Degree of resistance to, or protection from, harm
POPULARITY
Send us a textWhile I'll resist drawing comparisons about industrial cybersecurity to butterflies and bees, producing this episode did remind me of another great Muhammad Ali quote: "The hands can't hit what the eyes can't see.”This could provide an easy segue into the ongoing challenges about asset visibility, but really, it goes a bit deeper than that. In addition to being able to see all the things we need to defend against, we also have to understand what to look for in establishing those defenses. In this episode, we discuss these challenges and solutions with Bryson Bort, the founder and CEO of SCYTHE, a leading provider of Adversarial Exposure Validation (AEV) solutions. Watch/listen as we also discuss:The increasing impact of hacktivists.The rise of ransomware gangs.What AEV is all about.Why there is no such thing as an accidental hack.The human impact on cybersecurity and why it is rarely the human's fault.How his former military life has impacted his cybersecurity career.Why supply chains could be the most important threat landscape going forward.To check out the work he and his colleagues are up to, you can go to scythe.io, as well as icsvillage.com.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Send us a textUptime. It's the lifeblood of manufacturing and the precise target of industrial sector hackers. By knocking systems offline, stealing credentials, holding data for ransom, or crippling supply chains, the bad guys know their ultimate goals of disruption or extortion will be realized.And as we've discussed numerous times here on Security Breach, keeping these bad actors out has become more and more difficult as new technology, connectivity and endpoints are added to the OT landscape.Hackers are getting smarter and more complex, but the good news is so are the tools and strategies for the good guys. Here to offer some perspective on dealing with the leading threats targeting the people, systems and data of the industrial sector is a collection of experts focused on minimizing disruptions and preparing you to react and respond to cyberattacks.Watch/listen as:Max Clausen, senior VP of Network Connectivity at Zayo dives into the factors and strategies driving DDoS or distributed denial of service attacks.John Carse, Field CISO at SquareX discusses the ongoing impact of developing and legacy vulnerabilities, as well as some of the novel strategies hackers are using to introduce new strands of highly disruptive malware.Amit Hammer, CEO of Salvador Tech talks about lessons learned from the recent Jaguar Land Rover attack and how response strategies will continue to play a key role in minimizing attack-related downtime.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
Welcome to Spitting Nonsense—where two self-proclaimed amateurs, Jasmine and Zach, chat about all things nerdy (and plenty that's not). None of this is fact, but it's definitely our brand of nonsense! We're still recording regularly—no promises on hitting exact days anymore—but you can always count on us for plenty of off-the-wall commentary. And now, you can leave comments on Spotify! Tell us what's on your mind; we see every comment and might even respond on the show. Thanks for listening, and enjoy the nonsense!
The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive for federal agencies to update their F5 products following a significant breach where hackers accessed source code and undisclosed vulnerabilities. This incident, discovered in August, poses a serious risk to federal networks, as the threat actor could exploit these vulnerabilities to gain unauthorized access and exfiltrate sensitive data. Agencies are required to apply the latest updates by October 22nd and report their F5 deployments by October 29th, highlighting the urgency of addressing these security concerns.In a related development, the National Institute of Standards and Technology (NIST) is encouraging federal agencies to take calculated risks with artificial intelligence (AI) under new federal guidance. Martin Stanley, an AI and cybersecurity researcher, emphasized the importance of risk management in AI deployment, particularly in comparison to more established sectors like financial services. As agencies adapt to this guidance, they must identify high-impact AI applications that require thorough risk management to ensure both innovation and safety.A report from Cork Protection underscores the need for small and medium-sized businesses (SMBs) to adopt a security-first approach in light of evolving cyber threats. Many SMBs remain complacent, mistakenly believing they are not targets for cybercriminals. The report warns that this mindset, combined with the rising financial risks associated with breaches, necessitates a shift towards a security-centric operational model. The cybersecurity services market is projected to grow significantly, presenting opportunities for IT service providers that prioritize security.Apple has announced a substantial increase in its bug bounty program, now offering up to $5 million for critical vulnerabilities. This move reflects the growing importance of addressing security challenges within its ecosystem, which includes over 2.35 billion active devices. The company has previously awarded millions to security researchers, emphasizing its commitment to user privacy and security. As the landscape of cybersecurity evolves, managed service providers (MSPs) are urged to tighten vendor monitoring, incorporate AI risk assessments, and focus on continuous assurance to meet the increasing demands for security. Three things to know today00:00 Cybersecurity Crossroads: F5 Breach, AI Risk, and Apple's $5M Bug Bounty Signal Security Accountability06:44 Nearly a Third of MSPs Admit to Preventable Microsoft 365 Data Loss, Syncro Survey Finds09:22 AI Reality Check: Workers' Overconfidence, Cheaper Models, and Microsoft's Scientific Breakthrough Signal Maturity in the Market This is the Business of Tech. Supported by: https://mailprotector.com/mspradio/
