POPULARITY
Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today’s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot... Read more »
Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today’s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot... Read more »
LINKS: https://distrust.co/software.html - Software page with OSS software Linux distro: https://codeberg.org/stagex/stagex Milksad vulnerability: https://milksad.info/ In this episode of Cybersecurity Today on the Weekend, host Jim Love engages in a captivating discussion with Anton Livaja from Distrust. Anton shares his unique career transition from obtaining a BA in English literature at York University to delving into cybersecurity and tech. Anton recounts how he initially entered the tech field through a startup and quickly embraced programming and automation. The conversation covers Anton's interest in Bitcoin and blockchain technology, including the importance of stablecoins, and the frequent hacking incidents in the crypto space. Anton explains the intricacies of blockchain security, emphasizing the critical role of managing cryptographic keys. The dialogue also explores advanced security methodologies like full source bootstrapping and deterministic builds, and Anton elaborates on the significance of creating open-source software for enhanced security. As the discussion concludes, Anton highlights the need for continual curiosity, teamwork, and purpose-driven work in the cybersecurity field. 00:00 Introduction to Cybersecurity Today 00:17 Anton's Journey from Literature to Cybersecurity 01:08 First Foray into Programming and Automation 02:35 Blockchain and Its Real-World Applications 04:36 Security Challenges in Blockchain and Cryptocurrency 13:21 The Rise of Insider Threats and Social Engineering 16:40 Advanced Security Measures and Supply Chain Attacks 22:36 The Importance of Deterministic Builds and Full Source Bootstrapping 29:35 Making Open Source Software Accessible 31:29 Blockchain and Supply Chain Traceability 33:34 Ensuring Software Integrity and Security 38:20 The Role of AI in Code Review 40:37 The Milksad Incident 46:33 Introducing Distrust and Its Mission 52:23 Final Thoughts and Encouragement
In this episode of the Revenue Builders Podcast, hosts John McMahon and John Kaplan are joined by Matt Maloney, SVP of Global Sales at Fireblocks. The discussion dives deep into Matt's background in B2B sales, his journey into the world of cryptocurrency, and how Fireblocks is revolutionizing blockchain security. Matt shares insights on the importance of adaptable, coachable sales teams and the application of traditional sales disciplines to new and emerging markets. The conversation also touches on strategic decision-making when entering new markets, the relevance of a strong ideal customer profile, and how foundational sales processes like MEDDPICC contribute to scaling success. The episode concludes with a nod to the influential book 'Inside the Tornado' by Geoffrey Moore and its relevance to Fireblocks' strategy.ADDITIONAL RESOURCESLearn more about Matt Maloney:https://www.linkedin.com/in/matt-maloney-75698/Read Force Management's Guide to Embedding AI In Your B2B Sales Organization: https://hubs.li/Q03ldrzD0Download the CRO Strategy Checklist: https://hubs.li/Q03f8LmX0Enjoying the podcast? Sign up to receive new episodes straight to your inbox: https://hubs.li/Q02R10xN0HERE ARE SOME KEY SECTIONS TO CHECK OUT[00:02:13] Matt Maloney's Journey into Crypto[00:02:55] Understanding Fireblocks and Blockchain[00:06:36] The Role of Stablecoins[00:10:28] Security Challenges in Crypto[00:23:18] Adapting Traditional Sales Disciplines to Emerging Markets[00:34:44] Mitigating Risk in Emerging Markets[00:35:07] The Importance of Continuous Development[00:37:11] Building Trust and Credibility[00:38:07] Characteristics of Successful Salespeople[00:39:41] Company Responsibility in Employee Development[00:41:02] Aligning Company Goals with Sales Strategies[00:46:05] Avoiding Shiny Object Syndrome[00:48:36] The Role of Ideal Customer Profiles[00:49:43] Lessons from Mentorship and Experience[00:58:00] The Innovator's JourneyHIGHLIGHT QUOTES"Your job is to figure out hitting the number and making sure you're calibrating your resources, that you hit the number, because that's foundation to our jobs as sales leaders.""If you can be part of a disruptive movement... it could be game-changing.""You need people that are coachable that will take the time to listen and learn about what this market is."
