being used as a false flag leading the United States into for-profit war mongering actions across the globe. Our next guest is Matt Campbell, Family member to one of the few UK victims in the World Trade Center attacks of 9/11, who was killed by a massive explosion in the structure he was in, leaving much of his remains unfound. But their question has yet to be answered as to how their family member died of a catastrophic explosion in the twin towers when he was on a floor that was supposedly crushed by collapse in the destruction of the building. We sit down to talk about the long-term impact the events and aftermath of 9/11 have had on his family, as well as the ongoing case against the UK Attorney General to have the results of his brother death inquest unsealed, so that his family may finally have answers to what happen to their loved one on that fateful day. Up next we welcome civil engineer and researcher 911SpeakOut.org, Jonathan Cole. We discuss how he, once a proponent of the given narrative of 9/11 came to his point of personal conversion into a 9/11 researcher after seeing unscientific data in not only the National Institute of Science report, but other data regarding the 9/11 attacks. We also discuss his many videos of actual scientific experiments that show how the data provided in the NIST report are not only false, but not capable of repeatable within actual real-world experiments, something which is ley to calling something in science a “fact”. Next, we are happy to welcome civil engineer William Brinnier who was witness to the falling of Twin Towers falling and friend of New York Port Authority building director who died in the upper floors of the towers while leading victims down the staircase to safety. We discuss how his friend came to be in this prominent position and how he was able to help so many get rescued, as well as how he has dealt with the loss of his friend and what his analysis of the collapse is as an architect. Our final guest is Ted Walter, executive director of the International Center for 9/11 Justice. We discuss his experience of being a college student in New York as the events of 9/11 unfolded, how it affected his life, and catalyzed him to the mission of finding the truth of what happened that day. We also get into the ways in which 9/11 was used as a means of passing sweeping laws that would forever change the way in which Americans lived their lives, and how the true cause of justice for 9/11 victims and their families can be served through new hearings in congress where scientific data showing the fallacies of the 9/11 Report and the report of findings submitted by the National Institute of Sciences after the haphazardly conducted 9/11 investigation. Join the Curious Realm as Christopher Jordan ventures to the 2025 Turning the Tide 9/11 Conference to talk with researchers and investigators into the events of 9/11 and some of the hard questions being asked and the astounding data that has been found and never revealed by mainstream media or the US Government. Curious Realm is proudly distributed by: Ground Zero Media & Aftermath Media, KGRA, APRTV and the official Curious Realm ROKU App! Curious Realm has teamed up with True Hemp Science, Austin, TX based suppliers of high-quality full spectrum emulsified CBD products and more. Visit TrueHempScience.com TODAY and use code Curious7 to save 7% off your order of $50 or more and get a free 50mg CBD edible! Website live streams powered by Web Work Wireless. For the best in home and business WiFi solutions visit WebWorksWireless.com. Intro music “A Curious Realm” provided by No Disassemble find more great music and content at: NoDisassemble.com. Become a supporter of this podcast: https://www.spreaker.com/podcast/curious-realm--5254986/support.
In this episode of the Curious Realm Podcast, Host Christopher Jordan ventures forth to the 2025 Turning the Tide 9/11 Justice Conference in Washington, DC. Sponsored by the International Center for 9/11 Justice, this one-of-a-kind conference brings together the best researchers in the world of 9/112 research with everything from presentations, to open forum debates on the topic and new data that has been found in recent years concerning the most tragic event to ever occur on US soil.In the first part of this episode we welcome Wayne Coste. We discuss his latest data regarding the attack on the Pentagon in Washington, DC on 9/11. From his research he has found that the case for the Pentagon being struck by a plane is absolute. From frames of video showing a plane, to damage on objects as well as the pentagon itself, which is indicative of a plane, not a missile, and even new discovered flight recorder data that confirms these data points. Our second guest is author and researcher, Madhava Setty, MD. We discuss his book Woke. An Anesthesiologist's View and how the principles discussed in it apply to field of 9/11 research as well as his work with the International Center for 9/11 Justice. How are we to discern fact from fiction? How we can begin to open minds to the reality of science, which shows the events of 9/112 and the fall of buildings in New York were NOT caused by fire. As well as how now, 25 years later, hearts and minds of not only the public, but survivors, and families of victims may be ready to face these hard truths. Our next guest is Dr Aaron Good, political scientist, and author of the book, American Exception: Empire and the Deep State. We discuss the many ways that the September 11th attacks were exploited by the national security state to justify more covert operations and expand US imperial power. As well as the long history of imperialistic actions by the United States across the globe and many ways that has led our country down a road of political self-destruction. Next, we welcome Dr Richard Elelfritz, assistant professor of sociology, and author of Gale Researcher Guide for: Social Media and Global Social Movements. We sit down to discuss the long-term sociologic and psychologic effects that the 9/11 attacks have had on society, as well as the ways in which personal belief and bias affect the way we take in data about world shaking catastrophic events like these. Up next, we sit down with physicist, physics teacher, and researcher with 911SpeakOut.org, David Chandler to discuss his expert analysis of the events of 9/11 and how the narrative provided in the National Institute of Science report provided on the twin towers and world trade center building seven do not add up scientifically. We also get into the physics of the building falls as they happened and the numerous anomalies not only in the NIST report, but on videos of the events themselves. Next, we welcome Dr Piers Robinson, research director of the International Center of 9/11 Justice, and board member and researcher for the Organisation for Propaganda Studies. We get into the media's involvement with pushing the false narratives presented after the 9/11 disasters. We also discuss the long-time relationship of the media with the CIA and other propaganda creating groups and the numerous cases throughout US history of propaganda being used as a false flag leading the United States into for-profit war mongering actions across the globe. Our next guest is Matt Campbell, Family member to one of the few UK victims in the World Trade Center attacks of 9/11, who was killed by a massive explosion in the structure he was in, leaving much of his remains unfound. But their question has yet to be answered as to how their family member died of a catastrophic explosion in