POPULARITY
In this episode of the Look Forward Podcast, host Andy Critchlow sits down with Joshua Hutchinson, Managing Director of Risk and Intelligence at Ambrey, to explore the pressing issues surrounding maritime security in today's geopolitical climate. They delve into the increasing threats to global trade routes, including attacks on shipping and the evolving tactics employed. Joshua shares insights on the severity of current maritime threats, the role of technology in intelligence gathering, and the importance of risk management for vessel owners. Despite the daunting landscape, Joshua emphasizes the resilience of the maritime industry and the opportunities for collaboration and innovation that arise from these challenges. Tune in for an engaging conversation that sheds light on the complexities of maritime trade and security in an ever-changing world.
This week's episode of the Parsing Immigration Policy podcast features a wide-ranging conversation with recently retired Border Patrol Chief Jason Owens, who served for 30 years and led the agency during the worst border crisis in history. Owens speaks with the Center's Executive Director Mark Krikorian about the evolution of the Border Patrol over its […]
In today's episode of 'Cybersecurity Today,' hosted by Jim Love, we cover several key issues in the cybersecurity landscape. Firstly, a breach involving Workday and social engineering attacks targeting Salesforce customers is discussed. Next, the risks posed by a recent Windows update potentially causing data corruption on SSDs and HDDs are highlighted. We also delve into a critical infrastructure breach where Russian hackers remotely accessed a Norwegian dam's control system. Additionally, the episode covers Google's vulnerabilities in its AI and Gmail services, and finally, Apple's significant privacy victory against the UK's backdoor encryption mandate. The episode concludes with a call for listener support through donations to sustain the program. 00:00 Introduction and Headlines 00:23 Workday Data Breach Explained 02:15 Windows Update Issues 04:05 Norwegian Dam Cyber Attack 05:49 Google's Security Challenges 07:12 Apple's Privacy Victory 08:19 Conclusion and Listener Support
In-Depth Analysis: GPT-5 Launch, AI Security Concerns, and the Future of Digital IDs In this episode of Project Synapse, host Jim Love and panelists Marcel Gagne and John Pinard cover a range of topics from the latest AI advancements to critical security issues. They open with a discussion on recent AI developments, including the unfortunate incidents of developers losing code using IDEs and new security vulnerabilities. The panel reviews key highlights from the Black Hat presentation and discusses prompt injection attacks. They express concerns over security and call for better digital identity systems, referencing failures like the T App data breach. They also explore the launch of OpenAI's GPT-5, its impressive capabilities, unforeseen issues, and the company's strategy in releasing open-source models. The episode wraps up with reflections on the need for improved security practices and speculation on AI's future impacts. 00:00 Introduction to Project Synapse 00:34 Recent AI and Security Incidents 01:25 Black Hat Presentation and Prompt Injection 02:12 OpenAI's GPT-5 and Security Concerns 03:28 Elon Musk and Team Movements 04:10 Sam Altman's Public Statements 06:35 AI Implementation and Security Challenges 13:27 The Importance of Backups and Development Practices 18:02 Security Issues Beyond AI 25:30 AI's Impact on Daily Users and Security Practices 26:31 Public Sharing of AI Conversations 28:20 Conclusion and Future Considerations 31:02 Discussing Age Verification Issues 31:38 The T App Security Breach 33:02 Digital ID and Government Involvement 38:26 The Rise of GPT-5 46:54 OpenAI's Market Strategy 57:34 Book Recommendations and Closing Remarks
In this episode of the ASIAL Security Insider podcast, Tony Keane discusses the challenges of running major events.As the Head of Integrity & Security at the Australian Football League, Tony is responsible for the security of over 900 events per year, ranging from Australian Rules football matches to hosting some of the world's largest Cricket matches and a wide array of the leading music acts from across the globe. For more podcasts like this one, visit www.asial.com.au.
Karl and Erum bring on Dr. Alexander Titus, a commissioner on the National Security Commission on Emerging Biotechnology, to explore the exciting and challenging intersections of biotechnology and policy. Alexander shares his experiences from his unique journey across academia, government, and industry, diving into the role of biosecurity, the potential of synthetic biology, and the emerging convergence of tech and bio. They discuss ambitious projects like de-extincting the woolly mammoth, advances in biodefense, and the impacts of AI on biotech innovation. It's a conversation that sheds light on how cutting-edge biotech could shape the future and the necessary balance between innovation and ethical responsibility.Grow Everything brings the bioeconomy to life. Hosts Karl Schmieder and Erum Azeez Khan share stories and interview the leaders and influencers changing the world by growing everything. Biology is the oldest technology. And it can be engineered. What are we growing?Learn more at www.messaginglab.com/groweverything Chapters:00:00:00 - Behind the Scenes of Bureaucracy00:00:30 - Democracy's Turning Point00:02:23 - A Fiery Day in Prospect Park00:04:20 - How Spaces Shape Our Health00:08:35 - Enter Alexander Titus: Biosecurity Visionary00:10:13 - Biotech: The New Face of National Defense00:15:09 - Where Tech and Policy Collide00:23:10 - The Future of Biosecurity Unfolds00:28:02 - Bold Science vs. Ethical Boundaries00:30:24 - Robotics Meets Biotech: What's Next?00:33:29 - Hard Lessons from Cross-Industry Giants00:35:49 - Innovation Clashes with Red Tape00:36:11 - The Power of Expertise in Shaping Policy00:42:26 - Biotech's Hidden Environmental Risks00:45:42 - The Commission's Bold Path Forward00:48:45 - Parting Thoughts: What Lies AheadTopics Covered: biotech, biosecurity, national security commission on emerging biotechnology, policyEpisode Links: The Wild Life of Our Bodies by Robb Dunn Geerat Vermeij BTO - Biological Technologies Office of DARPA Bioeconomy.XYZ The Nobel Turing Challenge Range by David Epstein NSCEB Interim Report AI Safety Institute The Echo Wife by Sara GaileyHave a question or comment? Message us here:Text or Call (804) 505-5553Instagram / TikTok / Twitter / LinkedIn / Youtube / GrowEverything websiteEmail: groweverything@messaginglab.comMusic by: NihiloreProduction by: Amplafy Media
Nearly three years into President Gustavo Petro's term, his flagship “Total Peace” initiative is faltering. On this episode of the WOLA Podcast, Gimena Sánchez-Garzoli, WOLA's Director for the Andes, provides a sweeping overview of Colombia's peace and security reality.
