Podcasts about Security

Degree of resistance to, or protection from, harm

  • 24,561PODCASTS
  • 117KEPISODES
  • 37mAVG DURATION
  • 10+DAILY NEW EPISODES
  • Oct 9, 2025LATEST
Security

POPULARITY

20172018201920202021202220232024

Categories




    Best podcasts about Security

    Show all podcasts related to security

    Latest podcast episodes about Security

    The John Batchelor Show
    VHEADLINE: DeepSeek AI: Chinese LLM Performance and Security Flaws Revealed Amid Semiconductor Export Circumvention GUEST NAME: Jack Burnham SUMMARY: John Batchelor speaks with Jack Burnham about competition in Large Language Models between the US and Chi

    The John Batchelor Show

    Play Episode Listen Later Oct 9, 2025 4:43


    VHEADLINE: DeepSeek AI: Chinese LLM Performance and Security Flaws Revealed Amid Semiconductor Export Circumvention GUEST NAME: Jack Burnham SUMMARY: John Batchelor speaks with Jack Burnham about competition in Large Language Models between the US and China's DeepSeek. A NIST study found US models superior in software engineering, though DeepSeek showed parity in scientific questions. Critically, DeepSeek models exhibited significant security flaws. China attempts to circumvent US export controls on GPUs by smuggling and using cloud computing centers in Southeast Asia. Additionally, China aims to dominate global telecommunications through control of supply chains and legal mechanisms granting the CCP access to firm data. 1942

    The John Batchelor Show
    VHEADLINE: DeepSeek AI: Chinese LLM Performance and Security Flaws Revealed Amid Semiconductor Export Circumvention GUEST NAME: Jack Burnham SUMMARY: John Batchelor speaks with Jack Burnham about competition in Large Language Models between the US and Chi

    The John Batchelor Show

    Play Episode Listen Later Oct 9, 2025 13:07


    VHEADLINE: DeepSeek AI: Chinese LLM Performance and Security Flaws Revealed Amid Semiconductor Export Circumvention GUEST NAME: Jack Burnham SUMMARY: John Batchelor speaks with Jack Burnham about competition in Large Language Models between the US and China's DeepSeek. A NIST study found US models superior in software engineering, though DeepSeek showed parity in scientific questions. Critically, DeepSeek models exhibited significant security flaws. China attempts to circumvent US export controls on GPUs by smuggling and using cloud computing centers in Southeast Asia. Additionally, China aims to dominate global telecommunications through control of supply chains and legal mechanisms granting the CCP access to firm data.E 1959

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Thursday, October 9th, 2025: Polymorphic Python; ssh ProxyCommand Vuln;

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Oct 9, 2025 6:12


    Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnerability A user cloning a git repository may be tricked into executing arbitrary code via the SSH proxycommand option. https://dgl.cx/2025/10/bash-a-newline-ssh-proxycommand-cve-2025-61984 Framelink Figma MCP Server CVE-2025-53967 Framelink Figma s MCP server suffers from a remote code execution vulnerability.

    The Mind4Survival Podcast
    How Devices Track You: Palisades Fire Case

    The Mind4Survival Podcast

    Play Episode Listen Later Oct 9, 2025 40:16


    Preppers: Your phone, car, and devices track you. Here's how that data is used—and how to protect your digital footprint. The post How Devices Track You: Palisades Fire Case appeared first on Mind4Survival.

    Mad Radio
    Caserio on Pass Protection & Ball Security + Mixon Saga + Takeamania Preview

    Mad Radio

    Play Episode Listen Later Oct 9, 2025 36:14


    Seth and Sean dive into what Nick Caserio had to tell them about pass protection, protecting the ball and Denico Autry, dive into the Joe Mixon saga, and preview tomorrow's Takeamania.

    Mad Radio
    HOUR 2 - Caserio on Pass Protection, Ball Security Emphasis & Mixon Saga + Browns Taking the Week to Decide Backup QB

    Mad Radio

    Play Episode Listen Later Oct 9, 2025 45:21


    Seth and Sean discuss what Nick Caserio had to say about pass protection and ball security, dive into the Joe Mixon saga, and react to Kevin Stefanski saying he's taking the week picking a backup QB.

    Business of Tech
    AI Cyberattacks Surge as Gartner Predicts 50% Security Budget Shift to Prevention by 2030

    Business of Tech

    Play Episode Listen Later Oct 9, 2025 14:11


    AI-powered cyberattacks are rapidly evolving, prompting a significant shift in cybersecurity strategies. According to a recent Gartner report, IT leaders are expected to allocate over half of their cybersecurity budgets to preemptive defense measures by 2030. This change is driven by the inadequacy of traditional detection and response tools in the face of sophisticated cyber threats, particularly those enhanced by artificial intelligence. Experts warn that while preemptive measures can mitigate risks, organizations may encounter challenges in integrating these new systems and overcoming cultural inertia.Datadog's 2025 State of Cloud Security Report highlights a growing trend among organizations adopting data perimeters to combat credential theft, with 40% of organizations implementing this advanced security practice. Additionally, 86% of organizations are utilizing multi-account setups within AWS, which allows for better enforcement of security protocols. Meanwhile, OpenAI's report reveals that cybercriminals are increasingly leveraging AI for malicious activities, including phishing and surveillance, showcasing the urgent need for enhanced cybersecurity measures.In response to market pressures, Synology has reversed its policy on drive restrictions for its network-attached storage models, allowing the use of non-validated third-party drives. This decision comes after user feedback indicated dissatisfaction with the previous requirement for proprietary drives, which were often more expensive. For managed service providers (MSPs), this change offers greater flexibility and cost-effectiveness, making Synology's products more appealing once again.Pax8 has launched the Pax8 Agent Store, a platform designed to help MSPs adopt and offer AI-driven tools to small and medium-sized businesses. This marketplace aims to facilitate the integration and monetization of intelligent automation solutions, with early access set for December 2025. Additionally, SolarWinds has introduced an AI agent to enhance operational resilience for IT teams, while Barracuda Networks has launched Barracuda Research, a centralized resource for threat intelligence. Both initiatives aim to empower organizations in managing cybersecurity threats more effectively. Four things to know today00:00 Gartner, OpenAI, Datadog, and DHS Paint a Stark Cyber Future: AI Attacks Surge, Budgets Shift, and Defenses Fracture06:01 New Pax8 Platform Targets Repeatable AI Services, Sets Early Access for December08:03 Synology Reverses Course on Pricey Drives — Because You Stopped Buying09:53 SolarWinds and Barracuda Push AI to Ease IT Burdens—But Can They Deliver Real Value? This is the Business of Tech.     Supported by:  Comet, Scalepad Webinar:  https://bit.ly/msprmail

    WOLA Podcast
    The Grim Side of El Salvador's “Security Model”

    WOLA Podcast

    Play Episode Listen Later Oct 9, 2025 60:49


    A special episode as part of WOLA's 2025 Human Rights Awards Month President Nayib Bukele's government has jailed nearly 2 percent of El Salvador's entire population—the highest incarceration rate in the world. Still, because violence has dropped sharply, political figures across Latin America speak about emulating Bukele's “security model.” But behind the videos of mega-prisons and tweets about plunging homicide rates lies a darker, less sustainable reality. In this WOLA Podcast episode, Adam Isacson speaks with Beatriz Magaloni (personal site / Stanford site), a political scientist at Stanford University and co-author (with Alberto Díaz-Cayeros) of a Foreign Affairs article published September 11, 2025: “Does the Bukele Model Have a Future?” Their conversation reveals what Magaloni calls “a system of state terror and resource extraction,” and explores why El Salvador's experiment in mass incarceration may ultimately collapse under its own weight. In fieldwork conducted since last year, Dr. Magaloni interviewed the families of hundreds of victims of the security crackdown, many aided by MOVIR, the Movement of Victims of the Regime, which WOLA is honoring with its 2025 Human Rights Award. “Our crime is to be poor,” families told her. Police and soldiers face monthly arrest quotas, Magaloni explains. Civilians can denounce neighbors by calling a hotline—and are sometimes paid $300 bounties. Poor Salvadorans, many in communities with little or no gang presence, end up seized and jailed in prisons like Izalco and Mariona, where conditions amount to systematic torture. This, Magaloni says, has turned the carceral system into “a machine that milks the poor.” Bukele's ongoing emergency decrees, renewed 42 times, now serve dual purposes: silencing critics and funding repression. Despite its popularity, Bukele's “model” rests on brittle foundations. Poverty remains over 30 percent and is not declining. The economy depends on remittances from abroad, not job creation. Corruption persists, while transparency laws and data access have been erased. Bukele's control of the media, polished propaganda videos, and rapid-fire social-media presence drown out criticism. Civil society's challenge, Magaloni argues, is to build equally powerful counter-narratives that humanize victims and expose hidden abuses. Drawing on decades of field research in Mexico and Brazil, Magaloni concedes that effective citizen security sometimes does require force, but points to past experiments that achieved short-term safety without repression, human rights abuse, or democratic dismantlement. These include efforts like community-based policing in Medellín or Rio de Janeiro's early UPPs, which showed progress before political will and funding eroded. Bukele “could have stopped six months in, admitted mistakes, freed the innocent—and he'd have deserved credit,” Magaloni says. “Instead, he institutionalized terror.”  

    Syntax - Tasty Web Development Treats
    944: Is Coinbase Really Writing Half Their Code With AI?