Send us a textCameron and Gabe return after a brief hiatus to explore major developments in security, privacy, and resilience. They dive into insights from the IAPP conference and VeeamOn, examining how AI governance and outdated privacy tools are reshaping the industry landscape.• AI governance frameworks dominated IAPP discussions with companies "building the plane as they're flying"• Verizon's Data Breach Report debunks overblown AI security fears, showing real risks are data leakage and poor access controls• Growing frustration with outdated privacy management tools is driving demand for better solutions• Security posture isn't about using recognized brands but about architecture without dangerous gaps• Sam Altman's virtual appearance at IAPP disappointed attendees expecting an in-person keynoteStay tuned for our bonus episode covering even more developments from this busy week in privacy and security! Support the show
As countries in the Eastern Mediterranean - particularly Greece, Cyprus, and Israel - deepen their ties, they are also faced with the challenges posed by malign actors across the region. This includes countries like Russia, Iran, and Turkey, but also non-state actors like Hamas, Hezbollah and the Houthis in the Red Sea. Jonathan Spyer, director of research at the Middle East Forum and a contributor to the Jerusalem Post, the Wall Street Journal and The Australian, joins Thanos Davelis as we explore these security challenges and look at how East Med countries can work together to address them.You can read the articles we discuss on our podcast here:No One Should Be Surprised About the Syrian MassacresTurkey, Israel have begun talks to avoid clashes in Syria, sources sayHigh-stakes poker over energy linkPM: ‘A trade war only produces losers'
Experts are warning Ireland's maritime security is facing critical challenges due to underfunding, outdated infrastructure, and a lack of coordination across agencies. Brendan Flynn, University of Galway politics lecturer and specialist in maritime security.
Today, we're going over your questions. You guys had some follow-ups about my stalker, Timothy C., and I'll be giving you a few more details on that situation. We're also unpacking the RFK Jr. sex scandal—what's real, what's spin, and what it all means. Plus, the government's leaked text messages have been making waves, and I'll be breaking down what they reveal and why you should (and shouldn't) care.—https://policecoffee.com/?gad_source=1&gbraid=0AAAAACG7qmI1dmMkruwgp8vA8w0oECKla&gclid=Cj0KCQjwtJ6_BhDWARIsAGanmKfdkRQ1M1sighZQ-PGpEpsCjrZ8fCigidnvH55bfBUNMa56-yoy_A8aAv34EALw_wcB—https://open.spotify.com/episode/7CcmZWvQEaLTQAQRAFy2BQ?si=FgeO4b9QSi-5eB2cqX2XHw
In this episode of the Security Matters podcast, host David Puner is joined by Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, to explore the transformative impact of AI agents on cybersecurity and automation. They discuss real-world scenarios where AI agents monitor security logs, flag anomalies, and automate responses, highlighting both the opportunities and risks associated with these advanced technologies.Lavi shares insights into the evolution of AI agents, from chatbots to agentic AI, and the challenges of building trust and resilience in AI-driven systems. The conversation delves into the latest research areas, including safety, privacy, and security, and examines how different industries are adopting AI agents to handle vast amounts of data.Tune in to learn about the critical security challenges posed by AI agents, the importance of trust in automation, and the strategies organizations can implement to protect their systems and data. Whether you're a cybersecurity professional or simply curious about the future of AI, this episode offers valuable insights into the rapidly evolving world of AI agents.
Jason Brenner is the RVP of Healthcare & Lifesciences at LiveRamp and has been working in the advertising and ad tech industries for over 20 years. He is leading efforts on building data connectivity solutions for the healthcare and life sciences industries. Prior to LiveRamp, Jason has held leadership positions at Placed, Verve, PayPal, Time Inc., The New York Times, and Condé Nast. In this episode… Companies in industries like healthcare and life sciences are leveraging data collaboration to collect valuable insights to drive innovation and improve customer experiences. However, for many organizations, balancing data collaboration with privacy, security, and regulatory compliance obligations remains a significant challenge. With consumer trust at stake, and the risks of improper data handling, how can companies balance innovation with responsible data use? Data collaboration in healthcare presents both opportunities and challenges. Companies need to adopt privacy-by-design principles and engage legal and privacy teams early in the process. By implementing techniques such as data tokenization and de-identification, businesses can extract valuable insights while minimizing privacy and security risks. That's why companies like LiveRamp are making this process easier with a platform that transforms personally identifiable information into non-reversible tokens, allowing organizations to use data responsibly while minimizing privacy and security risks. In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels speak with Jason Brenner, RVP of Healthcare and Life Sciences at LiveRamp, about the critical role of privacy and security in data collaboration. Jason shares insights on how organizations are navigating a complex and fragmented regulatory landscape, the importance of adopting privacy-by-design principles, and engaging legal and privacy teams early in the process. He also shares how businesses can minimize data retention risks, the role of de-identification and tokenization in protecting sensitive information, and the importance of building customer trust through responsible data practices.