Send us a textWhile there are plenty to pick from, one of the biggest challenges for cybersecurity professionals in the industrial realm can be getting financial support. In manufacturing there are always a number of viable spending options, and working to make cybersecurity a priority can be tough, especially when enterprises are faced with initiatives seen as more fundamental to the core mission of getting finished product out the door.However, a couple of recent reports could help connect the dots between production and security, and the need to fund both.First, there's Adaptiva's State of Patch Management Report that found 75 percent of manufacturing companies have critical vulnerabilities with a CVSS score of 8 or higher, and 65 percent have at least one vulnerability listed in the CISA Known Exploited Vulnerabilities Catalog. So, hackers know about these weaknesses and they're taking advantage of them.And, according to Black Kite's 2025 Manufacturing Report, 51 percent of those surveyed indicate that patching has become a bigger challenge than intrusion detection, and more than 75 percent indicate that both IT and security must approve patches before deployment.Reading between the lines – patching takes too long and is too complicated, so the vulnerabilities persist and the hackers keep winning.Watch/listen as we discuss these and other topics with Chaz Spahn, the Director of Product Management at Adaptiva. As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
Plus: Bank of America highlights continued momentum from tech and artificial intelligence investments. And ASML logs better-than-expected orders amid continued AI frenzy. Finally, Workday plans to set up an AI-focused research center in Ireland. Julie Chang hosts. Learn more about your ad choices. Visit megaphone.fm/adchoices
Send us a textWhen talking to the experts and leading authorities that have participated in the 140+ episodes of Security Breach, there's always a slight pause when directing their attention specifically to the industrial sector. That's because, well, we're special. There's the unique juxtaposition of old and bleeding edge technology. There's the influx of greater connectivity combatting the struggles to identify and secure the growing number of endpoints. And there are the ongoing battles related to secure-by-design responsibilities, cloud networks and the ever popular building and breaking down of IT/OT silos. The good news is that we're getting better. Better at identifying the problems and better at elevating solutions from some of the sharpest minds in the sector. And we're fortunate to be able share these insights from an incredible collective on today's episode.Watch/listen as Max Clausen, senior VP of Network Connectivity at Zayo, John Carse, Field CISO at SquareX, Sophos' Chester Wisniewski and ExtraHop's Chad Lemaire tackle topics that include:VisibilitySecure-by-DesignArtificial IntelligenceIT/OT SilosPatchingLOTL and Phishing AttacksNon-standard OT ArchitectureAs a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
How do you know if one of your accounts has been part of a security breach? Richard chats with Troy Hunt about HaveIBeenPwned, a free service that allows individuals to receive notifications when their accounts appear in a security breach. Troy discusses other services available alongside HaveIBeenPwned for sysadmins, including password checking, identifying accounts associated with a specific domain, and more. When considering the cost of managing a customer with an exploited account, being able to prevent or mitigate potential risk is highly valuable. LinksHaveIBeenPwnedPark Mobile SettlementSnowflake Data BreachRecorded September 25, 2025
I know that we're constantly talking about artificial intelligence - the best ways to use it, the ways hackers are using it, and the overall good, bad and ugly of implementing AI into your security infrastructure.But what if we took a little different route.In this episode we're going to explore how AI can help make your people better at managing cybersecurity. We know there's a huge talent pool shortage, and the challenges of keeping employees vigilant against repeated attacks continues to grow.So, watch/listen as I explore these dynamics, well as many others, with Grant Oviatt - Head of Security Operations for Prophet Security – a company that recently unveiled their State of AI in SecOps 2025 research report. A lot of the data from the report was rather shocking, especially when the survey repeatedly uncovered how many SOCs, inundated with constant intrusion alerts, have experienced numerous breaches simply because the volume of critical alert notifications has made them easier to ignore.It was a great conversation, with numerous takeaways, including:Why 60 percent of security teams have experienced critical breaches stemming from overlooked alerts.How security leaders anticipate AI solutions handling more tasks within the SOC over the next 3 years.Reasons for 57 percent of organizations deliberately suppressing detection rules and accepting higher risks to keep operations moving.How hackers are using AI beyond just phishing campaigns to get access to critical assets and networks.How the industrial sector can better implement AI without yielding to internal pressures.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
Clement speaks to Vicki Turner for a global snapshot of the stories making headlines. In Paris, French President Emmanuel Macron has announced that 26 countries — dubbed the “Coalition of the Willing” — have pledged to send land, air, and sea troops to Ukraine as part of a reassurance force, but only after a peace deal is signed with Russia. Meanwhile, tributes are pouring in from around the world following the death of legendary fashion designer Giorgio Armani, who passed away at the age of 91. And in the UK, chaos erupted in the House of Commons after a mobile phone playing sex noises was planted near the front bench during Prime Minister’s Questions — a stunt now under serious security investigation. 702 Breakfast with Bongani Bingwa is broadcast on 702, a Johannesburg based talk radio station. Bongani makes sense of the news, interviews the key newsmakers of the day, and holds those in power to account on your behalf. The team bring you all you need to know to start your day Thank you for listening to a podcast from 702 Breakfast with Bongani Bingwa Listen live on Primedia+ weekdays from 06:00 and 09:00 (SA Time) to Breakfast with Bongani Bingwa broadcast on 702: https://buff.ly/gk3y0Kj For more from the show go to https://buff.ly/36edSLV or find all the catch-up podcasts here https://buff.ly/zEcM35T Subscribe to the 702 Daily and Weekly Newsletters https://buff.ly/v5mfetc Follow us on social media: 702 on Facebook: https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/Radio702 702 on YouTube: https://www.youtube.com/@radio702 See omnystudio.com/listener for privacy information.