the twin towers when he was on a floor that was supposedly crushed by collapse in the destruction of the building. We sit down to talk about the long-term impact the events and aftermath of 9/11 have had on his family, as well as the ongoing case against the UK Attorney General to have the results of his brother death inquest unsealed, so that his family may finally have answers to what happen to their loved one on that fateful day. Up next we welcome civil engineer and researcher 911SpeakOut.org, Jonathan Cole. We discuss how he, once a proponent of the given narrative of 9/11 came to his point of personal conversion into a 9/11 researcher after seeing unscientific data in not only the National Institute of Science report, but other data regarding the 9/11 attacks. We also discuss his many videos of actual scientific experiments that show how the data provided in the NIST report are not only false, but not capable of repeatable within actual real-world experiments, something which is ley to calling something in science a “fact”. Next, we are happy to welcome civil engineer William Brinnier who was witness to the falling of Twin Towers falling and friend of New York Port Authority building director who died in the upper floors of the towers while leading victims down the staircase to safety. We discuss how his friend came to be in this prominent position and how he was able to help so many get rescued, as well as how he has dealt with the loss of his friend and what his analysis of the collapse is as an architect. Our final guest is Ted Walter, executive director of the International Center for 9/11 Justice. We discuss his experience of being a college student in New York as the events of 9/11 unfolded, how it affected his life, and catalyzed him to the mission of finding the truth of what happened that day. We also get into the ways in which 9/11 was used as a means of passing sweeping laws that would forever change the way in which Americans lived their lives, and how the true cause of justice for 9/11 victims and their families can be served through new hearings in congress where scientific data showing the fallacies of the 9/11 Report and the report of findings submitted by the National Institute of Sciences after the haphazardly conducted 9/11 investigation. Join the Curious Realm as Christopher Jordan ventures to the 2025 Turning the Tide 9/11 Conference to talk with researchers and investigators into the events of 9/11 and some of the hard questions being asked and the astounding data that has been found and never revealed by mainstream media or the US Government. Curious Realm is proudly distributed by: Ground Zero Media & Aftermath Media, KGRA, APRTV and the official Curious Realm ROKU App! Curious Realm has teamed up with True Hemp Science, Austin, TX based suppliers of high-quality full spectrum emulsified CBD products and more. Visit TrueHempScience.com TODAY and use code Curious7 to save 7% off your order of $50 or more and get a free 50mg CBD edible! Website live streams powered by Web Work Wireless. For the best in home and business WiFi solutions visit WebWorksWireless.com. Intro music “A Curious Realm” provided by No Disassemble find more great music and content at: NoDisassemble.com. Become a supporter of this podcast: https://www.spreaker.com/podcast/curious-realm--5254986/support.
Do you want to use AI without losing trust? What frameworks help build trust and manage AI responsibly? Can we really create trust while using AI?In this episode of the FIT4PRIVACY Podcast, host Punit Bhatia and digital trust expert Mark Thomas explain how to govern and manage AI in ways that build real trust with customers, partners, and society.This episode breaks down what it means to use AI responsibly and how strong governance can help avoid risks. You'll also learn about key frameworks like the ISO 42001, the EU AI Act, and the World Economic Forum's Digital Trust Framework—and how they can guide your AI practices.Mark and Punit also talk about how organizational culture, company size, and leadership affect how AI is used—and how trust is built (or lost). They discuss real-world tips for making AI part of your existing business systems, and how to make decisions that are fair, explainable, and trustworthy.
Join 23-year architect Richard Gage, AIA, in this feature-length documentary featuring cutting-edge 9/11 evidence from more than 50 top experts in their fields, including high-rise architects, structural engineers, physicists, chemical engineers, firefighters, metallurgists, explosives experts, controlled demolition technicians, and more. Each is highly qualified in his/her respective fields. Several have Ph. D.s -- including National Medal of Science awardee Lynn Margulis. She, along with the other experts, exposes the fraud of NIST and discusses how the scientific method should have been applied, and acknowledges the "overwhelming" evidence of high-temperature incendiaries in all dust samples of the WTC. High-rise architects and structural engineers lay out the evidence in the features of the destruction of these three high-rises that point inevitably to explosive controlled demolition. 9/11 family members and psychologists ground the technical information with heart-centered support for a new investigation and a close look at the psychology of 9/11in this milestone production of AE911Truth: http://911ExpertsSpeakOut.orgCopyright Disclaimer under section 107 of the Copyright Act of 1976, allowance is made for ‘fair use' for purposes such as criticism, comment, news reporting, teaching, scholarship, education, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational, or personal use tips the balance in favor of fair use.
TOP STORIES - NIST concludes the Surfside Champlain Towers collapse began at the pool deck due to critically low safety margins in the design. Also: passengers stranded on a Bahamas-to-Miami flight, Lauderdale-by-the-Sea considers adding Trump's name to a street sign, a machete-wielding man attacks police in Walmart, jury selection resumes in the Trump assassination attempt trial, Fort Lauderdale fights FDOT's street art removal order, Tyreek Hill's legal team responds to divorce claims, Governor Ron DeSantis pushes open carry while promoting a Second Amendment tax holiday, possible car insurance refunds for Florida drivers, a Clearwater woman battles to keep her pet peacock, Tampa City Council election results, Rays' Wander Franco detained and admitted to a clinic, Hillsborough College emerges as a potential Rays stadium site, and Pinellas County residents may notice a change in their water taste.See omnystudio.com/listener for privacy information.
TOP STORIES - NIST concludes the Surfside Champlain Towers collapse began at the pool deck due to critically low safety margins in the design. Also: passengers stranded on a Bahamas-to-Miami flight, Lauderdale-by-the-Sea considers adding Trump's name to a street sign, a machete-wielding man attacks police in Walmart, jury selection resumes in the Trump assassination attempt trial, Fort Lauderdale fights FDOT's street art removal order, Tyreek Hill's legal team responds to divorce claims, Governor Ron DeSantis pushes open carry while promoting a Second Amendment tax holiday, possible car insurance refunds for Florida drivers, a Clearwater woman battles to keep her pet peacock, Tampa City Council election results, Rays' Wander Franco detained and admitted to a clinic, Hillsborough College emerges as a potential Rays stadium site, and Pinellas County residents may notice a change in their water taste.
Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity's door. They discuss the terrifying reality of quantum computing's power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline for transitioning away from legacy crypto, organizations face a race against time. Ted breaks down what "full crypto visibility" really means, why it's crucial to map your cryptographic assets now, and how legacy tech—from robotic sawmills to outdated hospital gear—poses serious risks. The interview explores NIST's new post-quantum algorithms, global readiness efforts, and how Keyfactor's acquisitions of InfoSec Global and Cipher Insights help companies start the quantum transition today—not tomorrow. Don't wait for the breach. Watch this and start your quantum strategy now. If digital trust is the goal, cryptography is the foundation. Segment Resources: http://www.keyfactor.com/digital-trust-digest-quantum-readiness https://www.keyfactor.com/press-releases/keyfactor-acquires-infosec-global-and-cipherinsights/ For more information about Keyfactor's latest Digital Trust Digest, please visit: https://securityweekly.com/keyfactorbh Live from BlackHat 2025 in Las Vegas, cybersecurity host Jackie McGuire sits down with Seemant Sehgal, founder of BreachLock, to unpack one of the most pressing challenges facing SOC teams today: alert fatigue—and its even more dangerous cousin, vulnerability fatigue. In this must-watch conversation, Seemant reveals how his groundbreaking approach, Adversarial Exposure Validation (AEV), flips the script on traditional defense-heavy security strategies. Instead of drowning in 10,000+ “critical” alerts, AEV pinpoints what actually matters—using Generative AI to map realistic attack paths, visualize kill chains, and identify the exact vulnerabilities that put an organization's crown jewels at risk. From his days leading cybersecurity at a major global bank to pioneering near real-time CVE validation, Seemant shares insights on scaling offensive security, improving executive buy-in, and balancing automation with human expertise. Whether you're a CISO, SOC analyst, red teamer, or security enthusiast, this interview delivers actionable strategies to fight fatigue, prioritize risks, and protect high-value assets. Key topics covered: - The truth about alert fatigue & why it's crippling SOC efficiency - How AI-driven offensive security changes the game - Visualizing kill chains to drive faster remediation - Why fixing “what matters” beats fixing “everything” - The future of AI trust, transparency, and control in cybersecurity Watch now to discover how BreachLock is redefining offensive security for the AI era. Segment Resources: https://www.breachlock.com/products/adversarial-exposure-validation/ This segment is sponsored by Breachlock. Visit https://securityweekly.com/breachlockbh to learn more about them! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-347
Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity's door. They discuss the terrifying reality of quantum computing's power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline for transitioning away from legacy crypto, organizations face a race against time. Ted breaks down what "full crypto visibility" really means, why it's crucial to map your cryptographic assets now, and how legacy tech—from robotic sawmills to outdated hospital gear—poses serious risks. The interview explores NIST's new post-quantum algorithms, global readiness efforts, and how Keyfactor's acquisitions of InfoSec Global and Cipher Insights help companies start the quantum transition today—not tomorrow. Don't wait for the breach. Watch this and start your quantum strategy now. If digital trust is the goal, cryptography is the foundation. Segment Resources: http://www.keyfactor.com/digital-trust-digest-quantum-readiness https://www.keyfactor.com/press-releases/keyfactor-acquires-infosec-global-and-cipherinsights/ For more information about Keyfactor's latest Digital Trust Digest, please visit: https://securityweekly.com/keyfactorbh Live from BlackHat 2025 in Las Vegas, cybersecurity host Jackie McGuire sits down with Seemant Sehgal, founder of BreachLock, to unpack one of the most pressing challenges facing SOC teams today: alert fatigue—and its even more dangerous cousin, vulnerability fatigue. In this must-watch conversation, Seemant reveals how his groundbreaking approach, Adversarial Exposure Validation (AEV), flips the script on traditional defense-heavy security strategies. Instead of drowning in 10,000+ “critical” alerts, AEV pinpoints what actually matters—using Generative AI to map realistic attack paths, visualize kill chains, and identify the exact vulnerabilities that put an organization's crown jewels at risk. From his days leading cybersecurity at a major global bank to pioneering near real-time CVE validation, Seemant shares insights on scaling offensive security, improving executive buy-in, and balancing automation with human expertise. Whether you're a CISO, SOC analyst, red teamer, or security enthusiast, this interview delivers actionable strategies to fight fatigue, prioritize risks, and protect high-value assets. Key topics covered: - The truth about alert fatigue & why it's crippling SOC efficiency - How AI-driven offensive security changes the game - Visualizing kill chains to drive faster remediation - Why fixing “what matters” beats fixing “everything” - The future of AI trust, transparency, and control in cybersecurity Watch now to discover how BreachLock is redefining offensive security for the AI era. Segment Resources: https://www.breachlock.com/products/adversarial-exposure-validation/ This segment is sponsored by Breachlock. Visit https://securityweekly.com/breachlockbh to learn more about them! Show Notes: https://securityweekly.com/asw-347
Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity's door. They discuss the terrifying reality of quantum computing's power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline for transitioning away from legacy crypto, organizations face a race against time. Ted breaks down what "full crypto visibility" really means, why it's crucial to map your cryptographic assets now, and how legacy tech—from robotic sawmills to outdated hospital gear—poses serious risks. The interview explores NIST's new post-quantum algorithms, global readiness efforts, and how Keyfactor's acquisitions of InfoSec Global and Cipher Insights help companies start the quantum transition today—not tomorrow. Don't wait for the breach. Watch this and start your quantum strategy now. If digital trust is the goal, cryptography is the foundation. Segment Resources: http://www.keyfactor.com/digital-trust-digest-quantum-readiness https://www.keyfactor.com/press-releases/keyfactor-acquires-infosec-global-and-cipherinsights/ For more information about Keyfactor's latest Digital Trust Digest, please visit: https://securityweekly.com/keyfactorbh Live from BlackHat 2025 in Las Vegas, cybersecurity host Jackie McGuire sits down with Seemant Sehgal, founder of BreachLock, to unpack one of the most pressing challenges facing SOC teams today: alert fatigue—and its even more dangerous cousin, vulnerability fatigue. In this must-watch conversation, Seemant reveals how his groundbreaking approach, Adversarial Exposure Validation (AEV), flips the script on traditional defense-heavy security strategies. Instead of drowning in 10,000+ “critical” alerts, AEV