    Syntax - Tasty Web Development Treats

    Play Episode Listen Later Oct 8, 2025 49:06


    Wes and Scott talk with Kyle Cesmat about how Coinbase is writing nearly half its code with AI—while keeping quality and security front and center. They dig into tools like Cursor and Claude Code, agent-driven workflows, code review challenges, and how AI is reshaping developer productivity without replacing developers. Show Notes 00:00 Welcome to Syntax! 03:29 Defining and measuring “quality” at a large company 05:05 How AI-generated code is reviewed and shipped at Coinbase 07:35 A developer's workflow using AI—from ticket to production 10:30 Standard vs. team-specific tools for AI development 12:55 Using MCP servers to power internal AI workflows 14:42 MCP vs. custom agent integrations 17:16 What kinds of code AI is writing at Coinbase 19:48 Which languages and tasks does AI handle best? 21:21 Getting AI to follow existing code conventions greptile 24:36 Brought to you by Sentry.io 25:01 How AI affects hiring, velocity, and developer focus 28:16 AI's role in speeding up code reviews 31:28 The most valuable AI tool in Coinbase's stack 33:48 Managing AI costs and model choices 35:10 Security considerations for using external AI models 37:04 How often Coinbase tunes and adjusts its AI systems 39:26 Using AI to write code vs. embedding AI in customer-facing features 42:29 Kyle's big-picture take on AI as a tool—not a magic bullet Measuring the Impact of Early-2025 AI on Experienced Open-Source Developer Productivity 44:33 The future of hiring engineers with their own “backpack” of agents 45:53 Sick Picks + Shameless Plugs Sick Picks Kyle: UltraShelf Hit us up on Socials! Syntax: X Instagram Tiktok LinkedIn Threads Wes: X Instagram Tiktok LinkedIn Threads Scott: X Instagram Tiktok LinkedIn Threads Randy: X Instagram YouTube Threads

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Wednesday, October 8th, 2025: FreePBX Exploits; Disrupting Teams Threats; Kibana and QT SVG Patches

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Oct 8, 2025 5:57


    FreePBX Exploit Attempts (CVE-2025-57819) A FreePBX SQL injection vulnerability disclosed in August is being used to execute code on affected systems. https://isc.sans.edu/diary/Exploit%20Against%20FreePBX%20%28CVE-2025-57819%29%20with%20code%20execution./32350 Disrupting Threats Targeting Microsoft Teams Microsoft published a blog post outlining how to better secure Teams. https://www.microsoft.com/en-us/security/blog/2025/10/07/disrupting-threats-targeting-microsoft-teams/ Kibana XSS Patch CVE-2025-25009 Elastic patched a stored XSS vulnerability in Kibana https://discuss.elastic.co/t/kibana-8-18-8-8-19-5-9-0-8-and-9-1-5-security-update-esa-2025-20/382449 QT SVG Vulnerabilities CVE-2025-10728, CVE-2025-10729, The QT group fixed two vulnerabilities in the QT SVG module. One of the vulnerabilities may be used for code execution https://www.qt.io/blog/security-advisory-uncontrolled-recursion-and-use-after-free-vulnerabilities-in-qt-svg-module-impact-qt

    All TWiT.tv Shows (MP3)
    Security Now 1046: Google's Developer Registration Decree

    All TWiT.tv Shows (MP3)

    Play Episode Listen Later Oct 8, 2025 164:44


    Google's new demand for developer registration could spell the end for open-source app stores, while Europe's controversial chat control vote threatens privacy for everyone—Steve and Leo break down what's at stake for devs and users alike. Qantas says no one can releak their stolen data. Brave's usage is up. But is it really 3 times faster. Next Tuesday the EU votes on "Chat Control". Microsoft formally launches a "Security Store". Outlook moves to block JavaScript in SVG's. A new release of Chrome. Gmail will no longer pull external email via POP. Googe Drive starts blocking ransomware encryptions. The UK issues another order to Apple. Researchers create a "Battering RAM" attack device. HackerOne's significant bug bounty payouts. The Imgur service goes dark across the UK. Guess why. The Netherlands plans to say NO to "Chat Control." Discord was breached and government IDs leaked. Salesforce says it's not another new breach. Signal introduces a new post-quantum ratchet. Your motherboard MIGHT support TPM 2.0. Google to force Android app devs to register and pay Show Notes - https://www.grc.com/sn/SN-1046-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com for Security Now joindeleteme.com/twit promo code TWIT hoxhunt.com/securitynow bitwarden.com/twit veeam.com

    Software Engineering Radio - The Podcast for Professional Software Developers
    SE Radio 689: Amey Desai on the Model Context Protocol

    Software Engineering Radio - The Podcast for Professional Software Developers

    Play Episode Listen Later Oct 8, 2025 58:36


    Amey Desai, the Chief Technology Officer at Nexla, speaks with host Sriram Panyam about the Model Context Protocol (MCP) and its role in enabling agentic AI systems. The conversation begins with the fundamental challenge that led to MCP's creation: the proliferation of "spaghetti code" and custom integrations as developers tried to connect LLMs to various data sources and APIs. Before MCP, engineers were writing extensive scaffolding code using frameworks such as LangChain and Haystack, spending more time on integration challenges than solving actual business problems. Desai illustrates this with concrete examples, such as building GitHub analytics to track engineering team performance. Previously, this required custom code for multiple API calls, error handling, and orchestration. With MCP, these operations can be defined as simple tool calls, allowing the LLM to handle sequencing and error management in a structured, reasonable manner. The episode explores emerging patterns in MCP development, including auction bidding patterns for multi-agent coordination and orchestration strategies. Desai shares detailed examples from Nexla's work, including a PDF processing system that intelligently routes documents to appropriate tools based on content type, and a data labeling system that coordinates multiple specialized agents. The conversation also touches on Google's competing A2A (Agent-to-Agent) protocol, which Desai positions as solving horizontal agent coordination versus MCP's vertical tool integration approach. He expresses skepticism about A2A's reliability in production environments, comparing it to peer-to-peer systems where failure rates compound across distributed components. Desai concludes with practical advice for enterprises and engineers, emphasizing the importance of embracing AI experimentation while focusing on governance and security rather than getting paralyzed by concerns about hallucination. He recommends starting with simple, high-value use cases like automated deployment pipelines and gradually building expertise with MCP-based solutions. Brought to you by IEEE Computer Society and IEEE Software magazine.

    Radio Leo (Audio)
    Security Now 1046: Google's Developer Registration Decree

    Radio Leo (Audio)

    Play Episode Listen Later Oct 8, 2025 164:44


    Google's new demand for developer registration could spell the end for open-source app stores, while Europe's controversial chat control vote threatens privacy for everyone—Steve and Leo break down what's at stake for devs and users alike. Qantas says no one can releak their stolen data. Brave's usage is up. But is it really 3 times faster. Next Tuesday the EU votes on "Chat Control". Microsoft formally launches a "Security Store". Outlook moves to block JavaScript in SVG's. A new release of Chrome. Gmail will no longer pull external email via POP. Googe Drive starts blocking ransomware encryptions. The UK issues another order to Apple. Researchers create a "Battering RAM" attack device. HackerOne's significant bug bounty payouts. The Imgur service goes dark across the UK. Guess why. The Netherlands plans to say NO to "Chat Control." Discord was breached and government IDs leaked. Salesforce says it's not another new breach. Signal introduces a new post-quantum ratchet. Your motherboard MIGHT support TPM 2.0. Google to force Android app devs to register and pay Show Notes - https://www.grc.com/sn/SN-1046-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: threatlocker.com for Security Now joindeleteme.com/twit promo code TWIT hoxhunt.com/securitynow bitwarden.com/twit veeam.com

    Wedding Business Solutions
    Handling Damages, should you take a security deposit?

    Wedding Business Solutions

    Play Episode Listen Later Oct 8, 2025 6:40 Transcription Available


    What happens when something gets damaged at your venue or event space? Should you always ask for a security deposit, or only if you've had trouble before? How do you decide what kind of damage is “just wear and tear” versus something you should actually charge for? In this episode, I dig into the uncomfortable reality of damages, the importance of clear contracts, how to be fair with clients, and why security deposits might be good business—even if most guests never cause a problem.Listen to this new 6-minute episode for practical advice on protecting your business from damages, being clear with customers, and making security deposits work to everyone's benefit.If you have any questions about anything in this, or any of my podcasts, or have a suggestion for a topic or guest, please reach out directly to me at Alan@WeddingBusinessSolutions.com or visit my website Podcast.AlanBerg.com Please be sure to subscribe to this podcast and leave a review (thanks, it really does make a difference). If you want to get notifications of new episodes and upcoming workshops and webinars, you can sign up at www.ConnectWithAlanBerg.com  View the full transcript on Alan's site: https://alanberg.com/blog/Want to see about joining an upcoming mastermind (bring together some industry friends to have me spend a day with you all) - or arranging one of your own (yes, I'll come to you!)? Reach out to me at Alan@WeddingBusinessSolutions.com or text or call +1.732.422.6362 I'm Alan Berg. Thanks for listening. If you have any questions about this or if you'd like to suggest other topics for "The Wedding Business Solutions Podcast" please let me know. My email is Alan@WeddingBusinessSolutions.com. Look forward to seeing you on the next episode. Thanks. Listen to this and all episodes on Apple Podcast, YouTube or your favorite app/site: Apple Podcast: http://bit.ly/weddingbusinesssolutions YouTube: www.WeddingBusinessSolutionsPodcast.tv Spotify: https://spoti.fi/3sGsuB8 Stitcher: http://bit.ly/wbsstitcher Google Podcast: http://bit.ly/wbsgoogle iHeart Radio: https://ihr.fm/31C9Mic Pandora: http://bit.ly/wbspandora ©2025 Wedding Business Solutions LLC & AlanBerg.com

    Owned and Operated
    Entry & Exit #1 How to Build, Scale & Sell a Security/Fire Business

    Owned and Operated

    Play Episode Listen Later Oct 8, 2025 52:12 Transcription Available


    Welcome to Entry & Exit — the new Owned and Operated series for builders in the security & life-safety world. Hosts Stephen Olmon and Collin Trimble share how they grew Alarm Masters from under $2M to ~3× revenue, including +50% RMR growth in Year 1.From recurring revenue (RMR) to acquisitions and organic growth, this episode breaks down what it really takes to scale a security business — and eventually position it for a successful exit.✨ What You'll Learn-The 3 revenue pillars (Install, Service, RMR) and target margins- Why buying monitoring accounts opens doors to 5 scopes (cameras, access, fire, intercom, PA)- The coffee/taco drop strategy that keeps customers sticky & cross-sold- How Alarm Masters went from 1st deal → 4 acquisitions → $6M+ in just 2 years- Lessons on hiring, ops leadership, and competing with the national giants- What buyers look for when evaluating your business (RMR %, retention, service cadence)