Electrical co-ops and public power utilities provide service to about a 100 million Americans, including many rural parts of the nation and counties with persistent poverty. They have many of the same concerns about both physical and cybersecurity as investor-owned utilities, but different challenges in terms of terrain, staffing and resources.On this episode, we focus on those challenges and how utilities in rural parts of the country are coping. Our guests are John Ransom, director of regulatory affairs for grid security for the National Rural Electric Cooperative Association, and Adrienne Lotto, senior vice president for grid security at the American Public Power Association. John and Adrienne discussed some of those unique challenges, how they work with state regulators and how something like high turnover in state energy offices can complicate their efforts. ResourcesAmerican Public Power AssociationNational Rural Electric Cooperative Association
In this episode of Hashtag Trending, titled 'The Inflection Point: AI's Gentle Singularity and the Security Conundrum', the hosts grapple with planning their show amidst rapid technological changes and delve into a blog post by Sam Altman on the 'Gentle Singularity.' The discussion touches on concepts from astrophysics and AI, explaining the singularity where AI progresses beyond human control. Historical AI figure Ray Kurzweil is mentioned for his predictive insights. They explore how large language models mimic human behavior, their strengths in emotional intelligence, and the inevitable march towards superintelligence. This technological optimism is countered with a serious look at security flaws in AI models and real-world examples of corporate negligence. They highlight the critical need for integrating security into AI development to prevent exploitation. The episode concludes with a contemplation of human nature, the ethics of business, and an advocacy for using AI's potential responsibly. 00:00 Introduction and Show Planning 00:20 Discussing Sam Altman's Gentle Singularity 01:06 Ray Kurzweil and the Concept of Singularity 02:41 Human-Machine Integration and Event Horizon 05:02 AI Hallucinations and Human Creativity 09:02 Capabilities and Limitations of Large Language Models 10:27 AI's Role in Future Productivity and Quality of Life 13:02 Debating AI Consciousness and Singularity 25:51 Security Concerns in AI Development 30:57 Hacking the Human Brain: Elections and Persuasion 31:16 Understanding AI Models and Security 33:04 The Role of CISOs in Modern Security 34:43 Steganography and Prompt Injection 37:26 AI in Automation and Security Challenges 38:47 Crime as a Business: The Reality of Cybersecurity 40:47 Balancing Speed and Security in AI Development 51:06 Corporate Responsibility and Ethical Leadership 55:29 The Future of AI and Human Values
Today's blockchain and crypto news Bitcoin traders stay cautious amid 'disbelief' near all‑time highs while leveraged Ethereum bets surge Nasdaq‑listed fitness company plans to raise $500 million for crypto treasury Ethereum derivatives top bitcoin with $110B daily volume as US ETFs, DeFi fuel momentum Ethereum Foundation outlines key security challenges facing the network in new report Circle's IPO underscores need for a diversified crypto portfolio, says Bitwise CIO Learn more about your ad choices. Visit megaphone.fm/adchoices
A new research study from UK fintech startup Nuke From Orbit, highlights a sharp rise in smartphone theft across the country and the growing impact on how people use their devices. As thefts soar and public trust in police and tech providers declines, the findings point to a security crisis that is reshaping digital habits for millions of Britons. According to the study, which surveyed 1,000 UK adults (18 years and above), 29% have now experienced phone theft, up from 17% just a year ago. The surge is fuelling widespread anxiety and has started prompting consumers (5% or greater) to scale back their use of mobile banking, email, social media and digital wallets. The findings reveal a nation struggling with digital vulnerability. 67% of consumers say they are most concerned about unauthorised access to their bank cards or accounts, underlining the financial risks of losing a smartphone. Despite this concern, 34% of users still rely on the same or similar PINs for multiple apps and to unlock their devices - a risky behaviour that continues to undermine security efforts. "The findings are deeply worrying," said James O'Sullivan, CEO of Nuke From Orbit. "In the past 18 months, we've seen a perfect storm: thefts are rising, personal security is lacking, and users are stuck in risky habits. It's unacceptable that nearly one in three people have had their phone stolen. The current solutions - and the police response - simply do not match the scale of the problem." Everyday phone habits are also contributing to increased theft risk. Nearly half of respondents (47%) say they use their phones in public several times a day - a figure that rises to 71% among 18-25-year-olds, making them easy targets for opportunistic thieves. This visibility, especially on public transport or in busy urban areas, significantly increases the likelihood of theft. Yet many victims are reluctant to report the crime. The research shows that those who have not experienced phone theft are almost three times more likely to report it than those who have, indicating a breakdown in trust and expectations around police intervention. Public opinion is divided on who should take responsibility for improving smartphone security. While 44% believe phone manufacturers should lead the charge, 30% say the onus is on users themselves. Interestingly, those who have never had their phone stolen are nearly three times more likely to report theft than those who have - suggesting that personal experience often leads to disillusionment. A Call for Urgent Action Nuke From Orbit is calling for stronger, more coordinated action on smartphone safety. The Rising Threat of Smartphone Theft: Consumer Behaviour and Security Challenges report highlights the need for improved consumer education, closer collaboration between tech providers and law enforcement and more integrated security solutions to better protect users and their data. CEO James O'Sullivan has been actively engaging with stakeholders, from meeting with officials at Downing Street to working alongside ethical hackers to identify system vulnerabilities, pushing for faster progress across the sector. "We need to shift how we approach smartphone safety," added O'Sullivan. "With greater awareness and stronger protections, we can reduce the impact of this growing threat and help prevent it altogether." See more stories here.
Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today’s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot... Read more »
Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today’s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot... Read more »
LINKS: https://distrust.co/software.html - Software page with OSS software Linux distro: https://codeberg.org/stagex/stagex Milksad vulnerability: https://milksad.info/ In this episode of Cybersecurity Today on the Weekend, host Jim Love engages in a captivating discussion with Anton Livaja from Distrust. Anton shares his unique career transition from obtaining a BA in English literature at York University to delving into cybersecurity and tech. Anton recounts how he initially entered the tech field through a startup and quickly embraced programming and automation. The conversation covers Anton's interest in Bitcoin and blockchain technology, including the importance of stablecoins, and the frequent hacking incidents in the crypto space. Anton explains the intricacies of blockchain security, emphasizing the critical role of managing cryptographic keys. The dialogue also explores advanced security methodologies like full source bootstrapping and deterministic builds, and Anton elaborates on the significance of creating open-source software for enhanced security. As the discussion concludes, Anton highlights the need for continual curiosity, teamwork, and purpose-driven work in the cybersecurity field. 00:00 Introduction to Cybersecurity Today 00:17 Anton's Journey from Literature to Cybersecurity 01:08 First Foray into Programming and Automation 02:35 Blockchain and Its Real-World Applications 04:36 Security Challenges in Blockchain and Cryptocurrency 13:21 The Rise of Insider Threats and Social Engineering 16:40 Advanced Security Measures and Supply Chain Attacks 22:36 The Importance of Deterministic Builds and Full Source Bootstrapping 29:35 Making Open Source Software Accessible 31:29 Blockchain and Supply Chain Traceability 33:34 Ensuring Software Integrity and Security 38:20 The Role of AI in Code Review 40:37 The Milksad Incident 46:33 Introducing Distrust and Its Mission 52:23 Final Thoughts and Encouragement
In this episode of the Revenue Builders Podcast, hosts John McMahon and John Kaplan are joined by Matt Maloney, SVP of Global Sales at Fireblocks. The discussion dives deep into Matt's background in B2B sales, his journey into the world of cryptocurrency, and how Fireblocks is revolutionizing blockchain security. Matt shares insights on the importance of adaptable, coachable sales teams and the application of traditional sales disciplines to new and emerging markets. The conversation also touches on strategic decision-making when entering new markets, the relevance of a strong ideal customer profile, and how foundational sales processes like MEDDPICC contribute to scaling success. The episode concludes with a nod to the influential book 'Inside the Tornado' by Geoffrey Moore and its relevance to Fireblocks' strategy.ADDITIONAL RESOURCESLearn more about Matt Maloney:https://www.linkedin.com/in/matt-maloney-75698/Read Force Management's Guide to Embedding AI In Your B2B Sales Organization: https://hubs.li/Q03ldrzD0Download the CRO Strategy Checklist: https://hubs.li/Q03f8LmX0Enjoying the podcast? Sign up to receive new episodes straight to your inbox: https://hubs.li/Q02R10xN0HERE ARE SOME KEY SECTIONS TO CHECK OUT[00:02:13] Matt Maloney's Journey into Crypto[00:02:55] Understanding Fireblocks and Blockchain[00:06:36] The Role of Stablecoins[00:10:28] Security Challenges in Crypto[00:23:18] Adapting Traditional Sales Disciplines to Emerging Markets[00:34:44] Mitigating Risk in Emerging Markets[00:35:07] The Importance of Continuous Development[00:37:11] Building Trust and Credibility[00:38:07] Characteristics of Successful Salespeople[00:39:41] Company Responsibility in Employee Development[00:41:02] Aligning Company Goals with Sales Strategies[00:46:05] Avoiding Shiny Object Syndrome[00:48:36] The Role of Ideal Customer Profiles[00:49:43] Lessons from Mentorship and Experience[00:58:00] The Innovator's JourneyHIGHLIGHT QUOTES"Your job is to figure out hitting the number and making sure you're calibrating your resources, that you hit the number, because that's foundation to our jobs as sales leaders.""If you can be part of a disruptive movement... it could be game-changing.""You need people that are coachable that will take the time to listen and learn about what this market is."
Send us a textCameron and Gabe return after a brief hiatus to explore major developments in security, privacy, and resilience. They dive into insights from the IAPP conference and VeeamOn, examining how AI governance and outdated privacy tools are reshaping the industry landscape.• AI governance frameworks dominated IAPP discussions with companies "building the plane as they're flying"• Verizon's Data Breach Report debunks overblown AI security fears, showing real risks are data leakage and poor access controls• Growing frustration with outdated privacy management tools is driving demand for better solutions• Security posture isn't about using recognized brands but about architecture without dangerous gaps• Sam Altman's virtual appearance at IAPP disappointed attendees expecting an in-person keynoteStay tuned for our bonus episode covering even more developments from this busy week in privacy and security! Support the show
As countries in the Eastern Mediterranean - particularly Greece, Cyprus, and Israel - deepen their ties, they are also faced with the challenges posed by malign actors across the region. This includes countries like Russia, Iran, and Turkey, but also non-state actors like Hamas, Hezbollah and the Houthis in the Red Sea. Jonathan Spyer, director of research at the Middle East Forum and a contributor to the Jerusalem Post, the Wall Street Journal and The Australian, joins Thanos Davelis as we explore these security challenges and look at how East Med countries can work together to address them.You can read the articles we discuss on our podcast here:No One Should Be Surprised About the Syrian MassacresTurkey, Israel have begun talks to avoid clashes in Syria, sources sayHigh-stakes poker over energy linkPM: ‘A trade war only produces losers'
Experts are warning Ireland's maritime security is facing critical challenges due to underfunding, outdated infrastructure, and a lack of coordination across agencies. Brendan Flynn, University of Galway politics lecturer and specialist in maritime security.
Today, we're going over your questions. You guys had some follow-ups about my stalker, Timothy C., and I'll be giving you a few more details on that situation. We're also unpacking the RFK Jr. sex scandal—what's real, what's spin, and what it all means. Plus, the government's leaked text messages have been making waves, and I'll be breaking down what they reveal and why you should (and shouldn't) care.—https://policecoffee.com/?gad_source=1&gbraid=0AAAAACG7qmI1dmMkruwgp8vA8w0oECKla&gclid=Cj0KCQjwtJ6_BhDWARIsAGanmKfdkRQ1M1sighZQ-PGpEpsCjrZ8fCigidnvH55bfBUNMa56-yoy_A8aAv34EALw_wcB—https://open.spotify.com/episode/7CcmZWvQEaLTQAQRAFy2BQ?si=FgeO4b9QSi-5eB2cqX2XHw
In this episode of the Security Matters podcast, host David Puner is joined by Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, to explore the transformative impact of AI agents on cybersecurity and automation. They discuss real-world scenarios where AI agents monitor security logs, flag anomalies, and automate responses, highlighting both the opportunities and risks associated with these advanced technologies.Lavi shares insights into the evolution of AI agents, from chatbots to agentic AI, and the challenges of building trust and resilience in AI-driven systems. The conversation delves into the latest research areas, including safety, privacy, and security, and examines how different industries are adopting AI agents to handle vast amounts of data.Tune in to learn about the critical security challenges posed by AI agents, the importance of trust in automation, and the strategies organizations can implement to protect their systems and data. Whether you're a cybersecurity professional or simply curious about the future of AI, this episode offers valuable insights into the rapidly evolving world of AI agents.
Jason Brenner is the RVP of Healthcare & Lifesciences at LiveRamp and has been working in the advertising and ad tech industries for over 20 years. He is leading efforts on building data connectivity solutions for the healthcare and life sciences industries. Prior to LiveRamp, Jason has held leadership positions at Placed, Verve, PayPal, Time Inc., The New York Times, and Condé Nast. In this episode… Companies in industries like healthcare and life sciences are leveraging data collaboration to collect valuable insights to drive innovation and improve customer experiences. However, for many organizations, balancing data collaboration with privacy, security, and regulatory compliance obligations remains a significant challenge. With consumer trust at stake, and the risks of improper data handling, how can companies balance innovation with responsible data use? Data collaboration in healthcare presents both opportunities and challenges. Companies need to adopt privacy-by-design principles and engage legal and privacy teams early in the process. By implementing techniques such as data tokenization and de-identification, businesses can extract valuable insights while minimizing privacy and security risks. That's why companies like LiveRamp are making this process easier with a platform that transforms personally identifiable information into non-reversible tokens, allowing organizations to use data responsibly while minimizing privacy and security risks. In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels speak with Jason Brenner, RVP of Healthcare and Life Sciences at LiveRamp, about the critical role of privacy and security in data collaboration. Jason shares insights on how organizations are navigating a complex and fragmented regulatory landscape, the importance of adopting privacy-by-design principles, and engaging legal and privacy teams early in the process. He also shares how businesses can minimize data retention risks, the role of de-identification and tokenization in protecting sensitive information, and the importance of building customer trust through responsible data practices.