pinpoints what actually matters—using Generative AI to map realistic attack paths, visualize kill chains, and identify the exact vulnerabilities that put an organization's crown jewels at risk. From his days leading cybersecurity at a major global bank to pioneering near real-time CVE validation, Seemant shares insights on scaling offensive security, improving executive buy-in, and balancing automation with human expertise. Whether you're a CISO, SOC analyst, red teamer, or security enthusiast, this interview delivers actionable strategies to fight fatigue, prioritize risks, and protect high-value assets. Key topics covered: - The truth about alert fatigue & why it's crippling SOC efficiency - How AI-driven offensive security changes the game - Visualizing kill chains to drive faster remediation - Why fixing “what matters” beats fixing “everything” - The future of AI trust, transparency, and control in cybersecurity Watch now to discover how BreachLock is redefining offensive security for the AI era. Segment Resources: https://www.breachlock.com/products/adversarial-exposure-validation/ This segment is sponsored by Breachlock. Visit https://securityweekly.com/breachlockbh to learn more about them! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-347
Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity's door. They discuss the terrifying reality of quantum computing's power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline for transitioning away from legacy crypto, organizations face a race against time. Ted breaks down what "full crypto visibility" really means, why it's crucial to map your cryptographic assets now, and how legacy tech—from robotic sawmills to outdated hospital gear—poses serious risks. The interview explores NIST's new post-quantum algorithms, global readiness efforts, and how Keyfactor's acquisitions of InfoSec Global and Cipher Insights help companies start the quantum transition today—not tomorrow. Don't wait for the breach. Watch this and start your quantum strategy now. If digital trust is the goal, cryptography is the foundation. Segment Resources: http://www.keyfactor.com/digital-trust-digest-quantum-readiness https://www.keyfactor.com/press-releases/keyfactor-acquires-infosec-global-and-cipherinsights/ For more information about Keyfactor's latest Digital Trust Digest, please visit: https://securityweekly.com/keyfactorbh Live from BlackHat 2025 in Las Vegas, cybersecurity host Jackie McGuire sits down with Seemant Sehgal, founder of BreachLock, to unpack one of the most pressing challenges facing SOC teams today: alert fatigue—and its even more dangerous cousin, vulnerability fatigue. In this must-watch conversation, Seemant reveals how his groundbreaking approach, Adversarial Exposure Validation (AEV), flips the script on traditional defense-heavy security strategies. Instead of drowning in 10,000+ “critical” alerts, AEV pinpoints what actually matters—using Generative AI to map realistic attack paths, visualize kill chains, and identify the exact vulnerabilities that put an organization's crown jewels at risk. From his days leading cybersecurity at a major global bank to pioneering near real-time CVE validation, Seemant shares insights on scaling offensive security, improving executive buy-in, and balancing automation with human expertise. Whether you're a CISO, SOC analyst, red teamer, or security enthusiast, this interview delivers actionable strategies to fight fatigue, prioritize risks, and protect high-value assets. Key topics covered: - The truth about alert fatigue & why it's crippling SOC efficiency - How AI-driven offensive security changes the game - Visualizing kill chains to drive faster remediation - Why fixing “what matters” beats fixing “everything” - The future of AI trust, transparency, and control in cybersecurity Watch now to discover how BreachLock is redefining offensive security for the AI era. Segment Resources: https://www.breachlock.com/products/adversarial-exposure-validation/ This segment is sponsored by Breachlock. Visit https://securityweekly.com/breachlockbh to learn more about them! Show Notes: https://securityweekly.com/asw-347
Dr. Wilson is a research chemist and coordinator of the Cannabis Research Program in the Chemical Sciences Division at the National Institute of Standards & Technology (NIST) in Gaithersburg, Maryland. He received his B.S. degree in Chemistry from Greensboro College followed by a M.S. degree in Chemistry from the same institution. He then moved south to pursue a Ph.D. in Chemistry at the University of Central Florida, training in the lab of Prof. Andres D. Campiglia. In a wide-ranging conversation, we discuss the influence of 2000's television shows such as CSI on Brent's interest in forensic science and analytical chemistry, and how an informal interview at a poster session ultimately led to the position he now holds at NIST. Dr. Wilson shares how he navigated the educational landscapes in forensic science and chemistry, both at the undergraduate and graduate levels. We discuss the evolution of cannabis standards and analytical characterization in recent years, and Brent shares his perspective on the importance of standards in general, the birth of a reference material, and the significant effort it takes to bring these materials to the point where analytical scientists like us can purchase them. Dr. Wilson also describes some of his work on low-temperature emission spectroscopy techniques, where molecule exhibit much narrower and specific emission bands compared to room temperature detection. Brent also shares more about the life of a scientist within NIST, from day-to-day activities, competing for federal funding, and more. Finally, Dr. Wilson shares some professional advice, including the importance of being prepared and adaptable, the value of talking with people at conferences, and the importance of establishing and maintaining relationships over the course of one's career.
Innovation comes in many areas and compliance professionals need to not only be ready for it but embrace it. Join Tom Fox, the Voice of Compliance as he visits with top innovative minds, thinkers and creators in the award-winning Innovation in Compliance podcast. In this episode, host Tom Fox visits with Lori Crooks, a seasoned professional in the field of cybersecurity and audit assessments, to discuss the evolution of auditing practices from physical infrastructure to cloud and AI. Lori shares insights from her extensive career, highlighting key federal compliance frameworks like NIST 800-53, FedRAMP, and NIST 800-171. Lori stresses the importance of proactive compliance strategies and scalable GRC programs. As AI integration accelerates, she also touches on the challenges of adjusting compliance frameworks to keep pace with technological advancements, and the necessity of fostering collaboration within organizations to meet regulatory requirements effectively. Key Highlights Federal Auditing Frameworks Proactive Compliance Strategies Scalable GRC Programs AI and Compliance Landscape Future of Auditing in the Age of AI Resources Lori Crooks on Linkedin Cadra Tom Fox Instagram Facebook YouTube Twitter LinkedIn Check out my latest book Upping Your Game-How Compliance and Risk Management Move to 2023 and Beyond, available from Amazon.com. Innovation in Compliance was recently honored as the number 4 podcast in Risk Management by 1,000,000 Podcasts.