OT security is commonly used to protect Industrial Systems and networks from attacks. Operational technology security is used to protect and control critical infrastructures such as power stations, transportation networks and smart city appliances.Thank you for watching this video, For more details or free demo with out expert write into us at sales@infosectrain.comSubscribe to our channel to get video updates. Hit the subscribe button above.Facebook: https://www.facebook.com/Infosectrain/Twitter: https://twitter.com/Infosec_TrainLinkedIn: https://www.linkedin.com/company/infosec-train/Instagram: https://www.instagram.com/infosectrain/Telegram: https://t.me/infosectrains
In 2011, Marc Andreessen predicted that software would eat the world. Specifically, the prediction was that software companies would take over the economy and disrupt all industries. The economic prediction has mostly come true, with 9 out of 10 of the most highly valued companies being tech companies. The industry disruption didn't materialize in some cases, and outright failed in others. Healthcare seems to be one of these 'disruption-resistant' areas. Ed joins us today to discuss why that might be, and what the paths towards securing the healthcare industry might look like. Segment Resources: Ed's podcast, Risk Never Sleeps We get a visit from Tanya Janca to discuss her latest book, Alice and Bob Learn Secure Coding! Segment Resources: Tanya's latest book on Amazon Tanya's previous book, Alice and Bob Learn Application Security on Amazon Tanya's website, She Hacks Purple This week, in the enterprise security news, we've got some funding and acquisitions! ransomware payments are DOWN 35% infostealers on Macs are UP 101% Bybit got hit by a $1.5B heist and shrugged it off A SaaS report says AI is having no impact on pricing Microsoft's CEO says AI is generating no value Google is dropping SMS as a second factor Google creates a 4th state of matter instead of fixing Teams What it's like to be named “Null” All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-396
In 2011, Marc Andreessen predicted that software would eat the world. Specifically, the prediction was that software companies would take over the economy and disrupt all industries. The economic prediction has mostly come true, with 9 out of 10 of the most highly valued companies being tech companies. The industry disruption didn't materialize in some cases, and outright failed in others. Healthcare seems to be one of these 'disruption-resistant' areas. Ed joins us today to discuss why that might be, and what the paths towards securing the healthcare industry might look like. Segment Resources: Ed's podcast, Risk Never Sleeps We get a visit from Tanya Janca to discuss her latest book, Alice and Bob Learn Secure Coding! Segment Resources: Tanya's latest book on Amazon Tanya's previous book, Alice and Bob Learn Application Security on Amazon Tanya's website, She Hacks Purple This week, in the enterprise security news, we've got some funding and acquisitions! ransomware payments are DOWN 35% infostealers on Macs are UP 101% Bybit got hit by a $1.5B heist and shrugged it off A SaaS report says AI is having no impact on pricing Microsoft's CEO says AI is generating no value Google is dropping SMS as a second factor Google creates a 4th state of matter instead of fixing Teams What it's like to be named “Null” All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-396
In 2011, Marc Andreessen predicted that software would eat the world. Specifically, the prediction was that software companies would take over the economy and disrupt all industries. The economic prediction has mostly come true, with 9 out of 10 of the most highly valued companies being tech companies. The industry disruption didn't materialize in some cases, and outright failed in others. Healthcare seems to be one of these 'disruption-resistant' areas. Ed joins us today to discuss why that might be, and what the paths towards securing the healthcare industry might look like. Segment Resources: Ed's podcast, Risk Never Sleeps Show Notes: https://securityweekly.com/esw-396
In 2011, Marc Andreessen predicted that software would eat the world. Specifically, the prediction was that software companies would take over the economy and disrupt all industries. The economic prediction has mostly come true, with 9 out of 10 of the most highly valued companies being tech companies. The industry disruption didn't materialize in some cases, and outright failed in others. Healthcare seems to be one of these 'disruption-resistant' areas. Ed joins us today to discuss why that might be, and what the paths towards securing the healthcare industry might look like. Segment Resources: Ed's podcast, Risk Never Sleeps Show Notes: https://securityweekly.com/esw-396
On the GZERO World Podcast, we're bringing you two starkly different views on Ukraine's future and European security. First, Ian Bremmer speaks with Latvian Foreign Minister Baiba Braže about the growing security threats facing the Baltics—from cyberattacks and disinformation to undersea sabotage in the Baltic Sea. When an oil tanker linked to Russia's shadow fleet recently severed a vital power cable between Estonia and Finland, it was a stark reminder of how hybrid warfare is playing out beyond the battlefield. Braže warns that Putin's ambitions extend far beyond Ukraine, aiming to weaken US alliances and destabilize Europe. She also pushes back against claims that Ukraine's NATO ambitions provoked the war, calling them “complete nonsense,” and outlines why Latvia is boosting its defense spending to 5% of GDP.The conversation then shifts to Moscow, where Bremmer speaks with former Russian colonel and ex-Carnegie Moscow Center director Dmitri Trenin. Once considered a pro-Western voice, Trenin's views now align closely with the Kremlin. He argues that the fate of Ukraine should be decided primarily by Russia and the United States—not Ukraine or Europe.Host: Ian BremmerGuest: Baiba Braže & Dmitri Trenin Subscribe to the GZERO World with Ian Bremmer Podcast on Apple Podcasts, Spotify, or your preferred podcast platform, to receive new episodes as soon as they're published.