In 2011, Marc Andreessen predicted that software would eat the world. Specifically, the prediction was that software companies would take over the economy and disrupt all industries. The economic prediction has mostly come true, with 9 out of 10 of the most highly valued companies being tech companies. The industry disruption didn't materialize in some cases, and outright failed in others. Healthcare seems to be one of these 'disruption-resistant' areas. Ed joins us today to discuss why that might be, and what the paths towards securing the healthcare industry might look like. Segment Resources: Ed's podcast, Risk Never Sleeps We get a visit from Tanya Janca to discuss her latest book, Alice and Bob Learn Secure Coding! Segment Resources: Tanya's latest book on Amazon Tanya's previous book, Alice and Bob Learn Application Security on Amazon Tanya's website, She Hacks Purple This week, in the enterprise security news, we've got some funding and acquisitions! ransomware payments are DOWN 35% infostealers on Macs are UP 101% Bybit got hit by a $1.5B heist and shrugged it off A SaaS report says AI is having no impact on pricing Microsoft's CEO says AI is generating no value Google is dropping SMS as a second factor Google creates a 4th state of matter instead of fixing Teams What it's like to be named “Null” All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-396
In 2011, Marc Andreessen predicted that software would eat the world. Specifically, the prediction was that software companies would take over the economy and disrupt all industries. The economic prediction has mostly come true, with 9 out of 10 of the most highly valued companies being tech companies. The industry disruption didn't materialize in some cases, and outright failed in others. Healthcare seems to be one of these 'disruption-resistant' areas. Ed joins us today to discuss why that might be, and what the paths towards securing the healthcare industry might look like. Segment Resources: Ed's podcast, Risk Never Sleeps We get a visit from Tanya Janca to discuss her latest book, Alice and Bob Learn Secure Coding! Segment Resources: Tanya's latest book on Amazon Tanya's previous book, Alice and Bob Learn Application Security on Amazon Tanya's website, She Hacks Purple This week, in the enterprise security news, we've got some funding and acquisitions! ransomware payments are DOWN 35% infostealers on Macs are UP 101% Bybit got hit by a $1.5B heist and shrugged it off A SaaS report says AI is having no impact on pricing Microsoft's CEO says AI is generating no value Google is dropping SMS as a second factor Google creates a 4th state of matter instead of fixing Teams What it's like to be named “Null” All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-396
In 2011, Marc Andreessen predicted that software would eat the world. Specifically, the prediction was that software companies would take over the economy and disrupt all industries. The economic prediction has mostly come true, with 9 out of 10 of the most highly valued companies being tech companies. The industry disruption didn't materialize in some cases, and outright failed in others. Healthcare seems to be one of these 'disruption-resistant' areas. Ed joins us today to discuss why that might be, and what the paths towards securing the healthcare industry might look like. Segment Resources: Ed's podcast, Risk Never Sleeps Show Notes: https://securityweekly.com/esw-396
In 2011, Marc Andreessen predicted that software would eat the world. Specifically, the prediction was that software companies would take over the economy and disrupt all industries. The economic prediction has mostly come true, with 9 out of 10 of the most highly valued companies being tech companies. The industry disruption didn't materialize in some cases, and outright failed in others. Healthcare seems to be one of these 'disruption-resistant' areas. Ed joins us today to discuss why that might be, and what the paths towards securing the healthcare industry might look like. Segment Resources: Ed's podcast, Risk Never Sleeps Show Notes: https://securityweekly.com/esw-396
On the GZERO World Podcast, we're bringing you two starkly different views on Ukraine's future and European security. First, Ian Bremmer speaks with Latvian Foreign Minister Baiba Braže about the growing security threats facing the Baltics—from cyberattacks and disinformation to undersea sabotage in the Baltic Sea. When an oil tanker linked to Russia's shadow fleet recently severed a vital power cable between Estonia and Finland, it was a stark reminder of how hybrid warfare is playing out beyond the battlefield. Braže warns that Putin's ambitions extend far beyond Ukraine, aiming to weaken US alliances and destabilize Europe. She also pushes back against claims that Ukraine's NATO ambitions provoked the war, calling them “complete nonsense,” and outlines why Latvia is boosting its defense spending to 5% of GDP.The conversation then shifts to Moscow, where Bremmer speaks with former Russian colonel and ex-Carnegie Moscow Center director Dmitri Trenin. Once considered a pro-Western voice, Trenin's views now align closely with the Kremlin. He argues that the fate of Ukraine should be decided primarily by Russia and the United States—not Ukraine or Europe.Host: Ian BremmerGuest: Baiba Braže & Dmitri Trenin Subscribe to the GZERO World with Ian Bremmer Podcast on Apple Podcasts, Spotify, or your preferred podcast platform, to receive new episodes as soon as they're published.
On the GZERO World Podcast, we're bringing you two starkly different views on Ukraine's future and European security. First, Ian Bremmer speaks with Latvian Foreign Minister Baiba Braže about the growing security threats facing the Baltics—from cyberattacks and disinformation to undersea sabotage in the Baltic Sea. When an oil tanker linked to Russia's shadow fleet recently severed a vital power cable between Estonia and Finland, it was a stark reminder of how hybrid warfare is playing out beyond the battlefield. Braže warns that Putin's ambitions extend far beyond Ukraine, aiming to weaken US alliances and destabilize Europe. She also pushes back against claims that Ukraine's NATO ambitions provoked the war, calling them “complete nonsense,” and outlines why Latvia is boosting its defense spending to 5% of GDP.The conversation then shifts to Moscow, where Bremmer speaks with former Russian colonel and ex-Carnegie Moscow Center director Dmitri Trenin. Once considered a pro-Western voice, Trenin's views now align closely with the Kremlin. He argues that the fate of Ukraine should be decided primarily by Russia and the United States—not Ukraine or Europe.Host: Ian BremmerGuest: Baiba Braže & Dmitri Trenin Subscribe to the GZERO World with Ian Bremmer Podcast on Apple Podcasts, Spotify, or your preferred podcast platform, to receive new episodes as soon as they're published.