    The John Batchelor Show
    Syria's Search for Stability: Security Deals, the Golan Heights, and the Gaza Impact Guests: Ahmad Sharawi, Bill Roggio Ahmad Sharawi and Bill Roggio discuss Syrian President al-Sharaa's focus on stability and his pursuit of a security agreement with I

    The John Batchelor Show

    Play Episode Listen Later Oct 7, 2025 8:50


    Syria's Search for Stability: Security Deals, the Golan Heights, and the Gaza Impact Guests: Ahmad Sharawi, Bill Roggio Ahmad Sharawi and Bill Roggio discuss Syrian President al-Sharaa's focus on stability and his pursuit of a security agreement with Israel. Negotiating away the Golan Heights is considered a non-starter for al-Sharaa's survival, as his father, Hafez Assad, is often seen as the man who lost the territory, and al-Sharaa would be domestically labeled a traitor by all segments of the Syrian population, including hardliners. A full peace agreement is out of the question, but a limited security agreement might be possible, allowing Israel to maintain its presence in the Golan Heights while potentially withdrawing from areas entered after the fall of the Assad regime. The end of the war in Gaza is expected to expedite negotiations between Syria and Israel toward a security deal, as it affects the optics of al-Sharaa making such a move in the Arab world. Al-Sharaa's main priority is removing Israeli presence and stopping Israeli air strikes inside southern Syria 1920 ALEPPO                                                 ,

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Tuesday, October 7th, 2025: More About Oracle; Redis Vulnerability; GoAnywhere Exploited

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Oct 7, 2025 5:33


    More Details About Oracle 0-Day The exploit is now widely distributed and has been analyzed to show the nature of the underlying vulnerabilities. https://isc.sans.edu/diary/Quick%20and%20Dirty%20Analysis%20of%20Possible%20Oracle%20E-Business%20Suite%20Exploit%20Script%20%28CVE-2025-61882%29%20%5BUPDATED%5B/32346 https://labs.watchtowr.com/well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882/ Redis Vulnerability Redis patched a ciritcal use after free vulnerability that could lead to arbitrary code execution. https://redis.io/blog/security-advisory-cve-2025-49844/ GoAnywhere Bug Exploited Microsoft is reporting about the exploitation of the recent GoAnywhere vulnerability https://www.microsoft.com/en-us/security/blog/2025/10/06/investigating-active-exploitation-of-cve-2025-10035-goanywhere-managed-file-transfer-vulnerability/

    Risky Business
    Snake Oilers: Realm Security, Horizon3 and Persona

    Risky Business

    Play Episode Listen Later Oct 7, 2025 45:40


    In this edition of the Snake Oilers podcast, three vendors pop in to pitch you all on their wares: Realm Security: A security focussed, AI-first data pipeline platform Horizon3: AI hackers! Pentesting robots!! They're coming fer yur jerbs! Persona: Verify customer and staff identities with live capture This episode is also available on Youtube. Show notes

    The Tech Blog Writer Podcast
    3445: Why AI Won't Replace Human Testers at JalasoftWhy AI Won't Replace Human Testers at Jalasoft

    The Tech Blog Writer Podcast

    Play Episode Listen Later Oct 7, 2025 24:34


    As AI tools race into every corner of software development, a simple question keeps coming back to me. Will AI replace human testers, or will it force us to rethink what great testing looks like in the first place. In today's conversation, I talk with Santiago Komadina Geffroy, a Software Engineer at Jalasoft and an educator with Jala University, about what changes, what stays, and what teams should do next. Santiago shares how his day job and teaching intersect. He points to a gap he sees often. Engineers are experimenting with large language models without fully understanding how they work, which leads to overconfidence and avoidable rework. He argues for clearer interaction patterns between tools and people. Think less about magic prompts and more about protocols, context sharing, and agent to agent collaboration. That shift frees testers to do the thinking work that AI still struggles with, from exploratory testing and usability judgment to spotting the weird edge cases that only show up when real humans use real products. We also get into bias and ethics. AI is only as fair as the data it learns from, and that matters in healthcare, finance, and hiring where a mistake can carry life changing consequences. Santiago calls for stronger education around data quality, authorship, privacy, and environmental impact, not as a side note but as part of how engineers are trained. He believes governance helps teams move faster with fewer regrets when they take AI into production. Security sits in the mix too. Many AI tools need deep system access. If compromised, they can distort results or leak sensitive information. Santiago is candid about the limits of any single safeguard. He recommends a culture of shared responsibility where engineers understand when to call in security specialists and how to design workflows that keep humans in the loop for consequential decisions. We close with what Jalasoft has learned from building with AI inside a nearshore model in South America. More thinking time. Smaller, controllable scopes. Clear lines between routine automation and human judgment. The headline is simple. AI will change testing. Human testers will remain at the heart of quality.

    Packet Pushers - Full Podcast Feed
    PP081: News Roundup – BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans

    Packet Pushers - Full Podcast Feed

    Play Episode Listen Later Oct 7, 2025 48:26


    From a massive SIM farm takedown to dealing with supply chain attacks targeting npm, our news roundup provides context and commentary on a fresh crop of security news. We discuss exploits against Cisco firewalls and switches, a SonicWall firmware update to remove a rootkit targeting its SMA 100, and GitHub’s plans to harden npm packages.... Read more »

    The Just Security Podcast
    Murder on the High Seas Part II: What We Know about U.S. Vessel Strikes One Month In

    The Just Security Podcast

    Play Episode Listen Later Oct 7, 2025 47:50


    Since early September, President Trump has ordered the U.S. military to conduct multiple lethal strikes on boats in the Caribbean Sea suspected of drug trafficking, resulting in at least 21 deaths. These unprecedented military actions raise critical questions about the identity of those targeted, the Administration's legal justification, and the scope of presidential power to designate “terrorists” and authorize lethal force. What checks exist from Congress, courts, or the executive branch to limit such authority?On this episode of the Just Security Podcast, cross-hosted with the Reiss Center on Law and Security, host Tess Bridgeman and co-host Rachel Goldbrenner are joined by experts Rebecca Ingber and Brian Finucane to analyze the facts, the law, and the broader implications of this military campaign in the Caribbean.They examine an important new chapter in the use of force against drug cartels and explores how far presidential powers extend in such contexts.Show Notes: This is a joint podcast of Just Security and NYU Law School's Reiss Center on Law and Security.Executive branch reporting on the vessel strikes, on Tren de Aragua, and related resources:48-Hour Report pursuant to the War Powers Resolution (September 4, 2025) (Note: For a living resource containing this and all other publicly available reports submitted pursuant to the War Powers Resolution since its enactment in 1973, see NYU Law's Reiss Center on Law and Security's War Powers Resolution Reporting Project)Notice to Congress Under 50 U.S.C. §1543a (Section 1230 of the FY 2024 National Defense Authorization Act) (undated, made public October 2, 2025)National Intelligence Council, Venezuela: Examining Regime Ties to Tren de Aragua (April 7, 2025)Listeners may also be interested in Just Security‘s Collection: U.S. Lethal Strikes on Suspected Drug Traffickers (updated, Oct. 3, 2025), including:Mary B. McCord and Tess Bridgeman, What the Senate Judiciary Committee Should Ask A.G. Bondi on Drug Cartel Strikes (Oct. 3, 2025)Marty Lederman, Legal Flaws in the Trump Administration's Notice to Congress on “Armed Conflict” with Drug Cartels (Oct. 3, 2025)Daniel Maurer, US Servicemembers' Exposure to Criminal Liability for Lethal Strikes on Narcoterrorists (September 24, 2025)Ben Saul, The United States' Dirty War on “Narco Terrorism” (September 22, 2025)Annie Shiel, John Ramming Chappell, Priyanka Motaparthy, Wells Dixon and Daphne Eviatar, Murder by Drone: The Legal and Moral Stakes of the Caribbean Strikes (September 17, 2025)Brian Finucane, Asserting a License to Kill: Why the Caribbean Strike is a Dangerous Departure from the “War on Terror (September 15, 2025)Marty Lederman, The Many Ways

    Digital Nomad Experts - Beach Commute
    How to get hired from anywhere: Insider tips on jobs, taxes & more for digital nomads | Ep 220

    Digital Nomad Experts - Beach Commute

    Play Episode Listen Later Oct 7, 2025 42:46


    Legalese and logistics shouldn't stop you from living and working anywhere. In this episode, we unpack the confusing stuff: work-from-anywhere policies vs. hire-from-anywhere roles, W-2 vs. 1099, employer-of-record (EOR), visas, and taxes. So you know what job listings actually mean and how to navigate them. No promises, no legal advice, just clear explanations and what to consider next.Highlights:

    Packet Pushers - Fat Pipe
    PP081: News Roundup – BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans

    Packet Pushers - Fat Pipe

    Play Episode Listen Later Oct 7, 2025 48:26


    From a massive SIM farm takedown to dealing with supply chain attacks targeting npm, our news roundup provides context and commentary on a fresh crop of security news. We discuss exploits against Cisco firewalls and switches, a SonicWall firmware update to remove a rootkit targeting its SMA 100, and GitHub’s plans to harden npm packages.... Read more »

    The Kevin Dairaghi Show
    69. How Faith & Risk Built a Real Estate Life — Matt Kamp on Startups, Security, and Selling with Heart

    The Kevin Dairaghi Show

    Play Episode Listen Later Oct 7, 2025 48:16


    Work with Kevin to get the confidence to build the life you want. - - - - - The One with Matt Kamp Join our host Kevin Dairaghi and guest Matt Kamp for a wonderful episode chronicling Matt's love of real estate and how he forged a life in it, leaving safety security behind and learning how to leverage strengths, mentors, and the support of faith, family and friends to prove that great guys can finish first.Dealmachine Bonus: http://www.dealmachine.com/KDSHOW House Buying Website: www.RestoreSTL.com Connect with Kevin Dairaghi! Website: www.kevindairaghi.com LinkedIn: www.linkedin.com/in/kdairaghi Instagram: @thekevindairaghishow Facebook: www.facebook.com/kdairaghi Get free access to some of the tools we talked about at www.kevindairaghi.com/tools You are who you surround yourself with. Join the Tribe! RATE & REVIEW this episode on Apple and Spotify. SHARE this episode with someone who needs it! A huge thank you to our sponsors: Lois Mans with Farmers Insurance - Insurance! (314) 638-8890 Greg Mans with Upright Construction - Roofs! (314) 374-1343 Adam Droege with CRS Realty - Property Management! (314) 325-8328 Jason Hudson with Red Maples Construction - Turnovers! (314) 312-2147 Please reach out to them - they are my real estate team! Tell them Kevin sent ya!