In this week's Security Sprint, Dave and Andy covered the following topics:Main Topics:Annunciation Catholic Church Attack • Minneapolis Suspect Knew Her Target, but Motive Is a Mystery• Shooter who opened fire on Minneapolis Catholic school posted rambling videos• Robin Westman: Minneapolis gunman was son of church employee• Robin Westman posted a manifesto on YouTube prior to Annunciation Church shooting• Minneapolis school shooter wrote “I am terrorist” and “Kill yourself” in Russian on weapon magazines and listened to Russian rappers• Minneapolis Catholic Church shooter mocked Christ in video before attack• Minneapolis school shooter 'obsessed with idea of killing children', authorities say• Minnesota Mass Shooter Steeped in Far-Right Lore, White Nationalist Murderers• In Secret Diaries, the Church Shooter's Plans for Mass Murder• Minneapolis church shooting search warrants reveal new details and evidence• 'There is no message': The search for ideological motives in the Minneapolis shooting• Minneapolis Church Shooting: Understanding the Suspect's Video• More Of Minnesota Shooter's Writings Uncovered: ‘Gender And Weed F***ed Up My Head'• Classmates say Minnesota school shooter gave Nazi salutes and idolized school shootings back in middle schoolHoax Active Shooter Reports• More than a dozen universities have been targeted by false active shooter reports• This Is the Group That's Been Swatting US Universities• FBI urges students to be vigilant amid wave of swatting hoaxesAI & Cyber Threats • The Era of AI-Generated Ransomware Has Arrived• Researchers flag code that uses AI systems to carry out ransomware attacks & First known AI-powered ransomware uncovered by ESET Research • Anthropic: Detecting and countering misuse of AI: August 2025• A quick look at sextortion at scale: 1,900 messages and 205 Bitcoin addresses spanning four yearsCountering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System• FBI warns Chinese hacking campaign has expanded, reaching 80 countries• Allied spy agencies blame 3 Chinese tech companies for Salt Typhoon attacks• UK NCSC: UK and allies expose China-based technology companies for enabling global cyber campaign against critical networksQuick Hits:• Storm-0501's evolving techniques lead to cloud-based ransomware • Why Hypervisors Are the New-ish Ransomware Target• FBI Releases Use-of-Force Data Update• Denmark summons US envoy over report on covert American ‘influence operations' in Greenland• Falsos Amigos• Surge in coordinated scans targets Microsoft RDP auth servers• Vulnerabilities impacting Citrix NetScaler ADC and NetScaler Gateway - CVE-2025-7775, CVE-2025-7776 and CVE-2025-8424• Citrix patches trio of NetScaler bugs – after attackers beat them to it• U.S., Japan, and ROK Join Mandiant to Counter North Korean IT Worker Threats• US sanctions fraud network used by North Korean ‘remote IT workers' to seek jobs and steal money• H1 2025 Malware and Vulnerability Trends • The FDA just overhauled its COVID vaccine guidance. Here's what it means for you• 25 August 2025 NCSC, AFOSI, ACIC, NCIS, DCSA, FBI, ED, NIST, NSF bulletin • DOGE Put Critical Social Security Data at Risk, Whistle-Blower Says• Blistering Wyden letter seeks review of federal court cybersecurity, citing ‘incompetence,' ‘negligence'• Email Phishing Scams Increasingly Target Churches
Can we build technology today to defend against the threats of tomorrow? This week, Technology Now concludes a double episode on post quantum cryptography and explores the subject of firmware, why it's imperative that it be protected against quantum attacks and why a simple update can't solve every problem. Nigel Edwards, Director of the Security Lab at HPE Labs, tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Nigel: https://www.linkedin.com/in/nigel-edwards-170591/?originalSubdomain=ukSources: https://www.theatlantic.com/technology/archive/2016/01/the-long-and-winding-history-of-encryption/423726/https://www.theqrl.org/blog/history-of-cryptography-behind-the-code-episode-1/https://www.theguardian.com/science/2025/may/07/todays-ai-can-crack-second-world-war-enigma-code-in-short-order-experts-say
On today's episode of Govcon Giants, I sit down with Jason Miller, Executive Editor of Federal News Network, to unpack the chaos shaking the government contracting community. Over the last 4–6 months, we've seen partnerships shrink, contracts cut, and entire workforces pushed into early retirement. Jason pulls back the curtain on GSA consolidation, NASA SEWP, consulting contract crackdowns, and the uncertainty surrounding CMMC, NIST 800-171, and small business programs like 8(a). This isn't just noise—it's a direct hit on how small businesses survive and thrive in the federal marketplace. Jason and I go deep on the big numbers—25,000 fewer staff at GSA, programs like CIO-SP3 still stuck in protest, and the seven-year delay of CMMC rollout that's left contractors dangerously exposed. We also discuss how the Trump administration's aggressive cost-cutting, paired with industry silence, could cripple government contractors who refuse to speak up. If you're counting on the old rules to keep you safe, think again—this episode is your wake-up call. Connect with Jason: LinkedIn account: https://www.linkedin.com/in/jasonmillerfnn/ LinkedIn corporate: https://www.linkedin.com/company/federal-news-network/posts/?feedView=all Link to your company: https://federalnewsnetwork.com/
In this episode of Cybersecurity Today, host Jim Love discusses recent developments in cybersecurity, including a method to bypass GPT5 model safeguards, malware issues in the Google Play Store, NIST's new AI-specific security controls, and a cyber attack that led to a government shutdown in Nevada. The episode also covers a CRM-related breach linked to the Shiny Hunters collective, who used OAuth tokens to gain unauthorized access. Key takeaways emphasize the need for stronger security frameworks and vigilance against evolving cyber threats. 00:00 Introduction and Overview 00:27 Exploiting GPT-5: A Simple Prompt Attack 02:20 Google Play Store's Malware Struggles 04:11 NIST's New AI Security Controls 06:06 Nevada Government Cyber Attack 08:23 Shiny Hunters' CRM Breach 10:41 Conclusion and Contact Information
If you like what you hear, please subscribe, leave us a review and tell a friend!
In this edition of Campus Technology Insider Podcast Shorts, host Rhea Kelly covers the latest news in education technology. Highlights include the National Institute of Standards and Technology's new guidelines for securing AI systems, Wiley's introduction of innovative AI tools for the zyBooks platform to enhance STEM education, and Columbia Engineering's HyperQ, which virtualizes quantum computing for simultaneous user access. Tune in for more on these exciting developments. 00:00 Introduction and Host Welcome 00:15 NIST's New AI Security Guidelines 00:50 Wiley's AI Tools for STEM Education 01:18 Columbia Engineering's HyperQ Innovation 01:54 Conclusion and Further Resources Source links: NIST Proposes New Cybersecurity Guidelines for AI Systems Wiley Introduces New AI Courseware Tools Columbia Engineering Researchers Develop Cloud-Style Virtualization for Quantum Computing Campus Technology Insider Podcast Shorts are curated by humans and narrated by AI.