AWS networking isn't as simple as it seems and when you're dealing with regulated industries like healthcare, the stakes are even higher.In this episode we sit down with Kyler Middleton and Jack W. Harter from Veradigm — who have navigated complex AWS networking challenges while migrating from on-prem data centers to the cloud.We speak about: The real struggles of moving from data centers to AWS Why networking can feel like a black box The anti-pattern that surprisingly worked best How to build secure cloud networks—without losing your sanity The hidden security & compliance challenges in healthcare cloud migrationGuest Socials: Kyler's Linkedin + Jack's Linkedin Podcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter - Cloud Security BootCampIf you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity PodcastQuestions asked:(00:00) Introduction(01:55) A bit about Kyler and Jack(03:18) Security Challenges in Medical Industry(06:01) Where to start when migrating from data centres to AWS?(07:42) Networking Challenges for Regulated Industries(11:26) Networking in On-Prem vs Cloud(19:24) Security by Design considerations(29:31) The Terraform pieces(34:34) Network Firewall in Cloud(39:46) Lessons learnt from the project(46:21) The Fun SectionResources:Let's Do DevOps - Kyler's Website Jack's WebsiteDay Two DevOps - Podcast Co-Hosted by Kyler
Join Howard Lindzon, Michael Parekh, Phil Pearlman, and special guests Adeniyi Abiodun (Co-Founder of Mysten Labs and Sui) and Shomik Ghosh (Investor at Boldstart Ventures) for a jam-packed episode of Trends with Friends. This week, the crew dives into the wild world of crypto, AI, and global markets. From peak degeneracy in stocks like Tesla, Palantir, and Solana to Sui's rise in Web3 and why cybersecurity is more critical than ever, this episode has it all. Plus, insights on Nvidia's dominance, the next wave of Web3 consumer apps, and the geopolitical risks shaping the economy.
On this episode of The Cybersecurity Defenders Podcast, we talk about security issues in the Arctic with Deepak Dutt, Founder of Zighra.Deepak is a technology leader and entrepreneur on a mission to secure the future against AI-powered threats and to inspire founders to transform their ideas from zero to meaningful impact.Deepak's career began in the software space, inspired by his father's passion for technology. In his late teens, he founded his first company in the eLearning space, which he successfully led to an acquisition, relocating to Ottawa at the age of 21.While in Ottawa, Deepak balanced graduate studies with roles at Newbridge Networks and Nortel, where he spent nearly a decade gaining expertise in product development, go-to-market strategy, and technological innovation. These experiences reinforced his drive to harness technology's transformative potential.In 2009, Deepak founded his second startup, a cloud-based cybersecurity company. Over the years, he has participated in leading accelerators worldwide, including Barclays/Techstars, Creative Destruction Labs, and the Canadian Technology Accelerator. Today, as Founder and CEO of Zighra, he is building an operating system designed to defend against AI-powered attacks, working with financial institutions and governments to deliver robust security solutions powered by explainable AI, behavioral biometrics, and contextual intelligence.A passionate advocate of the Zero to Impact philosophy, Deepak is committed to inspiring tech founders to embrace big challenges and develop innovations that drive meaningful change.
Three years into the invasion of Ukraine, and amid the Trump administration's rapid shift in US-Russia relations, can European and NATO allies continue to rely on the United States for support? On the GZERO World Podcast, Ian Bremmer is on the ground in Germany on the sidelines of the Munich Security Conference for a hard look at the future of European security with US Senator Elissa Slotkin. World leaders and diplomats gathered at the annual conference to discuss global security challenges, but the biggest story, by far, in Munich was the news of President Trump's 90-minute phone call with Vladimir Putin, which upended three years of US-led efforts to isolate Russia diplomatically. The Trump administration is emphatic: it wants an end to the war and that Europe is responsible for maintaining peace in any ceasefire deal. But can Europe guarantee Ukraine's security without US support? Later in the episode, GZERO's Tony Maciulis speaks with Alina Polyakova, President and CEO of the Center for European Policy Analysis, to discuss the reaction to the Trump-Putin call and growing fears that NATO allies will be left on the sidelines of peace negotiations in Ukraine.Host: Ian BremmerGuest: Elissa Slotkin Subscribe to the GZERO World with Ian Bremmer Podcast on Apple Podcasts, Spotify, or your preferred podcast platform, to receive new episodes as soon as they're published.
Three years into the invasion of Ukraine, and amid the Trump administration's rapid shift in US-Russia relations, can European and NATO allies continue to rely on the United States for support? On the GZERO World Podcast, Ian Bremmer is on the ground in Germany on the sidelines of the Munich Security Conference for a hard look at the future of European security with US Senator Elissa Slotkin. World leaders and diplomats gathered at the annual conference to discuss global security challenges, but the biggest story, by far, in Munich was the news of President Trump's 90-minute phone call with Vladimir Putin, which upended three years of US-led efforts to isolate Russia diplomatically. The Trump administration is emphatic: it wants an end to the war and that Europe is responsible for maintaining peace in any ceasefire deal. But can Europe guarantee Ukraine's security without US support? Later in the episode, GZERO's Tony Maciulis speaks with Alina Polyakova, President and CEO of the Center for European Policy Analysis, to discuss the reaction to the Trump-Putin call and growing fears that NATO allies will be left on the sidelines of peace negotiations in Ukraine.Host: Ian BremmerGuest: Elissa Slotkin Subscribe to the GZERO World with Ian Bremmer Podcast on Apple Podcasts, Spotify, or your preferred podcast platform, to receive new episodes as soon as they're published.