Clement speaks to Vicki Turner for a global snapshot of the stories making headlines. In Paris, French President Emmanuel Macron has announced that 26 countries — dubbed the “Coalition of the Willing” — have pledged to send land, air, and sea troops to Ukraine as part of a reassurance force, but only after a peace deal is signed with Russia. Meanwhile, tributes are pouring in from around the world following the death of legendary fashion designer Giorgio Armani, who passed away at the age of 91. And in the UK, chaos erupted in the House of Commons after a mobile phone playing sex noises was planted near the front bench during Prime Minister’s Questions — a stunt now under serious security investigation. 702 Breakfast with Bongani Bingwa is broadcast on 702, a Johannesburg based talk radio station. Bongani makes sense of the news, interviews the key newsmakers of the day, and holds those in power to account on your behalf. The team bring you all you need to know to start your day Thank you for listening to a podcast from 702 Breakfast with Bongani Bingwa Listen live on Primedia+ weekdays from 06:00 and 09:00 (SA Time) to Breakfast with Bongani Bingwa broadcast on 702: https://buff.ly/gk3y0Kj For more from the show go to https://buff.ly/36edSLV or find all the catch-up podcasts here https://buff.ly/zEcM35T Subscribe to the 702 Daily and Weekly Newsletters https://buff.ly/v5mfetc Follow us on social media: 702 on Facebook: https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/Radio702 702 on YouTube: https://www.youtube.com/@radio702 See omnystudio.com/listener for privacy information.
Now that we have a definitive backstory for the Mimic, we now have the answers we've been dying to understand for years. What is the Mimic's goal? What is the deal with MXES? Why was the lore of Security Breach so confusing in the first place? Join Game Theory Host Tom as he plummets down into the depths of Murray's Costume Manor to discover the REAL Secret of the Mimic!
The Rich Zeoli Show- Hour 3: 5:05pm- Susan Crabtree—RealClearPolitics National Political Correspondent & Author of the book, “Fools Gold: The Radicals, Con Artists, and Traitors Who Killed the California Dream and Now Threaten Us All”—joins The Rich Zeoli Show to discuss her latest report of a security breach on President Donald Trump's Scotland trip. Crabtree writes, “A Dallas USSS special agent tried to smuggle his wife on a Secret Service car plane accompanying President Trump's security detail to Scotland.” 5:20pm- While speaking in Canton, Ohio, Vice President JD Vance addressed a viral video clip featuring several people being beaten by mobs during a Cincinnati music festival. Vance stated: "Take the thugs who engaged in that violence and throw their asses in prison." 5:40pm- Is Matt a coward for not showing the entire Cincy fight on YouTube? The audience votes “yes!”
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In today's episode, we're answering as many questions as possible in the lead-up to the release of Secret of the Mimic. -------------------------------------------------------------------------------------------Use code RYETOAST at https://gamersupps.gg/ryetoast for 10% off your WHOLE ORDER!!!------------------------------------------------------------------------------------------To submit questions, theories, and creator collab requests, email at: FreddyFazbearPizzaPodcast@gmail.com --------------------------------------------------------------------------------------------------Intro/Outro music by: @Miri789 Thumbnail template by BarBADroid!https://barbadroid.carrd.coFreddy Fazbear Pizza Podcast is YOUR premiere FNAF podcast available everywhere!Youtube: https://youtube.com/playlist?list=PLlGAFKgA2Ax_6MKnuaq5ApBgC8osKW4Dx&si=jB2ja5c4k_OnCZQQSpotify: https://open.spotify.com/show/1a65iwRRAQylxb9EtRWmsdApple Music: https://podcasts.apple.com/us/podcast/freddy-fazbear-pizza-podcast/id1705899138Amazon Music: https://music.amazon.com/podcasts/4c77d1d8-077d-463d-b48e-21280279e281/freddy-fazbear-pizza-podcast--------------------------------------------------------------------------------------------------Wanna get me something? https://throne.com/ryetoastHere are all my socials and ways to support the channel!https://ryetoast.carrd.coJoin our growing community on discord! https://discord.gg/azPjrGGdBY-----------------------------------------------------------------------------------------------------------------------For Brand Deals and Sponsorships, contact: ryetoast@apollomgmt.co-------------------------------------------------------------------------------------------------Timestamps:00:00 Cold Open and Housekeeping05:21 Question: Could Fazbear have created the Murray Co inventions?09:39 Question: What would your hopes for a Nintendo Mascot Horror game be?12:20 Question: What's the deal with Shadow Freddy and RWQ?17:06 Question: Why are Fredbear and a Blue Bonnie together on the MCM mural?20:25 Question: What's the deal with the Security Breach silo?23:40 Question: Was the Mask Roxy has the real security node?26:26 Question: How important are Sun and Moon?28:23 Question: Were the springlock suits originally made to be worn by the mimic?30:00 Question: Why is Pigpatch in Help Wanted 2?32:20 Reminiscing