On the GZERO World Podcast, we're bringing you two starkly different views on Ukraine's future and European security. First, Ian Bremmer speaks with Latvian Foreign Minister Baiba Braže about the growing security threats facing the Baltics—from cyberattacks and disinformation to undersea sabotage in the Baltic Sea. When an oil tanker linked to Russia's shadow fleet recently severed a vital power cable between Estonia and Finland, it was a stark reminder of how hybrid warfare is playing out beyond the battlefield. Braže warns that Putin's ambitions extend far beyond Ukraine, aiming to weaken US alliances and destabilize Europe. She also pushes back against claims that Ukraine's NATO ambitions provoked the war, calling them “complete nonsense,” and outlines why Latvia is boosting its defense spending to 5% of GDP.The conversation then shifts to Moscow, where Bremmer speaks with former Russian colonel and ex-Carnegie Moscow Center director Dmitri Trenin. Once considered a pro-Western voice, Trenin's views now align closely with the Kremlin. He argues that the fate of Ukraine should be decided primarily by Russia and the United States—not Ukraine or Europe.Host: Ian BremmerGuest: Baiba Braže & Dmitri Trenin Subscribe to the GZERO World with Ian Bremmer Podcast on Apple Podcasts, Spotify, or your preferred podcast platform, to receive new episodes as soon as they're published.
AWS networking isn't as simple as it seems and when you're dealing with regulated industries like healthcare, the stakes are even higher.In this episode we sit down with Kyler Middleton and Jack W. Harter from Veradigm — who have navigated complex AWS networking challenges while migrating from on-prem data centers to the cloud.We speak about: The real struggles of moving from data centers to AWS Why networking can feel like a black box The anti-pattern that surprisingly worked best How to build secure cloud networks—without losing your sanity The hidden security & compliance challenges in healthcare cloud migrationGuest Socials: Kyler's Linkedin + Jack's Linkedin Podcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter - Cloud Security BootCampIf you are interested in AI Cybersecurity, you can check out our sister podcast - AI Cybersecurity PodcastQuestions asked:(00:00) Introduction(01:55) A bit about Kyler and Jack(03:18) Security Challenges in Medical Industry(06:01) Where to start when migrating from data centres to AWS?(07:42) Networking Challenges for Regulated Industries(11:26) Networking in On-Prem vs Cloud(19:24) Security by Design considerations(29:31) The Terraform pieces(34:34) Network Firewall in Cloud(39:46) Lessons learnt from the project(46:21) The Fun SectionResources:Let's Do DevOps - Kyler's Website Jack's WebsiteDay Two DevOps - Podcast Co-Hosted by Kyler
Join Howard Lindzon, Michael Parekh, Phil Pearlman, and special guests Adeniyi Abiodun (Co-Founder of Mysten Labs and Sui) and Shomik Ghosh (Investor at Boldstart Ventures) for a jam-packed episode of Trends with Friends. This week, the crew dives into the wild world of crypto, AI, and global markets. From peak degeneracy in stocks like Tesla, Palantir, and Solana to Sui's rise in Web3 and why cybersecurity is more critical than ever, this episode has it all. Plus, insights on Nvidia's dominance, the next wave of Web3 consumer apps, and the geopolitical risks shaping the economy.