In this episode of the Fearless Mindset Podcast, we engage with renowned figures in security, business, and entertainment leadership. Discussions include the evolving landscape of security leadership, the importance of mentorship, and being approachable for those new in the industry. Key points include transitioning from a cost center mindset to business acumen in security, assessing value and pricing in high-value problem-solving, and the increasing demand for women in executive protection roles. The conversation extends to challenges, ethical considerations, technology's impact, and the critical role of AI and machine learning in being proactive rather than reactive in security. The episode highlights valuable insights on mentorship, career progression, and the importance of building relationships within the industry.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSAdaptability in Security Leadership: Emphasizes the need for new security leaders to be adaptable, humble, and collaborative to achieve success.Importance of Mentorship: Mentorship seen as invaluable for individuals navigating the security industry.Business Acumen in Security: Critical for security professionals to understand and speak the language of business for better integration within organizations.Respect for Client Privacy: Advises caution with social media to protect client confidentiality.Value of Diverse Skills: Encourages professionals to take on tasks that allow skill development rather than passing them off.Predictive Risk Management: Future advancements in technology, particularly AI and machine learning, will enable security to be more proactive than reactive.QUOTES"One of the biggest lies...is that we're a cost center. We really provide no value here. We're just security.""You have to be cautious with social media... Watch what you post because your clients look at it.""If I'm weak somewhere, I know Tim is strong somewhere... and be humble.""AI without machine learning is just Alexa."To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
Scammers Exploit DeepSeek Hype & Jailbreak OpenAI's O3 Mini – TechNewsDay Update In this episode, we uncover how scammers are exploiting the recent hype around DeepSeek, a new AI model, by creating fake websites, counterfeit cryptocurrency tokens, and malware-laced downloads. We also discuss the jailbreaking of OpenAI's newly released O3 mini model, highlighting its security vulnerabilities. Additionally, a woman is sought by police for purchasing an iPhone using a stolen identity in a London Apple store. Stay tuned for important updates on cybersecurity, AI advancements, and fraud prevention. 00:00 Scammers Exploit DeepSeek Hype 01:43 DeepSeek's Security Challenges 04:10 OpenAI's O3 Mini Model Jailbreak 06:49 iPhone Fraud in London Apple Store 07:44 Conclusion and Call for Tips
Scott Jennings dives deep into the current political landscape, discussing Tulsi Gabbard's confirmation as Director of National Intelligence, evaluating her qualifications and past statements. He also addresses Trump's influence within the Republican Party, his comments on the Israel-Hamas war and his stance towards Hamas. The conversation extends to the challenges Trump's executive orders face in court and the ongoing debates about the roles of the judiciary and the executive branch.
Rogers for America with Lt. Steve Rogers – National security is in serious danger, and it's time for everyone to take notice. From government discussions to the sacrifices of our military, this piece highlights the urgent need for public awareness and action. Protecting our nation's safety requires understanding the threats we face and embracing our responsibility to future generations.
While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, The BlueHat Podcast by Microsoft and MSRC. See you in 2025! Yonatan Zunger, CVP of AI Safety & Security at Microsoft joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Yonatan explains the distinction between generative and predictive AI, noting that while predictive AI excels in classification and recommendation, generative AI focuses on summarizing and role-playing. He highlights how generative AI's ability to process natural language and role-play has vast potential, though its applications are still emerging. He contrasts this with predictive AI's strength in handling large datasets for specific tasks. Yonatan emphasizes the importance of ethical considerations in AI development, stressing the need for continuous safety engineering and diverse perspectives to anticipate and mitigate potential failures. He provides examples of AI's positive and negative uses, illustrating the importance of designing systems that account for various scenarios and potential misuses. In This Episode You Will Learn: How predictive AI anticipates outcomes based on historical data The difficulties and strategies involved in making AI systems safe and secure from misuse How role-playing exercises help developers understand the behavior of AI systems Some Questions We Ask: What distinguishes predictive AI from generative AI? Can generative AI be used to improve decision-making processes? What is the role of unit testing and test cases in policy and AI system development? Resources: View Yonatan Zunger on LinkedIn View Wendy Zenone on LinkedIn View Nic Fillingham on LinkedIn Related Microsoft Podcasts: Microsoft Threat Intelligence Podcast Afternoon Cyber Tea with Ann Johnson Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Learn more about your ad choices. Visit megaphone.fm/adchoices
Yonatan Zunger, CVP of AI Safety & Security at Microsoft joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Yonatan explains the distinction between generative and predictive AI, noting that while predictive AI excels in classification and recommendation, generative AI focuses on summarizing and role-playing. He highlights how generative AI's ability to process natural language and role-play has vast potential, though its applications are still emerging. He contrasts this with predictive AI's strength in handling large datasets for specific tasks. Yonatan emphasizes the importance of ethical considerations in AI development, stressing the need for continuous safety engineering and diverse perspectives to anticipate and mitigate potential failures. He provides examples of AI's positive and negative uses, illustrating the importance of designing systems that account for various scenarios and potential misuses. In This Episode You Will Learn: How predictive AI anticipates outcomes based on historical data The difficulties and strategies involved in making AI systems safe and secure from misuse How role-playing exercises help developers understand the behavior of AI systems Some Questions We Ask: What distinguishes predictive AI from generative AI? Can generative AI be used to improve decision-making processes? What is the role of unit testing and test cases in policy and AI system development? Resources: View Yonatan Zunger on LinkedIn View Wendy Zenone on LinkedIn View Nic Fillingham on LinkedIn Related Microsoft Podcasts: Microsoft Threat Intelligence Podcast Afternoon Cyber Tea with Ann Johnson Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Join Monte Judah as he looks at the state of the world and the Holy Land. In this latest episode, Monte provides comprehensive analysis of current Middle East developments, including hostage negotiations, regional conflicts, and diplomatic efforts, with insights into Iran's nuclear program and security challenges. HaYovel: https://serveisrael.com/ TheIsraelGuys.com Support Charities: United Nations for Israel: https://unitednationsforisrael.org/unify-donations/ Israeli Red Cross: https://secure.afmda.org/site/Donation2?df_id=2000&2000.donation=form1&s_src=GNRLWEB&FURL=UR The Nazarine Fund: https://donate.mercuryone.org/site/Donation2?df_id=1501&mfc_pref=T&1501.donation=form1 Featured Products: Dark Blue Jerusalem Kippah: https://messianicmarketplace.org/products/dark-blue-jerusalem-kippah For more information: Your donations make this show possible: https://www.messianicworldupdate.com/ambassador-level Newest DVD Teaching by Monte Judah: https://www.messianicmarketplace.org/search?type=product&q=messianic+teachings+for+christians Other Monte Judah Links: https://thegreaterexodus.com/ https://www.messianicmarketplace.org/collections/monte-judah Other Lion and Lamb Links: https://www.lionandlambministries.org/ https://LionandLamb.tv/ https://www.messianicmarketplace.org/ https://www.yavohmagazine.com/ https://www.campyeshua.com/ Contact Us at: info@lionlamb.co