Chilling Tales for Dark Nights: A Horror Anthology and Scary Stories Series Podcast
When the doors close and the night shift begins, who's really keeping watch? In this unnerving new episode of Chilling Tales for Dark Nights, host Steve Taylor beckons you past the flickering lights of a shuttered shopping mall, into a world where silence isn't empty—and routine is anything but safe. Featuring the return of acclaimed narrator Dr. Creepen, “Security Breach” is a descent into fluorescent purgatory, where identity frays, shadows lie, and something with your face may be waiting just beyond the next security feed. Step inside for a tale that haunts by degrees—quietly at first, then all at once. Just be sure to remember the way out. You may need it. To watch the podcast on YouTube: http://bit.ly/ChillingEntertainmentYT Don't forget to subscribe to the podcast for free wherever you're listening or by using this link: http://bit.ly/ChillingTalesPod If you like the show, telling a friend about it would be amazing! You can text, email, Tweet, or send this link to a friend: http://bit.ly/ChillingTalesPod Learn more about your ad choices. Visit podcastchoices.com/adchoices
Browny’s souvlaki scoffing world record, Rhino's investigation: Can Stevie J become a quiz master? | Footy Rhino's Footy News: Carlton mess, Brad Lloyd, Dean Cox & the new Lions ruckman? | Crows assistant coach Nathan Van Berlo | Gold Coast skipper Noah Anderson joins us | Daisy breaches Triple M security | The Random Top 5 - Stevie J's best moments of 2025 | Richmond's Jayden Short live in studio: his piercings, calf injury & looking good | Hitch Your Caravan - Trumps classic F-bomb | All the Good, Bad & Ugly from round 16 | Stevie J caught telling porky pies on airSee omnystudio.com/listener for privacy information.
In this episode of 'Cybersecurity Today,' host Jim Love discusses several alarming cybersecurity developments. A recent Washington Post breach raises critical questions about Microsoft 365's enterprise security as foreign government hackers compromised the email accounts of journalists. Additionally, a critical Linux flaw allows attackers to gain root access, making millions of systems vulnerable. Upgraded Godfather malware now creates virtual banking apps on infected Android devices to steal credentials in real-time. Moreover, a record-breaking data breach has exposed 16 billion logins, including Apple accounts, underscoring the fundamental flaws of password-based security. Finally, the episode addresses the systemic vulnerabilities of SMS-based two-factor authentication, advocating for a transition to app-based or hardware key solutions. 00:00 Introduction and Major Headlines 00:24 Microsoft 365 Security Breach 03:19 Critical Linux Vulnerabilities 05:59 Godfather Malware Evolution 08:18 Massive Data Breach Exposed 11:30 The Fall of SMS Two-Factor Authentication 13:21 Conclusion and Final Thoughts
In today's episode, we cover UK MPs approving assisted dying legislation, Europe pushing for diplomacy with Iran, a security breach at the UK's largest air base, and divisions over a new NATO spending targetWatch TLDR's latest videos here (YouTube):https://www.youtube.com/watch?v=k7KavbLybKYhttps://www.youtube.com/watch?v=6lTs4S3PXBUWatch TLDR's latest videos here (Nebula):https://nebula.tv/videos/tldrnewsglobal-could-a-secret-nuclear-deal-bring-peace-to-iranhttps://nebula.tv/videos/tldrnewseu-why-czechias-government-is-doomedTLDR's Daily Briefing is a roundup of the day's most important news stories from around the world. But we don't just tell you what's happening, we explain it: making complex topics simple to understand. Listen to the Daily Briefing for your global news bulletin every weekday.Pre-order the next edition of Too Long, TLDR's print magazine, here: https://toolong.news/dailyProduced and edited by Scarlett WatchornHosted byWritten by Ben Blissett and Rory TaylorMusic by Epidemic Sound: http://epidemicsound.com/creator//////////////////////////////Sources:✍️ Britain Approves Assisted Dyinghttps://www.bbc.co.uk/news/live/cg4ry0pge4kt?page=3https://www.telegraph.co.uk/politics/2025/06/20/assisted-dying-terminally-ill-adults-bill-house-of-commons/✍️ Europe Pushes for Diplomacy with Iranhttps://www.reuters.com/world/europe/europeans-try-coax-iran-back-diplomacy-trump-considers-strikes-2025-06-20/ https://apnews.com/article/israel-palestinians-iran-war-latest-06-20-2025-7c3307c446da24fb8f8ac038e93b9b85 ✍️ Security Breach at UK's Largest Air Basehttps://www.theguardian.com/world/2025/jun/20/pro-palestine-protesters-deface-two-aircraft-raf-brize-nortonhttps://www.bbc.co.uk/news/articles/cx24nppdx0lo ✍️ Upcoming NATO Summithttps://apnews.com/article/nato-defense-spending-budgets-trump-summit-2be81058f43461cb431747d2b964a8f0https://www.euronews.com/my-europe/2025/06/19/spains-pm-pedro-sanchez-rejects-natos-5-of-gdp-spending-plan-as-unreasonable See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