On this episode of The Cybersecurity Defenders Podcast, we talk about security issues in the Arctic with Deepak Dutt, Founder of Zighra.Deepak is a technology leader and entrepreneur on a mission to secure the future against AI-powered threats and to inspire founders to transform their ideas from zero to meaningful impact.Deepak's career began in the software space, inspired by his father's passion for technology. In his late teens, he founded his first company in the eLearning space, which he successfully led to an acquisition, relocating to Ottawa at the age of 21.While in Ottawa, Deepak balanced graduate studies with roles at Newbridge Networks and Nortel, where he spent nearly a decade gaining expertise in product development, go-to-market strategy, and technological innovation. These experiences reinforced his drive to harness technology's transformative potential.In 2009, Deepak founded his second startup, a cloud-based cybersecurity company. Over the years, he has participated in leading accelerators worldwide, including Barclays/Techstars, Creative Destruction Labs, and the Canadian Technology Accelerator. Today, as Founder and CEO of Zighra, he is building an operating system designed to defend against AI-powered attacks, working with financial institutions and governments to deliver robust security solutions powered by explainable AI, behavioral biometrics, and contextual intelligence.A passionate advocate of the Zero to Impact philosophy, Deepak is committed to inspiring tech founders to embrace big challenges and develop innovations that drive meaningful change.
Three years into the invasion of Ukraine, and amid the Trump administration's rapid shift in US-Russia relations, can European and NATO allies continue to rely on the United States for support? On the GZERO World Podcast, Ian Bremmer is on the ground in Germany on the sidelines of the Munich Security Conference for a hard look at the future of European security with US Senator Elissa Slotkin. World leaders and diplomats gathered at the annual conference to discuss global security challenges, but the biggest story, by far, in Munich was the news of President Trump's 90-minute phone call with Vladimir Putin, which upended three years of US-led efforts to isolate Russia diplomatically. The Trump administration is emphatic: it wants an end to the war and that Europe is responsible for maintaining peace in any ceasefire deal. But can Europe guarantee Ukraine's security without US support? Later in the episode, GZERO's Tony Maciulis speaks with Alina Polyakova, President and CEO of the Center for European Policy Analysis, to discuss the reaction to the Trump-Putin call and growing fears that NATO allies will be left on the sidelines of peace negotiations in Ukraine.Host: Ian BremmerGuest: Elissa Slotkin Subscribe to the GZERO World with Ian Bremmer Podcast on Apple Podcasts, Spotify, or your preferred podcast platform, to receive new episodes as soon as they're published.
Three years into the invasion of Ukraine, and amid the Trump administration's rapid shift in US-Russia relations, can European and NATO allies continue to rely on the United States for support? On the GZERO World Podcast, Ian Bremmer is on the ground in Germany on the sidelines of the Munich Security Conference for a hard look at the future of European security with US Senator Elissa Slotkin. World leaders and diplomats gathered at the annual conference to discuss global security challenges, but the biggest story, by far, in Munich was the news of President Trump's 90-minute phone call with Vladimir Putin, which upended three years of US-led efforts to isolate Russia diplomatically. The Trump administration is emphatic: it wants an end to the war and that Europe is responsible for maintaining peace in any ceasefire deal. But can Europe guarantee Ukraine's security without US support? Later in the episode, GZERO's Tony Maciulis speaks with Alina Polyakova, President and CEO of the Center for European Policy Analysis, to discuss the reaction to the Trump-Putin call and growing fears that NATO allies will be left on the sidelines of peace negotiations in Ukraine.Host: Ian BremmerGuest: Elissa Slotkin Subscribe to the GZERO World with Ian Bremmer Podcast on Apple Podcasts, Spotify, or your preferred podcast platform, to receive new episodes as soon as they're published.