The Twenty Minute VC: Venture Capital | Startup Funding | The Pitch
Guy Podjarny founded Tessl, Snyk and Blaze. Tessl is reimagining software development for the AI era and shaping AI Native Development. Snyk created and leads the Developer Security category, and is now a multi-billion dollar company with over 1,000 employees. Guy was previously CTO at Akamai (following its acquisition of Blaze), is an active angel investor, and co-hosts of the AI Native Dev podcast. In Today's Episode with Guy Podjarny We Discuss: 03:02 Discussion on NVIDIA's Market Position 04:14 Will We See a Trough of Disillusionment in AI 07:36 The Future of AI Development and Specialized Models 10:17 Challenges and Opportunities in AI Dev Tools 17:41 Concerns About Closed vs. Open Development Platforms 21:27 Speculations on AI's Role in Application Layers 24:40 Google's Competitive Edge 25:28 IPO and M&A in the Trump Era 26:45 The Future Role of Software Developers 32:20 Security Challenges in AI Development 33:41 Spicy Questions and Charity Donations 36:05 Quickfire Round: Insights and Advice
Guest: Abbas Kudrati, Asia's SMC Regional Chief Security, Risk, Compliance Advisor, Microsoft [@Microsoft]On LinkedIn | https://www.linkedin.com/in/akudrati/On Twitter | https://twitter.com/askudratiHosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesDuring the On Location series at AISA Cyber Con 2024 in Melbourne, a significant conversation unfolded between Sean Martin, Marco Ciappelli, and Abbas Kudrati about key cybersecurity themes and strategies relevant to the Asia-Pacific region.Abbas Kudrati, a seasoned cybersecurity professional and cloud advocate, shared insights into the state of cybersecurity in the region. He highlighted that ransomware remains one of the top threats, particularly in Asia and Australia. This persistent issue underscores the importance of robust data governance and access control. Abbas emphasized that organizations must establish strong security foundations, including data classification and access management, to prepare for the complexities introduced by AI. Without these measures, companies risk exposing sensitive information when leveraging generative AI solutions.The discussion also touched on data sovereignty, a critical topic for governments and defense organizations in Australia. Abbas noted the growing number of localized data centers built by major cloud providers to meet sovereignty requirements. While private sector organizations tend to be less stringent about data location, government entities require data to remain onshore. Frameworks like IRAP and Essential Eight are instrumental in ensuring compliance and guiding organizations in implementing consistent security practices.Zero Trust emerged as a transformative concept post-pandemic. According to Abbas, it simplified cybersecurity by enabling secure remote work and encouraging organizations to embrace cloud solutions. He contrasted this with the rise of generative AI, which has introduced both opportunities and challenges. AI's potential to streamline processes, such as analyzing security alerts and automating vulnerability management, is undeniable. However, its unbounded nature demands new strategies, including employee education on prompt engineering and responsible AI use.Sean Martin and Marco Ciappelli explored how AI can revolutionize operations. Abbas pointed out that AI tools like security copilots are making cybersecurity more accessible, allowing analysts to query systems in natural language and accelerating incident response. He stressed the importance of using AI defensively to match the speed and sophistication of modern attackers, noting that attackers are increasingly leveraging AI for malicious activities.The conversation concluded with a forward-looking perspective on AI's role in shaping cybersecurity and the importance of maintaining agility and preparedness in the face of evolving threats. This dynamic exchange provided a comprehensive view of the challenges and advancements influencing cybersecurity in the Asia-Pacific region today.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More
Karl and Erum bring on Dr. Alexander Titus, a commissioner on the National Security Commission on Emerging Biotechnology, to explore the exciting and challenging intersections of biotechnology and policy. Alexander shares his experiences from his unique journey across academia, government, and industry, diving into the role of biosecurity, the potential of synthetic biology, and the emerging convergence of tech and bio. They discuss ambitious projects like de-extincting the woolly mammoth, advances in biodefense, and the impacts of AI on biotech innovation. It's a conversation that sheds light on how cutting-edge biotech could shape the future and the necessary balance between innovation and ethical responsibility. Grow Everything brings the bioeconomy to life. Hosts Karl Schmieder and Erum Azeez Khan share stories and interview the leaders and influencers changing the world by growing everything. Biology is the oldest technology. And it can be engineered. What are we growing? Learn more at www.messaginglab.com/groweverything Chapters: 00:00:00 - Behind the Scenes of Bureaucracy 00:00:30 - Democracy's Turning Point 00:02:23 - A Fiery Day in Prospect Park 00:04:20 - How Spaces Shape Our Health 00:08:35 - Enter Alexander Titus: Biosecurity Visionary 00:10:13 - Biotech: The New Face of National Defense 00:15:09 - Where Tech and Policy Collide 00:23:10 - The Future of Biosecurity Unfolds 00:28:02 - Bold Science vs. Ethical Boundaries 00:30:24 - Robotics Meets Biotech: What's Next? 00:33:29 - Hard Lessons from Cross-Industry Giants 00:35:49 - Innovation Clashes with Red Tape 00:36:11 - The Power of Expertise in Shaping Policy 00:42:26 - Biotech's Hidden Environmental Risks 00:45:42 - The Commission's Bold Path Forward 00:48:45 - Parting Thoughts: What Lies Ahead Topics Covered: biotech, biosecurity, national security commission on emerging biotechnology, policy Episode Links: The Wild Life of Our Bodies by Robb Dunn Geerat Vermeij BTO - Biological Technologies Office of DARPA Bioeconomy.XYZ The Nobel Turing Challenge Range by David Epstein NSCEB Interim Report AI Safety Institute The Echo Wife by Sara Gailey Have a question or comment? Message us here: Text or Call (804) 505-5553 Instagram / TikTok / Twitter / LinkedIn / Youtube / GrowEverything website Email: groweverything@messaginglab.com Music by: Nihilore Production by: Amplafy Media
#ISRAEL: Rocketed everyday in the hundreds. Lieutenant Colonel (Res.) Sarit Zehavi. Founder and president of Alma – a nonprofit and an independent research and education center specializing in Israel's security challenges on its northern border. 1950 Ramallah
In this episode, we sat down with Lukasz Gogolkiewicz, an Australia-based Cybersecurity Leader and former pentester, to explore his journey from offensive security into cybersecurity leadership. Lukasz, also a speaker coach at BlackHat USA, brings valuable insights into what it takes to shift from being technical to managing compliance, governance, and broader security programs in industries like retail and advertising. Throughout the conversation, we dive into the specific challenges of transitioning from a purely cloud-based tech company to a bricks-and-mortar retail operation, highlighting how the threat models differ dramatically between these environments. Lukasz shares his unique perspective on cybersecurity frameworks like NIST CSF 2.0, essential for building resilient programs, and offers practical advice for selecting the right framework based on your organization's needs. Guest Socials: Lukasz's Linkedin Podcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - Cloud Security Podcast- Youtube - Cloud Security Newsletter - Cloud Security BootCamp Questions asked: (00:00) Introduction (03:00) A bit about Lukasz (04:32) Security Challenges for Tech First advertising company (05:16) Security Challenges for Retail Industry (06:00) Difference between the two industries (07:01) Best way to build Cybersecurity Program (09:44) NIST CSF 2.0 (13:02) Why go with a framework? (16:26) Which framework to start with for your cybersecurity program? (18:33) Technical CISO vs Non Technical CISO (25:37) The Fun Section Resources spoken about during the interview: NIST CSF 2.0 CIS Benchmark ASD Essential Eight Mapping between the frameworks https://www.cisecurity.org/insights/white-papers/cis-controls-v8-mapping-to-nist-csf-2-0 https://www.cisecurity.org/insights/white-papers/cis-controls-v8-mapping-to-asds-essential-eight Verizon Data Breach Investigations Report (DBIR) Lukasz Woodwork Channel BSides Melbourne