This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window into adversary behavior offers critical intelligence to strengthen incident response and prevention strategies. In this interview, we'll break down what these leaks reveal and how security teams can use this intelligence to proactively harden their defenses, including: Key takeaways from the LockBit and Black Basta leaks—and what they confirm about ransomware operations How leaked playbooks, chats, and toolkits can inform detection and response Practical steps to defend against modern ransomware tactics in 2025 In the security news: Practical exploit code Old vulnerabilities, new attackers AI and web scraping - the battle continues 0-Days: You gotta prove it WinRAR 0-Day LLM patch diffing $20 million bug bounty Your APT is showing Hacking from the routers Its that easy eh? NIST guidance on AI Words have meaning Developers knowingly push vulnerable code My Hackberry PI post is live: https://eclypsium.com/blog/build-the-ultimate-cyberdeck-hackberry-pi/ Resources: Inside the LockBit Leak: Rare Insights Into Their Operations: https://flashpoint.io/blog/inside-the-lockbit-leak/?utmcampaign=WBHostedSCMedia2025&utmsource=SCMedia&utmmedium=email&sfcampaign_id=701Rc00000S48bZIAR 2025 Ransomware Survival Guide: https://flashpoint.io/resources/e-book/2025-ransomware-survival-guide/?utmcampaign=WBHostedSCMedia2025&utmsource=SCMedia&utmmedium=email&sfcampaign_id=701Rc00000S48bZIAR AI and Threat Intelligence: The Defenders' Guide https://go.flashpoint.io/ai-and-threat-intelligence-guide?utmcampaign=WBHostedSCMedia2025&utmsource=SCMedia&utmmedium=email&sfcampaign_id=701Rc00000S48bZIAR Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-888
Why do quantum computers pose a threat to governments? This week Technology Now starts a two part dive into quantum computing. In this first episode, we ask: how are governments preparing to mitigate the threat posed by a hypothetical quantum computer which could be invented. Ken Rich, Federal CTO at HPE tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Ken Rich:https://www.linkedin.com/in/kenrich111/Sources:https://www.ncsc.gov.uk/whitepaper/next-steps-preparing-for-post-quantum-cryptographyhttps://www.britannica.com/technology/quantum-computerhttps://www.livescience.com/technology/computing/history-of-quantum-computing-key-moments-that-shaped-the-future-of-computingShor, Peter W.. “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer.” SIAM Rev. 41 (1995): 303-332.P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 1994, pp. 124-134, doi: 10.1109/SFCS.1994.365700.https://www.newscientist.com/article/2399246-record-breaking-quantum-computer-has-more-than-1000-qubits/
This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window into adversary behavior offers critical intelligence to strengthen incident response and prevention strategies. In this interview, we'll break down what these leaks reveal and how security teams can use this intelligence to proactively harden their defenses, including: Key takeaways from the LockBit and Black Basta leaks—and what they confirm about ransomware operations How leaked playbooks, chats, and toolkits can inform detection and response Practical steps to defend against modern ransomware tactics in 2025 In the security news: Practical exploit code Old vulnerabilities, new attackers AI and web scraping - the battle continues 0-Days: You gotta prove it WinRAR 0-Day LLM patch diffing $20 million bug bounty Your APT is showing Hacking from the routers Its that easy eh? NIST guidance on AI Words have meaning Developers knowingly push vulnerable code My Hackberry PI post is live: https://eclypsium.com/blog/build-the-ultimate-cyberdeck-hackberry-pi/ Resources: Inside the LockBit Leak: Rare Insights Into Their Operations: https://flashpoint.io/blog/inside-the-lockbit-leak/?utmcampaign=WBHostedSCMedia2025&utmsource=SCMedia&utmmedium=email&sfcampaign_id=701Rc00000S48bZIAR 2025 Ransomware Survival Guide: https://flashpoint.io/resources/e-book/2025-ransomware-survival-guide/?utmcampaign=WBHostedSCMedia2025&utmsource=SCMedia&utmmedium=email&sfcampaign_id=701Rc00000S48bZIAR AI and Threat Intelligence: The Defenders' Guide https://go.flashpoint.io/ai-and-threat-intelligence-guide?utmcampaign=WBHostedSCMedia2025&utmsource=SCMedia&utmmedium=email&sfcampaign_id=701Rc00000S48bZIAR Show Notes: https://securityweekly.com/psw-888
What AI website summaries mean for Internet economics. Time to urgently update Plex Servers (again). Allianz Life stolen data gets leaked. Chrome test Incognito-mode fingerprint script blocking. Chrome 140 additions coming in 2 weeks. Data brokers hide opt-out pages from search engines. Secure messaging changes in Russia. NIST rolls-out lightweight IoT crypto. SyncThing moves to v2.0 and beyond. Alien:Earth -- first take. What can we learn from another critical vulnerability? Show Notes - https://www.grc.com/sn/SN-1039-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com/twit bitwarden.com/twit go.acronis.com/twit joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW
What AI website summaries mean for Internet economics. Time to urgently update Plex Servers (again). Allianz Life stolen data gets leaked. Chrome test Incognito-mode fingerprint script blocking. Chrome 140 additions coming in 2 weeks. Data brokers hide opt-out pages from search engines. Secure messaging changes in Russia. NIST rolls-out lightweight IoT crypto. SyncThing moves to v2.0 and beyond. Alien:Earth -- first take. What can we learn from another critical vulnerability? Show Notes - https://www.grc.com/sn/SN-1039-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com/twit bitwarden.com/twit go.acronis.com/twit joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW
What AI website summaries mean for Internet economics. Time to urgently update Plex Servers (again). Allianz Life stolen data gets leaked. Chrome test Incognito-mode fingerprint script blocking. Chrome 140 additions coming in 2 weeks. Data brokers hide opt-out pages from search engines. Secure messaging changes in Russia. NIST rolls-out lightweight IoT crypto. SyncThing moves to v2.0 and beyond. Alien:Earth -- first take. What can we learn from another critical vulnerability? Show Notes - https://www.grc.com/sn/SN-1039-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com/twit bitwarden.com/twit go.acronis.com/twit joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW
What AI website summaries mean for Internet economics. Time to urgently update Plex Servers (again). Allianz Life stolen data gets leaked. Chrome test Incognito-mode fingerprint script blocking. Chrome 140 additions coming in 2 weeks. Data brokers hide opt-out pages from search engines. Secure messaging changes in Russia. NIST rolls-out lightweight IoT crypto. SyncThing moves to v2.0 and beyond. Alien:Earth -- first take. What can we learn from another critical vulnerability? Show Notes - https://www.grc.com/sn/SN-1039-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com/twit bitwarden.com/twit go.acronis.com/twit joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW
What AI website summaries mean for Internet economics. Time to urgently update Plex Servers (again). Allianz Life stolen data gets leaked. Chrome test Incognito-mode fingerprint script blocking. Chrome 140 additions coming in 2 weeks. Data brokers hide opt-out pages from search engines. Secure messaging changes in Russia. NIST rolls-out lightweight IoT crypto. SyncThing moves to v2.0 and beyond. Alien:Earth -- first take. What can we learn from another critical vulnerability? Show Notes - https://www.grc.com/sn/SN-1039-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com/twit bitwarden.com/twit go.acronis.com/twit joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW
What AI website summaries mean for Internet economics. Time to urgently update Plex Servers (again). Allianz Life stolen data gets leaked. Chrome test Incognito-mode fingerprint script blocking. Chrome 140 additions coming in 2 weeks. Data brokers hide opt-out pages from search engines. Secure messaging changes in Russia. NIST rolls-out lightweight IoT crypto. SyncThing moves to v2.0 and beyond. Alien:Earth -- first take. What can we learn from another critical vulnerability? Show Notes - https://www.grc.com/sn/SN-1039-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com/twit bitwarden.com/twit go.acronis.com/twit joindeleteme.com/twit promo code TWIT vanta.com/SECURITYNOW
Send us a textProfessor JRod makes a triumphant return to Technology Tap after a year-long hiatus, bringing listeners up to speed on his personal journey and diving straight into Security Plus 701 fundamentals. Having completed his doctorate and subsequently focusing on his health—resulting in an impressive 50-pound weight loss—he reconnects with his audience with the same passion and expertise that made his podcast popular.The heart of this comeback episode centers on essential cybersecurity concepts, beginning with the CIA triad (confidentiality, integrity, availability) that forms the foundation of information security. Professor J-Rod expertly breaks down complex frameworks including NIST, ISO/IEC standards, and compliance-driven approaches like HIPAA and GDPR, explaining how organizations should select frameworks based on their specific industry requirements.With his trademark clear explanations, he walks listeners through the process of gap analysis—a methodical approach to identifying differences between current security postures and desired standards. The episode then transitions to a comprehensive overview of access control models, including Discretionary, Mandatory, Role-Based, Attribute-Based, and Rule-Based controls, each illustrated with practical examples that bring abstract concepts to life.What sets this episode apart is the interactive element, as Professor JRod concludes with practice questions that challenge listeners to apply their newly acquired knowledge. This practical approach bridges the gap between theory and real-world implementation, making complex security concepts accessible to professionals and students alike. Whether you're preparing for certification or simply expanding your cybersecurity knowledge, this return episode delivers valuable insights from an educator who clearly missed sharing his expertise with his audience.Support the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Industrial Talk is talking to Sandy Carielli, Vice President at Forrester Research about "Quantum Computing Cybersecurity". Scott Mackenzie and Sandy Carielli discuss the implications of quantum computing on cybersecurity. Quantum computers could potentially break today's public key cryptography, compromising data security. Carielli highlights the importance of transitioning to new, quantum-resistant algorithms, such as those developed by NIST. She emphasizes the urgency for organizations, especially government agencies and financial institutions, to start this migration process. Carielli also warns of the "harvest now, decrypt later" attack scenario, where data is intercepted today and decrypted later with a future quantum computer. The conversation underscores the need for proactive measures to ensure digital trust and security. Action Items [ ] Conduct a cryptographic discovery exercise to inventory the algorithms and protocols currently in use across the organization. [ ] Bring together a cross-functional team to assess the organization's exposure to quantum computing threats and start the process of migrating to post-quantum cryptography. [ ] Incorporate requirements for quantum-resistant cryptography in procurement processes and vendor SLAs. [ ] Prioritize the migration of high-value, long-term data and systems that rely on digital signatures. Outline Introduction and Purpose of Industrial Talk Podcast Scott MacKenzie thanks listeners for their support and highlights the platform's dedication to celebrating achievements and amplifying messages. Scott MacKenzie praises Sandy Carielli from Forrester Research for her contributions to quantum computing and cybersecurity. The conversation aims to explore the transformative impact of quantum computing on cybersecurity. Scott MacKenzie's Perspective on Innovation and Technology Scott MacKenzie discusses the importance of creating content and demonstrating the human side of professionals in various industries. He emphasizes the need for companies to adapt to new technologies and innovations to remain successful. Scott MacKenzie shares themes from his conversations with industrial leaders, such as the importance of education, collaboration, and innovation. He highlights the need for companies to be nimble, trusted, and passionate about solving challenges. Introduction to Sandy Carielli and Quantum Computing Scott MacKenzie introduces Sandy Carielli and her work at Forrester Research on quantum computing and cybersecurity. Sandy Carielli explains the process of selecting topics for research at Forrester, including trends, market exposure, and regulatory changes. The conversation touches on the rapid evolution of technologies and the importance of staying current. Sandy Carielli mentions the annual top 10 emerging technologies report published by Forrester. Quantum Computing and Its Impact on Cybersecurity Sandy Carielli provides an overview of quantum computing and its potential to break today's public key cryptography. She explains the concept of public key cryptography and its role in securing communications and transactions. The discussion covers the potential risks posed by nation-states developing quantum computers and the need for cybersecurity measures. Sandy Carielli highlights the efforts to develop new cryptographic algorithms resistant to quantum computers. Preparing for Quantum...