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Oracle E-Business Suite 0-Day CVE-2025-61882 Last week, the Cl0p ransomware gang sent messages to many businesses stating that an Oracle E-Business Suite vulnerability was used to exfiltrate data. Initially, Oracle believed the root cause to be a vulnerability patched in June, but now Oracle released a patch for a new vulnerability. https://www.oracle.com/security-alerts/alert-cve-2025-61882.html Zimbra Exploit Analysis An exploit against a Zimbra system prior to the patch release is analyzed. These exploits take advantage of .ics files to breach vulnerable systems. https://strikeready.com/blog/0day-ics-attack-in-the-wild/ Unity Editor Vulnerability CVE-2025-59489 The Unity game editor suffered from a code execution vulnerablity that would also expose software developed with vulnerable versions https://unity.com/security/sept-2025-01

    Coin Stories
    News Block: Bitcoin Hits New ATH, BTC & Gold Dubbed "Debasement Trade," Ray Dalio Shares Bitcoin FUD, CAMT Policy Fix

    Coin Stories

    Play Episode Listen Later Oct 6, 2025 10:20


    In this week's episode of the Coin Stories News Block powered exclusively by Ledn, we cover these major headlines related to Bitcoin, macroeconomics, and global finance: JPMorgan Labels Bitcoin as the “Debasement Trade," Lifts BTC Fair Value to ~$165k Global Debt Hits $338T -- Hard Money Outperforms Treasury to Exempt Bitcoin from 15% Corporate Tax Ray Dalio Shares Criticism of Bitcoin Privacy, Security, Central Bank Adoption Robinhood Lists Strategy's Preferred Equity Products  ---- The News Block is powered exclusively by Ledn – the global leader in Bitcoin-backed loans, issuing over $9 billion in loans since 2018, and they were the first to offer proof of reserves. With Ledn, you get custody loans, no credit checks, no monthly payments, and more. My followers get .25% off their first loan. Learn more at www.ledn.io/natalie  ---- Read every story in the News Block with visuals and charts! Join our mailing list and subscribe to our free Bitcoin newsletter: https://thenewsblock.substack.com  ---- References mentioned in the episode: Treasury Clarifies Guidance on CAMT Policy Treasury to Exempt BTC from CAMT on Unrealized Gains Senator Lummis' Tweet on CAMT Guidance  Michael Saylor's Tweet on CAMT Guidance Charlie Bilello's Tweet on Gold & BTC Performance Bitcoin Rises to Record Amid the “Debasement Trade”  JPMorgan Labels Bitcoin as the “Debasement Trade” IIF: Global Debt Has Increased to $338 Trillion  JPMorgan Says that Bitcoin's Fair Value is $165K CNBC Headline Calls Bitcoin a Safe-Haven Asset Robinhood Lists Strategy's Preferred Equity Products Robinhood Lists Strategy's Preferreds in Platform First  Vlad Tenev's Tweet on Listing Strategy's Preferreds Ray Dalio's Recent Comments on Bitcoin ---- Upcoming events: Bitcoin 2026 will be here before you know it. Get 10% off Early Bird passes using the code HODL: https://tickets.b.tc/event/bitcoin-2026?promoCodeTask=apply&promoCodeInput=  Your Bitcoin oasis awaits at Camp Nakamoto: A retreat for Bitcoiners, by Bitcoiners. Code HODL for discounted passes: https://massadoptionbtc.ticketspice.com/camp-nakamoto      ---- This podcast is for educational purposes and should not be construed as official investment advice. ---- VALUE FOR VALUE — SUPPORT NATALIE'S SHOWS Strike ID https://strike.me/coinstoriesnat/ Cash App $CoinStories #money #Bitcoin #investing

    Thee Generation Podcast
    Faith Talks: Fear of Missing the Right One

    Thee Generation Podcast

    Play Episode Listen Later Oct 6, 2025 41:10


    Anna Faith is newly engaged—and with her mom, Joanna, she gets honest about the fear of “missing the right one.” From PNG to answered prayers back home, they trace how God moved her from anxious timelines to quiet trust, showing that His goodness isn't limited by place, people, or plans. This conversation gives hopeful, practical pathways to trade grasping for guidance and let God write the story.Topics DiscussedThe hidden belief: “College is the only window to meet the right guy”Crisis of faith on the PNG trip and learning satisfaction in GodVerses that dismantled fear (1 Sam 12:24; Prov 16:9; Matt 6:33; Isa 55:8–9; Ps 34:8; Prov 3:5–6; Isa 62:4–5)How family counsel and parental involvement guided next stepsThe providential “Jonathan” connection and praying through uncertaintyGuardrails against desperation datingWaiting without manipulation: letting God make the introductionsWhat to do with a God-given desire for marriageSpecific prayer requests, looking for light, and following peaceKey TakeawaysGod's goodness is not theoretical—it's traceable. Track His works and let truth replace fear when feelings surge.Desire for marriage is God-made, but timing is God-led. Seek Him first; let Him realign desires and pace the path.You can't miss God's will while you're trusting God. Pray specifically, obey immediately, and watch Him open the right doors.Don't marry out of desperation. Security comes from Christ's sufficiency, not from forcing a relationship.Scripture answers fear in real time. Keep a running list of verses God gives you and revisit them when doubts return.Faith Talks is a monthly program on the Thee Generation Podcast designed to help young ladies grow in faith and live it out daily. Have a question for the Faith Twins or our guest? Email faithtalks@theegeneration.org. If you've been encouraged by this podcast, please take the time to give us a five-star rating and write a brief review. That would help tremendously in getting the word out and raising the visibility of the Thee Generation for others. For more faith inspiring resources and information about joining Thee Generation, please visit theegeneration.org.

    The Tara Show
    H2: “Judges, Cartels & Corruption: America's Crisis in Justice and Security”

    The Tara Show

    Play Episode Listen Later Oct 6, 2025 28:42


    In this explosive episode, we break down the shocking failures of the U.S. judicial system, from federal judges allegedly blocking ICE operations to South Carolina's legislature-controlled courts that let violent offenders roam free. We explore how political appointments, liberal judges, and a broken criminal justice system have contributed to rising chaos in American cities, including threats to federal agents and citizens alike. From Judge Emergold's controversial rulings to Trump's deployment of the National Guard, this episode examines the intersection of politics, law enforcement, and cartel influence — and why some claim parts of the U.S. now resemble Mexico when it comes to lawlessness. We also dive into the misinformation around illegal immigrant healthcare, the federal budget, and media narratives shaping public perception. Coming up at 8:00, hear from key voices and experts as the national conversation on law, order, and political corruption heats up.

    Paul's Security Weekly
    AI & IAM: Where Security Gets Superhuman (Or Supremely Stuck) - Matt Immler, Heather Ceylan, Alexander Makarov, Nitin Raina, Dor Fledel, Aaron Parecki - ESW #427

    Paul's Security Weekly

    Play Episode Listen Later Oct 6, 2025 94:04


    At Oktane 2025, leaders from across the security ecosystem shared how identity has become the new front line in protecting today's AI-driven enterprises. As SaaS adoption accelerates and AI agents proliferate, organizations face an explosion of human and non-human identities—and with it, growing risks like misconfigured access, orphaned accounts, and identity-based attacks. In this special Enterprise Security Weekly episode, we bring together insights from top experts: Dor Fledel (Okta) explains how teams can gain visibility into AI agents, uncover risks, and enforce appropriate access controls. Alexander Makarov (Adyen) shares how a global fintech unified and streamlined identity with Okta, improving both security and employee experience across 200+ countries. Aaron Parecki (Okta) highlights the importance of open standards—like IPSIE, MCP, and A2A—for building secure, interoperable AI ecosystems and centralized control over AI-driven interactions. Heather Ceylan (Box) discusses how Box embeds AI into workflows to enhance data protection, even for highly regulated industries. Matt Immler (Okta) offers lessons from the field on strengthening defenses with behavioral monitoring, automation, and a security-first culture to counter attackers who now “log in” instead of hacking in. Nitin Raina (Thoughtworks) warns about AI-driven social engineering—from deepfakes to multi-channel phishing—and shares practical strategies like phishing-resistant MFA, zero-trust architecture, and better employee training. From open standards to privileged access management and AI-powered defense, these Oktane 2025 conversations explore how identity-driven strategies are shaping the future of enterprise security. Segment Resources: https://www.okta.com/newsroom/articles/old-security-challenges--new-ai-risks--managing-authorization-in https://www.okta.com/newsroom/press-releases/okta-introduces-cross-app-access-to-help-secure-ai-agents-in-the/ https://www.okta.com/blog/ai/securing-the-ai-agent-ecosystem/ https://www.okta.com/customers/adyen/ https://www.okta.com/newsroom/?sort=featured&filters=okta%3Acategories%2Fidentity-security https://www.okta.com/customers/thoughtworks/ This segment is sponsored by Oktane by Okta. Visit https://securityweekly.com/oktane to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-427

    ai security stuck i am mfa superhuman okta mcp nitin ceylan a2a makarov oktane aaron parecki enterprise security weekly segment resources
    America Adapts the Climate Change Podcast
    Special Episode — Climate Change and Human Mobility (Rebroadcast of a CCST Panel Conversation)