In this episode of 'Cybersecurity Today', host Jim Love is joined by panelists Laura Payne from White Tuque and David Shipley from Beauceron Security to review significant cybersecurity events over the past month. The discussion covers various impactful stories such as the disappearance of a professor, a data breach at Hertz, and government officials using a commercial app during a conflict. They dive deep into the ransomware attack on PowerSchool and its implications for K-12 schools in North America. The conversation also highlights the vulnerability of critical infrastructures, including the food supply chain and the importance of robust cybersecurity measures. Finally, the panel touches upon the progression towards post-quantum encryption by major tech companies like AWS and Google, signaling advancements in securing future technologies. 00:00 Introduction and Panelist Welcome 00:20 Major Cybersecurity Incidents of the Month 02:04 PowerSchool Data Breach Analysis 04:11 Ransomware and Double Extortion Tactics 12:20 4chan Security Breach and Its Implications 16:31 Hertz Data Loss and Retail Cybersecurity 17:44 Critical Infrastructure and Cyber Regulation 27:03 The Importance of CVE Database 27:54 Debate on Vulnerability Scoring 30:17 Open Source Software and Geopolitical Risks 31:43 The Evolution and Challenges of Open Source 37:17 The Need for Software Regulation 46:50 Signal Gate and Compliance Issues 54:08 Post-Quantum Cryptography 56:10 Conclusion and Final Thoughts
Cardinals began the ancient and secret tradition of electing a new Pope. After the first vote, black smoke indicated that a new Pope had not been chosen.And: School boards that were subject to a data breach last year notify parents that a ransom was paid, but sensitive data was not deleted.Also: In a league of her own. One of Japan's top female baseball stars gets set to take the mound for a pro men's team in Canada.Plus: PM Carney speaks to premiers after D.C. trip, India and Pakistan on the brink of a bigger conflict, the troubling warning about the effects of future climate events, and more.
The National Labor Relations Board protects workers' right to organize and investigates unfair labor practices. A whistleblower complaint filed by an IT staffer claims Elon Musk and his DOGE team gained access to sensitive data that could have led directly to a “significant cybersecurity breach.” Amna Nawaz discussed more with NLRB whistleblower Daniel Berulis and attorney Andrew Bakaj. PBS News is supported by - https://www.pbs.org/newshour/about/funders
In today's episode, we cover the FNAF Timeline from FNAF 6 to Security Breach! GET A MARQ PLUSHIE https://www.makeship.com/products/marq-plushie-------------------------------------------------------------------------------------------To submit questions, theories, and creator collab requests, email at: FreddyFazbearPizzaPodcast@gmail.com --------------------------------------------------------------------------------------------------Intro/Outro music by: @Miri789 Thumbnail template by BarBADroid!https://barbadroid.carrd.coFreddy Fazbear Pizza Podcast is YOUR premiere FNAF podcast available everywhere!Youtube: https://youtube.com/playlist?list=PLlGAFKgA2Ax_6MKnuaq5ApBgC8osKW4Dx&si=jB2ja5c4k_OnCZQQSpotify: https://open.spotify.com/show/1a65iwRRAQylxb9EtRWmsdApple Music: https://podcasts.apple.com/us/podcast/freddy-fazbear-pizza-podcast/id1705899138Amazon Music: https://music.amazon.com/podcasts/4c77d1d8-077d-463d-b48e-21280279e281/freddy-fazbear-pizza-podcast--------------------------------------------------------------------------------------------------Wanna get me something? https://throne.com/ryetoastHere are all my socials and ways to support the channel!https://ryetoast.carrd.coJoin our growing community on discord! https://discord.gg/azPjrGGdBY-----------------------------------------------------------------------------------------------------------------------For Brand Deals and Sponsorships, contact: ryetoast@apollomgmt.co-------------------------------------------------------------------------------------------------
In today's episode, we cover the FNAF Timeline from Security Breach to the END! Glamrock Bonnie Theory! https://www.reddit.com/r/fivenightsatfreddys/comments/17xjkhp/ive_found_glamrock_bonnies_killer_i_can_prove_it/GET A MARQ PLUSHIE https://www.makeship.com/products/marq-plushie-------------------------------------------------------------------------------------------To submit questions, theories, and creator collab requests, email at: FreddyFazbearPizzaPodcast@gmail.com --------------------------------------------------------------------------------------------------Intro/Outro music by: @Miri789 Thumbnail template by BarBADroid!https://barbadroid.carrd.coFreddy Fazbear Pizza Podcast is YOUR premiere FNAF podcast available everywhere!Youtube: https://youtube.com/playlist?list=PLlGAFKgA2Ax_6MKnuaq5ApBgC8osKW4Dx&si=jB2ja5c4k_OnCZQQSpotify: https://open.spotify.com/show/1a65iwRRAQylxb9EtRWmsdApple Music: https://podcasts.apple.com/us/podcast/freddy-fazbear-pizza-podcast/id1705899138Amazon Music: https://music.amazon.com/podcasts/4c77d1d8-077d-463d-b48e-21280279e281/freddy-fazbear-pizza-podcast--------------------------------------------------------------------------------------------------Wanna get me something? https://throne.com/ryetoastHere are all my socials and ways to support the channel!https://ryetoast.carrd.coJoin our growing community on discord! https://discord.gg/azPjrGGdBY-----------------------------------------------------------------------------------------------------------------------For Brand Deals and Sponsorships, contact: ryetoast@apollomgmt.co