In this episode of the Fearless Mindset Podcast, we engage with renowned figures in security, business, and entertainment leadership. Discussions include the evolving landscape of security leadership, the importance of mentorship, and being approachable for those new in the industry. Key points include transitioning from a cost center mindset to business acumen in security, assessing value and pricing in high-value problem-solving, and the increasing demand for women in executive protection roles. The conversation extends to challenges, ethical considerations, technology's impact, and the critical role of AI and machine learning in being proactive rather than reactive in security. The episode highlights valuable insights on mentorship, career progression, and the importance of building relationships within the industry.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSAdaptability in Security Leadership: Emphasizes the need for new security leaders to be adaptable, humble, and collaborative to achieve success.Importance of Mentorship: Mentorship seen as invaluable for individuals navigating the security industry.Business Acumen in Security: Critical for security professionals to understand and speak the language of business for better integration within organizations.Respect for Client Privacy: Advises caution with social media to protect client confidentiality.Value of Diverse Skills: Encourages professionals to take on tasks that allow skill development rather than passing them off.Predictive Risk Management: Future advancements in technology, particularly AI and machine learning, will enable security to be more proactive than reactive.QUOTES"One of the biggest lies...is that we're a cost center. We really provide no value here. We're just security.""You have to be cautious with social media... Watch what you post because your clients look at it.""If I'm weak somewhere, I know Tim is strong somewhere... and be humble.""AI without machine learning is just Alexa."To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
Scammers Exploit DeepSeek Hype & Jailbreak OpenAI's O3 Mini – TechNewsDay Update In this episode, we uncover how scammers are exploiting the recent hype around DeepSeek, a new AI model, by creating fake websites, counterfeit cryptocurrency tokens, and malware-laced downloads. We also discuss the jailbreaking of OpenAI's newly released O3 mini model, highlighting its security vulnerabilities. Additionally, a woman is sought by police for purchasing an iPhone using a stolen identity in a London Apple store. Stay tuned for important updates on cybersecurity, AI advancements, and fraud prevention. 00:00 Scammers Exploit DeepSeek Hype 01:43 DeepSeek's Security Challenges 04:10 OpenAI's O3 Mini Model Jailbreak 06:49 iPhone Fraud in London Apple Store 07:44 Conclusion and Call for Tips
Scott Jennings dives deep into the current political landscape, discussing Tulsi Gabbard's confirmation as Director of National Intelligence, evaluating her qualifications and past statements. He also addresses Trump's influence within the Republican Party, his comments on the Israel-Hamas war and his stance towards Hamas. The conversation extends to the challenges Trump's executive orders face in court and the ongoing debates about the roles of the judiciary and the executive branch.
Rogers for America with Lt. Steve Rogers – National security is in serious danger, and it's time for everyone to take notice. From government discussions to the sacrifices of our military, this piece highlights the urgent need for public awareness and action. Protecting our nation's safety requires understanding the threats we face and embracing our responsibility to future generations.
While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, The BlueHat Podcast by Microsoft and MSRC. See you in 2025! Yonatan Zunger, CVP of AI Safety & Security at Microsoft joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Yonatan explains the distinction between generative and predictive AI, noting that while predictive AI excels in classification and recommendation, generative AI focuses on summarizing and role-playing. He highlights how generative AI's ability to process natural language and role-play has vast potential, though its applications are still emerging. He contrasts this with predictive AI's strength in handling large datasets for specific tasks. Yonatan emphasizes the importance of ethical considerations in AI development, stressing the need for continuous safety engineering and diverse perspectives to anticipate and mitigate potential failures. He provides examples of AI's positive and negative uses, illustrating the importance of designing systems that account for various scenarios and potential misuses. In This Episode You Will Learn: How predictive AI anticipates outcomes based on historical data The difficulties and strategies involved in making AI systems safe and secure from misuse How role-playing exercises help developers understand the behavior of AI systems Some Questions We Ask: What distinguishes predictive AI from generative AI? Can generative AI be used to improve decision-making processes? What is the role of unit testing and test cases in policy and AI system development? Resources: View Yonatan Zunger on LinkedIn View Wendy Zenone on LinkedIn View Nic Fillingham on LinkedIn Related Microsoft Podcasts: Microsoft Threat Intelligence Podcast Afternoon Cyber Tea with Ann Johnson Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Learn more about your ad choices. Visit megaphone.fm/adchoices