    America Adapts the Climate Change Podcast

    Play Episode Listen Later Oct 6, 2025 62:04


    In episode 238  of America Adapts, Doug Parsons takes you inside a CCST webinar that he moderated —part of the California Council on Science and Technology's Climate Change & Human Mobility series, organized with the UC Disaster Resilience Network and UC Berkeley. You'll hear from three experts: Dr. Hélène Benveniste (Assistant Professor, Environmental Social Sciences, Doerr School of Sustainability, Stanford University), Dr. Joshua Busby (Professor of Public Affairs, LBJ School, University of Texas at Austin), and Dr. Barbara F. Walter (Rohr Professor of International Affairs, School of Global Policy & Strategy, UC San Diego). Together, they explore the politics of place attachment, the limits of “climate haven” narratives, and the policies that can turn hard choices into durable, just resilience. We also dig into how climate stress can heighten the risk of civil conflict under certain economic and governance conditions, and why national adaptation plans need to account for mobility—designing for relocation, receiving communities, and security implications alongside equity and long-term planning. Episode Transcript 2025 EXPERT PANEL SERIES #1 Climate Change Human Mobility #1: Risks|Displacement|Community Impacthttps://www.youtube.com/watch?v=x5UZ_UtiD-E 2025 EXPERT PANEL SERIES #2: Housing Costs, Insurance Rates, and Rebuilding After Disastershttps://www.youtube.com/watch?v=2Zs3GrV5zmQ   Check out the America Adapts Media Kit here! Subscribe to the America Adapts newsletter here. Listen to America Adapts on your favorite app here! Facebook, Linkedin and Bluesky: https://www.facebook.com/americaadapts/ https://bsky.app/profile/americaadapts.bsky.social https://www.linkedin.com/in/doug-parsons-america-adapts/ Links in this episode: https://ccst.us/register-climate-change-and-human-mobility-briefing-series/ https://www.youtube.com/watch?v=NzT8noY0IVM UC Disaster Resilience Network UC Berkeley Center for Security in Politics https://ccst.us/people/staff/eric-chu/ UC Disaster Resilience Network YouTube Channel https://www.youtube.com/@UCDRN   Doug Parsons and Speaking Opportunities: If you are interested in having Doug speak at corporate and conference events, sharing his unique, expert perspective on adaptation in an entertaining and informative way, Now on Spotify! List of Previous Guests on America Adapts Follow/listen to podcast on Apple Podcasts. The 10 Best Sustainability Podcasts for Environmental Business Leadershttps://us.anteagroup.com/news-events/blog/10-best-sustainability-podcasts-environmental-business-leaders For more information on this podcast, visit the website at http://www.americaadapts.org and don't forget to subscribe to this podcast on Apple Podcasts.   Podcast Music produce by Richard Haitz Productions Write a review on Apple Podcasts ! America Adapts on Facebook!   Join the America Adapts Facebook Community Group. Check us out, we're also on YouTube! Subscribe to America Adapts on Apple Podcasts Doug can be contacted at americaadapts @ g mail . com

    MoneyWise on Oneplace.com
    Health Insurance or Medical Cost Sharing: Which Is Right for You? with Lauren Gajdek

    MoneyWise on Oneplace.com

    Play Episode Listen Later Oct 6, 2025 24:57


    Health insurance or health cost-sharing—which is the better fit for your family? With open enrollment upon us, it's the perfect moment to explore your choices. Joining me today is Lauren Gajdek to highlight the key differences between health insurance and health cost-sharing.Lauren Gajdek is the Senior Director of External Affairs at Christian Healthcare Ministries (CHM), an underwriter of Faith & Finance. The Landscape of Traditional Health InsuranceOpen enrollment season is right around the corner—running from November 1 through January 15, 2026. For most people, that means navigating the world of traditional health insurance. These plans typically require you to select doctors and specialists within a designated provider network, often necessitating referrals or pre-authorization before receiving care.While insurance companies provide coverage, their structure can come at a high cost. Premiums and deductibles are often steep, and because insurers operate for profit, patient care and affordability don't always align. For many families, this creates a significant financial burden.How Health Cost Sharing Is DifferentHealth cost-sharing ministries, such as CHM, offer a unique alternative. The end result is the same—your medical bills are taken care of—but the process looks very different.No provider networks: Members are free to choose their own doctors and hospitals.Nonprofit model: Unlike insurance companies, CHM is a ministry. Members send in a set monthly contribution, which is pooled together to reimburse medical costs.Community approach: Instead of being absorbed into a bureaucratic system, members know that their contributions directly help fellow believers in need.Since its founding, CHM has facilitated over $10 billion in shared medical bills.How Does Health Cost-Sharing Work?Here's how it works for a typical family:Choose your provider. Members can see any doctor or hospital as long as the treatment fits CHM's guidelines.Identify as self-pay. This allows members to receive significant discounts often, sometimes as high as 40%.Submit bills to CHM. The ministry coordinates with providers as needed. In the meantime, members may set up a temporary payment plan until reimbursement arrives.The process is straightforward, designed to give families peace of mind while also offering flexibility and savings.What to Keep in Mind During Open EnrollmentWhen weighing your options, consider more than just the monthly premium. Ask:How much am I actually paying out-of-pocket after deductibles, co-pays, and coinsurance?Will my coverage travel with me if I go out of state—or out of the country?With CHM, members don't face co-pays or coinsurance, and qualifying medical bills are shared 100% according to ministry guidelines. Additionally, portability makes it an appealing option for families who want flexibility, regardless of where life takes them.A Biblical Approach to HealthcareAt its core, CHM is more than a healthcare solution—it's a ministry. Members not only share medical expenses but also pray for one another and receive prayer support in return. Every monthly contribution is a gift that directly helps another member in need.CHM reflects biblical principles of bearing one another's burdens while providing a practical, affordable path to healthcare.To explore whether health cost sharing is right for your family this open enrollment season, visit CHMinistries.org/Faith.On Today's Program, Rob Answers Listener Questions:I'm refinancing my home and am unsure whether I should roll the closing costs into the new loan or pay them from my investments or retirement accounts. Rolling them into the loan would lower my monthly payment, but is that the wisest choice financially—and biblically?Could you explain where the funds actually come from with a reverse mortgage, who technically owns the home in this arrangement, and whether the FHA backs the loan?My wife and I recently took a required minimum distribution from her IRA and made a qualified charitable distribution to our church. They told us it wasn't tax-deductible and wouldn't issue a receipt. What does the IRS actually require in this situation?Resources Mentioned:Faithful Steward: FaithFi's New Quarterly Magazine (Become a FaithFi Partner)Christian Healthcare Ministries (CHM)Understanding Reverse: Simplifying the Reverse Mortgage by Dan HultquistWisdom Over Wealth: 12 Lessons from Ecclesiastes on MoneyLook At The Sparrows: A 21-Day Devotional on Financial Fear and AnxietyRich Toward God: A Study on the Parable of the Rich FoolFind a Certified Kingdom Advisor (CKA) or Certified Christian Financial Counselor (CertCFC)FaithFi App Remember, you can call in to ask your questions most days at (800) 525-7000. Faith & Finance is also available on the Moody Radio Network and American Family Radio. Visit our website at FaithFi.com where you can join the FaithFi Community and give as we expand our outreach. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Security Unfiltered
    From Apple's Inside to a New Kind of Phone: Privacy, Free Speech, and Building a Third Platform

    Security Unfiltered

    Play Episode Listen Later Oct 6, 2025 49:17 Transcription Available


    Send us a textWe trade last‑minute schedules and kid chaos for a deep dive into how modern phones leak data, why “Ask App Not to Track” isn't enforcement, and what a third platform built for privacy and free speech looks like. Joe shares his Apple-to-Unplugged journey, the Raxxis findings, and practical features that make privacy usable.• zero‑to‑one background from Nomi acquisition to Apple services• motivation for a third platform beyond Apple and Google• Raxxis test revealing 3,400 sessions and 210,000 packets in one hour• third‑party data brokers, pattern‑of‑life risks, Fourth Amendment gaps• layered threat model from passive tracking to seizure and signals• emergency reset, false PIN wipe, and hardware battery cut‑off• first‑party vs third‑party privacy and ecosystem incentives• “Ask App Not to Track” as preference vs permission• Time Away to reduce engagement and regain attention• firewall, USB data blocking, 2G limits, Bluetooth controls• camouflaged VPN and operational noise in repressive networks• app compatibility layer and broader app sourcing without Google• clear business model: hardware and subscriptions, no data salePodMatchPodMatch Automatically Matches Ideal Podcast Guests and Hosts For InterviewsSupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast

    We Don't PLAY
    Download Perplexity Comet: AI-native Browser; Web Adoption and Security Talk with Favour Obasi-ike