This Week's Guests: MSNBC Legal Analyst - Danny Cevallos Episode 353 Danny Cevallos is an MSNBC legal analyst who practices in the areas of personal injury, wrongful conviction and criminal defense in Pennsylvania, New York and the U.S. Virgin Islands at the law firms of Cevallos & Wong in Pennsylvania and Edelman & Edelman in New York, where he is of counsel. "Rethink Production presents "Live From America Podcast" - a weekly show that combines political commentary with humor. Hosted by the comedy cellar owner Noam Dworman and producer Hatem Gabr, the show features expert guests discussing news, culture, and politics with a blend of knowledge and laughter. Follow Live From America YouTube @livefromamericapodcast twitter.com/AmericasPodcast www.LiveFromAmericaPodcast.com LiveFromAmericapodcast@gmail.com Follow Hatem Twitter.com/HatemNYC Instagram.com/hatemnyc/ Follow Noam Twitter.com/noam_dworman #DOGE #SignaLeak #Deportation
Tonight's rundown: Hey BillOReilly.com Premium and Concierge Members, welcome to the No Spin News for Wednesday, March 26, 2025. Stand Up for Your Country. Talking Points Memo: The latest on National Security Advisor Mike Waltz accidentally letting liberal journalist Jeffrey Goldberg into a meeting about the Houthis. Professor Roy Gutterman, Director of the Tully Center for Free Speech, joins No Spin News to discuss whether the security breach should be considered a scandal and give his views on the current state of the media. President Trump signs an executive order to change election rules, focusing on citizenship and mail-in voting. Bill looks at the recent outrageous things said by Democratic Representatives Maxine Waters and Jasmine Crockett. Final Thought: Bill's appearance on The Stephen A. Smith Show. In Case You Missed It: Read Bill's latest column, Frankie and Donnie Stand out from the crowd with our NEW Not Woke baseball cap for just $28.95! For a limited time, get Bill O'Reilly's bestselling The United States of Trump and a No Spin Mug for only $39.95. Get Bill's latest book, CONFRONTING THE PRESIDENTS, out NOW! Now's the time to get a Premium or Concierge Membership to BillOReilly.com, the only place for honest news analysis. Learn more about your ad choices. Visit megaphone.fm/adchoices
President Trump now says his defense secretary had nothing to do with the major security breach where highly sensitive details about United States military strikes were shared in a group chat with a journalist. New details have been reported by the journalist who first published the story. Learn more about your ad choices. Visit podcastchoices.com/adchoices
First the good news: we might just manage to build a lot of new houses. And the bad news? Millions of people will be worse off and about fifty thousand children will be pushed into poverty by welfare reform.Nish and Coco unpack Rachel Reeves' Spring Statement with the help of economist James Meadway, former advisor to John McDonnell. It was pretty bleak stuff from Reeves: the world is scary, growth is low, and cuts are coming. All with a strong whiff of austerity 2.0.The Chancellor says her fiscal rules are “non-negotiable”. But James has an alternative Spring Statement to banish the gloom and challenge the way we think about growth.Plus, as the great Signal security cock up rumbles on in the US, Nish and Coco wonder why they've never been included in a top-secret military chat. It's just not fair.And it's got the UK talking, but will the Netflix drama ‘Adolescence' make a difference in the real world?CHECK OUT THESE DEALS FROM OUR SPONSORS SKY SPORTS F1 https://www.sky.com/tv/sports Guests:James Meadway Audio CreditsParliament TV Pod Save the UK is a Reduced Listening production for Crooked Media.Contact us via email: PSUK@reducedlistening.co.ukInsta: https://instagram.com/podsavetheukTwitter: https://twitter.com/podsavetheukTikTok: https://www.tiktok.com/@podsavetheukFacebook: https://facebook.com/podsavetheukYoutube: https://www.youtube.com/@PodSavetheUK
Several of President Donald Trump's top national security officials, at times with assistance from a top Senate Republican, shifted responsibility to Secretary of Defense Pete Hegseth for sending potentially classified information that appeared in a group chat about US military strikes in Yemen that a journalist was included in. Under sharp questioning from outraged Democrats on the Senate Intelligence Committee, CIA Director John Ratcliffe and Director of National Intelligence Tulsi Gabbard repeatedly denied that the chat contained classified information. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Original link to the Will Cain Show: https://www.foxnews.com/video/6370597588112 _______________________________________ If you appreciate my work and would like to support it: https://subscribestar.com/the-saad-truth https://patreon.com/GadSaad https://paypal.me/GadSaad To subscribe to my exclusive content on Twitter, please visit my bio at https://twitter.com/GadSaad _______________________________________ This clip was posted on March 26, 2025 on my YouTube channel as THE SAAD TRUTH_1828: https://youtu.be/l_4XFRR8nqk _______________________________________ Please visit my website gadsaad.com, and sign up for alerts. If you appreciate my content, click on the "Support My Work" button. I count on my fans to support my efforts. You can donate via Patreon, PayPal, and/or SubscribeStar. _______________________________________ Dr. Gad Saad is a professor, evolutionary behavioral scientist, and author who pioneered the use of evolutionary psychology in marketing and consumer behavior. In addition to his scientific work, Dr. Saad is a leading public intellectual who often writes and speaks about idea pathogens that are destroying logic, science, reason, and common sense. _______________________________________
Details about U.S. military strikes being discussed on Signal have shocked many in the national security community. But President Trump called the whole episode a "witch hunt" and said Defense Secretary Hegseth "had nothing to do with this." Geoff Bennett discussed more with Jeffrey Goldberg, editor-in-chief of the Atlantic and moderator of Washington Week. PBS News is supported by - https://www.pbs.org/newshour/about/funders
3.25.2025 #RolandMartinUnfiltered: Signal security breach fallout, Bondi demands Crockett apology, MAGA judiciary attack, 14th amendment center opens Senators questioned Intel officials about how the Atlantic's editor-in-chief "mistakenly" got added to a group chat with top security officials discussing war plans. We'll show you how the Trump administration dodges accountability for this massive security breach. We'll show you how Fox is fumbled to tell the story while defending their former co-worker, Defense Secretary Pete Hegseth. I also have some thoughts for DJ Envy and his Breakfast Club co-hosts, who claim that the Atlantic editor-in-chief was wrong to disclose that he was included in a top-secret group chat. Attorney General Pam Bondi says that Congresswoman Jasmine Crockett owes Elon Musk and Telsa shareholders an apology. On Friday, Howard University's 14th Amendment Center will officially open. Founder Sherrilyn Ifill will explain why this center is more crucial now than ever. #BlackStarNetwork partner: Fanbasehttps://www.startengine.com/offering/fanbase This Reg A+ offering is made available through StartEngine Primary, LLC, member FINRA/SIPC. This investment is speculative, illiquid, and involves a high degree of risk, including the possible loss of your entire investment. You should read the Offering Circular (https://bit.ly/3VDPKjD) and Risks (https://bit.ly/3ZQzHl0) related to this offering before investing. Download the #BlackStarNetwork app on iOS, AppleTV, Android, Android TV, Roku, FireTV, SamsungTV and XBox http://www.blackstarnetwork.com The #BlackStarNetwork is a news reporting platform covered under Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research.See omnystudio.com/listener for privacy information.
Top intel officials have shifted responsibility on to Defense Secretary Pete Hegseth for sending potentially classified info to Yemen strike Signal group chat. Join this channel for exclusive access and bonus content: https://www.youtube.com/channel/UCkbwLFZhawBqK2b9gW08z3g/join Five Minute News with Anthony Davis is an Evergreen Podcast, covering politics, inequality, health and climate - delivering independent, unbiased and essential news for the US and across the world. Visit us online at http://www.fiveminute.news Follow us on Bluesky https://bsky.app/profile/fiveminutenews.bsky.social Follow us on Instagram http://instagram.com/fiveminnews Support us on Patreon http://www.patreon.com/fiveminutenews You can subscribe to Five Minute News with your preferred podcast app, ask your smart speaker, or enable Five Minute News as your Amazon Alexa Flash Briefing skill. Please subscribe HERE https://www.youtube.com/channel/UCkbwLFZhawBqK2b9gW08z3g?sub_confirmation=1 CONTENT DISCLAIMER The views and opinions expressed on this channel are those of the guests and authors and do not necessarily reflect the official policy or position of Anthony Davis or Five Minute News LLC. Any content provided by our hosts, guests or authors are of their opinion and are not intended to malign any religion, ethnic group, club, organization, company, individual or anyone or anything, in line with the 1st Amendment right to free speech. Learn more about your ad choices. Visit megaphone.fm/adchoices
The latest fallout from the leaked Trump administration war plans that were sent to a group chat, which included a journalist from The Atlantic. Also, an exposure on an Amtrak train in Washington, D.C., adds to the nation's growing measles crisis. Plus, Luigi Mangione asks the court for access to a laptop as he awaits trial for the shooting death of UnitedHealth Care CEO Brian Thompson. And, a closer look at deepfake AI as a fraudulent video of our own Al Roker selling a blood pressure device hits the internet.
In this episode of the National Crawford Roundtable podcast the guys talk about the Signal App security breach, Federal funding being pulled from Columbia University, and the sudden interest by China and Russia regarding ownership of Greenland.