Yonatan Zunger, CVP of AI Safety & Security at Microsoft joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Yonatan explains the distinction between generative and predictive AI, noting that while predictive AI excels in classification and recommendation, generative AI focuses on summarizing and role-playing. He highlights how generative AI's ability to process natural language and role-play has vast potential, though its applications are still emerging. He contrasts this with predictive AI's strength in handling large datasets for specific tasks. Yonatan emphasizes the importance of ethical considerations in AI development, stressing the need for continuous safety engineering and diverse perspectives to anticipate and mitigate potential failures. He provides examples of AI's positive and negative uses, illustrating the importance of designing systems that account for various scenarios and potential misuses. In This Episode You Will Learn: How predictive AI anticipates outcomes based on historical data The difficulties and strategies involved in making AI systems safe and secure from misuse How role-playing exercises help developers understand the behavior of AI systems Some Questions We Ask: What distinguishes predictive AI from generative AI? Can generative AI be used to improve decision-making processes? What is the role of unit testing and test cases in policy and AI system development? Resources: View Yonatan Zunger on LinkedIn View Wendy Zenone on LinkedIn View Nic Fillingham on LinkedIn Related Microsoft Podcasts: Microsoft Threat Intelligence Podcast Afternoon Cyber Tea with Ann Johnson Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Join Monte Judah as he looks at the state of the world and the Holy Land. In this latest episode, Monte provides comprehensive analysis of current Middle East developments, including hostage negotiations, regional conflicts, and diplomatic efforts, with insights into Iran's nuclear program and security challenges. HaYovel: https://serveisrael.com/ TheIsraelGuys.com Support Charities: United Nations for Israel: https://unitednationsforisrael.org/unify-donations/ Israeli Red Cross: https://secure.afmda.org/site/Donation2?df_id=2000&2000.donation=form1&s_src=GNRLWEB&FURL=UR The Nazarine Fund: https://donate.mercuryone.org/site/Donation2?df_id=1501&mfc_pref=T&1501.donation=form1 Featured Products: Dark Blue Jerusalem Kippah: https://messianicmarketplace.org/products/dark-blue-jerusalem-kippah For more information: Your donations make this show possible: https://www.messianicworldupdate.com/ambassador-level Newest DVD Teaching by Monte Judah: https://www.messianicmarketplace.org/search?type=product&q=messianic+teachings+for+christians Other Monte Judah Links: https://thegreaterexodus.com/ https://www.messianicmarketplace.org/collections/monte-judah Other Lion and Lamb Links: https://www.lionandlambministries.org/ https://LionandLamb.tv/ https://www.messianicmarketplace.org/ https://www.yavohmagazine.com/ https://www.campyeshua.com/ Contact Us at: info@lionlamb.co
The Twenty Minute VC: Venture Capital | Startup Funding | The Pitch
Guy Podjarny founded Tessl, Snyk and Blaze. Tessl is reimagining software development for the AI era and shaping AI Native Development. Snyk created and leads the Developer Security category, and is now a multi-billion dollar company with over 1,000 employees. Guy was previously CTO at Akamai (following its acquisition of Blaze), is an active angel investor, and co-hosts of the AI Native Dev podcast. In Today's Episode with Guy Podjarny We Discuss: 03:02 Discussion on NVIDIA's Market Position 04:14 Will We See a Trough of Disillusionment in AI 07:36 The Future of AI Development and Specialized Models 10:17 Challenges and Opportunities in AI Dev Tools 17:41 Concerns About Closed vs. Open Development Platforms 21:27 Speculations on AI's Role in Application Layers 24:40 Google's Competitive Edge 25:28 IPO and M&A in the Trump Era 26:45 The Future Role of Software Developers 32:20 Security Challenges in AI Development 33:41 Spicy Questions and Charity Donations 36:05 Quickfire Round: Insights and Advice
Guest: Abbas Kudrati, Asia's SMC Regional Chief Security, Risk, Compliance Advisor, Microsoft [@Microsoft]On LinkedIn | https://www.linkedin.com/in/akudrati/On Twitter | https://twitter.com/askudratiHosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesDuring the On Location series at AISA Cyber Con 2024 in Melbourne, a significant conversation unfolded between Sean Martin, Marco Ciappelli, and Abbas Kudrati about key cybersecurity themes and strategies relevant to the Asia-Pacific region.Abbas Kudrati, a seasoned cybersecurity professional and cloud advocate, shared insights into the state of cybersecurity in the region. He highlighted that ransomware remains one of the top threats, particularly in Asia and Australia. This persistent issue underscores the importance of robust data governance and access control. Abbas emphasized that organizations must establish strong security foundations, including data classification and access management, to prepare for the complexities introduced by AI. Without these measures, companies risk exposing sensitive information when leveraging generative AI solutions.The discussion also touched on data sovereignty, a critical topic for governments and defense organizations in Australia. Abbas noted the growing number of localized data centers built by major cloud providers to meet sovereignty requirements. While private sector organizations tend to be less stringent about data location, government entities require data to remain onshore. Frameworks like IRAP and Essential Eight are instrumental in ensuring compliance and guiding organizations in implementing consistent security practices.Zero Trust emerged as a transformative concept post-pandemic. According to Abbas, it simplified cybersecurity by enabling secure remote work and encouraging organizations to embrace cloud solutions. He contrasted this with the rise of generative AI, which has introduced both opportunities and challenges. AI's potential to streamline processes, such as analyzing security alerts and automating vulnerability management, is undeniable. However, its unbounded nature demands new strategies, including employee education on prompt engineering and responsible AI use.Sean Martin and Marco Ciappelli explored how AI can revolutionize operations. Abbas pointed out that AI tools like security copilots are making cybersecurity more accessible, allowing analysts to query systems in natural language and accelerating incident response. He stressed the importance of using AI defensively to match the speed and sophistication of modern attackers, noting that attackers are increasingly leveraging AI for malicious activities.The conversation concluded with a forward-looking perspective on AI's role in shaping cybersecurity and the importance of maintaining agility and preparedness in the face of evolving threats. This dynamic exchange provided a comprehensive view of the challenges and advancements influencing cybersecurity in the Asia-Pacific region today.