    We Don't PLAY

    Play Episode Listen Later Oct 5, 2025 79:02


    Download Perplexity Comet: AI-native Browser; Web Adoption and Security Talk with Favour Obasi-Ike | Get exclusive SEO newsletters in your inbox.Perplexity AI's free "Comet" web browser, which occurred this past Thursday. We expressed excitement over this development, highlighting Comet's functionality as an AI-powered browser that can import Google Chrome extensions and act as a personal assistant, shopping, and email agent. The conversation extensively examines the implications of Comet's introduction on the browser market share, particularly in relation to the dominance of Google Chrome, and explores how this new tool affects Search Engine Optimization (SEO) strategies and content visibility for businesses. Finally, a significant portion of the discussion addresses crucial concerns regarding user privacy and data security when utilizing these advanced AI tools, emphasizing the need for caution and strategic use.Next Steps for Digital Marketing + SEO Services:>> ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Need SEO Services? Book a Complimentary SEO Discovery Call with Favour Obasi-Ike⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠>> Need more information? Visit our Work and PLAY Entertainment website to learn about our digital marketing services.>> Visit our Official website for the best digital marketing, SEO, and AI strategies today!FAQs about this episode1. What is the Perplexity AI Comet Browser?Comet is an AI web browser released by Perplexity AI. Comet essentially integrates Perplexity AI capabilities into a browser format. The concept involves having an AI web browser, similar to using Google Chrome but with AI integration.2. When was the Comet browser released, and to whom?The free Comet browser was recently made available to everyone worldwide. It was announced on a Thursday. However, Comet was initially released to people who had Perplexity Max in July. This three-month period (July to October) allowed Perplexity to keep it exclusive within their beta program or exclusive community before releasing it universally.3. How can I download the Comet browser, and what platforms is it available on?You can download the Comet browser by visiting perplexity.ai/comment. It is available for both Mac and Windows.4. What are the key features and capabilities of the Comet browser?The Comet browser offers several features that distinguish it from traditional browsers:• Extension Import: You can import your Google Chrome extensions into the Comet AI browser.• Agentic Capabilities: It is described as a personal assistant that helps with many things. It can: ◦ Autonomously control browser actions, such as closing tabs and opening pages. ◦ Fill out forms. ◦ Control Google Drive. ◦ Shop for you. ◦ Send out emails, leveraging a feature called "background assistant".• Current Focus: It is currently heavily focused on the web, though a mobile app is anticipated, similar to the existing Google Chrome app and Perplexity app.5. Why did Perplexity AI release the Comet browser?Perplexity is doing this to gain market share and compete with major rivals, particularly Google. The current browser market is heavily dominated by Google Chrome, which holds about 72% of the market share (specifically cited as 71.77% to 71.86% recently).6. How is Perplexity AI related to Microsoft and other platforms?Perplexity is closely associated with Microsoft and Bing. The platforms are interconnected, as LinkedIn is also owned by Microsoft. It is noted that Microsoft is also involved with Copilot and is "somewhere in the mix" of OpenAI/ChatGPT content, further connecting it to Comet.7. What are the major concerns regarding security and privacy with agentic AI browsers?The primary concerns revolve around security, privacy, and user adoption. Since the Comet browser can autonomously control browser actions, access Google Drive, and fill out forms, there are questions about how much security is provided.• Data Compromise: One critical concern is that if a company's chosen AI platform (like Comet) lacks necessary security measures, a client could be exposed to a hack, potentially compromising years of hard work.• Lack of Regulation: There is a belief that there is not enough regulation surrounding privacy in the AI space, often favoring convenience and productivity over individual privacy.8. How will AI search browsers impact SEO and business visibility?AI search models are changing how businesses achieve visibility:• Beyond Top 10: AI models are no longer just scanning the top 10 search pages; they are scanning anywhere between 10 to 40 links or sources. Businesses should aim to be in this "Top 40 listing".• Platform Diversity: Visibility is achieved when a brand is interconnected across various platforms, including LinkedIn, YouTube, Google, Pinterest, the website, blogs, videos, audios, and podcasts.• LinkedIn Importance: If Perplexity uses LinkedIn as one of its information sources, having a complete and active LinkedIn profile is significant for search results.• Contextual Content: Content needs to be contextually relevant, moving beyond just typing basic search phrases like "best restaurant near me".• SEO Relevance: SEO remains important; even if AI models like ChatGPT handle e-commerce orders, they are still pulling information from sources with high domain authority, which is based on SEO principles.9. What are the best practices for leveraging AI tools like Comet?Users should adopt a strategic approach when using these new AI tools:• Strategy and Learning: Use AI to strategize, discover different angles, and find solutions to problems you haven't considered. Ask AI how to improve upon an idea or find what is missing from your strategy.• Strategy vs. Dependence: Use AI as a tool to improve yourself and learn, but do not depend on it.• Privacy Protection: Exercise caution regarding privacy. Do not give out personal identifying information (PII) such as your specific address, phone number, or names of family members. Ask general questions instead of highly specific personal ones.• Prompt Awareness: Be aware that all prompts written into ChatGPT are typically indexed into Google unless you change your settings.Digital Marketing SEO Resources:>> ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Join our exclusive SEO Marketing community⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠>> Read SEO Articles>> ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Need SEO Services? Book a Complimentary SEO Discovery Call with Favour Obasi-Ike⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠>> ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Subscribe to the We Don't PLAY Podcast⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    Learn English with Bob the Canadian
    Let's Learn English! Topic: Security Part 2!

    Learn English with Bob the Canadian

    Play Episode Listen Later Oct 5, 2025 22:45


    In this English lesson I will help you learn more words and phrases about security. You'll learn words like: turnstile, surveillance, bag check, badge, ID card, metal detector, x-ray, fingerprint scanner, retina scanner, key card, barrier, bouncer, and many more!Note: This is the audio portion of a Youtube English lesson which you can watch right here: https://www.youtube.com/watch?v=-NrfUfZeh6Q or by searching Youtube for, "Bob the Canadian Security Part 2"

    New York’s Finest: Retired & Unfiltered Podcast
    Off Duty NYPD Detective Pretended to be Trump's Security at Ryder Cup

    New York’s Finest: Retired & Unfiltered Podcast

    Play Episode Listen Later Oct 5, 2025 161:54


    On this episode of New York's Finest : Retired & Unfiltered Podcast John, Eric, Marlon & Steven Lee discuss the off duty NYPD Detective who snuck into the ryder cup and pretended to be part of President Trump's security detail as well as this week in NYC & NYPD news and rumors To Follow The Finest Unfiltered: https://x.com/TheFinestCast https://www.instagram.com/thefinestun... To learn more about us visit us at: Website: https://thefinestunfiltered.com To Purchase a Coffee Mug https://the-finest-unfiltered-podcast.printify.me/product/10258644 If you are interested in purchasing a Finest Unfiltered T-Shirt please visit https://meyersuniforms.com/265-unfiltered-podcast-tee/ For any financial or investment advice please contact LaidLaw Blue at 888-901-2583 (Blue) or visit them online at https://laidlawwealthmanagement.com/laidlaw-blue/ tell them your friends at #TheFinestUnfiltered sent you

    PC Perspective Podcast
    Podcast #838 - Snapdragon X2 Elite Extreme, Another Unlikely Intel Investor, CRT Revivals, Brave Security, EA Buyout + MORE!

    PC Perspective Podcast

    Play Episode Listen Later Oct 4, 2025 85:33


    Matching up the audio this week for a change of pace!  That Snapdragon X2 Elite Extreme sometimes compares favorably, there's a new Kindle Scribe and you will never guess who's coming to the Intel investment party.  Also Microsoft extends security updates for Windows 10 if you live in the right places, and the they're also looking into micro-channel cooling?  All this and so much more!00:00 Intro00:44 Patreon02:33 Food with Josh05:58 Snapdragon X2 Elite Extreme benchmarks11:32 Qualcomm wins final battle with Arm over Oryon14:23 Amazon Kindle Scribe lineup now bigger, offers first color model18:10 LG has world's first 6K TB5 display21:54 Apple might invest in Intel?26:48 Intel 13th and 14th Gen price hike32:03 Microsoft gives in on Windows 10 at the 11th hour - sort of36:42 Microsoft also exploring tiny channels on CPUs for microfluidic cooling42:16 Podcast sponsor Zapier43:36 (In)Security Corner53:52 Gaming Quick Hits1:06:25 Picks of the Week1:23:57 Outro ★ Support this podcast on Patreon ★

    Light 'Em Up
    Securing the Stage: Lessons from the Charlie Kirk Shooting. How to Prepare for and Put on a Large Scale Outdoor Special Event. An In-depth analysis of Special Event Contingency Planning in the Wake of Charlie Kirk's Shooting.

    Light 'Em Up

    Play Episode Listen Later Oct 4, 2025 60:48


    Welcome to this explosive, fact-finding edition of Light ‘Em Up!We're very pleased you decided to join us!With the nation abuzz with the shooting of Charlie Kirk — his shooting recalls a disturbing pattern: Even the champions of “pro-gun” politics are not immune to America's epidemic of gun violence.We've been flooded with requests from our clients to address in-depth Special Event Contingency Planning for Public Safety Agencies — and that's exactly what we are going to do.In an era where public discourse is increasingly polarized and high-profile events carry heightened risk; the shooting of Charlie Kirk raises urgent questions about how we protect both speakers and attendees.This episode explores the intersection of Special Event Contingency Planning and political symbolism, unpacking how public safety agencies can—and must—design protocols that anticipate threats without compromising civil liberties.We examine the anatomy of a well-executed safety plan, the psychological dynamics of radicalized environments, and the strategic blind spots that can turn a rally into a crisis. Whether you're a public safety professional, a communications strategist, or simply someone concerned with the fragile balance between free speech and public harm—this conversation is for you.This episode will provide essential guidance for event planners, speakers and ticket holders/(spectators). This episode is an in-depth, thorough examination of how to keep events like Charlie Kirk's safe, for all involved.Physical Security is the focus of Rizzo's Protective Group, Ltd.As education is always a key pillar of Light ‘Em Up, by the end of this episode if we achieve our learning objectives in full, you will:Understand clearly and be able to:Define what qualifies an event as being “special” and—    Identify for your own edification and knowledge what a special event contingency planning team consists of and looks like.—   You'll be guided in conducting a hazard analysis for a special event.—   You'll hear how the incident command system (ICS) can be used in response to an incident at a special event.—   We'll give examples of special events (providing clear direction on how you must prepare for them as a provider and spectator).Mark my words, clearly, security measures are going to change and change drastically following this incident.Special Event Contingency planning involves creating a formal document with detailed procedures, responsibilities, and actions to address potential emergencies or hazards during a public gathering, such as at a festival, concert, or sporting event.A few of the main aspects, goals and strategies when conducting a thorough hazard analysis are to:—    identify risks,—    develop a response strategy,—    establish a command structure with assigned roles,—    and define communication protocols for both internal and external stakeholders, including attendees and emergency services.—    The primary goal is to prevent injury, suffering, or death by ensuring the event is safe and successful despite unforeseen circumstances.Don't move a muscle!Tune out the world and tune-in to Light ‘Em Up.  Right here and right now!You can listen to us:  on-the-go, at work, home or when resting.Remember that we are here for you and because of you!In a time of uncertainty, facts provide clarity … even if they upset you!This episode is rated “E” for EVERYONE!Tune in and follow our sponsors Newsly and Feedspot!We want to hear from you!

    Grumpy Old Geeks
    716: Release the CrackerBot!