Security Breach Allegations: The report discusses claims that Trump administration officials accidentally included journalist Jeffrey Goldberg in a Signal group chat discussing secret US military plans to strike Houthi targets in Yemen. High-level officials like Defense Secretary Pete Headseth, Vice President Jedi Vance, and Secretary of State Marco Rubio were allegedly involved. Pete Headseth denies the allegations, calling Goldberg a discredited journalist known for spreading hoaxes. Trump's Economic Policies: President Trump estimates that $4 trillion worth of companies are moving back to the US due to tariffs. He highlights the return of high-paying jobs and investments in the US, including a significant investment from Hyundai in a new steel plant in Louisiana. Elon Musk's Media Coverage: The report criticizes the media's coordinated attacks on Elon Musk, portraying him as a disruptive force in government efficiency. It includes a montage of media references to Musk's "chainsaw" approach to federal workforce reduction. Please Hit Subscribe to this podcast Right Now. Also Please Subscribe to the Ben Ferguson Show Podcast and Verdict with Ted Cruz Wherever You get You're Podcasts. Thanks for Listening #seanhannity #hannity #marklevin #levin #charliekirk #megynkelly #tucker #tuckercarlson #glennbeck #benshapiro #shapiro #trump #sexton #bucksexton#rushlimbaugh #limbaugh #whitehouse #senate #congress #thehouse #democrats#republicans #conservative #senator #congressman #congressmen #congresswoman #capitol #president #vicepresident #POTUS #presidentoftheunitedstatesofamerica#SCOTUS #Supremecourt #DonaldTrump #PresidentDonaldTrump #DT #TedCruz #Benferguson #Verdict #maga #presidenttrump #47 #the47morningupdate #donaldtrump #trump #news #trumpnews #Benferguson #breaking #breakingnews #morningupdateYouTube: https://www.youtube.com/@VerdictwithTedCruzSee omnystudio.com/listener for privacy information.
MSNBC's Jason Johnson hosts "The Beat" on Tuesday, March 25, and reports on the fallout from the Trump war plan “group chat” scandal, turmoil surrounding Social Security, and Trump's push for retribution. Rachel Cohen, Barbara McQuade, April Ryan, Rep. André Carson, Sabrina Singh, and Mark Leibovich join.
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.”See omnystudio.com/listener for privacy information.
Questions grow surrounding a shocking security breach after Trump administration officials mistakenly include a journalist to a text chain about secret U.S. military strikes in Yemen. Plus, a judicial clash over the President's deportation flights and use of the Alien Enemies Act. And, the US and Russia begin talks on a partial ceasefire in Ukraine while the Kremlin orders more drone strikes. Susan Glasser, David Drucker, Barbara McQuade, Eric Swalwell, William Taylor, Joel Payne, and Charlie Sykes join as Charles Coleman Jr. hosts The 11th Hour this Monday.
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.”See omnystudio.com/listener for privacy information.
The new JOHN ROSS coffee is here! I've teamed up with Frontier Coffee Company to bring you a funny bled of your favorite flavors of coffee. Check them out here: John Ross's Coffee in Color – Frontier Coffee Company
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.”See omnystudio.com/listener for privacy information.
Jen Psaki speaks to Jeffrey Goldberg, editor in chief of The Atlantic, about how he was mistakenly included on a group chat of high-ranking Trump officials discussing secret war plans. Goldberg reflects on being a firsthand witness such an unprecedented leak and reacts to the backlash from Secretary Pete Hegseth. Later, Senator Adam Schiff gives insight into how Congress is reacting to Goldberg's revelation and how both Republicans and Democrats are ready to hold the administration accountable. Next, Jen highlights on the growing unpopularity of Elon Musk after he trashed social security and threatened its elimination, and why it is a political gift to Democrats. Jen talks to Governor JB Pritzker about Musk's sweeping layoffs and their impact on Illinois, and Former Senator Sherrod Brown reflects on how he is stepping up to address the struggles of American workers. Check out our social pages below:https://twitter.com/InsideWithPsakihttps://www.instagram.com/InsideWithPsaki/https://www.tiktok.com/@insidewithpsakihttps://www.msnbc.com/jen-psakihttps://bsky.app/profile/insidewithpsaki.msnbc.com
MSNBC's Michael Steele hosts "The Beat" on Monday, March 24, and reports on legal battles over Donald Trump's controversial deportation efforts, the future of the Democratic Party, and mounting concerns over Elon Musk's government conflicts of interest. Plus, Steele reports on rising national security fears after a leaked war plan from top U.S. officials. Ankush Khardori, Libby Casey, Eugene Robinson, Alencia Johnson, Rep. Joe Crowley, and Larry Pfeiffer join.
National security officials discussed military plans in a Signal group chat that mistakenly included The Atlantic editor-in-chief Jeffrey Goldberg, according to a report published on Monday. To discuss the revelation and the national security implications, Geoff Bennett spoke with Leon Panetta, the former defense secretary and director of the Central Intelligence Agency. PBS News is supported by - https://www.pbs.org/newshour/about/funders
Sandra Smith, co-anchor of America Reports with Sandra Smith & John Roberts (weekdays 1-3pm ET), joined The Guy Benson Show to discuss the shocking national security leak involving a messaging chain between high-ranking Trump officials that revealed details of a classified military strike plan. Smith and Benson discussed the significance of The Atlantic's editor being accidentally included in the chain, raising serious questions about security protocols amongst the Trump team. They also covered reports that Trump may slow-walk the implementation of some tariffs set to go into effect on April 1st, signaling a potential policy shift. You can listen to the full interview below! Learn more about your ad choices. Visit podcastchoices.com/adchoices
The Guy Benson Show 03-24-2025 Learn more about your ad choices. Visit podcastchoices.com/adchoices