Plex urges users to immediately update their Media Server due to an undisclosed security flaw. Cisco warns of a critical remote code execution flaw in their Secure Firewall Management Center software.Rockwell Automation discloses multiple critical and high-severity flaws. Hackers breached a Canadian House of Commons database. Active law enforcement and government email accounts are sold online for as little as $40. Telecom giant Colt Technology Services suffers a cyber incident disrupting its customer portal. Taiwan launches new measures to boost hospital cybersecurity after ransomware attacks. NIST has released a concept paper proposing control overlays for securing AI systems. A date with an AI chatbot ends in tragedy. Our guest is Randall Degges, Snyk's Head of Developer and Security Relations, to discuss how underqualified or outsourced coding support can open doors for nation-state threats. Dutch speed cameras are stuck in a cyber-induced siesta. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Randall Degges, Snyk's Head of Developer and Security Relations, to discuss how underqualified or outsourced coding support can open doors for nation-state threats. Selected Reading Plex warns users to patch security vulnerability immediately (Bleeping Computer) Cisco Discloses Critical RCE Flaw in Firewall Management Software (Infosecurity Magazine) Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products (SecurityWeek) CISA Releases Thirty-Two Industrial Control Systems Advisories (CISA.gov) Hackers Breach Canadian Government Via Microsoft Exploit (Bank Infosecurity) Compromised Government and Police Email Accounts on the Dark Web (Abnormal.AI) Telco giant Colt suffers attack, takes systems offline (The Register) Taiwan announces measures to protect hospitals from hackers (Focus Taiwan) New NIST Concept Paper Outlines AI-Specific Cybersecurity Framework (Hack Read) A flirty Meta AI bot invited a retiree to meet. He never made it home. (Reuters) Dutch prosecution service attack keeps speed cameras offline (The Register) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
The Cybersecurity and Infrastructure Security Agency (CISA) is facing significant criticism from state and local officials who feel abandoned due to diminishing federal support for critical cybersecurity programs. Many officials are concerned about their increasing reliance on self-driven initiatives, especially after cuts to the Multi-State Information Sharing and Analysis Center, which has been a crucial source of cybersecurity intelligence for over two decades. A recent survey revealed that a substantial portion of state and local governments lack adequate funding for cybersecurity, with 22% allocating no funds and 42% operating with annual budgets of less than $100,000. This situation raises alarms about the potential for increased vulnerability to cyberattacks, particularly from nation-state actors.In response to the evolving landscape of artificial intelligence, the National Institute of Standards and Technology (NIST) is developing new security guidance aimed at addressing the associated risks. This initiative will clarify how AI interacts with cybersecurity, focusing on securing AI systems, the adversarial use of AI, and leveraging AI to enhance cybersecurity measures. Additionally, a bipartisan bill known as the Validation and Evaluation for Trustworthy Artificial Intelligence Act has been reintroduced in the Senate, aiming to establish guidelines for the responsible development and testing of AI systems. House appropriators are also proposing a significant funding increase for NIST, reflecting a commitment to bolster cybersecurity and innovation.The Federal Risk Management and Authorization Program (FedRAMP) has made strides in streamlining the approval process for government cloud services, achieving a significant reduction in wait times from over a year to approximately five weeks. This shift is part of a broader trend toward more efficient cloud authorization processes, with FedRAMP already approving more than twice as many services in fiscal year 2025 compared to the previous year. This development presents an opportunity for businesses to leverage FedRAMP-authorized stacks for government-related buyers and to build migration strategies accordingly.OpenAI has recently updated its ChatGPT platform, introducing new models and third-party tool connectors while facing scrutiny over the performance and security of its latest model, GPT-5. Despite the introduction of various user-focused options, security assessments have revealed significant vulnerabilities in GPT-5, prompting concerns about its safety and reliability. As companies like ConnectWise implement new credit card surcharges and adjust their workforce in response to market demands, the overarching theme emphasizes the need for operational discipline and strategic planning in navigating the evolving technology landscape. Four things to know today 00:00 Shrinking Cyber Budgets, Emerging AI Rules, and Streamlined FedRAMP Signal Shifts for IT Providers06:43 From Security to SaaS Management, Vendors Roll Out Agentic Features for IT Service Providers10:25 OpenAI Expands GPT-5 Options, Adds Connectors, but Faces Early Security Backlash13:41 ConnectWise Adds Credit Card Surcharges, Trims Staff in Strategic Realignment Supported by: https://syncromsp.com/ Tell us about a newsletter!https://bit.ly/biztechnewsletter All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
Our Bachelor Nation OG Trista Sutter is catching up with Golden Bachelor season one winner Theresa Nist! She shares her hot takes on the new season of Bachelor in Paradise and she holds nothing back when asked about the next Golden Bachelor Mel Owens!Plus, we get an answer on if Theresa would want to be the next Golden Bachelorette, and if she would be more “affectionate” than people expect! See omnystudio.com/listener for privacy information.
Leslie and Theresa might have competed against one another on "The Golden Bachelor," but these two single gals are now thick as thieves! These Golden Girls tell Jennifer Fessler why they're tired of being called "cute" and why the older crew brought the heat to the beach on Bachelor in Paradise. Should you FaceTime before a date? The ladies are giving their unfiltered opinions. Email us at: IDOPOD@iheartradio.com or call us at 844-4-I Do Pod (844-443-6763)Follow I Do, Part 2 on Instagram and TikTokSee omnystudio.com/listener for privacy information.
Leslie and Theresa might have competed against one another on "The Golden Bachelor," but these two single gals are now thick as thieves! These Golden Girls tell Jennifer Fessler why they're tired of being called "cute" and why the older crew brought the heat to the beach on Bachelor in Paradise. Should you FaceTime before a date? The ladies are giving their unfiltered opinions. Email us at: IDOPOD@iheartradio.com or call us at 844-4-I Do Pod (844-443-6763)Follow I Do, Part 2 on Instagram and TikTokSee omnystudio.com/listener for privacy information.
Leslie and Theresa might have competed against one another on "The Golden Bachelor," but these two single gals are now thick as thieves! These Golden Girls tell Jennifer Fessler why they're tired of being called "cute" and why the older crew brought the heat to the beach on Bachelor in Paradise. Should you FaceTime before a date? The ladies are giving their unfiltered opinions. Email us at: IDOPOD@iheartradio.com or call us at 844-4-I Do Pod (844-443-6763)Follow I Do, Part 2 on Instagram and TikTokSee omnystudio.com/listener for privacy information.
Leslie and Theresa might have competed against one another on "The Golden Bachelor," but these two single gals are now thick as thieves! These Golden Girls tell Jennifer Fessler why they're tired of being called "cute" and why the older crew brought the heat to the beach on Bachelor in Paradise. Should you FaceTime before a date? The ladies are giving their unfiltered opinions. Email us at: IDOPOD@iheartradio.com or call us at 844-4-I Do Pod (844-443-6763)Follow I Do, Part 2 on Instagram and TikTokSee omnystudio.com/listener for privacy information.
Golden Bachelor favorites, and friends, Susan Noles and Theresa Nist, are giving great girlfriend-approved advice! They're talking about how to avoid being scammed when dating, how to get back out there after losing a partner, and ways to meet people if you live in a small town. Plus, the women give their unfiltered thoughts on the new season of Bachelor in Paradise, and their honest opinions on those ageist comments new Golden Bachelor, Mel Owens, recently made! And Susan and Theresa have a unique idea that producers should implement on Mel's upcoming season! Email us at: IDOPOD@iheartradio.com or call us at 844-4-I Do Pod (844-443-6763)Follow I Do, Part 2 on Instagram and TikTokSee omnystudio.com/listener for privacy information.