    Grumpy Old Geeks

    Play Episode Listen Later Oct 3, 2025 73:02


    The world is a dumpster fire, confirmed. Following California's landmark AI safety bill SB 53, the head of Nvidia is allegedly "quaking in his boots"—which is a good sign, unlike the news that the "Nirvana Baby" Spencer Elden's lawsuit was finally dismissed. Meanwhile, corporate America continues its pivot to chaos: Spotify shuffled its execs, Meta is charging UK users for ad-free Facebook and Instagram, and the UK is introducing digital ID cards (Hello, Mark of the Beast). The entire internet is now dominated by bots, proving the Cracker Barrel logo outrage was manufactured, a fact that's somehow less depressing than the FCC accidentally leaking iPhone schematics. Naturally, Alphabet just paid $22 million to settle President Trump's YouTube lawsuit, confirming that legal threats are the new VC funding. Disney is panicking over an "AI Actress," sending cease and desist letters to Character.AI, while OpenAI rolls out its new Sora app and ChatGPT's ability to buy things for you, proving it's determined to turn the internet into one seamless, copyright-infringing shopping mall, and it's now worth more than Elon Musk's SpaceX.The ensuing boredom demands new media, though the pacing is terrible in everything: Slow Horses Season 5 and Human: Neanderthal Encounters are great, but even the original Matrix and Frankenstein trailer (by Guillermo del Toro) feel slow, confirming the Princess Bride litmus test. MXV's Riot Fest photos were rad, and Disney lost 1.7M subs after suspending Kimmel, which is why YouTube Music is testing AI hosts (who will only be wrong), and the Pivot Tour is happening. Our Apps & Doohickeys department confirms security is an afterthought: macOS 26 unlocked the Journal app, but the smart glasses race is fully on, and Logitech's new keyboard can be recharged by any light (finally, tech that works!). Amazon Fire TV is expected to ditch Android for Linux, Meta introduced the AI-filled Vibes feed, and Tile trackers were found to have a stalking flaw—a fact only slightly more depressing than the swift failure of the Neon call-recording app and the continued existence of the Comet browser. Finally, The Dark Side with Dave celebrated the low-budget charm of Blue Thunder and the necessity of Disney Park Ride Overlays, while Dave embarked on his quest to unbox the Home Depot R2D2. We thank our patrons for keeping this beautiful noise alive and pay tribute to the amazing Jane Goodall.Sponsors:Private Internet Access - Go to GOG.Show/vpn and sign up today. For a limited time only, you can get OUR favorite VPN for as little as $2.03 a month.SetApp - With a single monthly subscription you get 240+ apps for your Mac. Go to SetApp and get started today!!!1Password - Get a great deal on the only password manager recommended by Grumpy Old Geeks! gog.show/1passwordShow notes at https://gog.show/716FOLLOW UPCalifornia Governor Newsom signs landmark AI safety bill SB 53Nvidia Is Quaking in Its Boots‘Nirvana Baby' Spencer Elden's ‘Nevermind' Suit Dismissed AgainIN THE NEWSSpotify Appoints New CEOs as Daniel Ek Becomes Executive ChairMeta announces paid subscriptions for both Instagram and Facebook in the UKUK announces plans for digital ID cardsOpenAI's New Sora App Lets You Deepfake Yourself for EntertainmentThe First 24 Hours of Sora 2 Chaos: Copyright Violations, Sam Altman Shoplifting, and MoreOpenAI Rolls Out ChatGPT's Ability to Buy Stuff for YouOpenAI Is Now Worth More on Paper Than SpaceX, Catches Up to Elon Musk HimselfDisney sends cease and desist letter to Character.AICreator of “AI Actress” Responds to Near-Universal BacklashFCC accidentally leaked iPhone schematics, potentially giving rivals a peek at company secretsAlphabet will pay $22 million to settle President Trump's YouTube lawsuitCracker Barrel Outrage Was Almost Certainly Driven by Bots, Researchers SayMEDIA CANDYMXV's Riot Fest PhotosSlow Horses Season 5Frankenstein | Guillermo del Toro | Official Trailer | NetflixHuman: Neanderthal EncountersPivot TourYouTube Music is testing AI hosts that present relevant stories, trivia and commentaryHow Many Streaming Subscribers Did Disney Lose After Suspending Kimmel?APPS & DOODADSmacOS 26 unlocks the real potential of Apple's Journal appThe smart glasses race is really on nowLogitech's new keyboard can be recharged by any kind of lightAmazon Fire TV devices expected to ditch Android for Linux in 2025Meta introduces Vibes feed for AI generated contentNeon, an App That Pays to Record Your Phone Calls Hit #2 on the App Store, Taken Down Over Security FlawTile trackers reportedly have a security flaw that can let stalkers track your locationComet - The browser that works for youTHE DARK SIDE WITH DAVEDave BittnerThe CyberWireHacking HumansCaveatControl LoopOnly Malware in the BuildingThe Princess BrideBlue ThunderThe Best Disney Park Ride Overlays, and Where to Find ThemHome Depot R2D2 Unboxing and Assembly!See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    The Highwire with Del Bigtree
    Episode 444: FORBIDDEN FACTS

    The Highwire with Del Bigtree

    Play Episode Listen Later Oct 3, 2025 121:26


    Del Bigtree shares new details on the highly anticipated release of ‘An Inconvenient Study'; Jefferey Jaxen reports on the UK's newly imposed Digital ID mandate, now required for employment; New Book empowers children to think critically; Canadian bill to end eugenics reveals deeper problems; Security expert & author Gavin de Becker exposes government and Big Pharma deception in his explosive new book ‘Forbidden Facts.' Guests: Shannon Kroner, Gavin de Becker Become a supporter of this podcast: https://www.spreaker.com/podcast/the-highwire-with-del-bigtree--3620606/support.

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Friday, October 3rd, 2025: More .well-known Scans; RedHat Openshift Patch; TOTOLINK Vuln;

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Oct 3, 2025 6:35


    More .well-known scans Attackers are using API documentation automatically published in the .well-known directory for reconnaissance. https://isc.sans.edu/diary/More%20.well-known%20Scans/32340 RedHat Patches Openshift AI Services A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, for example, as a data scientist using a standard Jupyter notebook, can escalate their privileges to a full cluster administrator. https://access.redhat.com/security/cve/cve-2025-10725#cve-affected-packages TOTOLINK X6000R Vulnerabilities Paloalto released details regarding three recently patched vulnerabilities in TotalLink-X6000R routers. https://unit42.paloaltonetworks.com/totolink-x6000r-vulnerabilities/ DrayOS Vulnerability Patched Draytek fixed a single memory corruption vulnerability in its Vigor series router. An unauthenticated user may use it to execute arbitrary code. https://www.draytek.com/about/security-advisory/use-of-uninitialized-variable-vulnerabilities

    The Mind4Survival Podcast
    How Much Ammo Do You Need for SHTF?

    The Mind4Survival Podcast

    Play Episode Listen Later Oct 3, 2025 50:51


    How much ammo is enough? This SHTF guide gives minimum and ideal ammo counts for pistols, rifles, and shotguns—no fluff, just facts. The post How Much Ammo Do You Need for SHTF? appeared first on Mind4Survival.

    MoneyWise on Oneplace.com
    10 Financial Mistakes To Avoid

    MoneyWise on Oneplace.com

    Play Episode Listen Later Oct 3, 2025 24:57


    Financial blunders aren't new. Consider this: the web portal Excite once passed on buying Google for just $750,000. Today, Google's parent company is worth over $2 trillion. That, my friends, is a legendary missed opportunity.Most of us won't miss out on trillions, but we've all made financial mistakes. The good news is that God's Word offers wisdom for recovery and direction when we stumble.Learning from FailureScripture reminds us that falling isn't the end for those who walk with God:“For the righteous falls seven times and rises again” (Proverbs 24:16).“For you, O Lord, are good and forgiving, abounding in steadfast love to all who call upon you” (Psalm 86:5).“If any of you lacks wisdom, let him ask of God … and it will be given him” (James 1:5).Failure can be a stepping stone when we let God guide us forward. With that encouragement, here are 10 financial mistakes to avoid—and biblical wisdom to help you course-correct.1. Borrowing from Your 401(k)It feels like “borrowing from yourself,” but it often masks overspending or debt. While repaying, you may miss out on employer matches and the compounding growth that comes with them. Worse, leaving your job could trigger taxes and penalties.2. Claiming Social Security Too EarlyStarting at 62, benefits are reduced by up to 30%—for life. If possible, wait until full retirement age (or beyond) for a larger monthly check that lasts as long as you do.3. Only Paying the Minimum on Credit CardsA $5,000 balance at 20% interest can take nearly a decade to pay off with minimum payments, costing more than $8,000 in interest. Pay extra and utilize debt payoff strategies, such as the snowball or avalanche method.4. Delaying Retirement SavingsCompound interest rewards the early saver. Even small contributions in your 20s can grow into a significant nest egg. Don't panic if you're starting late—just start now.5. Overextending Yourself for Your KidsHelping with college, weddings, or down payments shouldn't jeopardize your own financial stability. Generosity is good, but if you sacrifice retirement now, you may depend on your kids later.6. Going It Alone Without Wise CounselMany sell low during downturns because they lack guidance. Proverbs 15:22 says, “Without counsel plans fail, but with many advisers they succeed.” Seek out wise, faith-based financial advice.7. Co-Signing a LoanScripture warns: “One who lacks sense gives a pledge and puts up security in the presence of his neighbor” (Proverbs 17:18). About 40% of co-signers end up paying the loan themselves. Be wise in your generosity.8. Quitting School Too SoonEducation—whether a four-year degree, trade school, or certification—equips you with marketable skills. Think of it as an investment in your future, not just a cost.9. Buying a TimeshareTimeshares are marketed as affordable luxury, but often come with steep fees, little flexibility, and low resale value. They're rarely the “investment” they claim to be.10. Falling for ScamsScammers prey on fear, urgency, and greed. Whether through fake calls, emails, or investment pitches, their goal is always the same—to separate you from your money. Be vigilant and discerning.Walking Forward in FreedomJesus warned His disciples: “I am sending you out as sheep in the midst of wolves, so be wise as serpents and innocent as doves” (Matthew 10:16).Wise stewardship isn't about never failing—it's about learning, leaning on God's wisdom, and moving forward faithfully. With His help, you can recover from mistakes and grow into a more faithful steward of His resources.———————————————————————————————————————At FaithFi, we believe money is a tool to advance God's Kingdom. When you partner with us, you help more people discover the freedom of biblical stewardship and the joy of seeing God as their ultimate treasure.Become a FaithFi Partner today with your gift of $35/month or $400/year, and you'll receive:Early access to devotionals and studiesOur quarterly Faithful Steward magazineThe Pro version of the FaithFi appTogether, we can live as wise stewards and help others do the same.On Today's Program, Rob Answers Listener Questions:I have a 401(k) from a former employer, and I'm thinking of rolling it into a traditional IRA. Is that wise? And can I withdraw some cash during the transfer without incurring a penalty?I purchased a house in 2019 and now require a loan of $20,000–$30,000 to address basement flooding. What's the best loan option?I'm almost 80 and want to close several credit card accounts. How much would that hurt my credit score?I hold CDs jointly with my sister, but we're worried she could be liable if I get sued. Should I change the ownership before they mature?I'm considering joining Christian Community Credit Union, but I noticed that it isn't FDIC insured. Should that be a concern?Resources Mentioned:Faithful Steward: FaithFi's New Quarterly Magazine (Become a FaithFi Partner)Christian Community Credit Union (CCCU)Wisdom Over Wealth: 12 Lessons from Ecclesiastes on MoneyLook At The Sparrows: A 21-Day Devotional on Financial Fear and AnxietyRich Toward God: A Study on the Parable of the Rich FoolFind a Certified Kingdom Advisor (CKA) or Certified Christian Financial Counselor (CertCFC)FaithFi App Remember, you can call in to ask your questions most days at (800) 525-7000. Faith & Finance is also available on the Moody Radio Network and American Family Radio. Visit our website at FaithFi.com where you can join the FaithFi Community and give as we expand our outreach. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Irish Times Inside Politics
    Jack Chambers channels 'Margaret Thatcher' as 'big squeeze budget' looms