Today on Borderland, Vince sits down with former CIA covert operations officer and host of The President's Daily Brief podcast, Mike Baker. Mike has over 15 years of experience in counterterrorism, counter-narcotics, and intelligence operations worldwide. After his career in the CIA, he transitioned into the private sector, co-founding a global intelligence and security firm called Diligence LLC, which provides services in risk management and investigative support. BORDERLAND is an IRONCLAD Original. SPONSORS: MTNTOUGH FITNESS Go to: https://mtntough.com/ and download the MTNTOUGH app today, and use code “BORDERLAND” To get a 14-day free trial and one month free! That's six weeks of MTNTOUGH at no cost. Learn more about your ad choices. Visit megaphone.fm/adchoices
October 17, 2024: Josh Howell, Sales Engineering Manager (Healthcare East/Central) at Rubrik, and David Houlding, Director of Global Healthcare Security and Compliance Strategy at Microsoft Join Sarah and Bill for a Webinar. They delve into how their integrated approach strengthens cybersecurity and disaster recovery for healthcare organizations. How do cloud migrations and zero-trust architectures enhance security and cost-efficiency, especially in an industry prone to ransomware? The conversation highlights the complexity of modern healthcare environments, from multi-cloud infrastructures to compliance challenges. Key Points:02:37 Microsoft and Rubrik Partnership09:40 Ransomware Resilience and Data Recovery21:46 The Importance of Zero Trust Security26:00 Risk Minimization and Cost Savings27:50 Disaster Recovery in Cloud Migration33:06 Security Challenges and Solutions in Cloud Adoption47:32 The Human Element in CybersecuritySubscribe: This Week HealthTwitter: This Week HealthLinkedIn: Week HealthDonate: Alex's Lemonade Stand: Foundation for Childhood Cancer
Have you ever wondered how real-life altercations and unpredictable confrontations can completely shift your mindset and approach to life? In today's world, understanding how to manage aggression, make quick decisions under pressure, and adapt as you age can be the difference between staying safe or being caught off guard. This episode explores how these critical lessons apply to both everyday life and high-stress situations. Gain insights from experts in street altercations and security confrontations that you won't hear anywhere else. Learn how combat sports and survival instincts can sharpen your awareness and decision-making. Discover the profound impact of life experiences on your character and how these can shape your growth over time. Don't miss this episode—listen now to unlock these life-changing insights and start applying them to your own mindset today! Reflecting on Life's Tough Lessons: From Street Fights to Personal Growth In this episode of The Jiu Jitsu Mindset, Pete Deeley hosts Professor Todd Fox and other speakers as they reflect on personal anecdotes and transformative experiences. Discussions range from street and security altercations, the unpredictability of confrontations, and the critical lessons learned. They emphasize the importance of being aware of one's environment, understanding the implications of actions, and the shift in decision-making across different life stages. Insights from combat sports and survival instincts are also explored, highlighting how violence, aggression management, and ethical considerations shape personal growth. Listeners are encouraged to appreciate the evolving nature of choices and the cumulative impact of life experiences on character development. 00:00 Introduction and Guest Welcome 00:49 Defining Memorable Fights 01:44 A Lesson in Character and Friendship 04:20 The Fight That Changed Everything 08:15 Lessons Learned from Defeat 16:27 Security Challenges on Tour 22:45 Unexpected Conflict and Quick Thinking 26:39 The Thin Line Between Safety and Aggression 27:38 The Paradox of De-escalation and Assertion 29:01 Legal and Moral Compass in Self-Defense 29:52 Cultural Contexts and Survival Instincts 34:23 Generational Lessons and Street Wisdom 38:23 The Core of Human Behavior: Survival 54:09 Adapting to Different Environments 56:39 Final Thoughts and Reflections
In this Replay of Screaming in the Cloud, we revisit our inspiring conversation with Jackie Singh. At the time, she had recently served as a senior cybersecurity staffer at the Biden campaign. But her venerated career is considerably more than that alone. Jackie's time spent in the Army, at the DoD, and eventually at work in the commercial world allows her to bring an adroit sensibility to her work and to this episode. Jackie goes into detail on her time spent at the Biden campaign and the intricacies of working in such highly politicized, and short term, environment. The cyber security threats she faced there were paramount, to downplay it, and have given Jackie a rich and constantly developing perspective on security. That in combination with her career has helped her develop a perspective that she has kindly discussed in detail during this episode! Tune in for the whole story.Show Highlights(0:00) Intro(1:16) Backblaze sponsor read(1:42) Working for the 2020 Biden Campaign(4:45) The high-stakes world of political information security(10:08) Breaking down Jackie's impressive resume(12:38) Being the target of a far-right tabloid hit piece(16:24) Contemporary politics, bad faith discourse, and its role in tech(23:34) Common Fate sponsor read(24:03) The ethics of reporting InfoSec vulnerabilities(31:13) Explaining “threat modeling”(36:49) Where you can find more from JackieAbout Jackie SinghJackie Singh is an Information Security professional with more than 20 years of hacking experience, beginning in her preteen. She began her career in the US Army, and deployed to Iraq in 2003. Jackie subsequently spent several years in Iraq in cleared roles for the Department of Defense.She is now an independent consultant. Her passion extends to evangelizing best practices, writing and research for her blog, tweeting informative content, speaking at conferences, contributing to podcasts, and collaborating with fellow journalists and security professionals.Links:Disclose.io: https://disclose.ioTwitter: https://twitter.com/hackingbutlegalOriginal Episode:https://www.lastweekinaws.com/podcast/screaming-in-the-cloud/security-challenges-and-working-for-president-biden-with-jackie-singh/SponsorsBackblaze: https://www.backblaze.com/Common Fate: http://commonfate.io/
Snir Ben Shimol from ZEST Security on their work, "How we hacked a cloud production environment by exploiting Terraform providers." In this blog, ZEST discusses the security risks associated with Terraform providers, particularly those from community sources. The research highlights the importance of carefully vetting providers, regular scanning, and following best practices like version pinning to mitigate potential vulnerabilities in cloud infrastructure management. The research can be found here: The hidden risks of Terraform providers Learn more about your ad choices. Visit megaphone.fm/adchoices
Northern Israel: Under constant attack. Lieutenant Colonel (Res.) Sarit Zehav iFounder and president of Alma – a nonprofit and an independent research and education center specializing in Israel's security challenges on its northern border. Malcolm Hoenlein @Conf_of_pres @mhoenlein1 1903 Galilee