    Irish Times Inside Politics

    Play Episode Listen Later Oct 3, 2025 49:14


    Pat Leahy and Jack Horgan-Jones join Hugh Linehan to talk about the week in politics: We already know next Tuesday's budget is going to be a much less generous affair than recent years. Jack and Pat share what they know about the tough stance being taken by Ministers Paschal Donohoe and Jack Chambers in negotiations, including one Government source's characterisation of Chambers as akin to Margaret Thatcher: “no, no, no”. Of the three presidential hopefuls, Catherine Connolly has run the strongest campaign so far. But could the news that she employed a woman convicted of firearms offences hinder her in gathering the votes she needs?Fianna Fáil candidate Jim Gavin's campaign also made some missteps this week, hampering the novice politician's campaign as it finds its feet. Security issues are at the top of the European agenda thanks to the ongoing war in Ukraine and the fear of Russian cyberattacks and drone incursions. Finally the panelists pick their favourite Irish Times journalism of the week including Senator Michael McDowell's explanation for why he didn't nominate Maria Steen, the passing of Martin Mansergh and a relatable personal problem. Hosted on Acast. See acast.com/privacy for more information.

    FreightCasts
    Running on Ice | Food service distribution security with Surfact

    FreightCasts

    Play Episode Listen Later Oct 3, 2025 25:15


    In this episode, we dive into the adaptability of the food distribution industry to temperature tracking. Our guest, Per Mange, CEO and founder of Surfact, breaks down the intricacies of the food distribution network and what's next for additional temperature-controlled industries. For more information, subscribe to ⁠Running on Ice the newsletter⁠ or podcast. ⁠Follow the Running on Ice Podcast⁠ ⁠Other FreightWaves Shows⁠ Learn more about your ad choices. Visit megaphone.fm/adchoices

    Two Girls One Ghost
    Encounters x301 - Paranormal Evidence: Photos, Videos & EVPs

    Two Girls One Ghost

    Play Episode Listen Later Oct 2, 2025 56:57


    Happy haunt season, ghouls! We're kicking off October with a TON of paranormal evidence—ghost photos, videos and EVPs. This time, every single story comes with proof so you can see and hear the paranormal activity for yourself. Get ready for goosebumps, giggles, and the kind of evidence that makes you want to leave the lights on. Stories Include: At the Winchester Mystery House, a video captures a woman in white drifting past a window, complete with an EVP whispering, “I miss this house.” A roommate's demonic attachment makes itself known through hair pulling and an unnerving snapshot with glowing eyes. A tour of the notoriously haunted SK Pierce Mansion ends with strange energy shifts, payment glitches, and a chilling face appearing in a window photo. From the infamous Sally House, a recorder plays back an eerie little girl's singing while the house was empty. Security footage from a Pennsylvania shop shows unexplained glowing shapes floating through the room like ghostly fish. We laughed, we screamed, and we realized ghosts might be better at selfies than we are. Get tickets to the October 8th live show here. Watch the video version here. Have ghost stories of your own? E-mail them to us at twogirlsoneghostpodcast@gmail.com New Episodes are released every Thursday and Sunday at 12am PST/3am EST (the witching hour, of course). Corinne and Sabrina hand select a couple of paranormal encounters from our inbox to read in each episode, from demons, to cryptids, to aliens, to creepy kids... the list goes on and on. If you have a story of your own that you'd like us to share on an upcoming episode, we invite you to email them to us!  If you enjoy our show, please consider joining our Patreon, rating and reviewing on iTunes & Spotify and following us on social media! Youtube, Instagram, TikTok, Facebook, and Discord. Edited by Jaimi Ryan and produced by Emma Leventer and Jaimi Ryan, original music by Arms Akimbo! Disclaimer: the use of white sage and smudging is a closed practice. If you're looking to cleanse your space, here are some great alternatives! Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Wake Up Warchant
    (10/2/25): Keys to victory vs. Miami, FSU dominates TV ratings, coaching security

    Wake Up Warchant

    Play Episode Listen Later Oct 2, 2025 65:16


    (2:00) Sounds like Norvell, players embracing intensity, emotions of rivalry clash(8:00) Hot seat talk to resume if FSU loses to Miami?(22:00) Will FSU be able to exact proper revenge on Miami in the playoff era?(37:00) Totem pole of ACC QBs(46:00) Keys to victory(48:00) Over/under(54:00) FSU dominates TV ratingsMusic: Taking Back Sunday - Miamivitaminenergy.com | PROMO: warchantbogo | buy one, get one free!Get 10% off TUSHY with the code WARCHANT at https://hellotushy.com/WARCHANT  Download the  Underdog app today and sign up with promo code WARCHANT to score fifty dollars in Bonus Funds when you play your first five dollars. Must be 18+ (19+ in Alabama & Nebraska; 19+ in Colorado for some games; 21+ in Arizona, Massachusetts & Virginia) and present in a state where Underdog Fantasy operates. Terms apply. See assets.underdogfantasy.com/web/PlayandGetTerms_DFS_.html for details. Offer not valid in Maryland, Michigan, Ohio, and Pennsylvania. Concerned with your play? Call 1-800-GAMBLER or visit www.ncpgambling.org. In New York, call the 24/7 HOPEline at 1-877-8-HOPENY or Text HOPENY (467369) Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Thursday, October 2nd, 2025: Honeypot Passwords; OneLogin Vuln; Breaking Intel SGX; OpenSSL Patch

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Oct 2, 2025 8:11


    Comparing Honeypot Passwords with HIBP Most passwords used against our honeypots are also found in the Have I been pwn3d list. However, the few percent that are not found tend to be variations of known passwords, extending them to find likely mutations. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Comparing%20Honeypot%20Passwords%20with%20HIBP/32310 Breaking Server SGX via DRAM Inspection By observing read and write operations to memory, it is possible to derive keys stored in SGX and break the security of systems relying on SGX. https://wiretap.fail/files/wiretap.pdf OneLogin OIDC Vulnerability A vulnerability in OneLogin can be used to read secret application keys https://www.clutch.security/blog/onelogin-many-secrets-clutch-uncovers-vulnerability-exposing-client-credentials OpenSSL Patch OpenSSL patched three vulnerabilities. One could lead to remote code execution, but the feature is used infrequently, and the exploit is difficult, according to OpenSSL

    Bearing Arms' Cam & Co
    Florida Senators Hopes to Aid Volunteer Armed Security in Houses of Worship

    Bearing Arms' Cam & Co

    Play Episode Listen Later Oct 2, 2025 24:26


    Cam details a new bill that should make it a little easier for houses of worship to adopt formal security plans involving armed parishioners.

    The Jesse Kelly Show
    Hour 2: Bored Security

    The Jesse Kelly Show

    Play Episode Listen Later Oct 1, 2025 37:20 Transcription Available


    Being a bored security guard. The difference between doing security and doing security well. Why our military standards must change. What major power currently has the most experience? China is gearing up to take Taiwan. India vs Somalia. Follow The Jesse Kelly Show on YouTube: https://www.youtube.com/@TheJesseKellyShowSee omnystudio.com/listener for privacy information.

    Breaking Points with Krystal and Saagar
    9/30/25: Trump Bibi Gaza Deal, Gov Shutdown Imminent, Epstein Brokered Israel Security Deal, Pro Israel War To Replace Kirk

    Breaking Points with Krystal and Saagar

    Play Episode Listen Later Sep 30, 2025 104:57 Transcription Available


    Krystal and Saagar discuss Trump and Bibi announce Gaza deal, Hamas leaders negative on Gaza plan, gov shutdown imminent, Epstein brokered Israeli security agreement, pro Israel war to replace Kirk. Jeremy Scahill: https://x.com/jeremyscahill To become a Breaking Points Premium Member and watch/listen to the show AD FREE, uncut and 1 hour early visit: www.breakingpoints.comMerch Store: https://shop.breakingpoints.com/See omnystudio.com/listener for privacy information.