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More
Guest: Abbas Kudrati, Asia's SMC Regional Chief Security, Risk, Compliance Advisor, Microsoft [@Microsoft]On LinkedIn | https://www.linkedin.com/in/akudrati/On Twitter | https://twitter.com/askudratiHosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesDuring the On Location series at AISA Cyber Con 2024 in Melbourne, a significant conversation unfolded between Sean Martin, Marco Ciappelli, and Abbas Kudrati about key cybersecurity themes and strategies relevant to the Asia-Pacific region.Abbas Kudrati, a seasoned cybersecurity professional and cloud advocate, shared insights into the state of cybersecurity in the region. He highlighted that ransomware remains one of the top threats, particularly in Asia and Australia. This persistent issue underscores the importance of robust data governance and access control. Abbas emphasized that organizations must establish strong security foundations, including data classification and access management, to prepare for the complexities introduced by AI. Without these measures, companies risk exposing sensitive information when leveraging generative AI solutions.The discussion also touched on data sovereignty, a critical topic for governments and defense organizations in Australia. Abbas noted the growing number of localized data centers built by major cloud providers to meet sovereignty requirements. While private sector organizations tend to be less stringent about data location, government entities require data to remain onshore. Frameworks like IRAP and Essential Eight are instrumental in ensuring compliance and guiding organizations in implementing consistent security practices.Zero Trust emerged as a transformative concept post-pandemic. According to Abbas, it simplified cybersecurity by enabling secure remote work and encouraging organizations to embrace cloud solutions. He contrasted this with the rise of generative AI, which has introduced both opportunities and challenges. AI's potential to streamline processes, such as analyzing security alerts and automating vulnerability management, is undeniable. However, its unbounded nature demands new strategies, including employee education on prompt engineering and responsible AI use.Sean Martin and Marco Ciappelli explored how AI can revolutionize operations. Abbas pointed out that AI tools like security copilots are making cybersecurity more accessible, allowing analysts to query systems in natural language and accelerating incident response. He stressed the importance of using AI defensively to match the speed and sophistication of modern attackers, noting that attackers are increasingly leveraging AI for malicious activities.The conversation concluded with a forward-looking perspective on AI's role in shaping cybersecurity and the importance of maintaining agility and preparedness in the face of evolving threats. This dynamic exchange provided a comprehensive view of the challenges and advancements influencing cybersecurity in the Asia-Pacific region today.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More
Karl and Erum bring on Dr. Alexander Titus, a commissioner on the National Security Commission on Emerging Biotechnology, to explore the exciting and challenging intersections of biotechnology and policy. Alexander shares his experiences from his unique journey across academia, government, and industry, diving into the role of biosecurity, the potential of synthetic biology, and the emerging convergence of tech and bio. They discuss ambitious projects like de-extincting the woolly mammoth, advances in biodefense, and the impacts of AI on biotech innovation. It's a conversation that sheds light on how cutting-edge biotech could shape the future and the necessary balance between innovation and ethical responsibility. Grow Everything brings the bioeconomy to life. Hosts Karl Schmieder and Erum Azeez Khan share stories and interview the leaders and influencers changing the world by growing everything. Biology is the oldest technology. And it can be engineered. What are we growing? Learn more at www.messaginglab.com/groweverything Chapters: 00:00:00 - Behind the Scenes of Bureaucracy 00:00:30 - Democracy's Turning Point 00:02:23 - A Fiery Day in Prospect Park 00:04:20 - How Spaces Shape Our Health 00:08:35 - Enter Alexander Titus: Biosecurity Visionary 00:10:13 - Biotech: The New Face of National Defense 00:15:09 - Where Tech and Policy Collide 00:23:10 - The Future of Biosecurity Unfolds 00:28:02 - Bold Science vs. Ethical Boundaries 00:30:24 - Robotics Meets Biotech: What's Next? 00:33:29 - Hard Lessons from Cross-Industry Giants 00:35:49 - Innovation Clashes with Red Tape 00:36:11 - The Power of Expertise in Shaping Policy 00:42:26 - Biotech's Hidden Environmental Risks 00:45:42 - The Commission's Bold Path Forward 00:48:45 - Parting Thoughts: What Lies Ahead Topics Covered: biotech, biosecurity, national security commission on emerging biotechnology, policy Episode Links: The Wild Life of Our Bodies by Robb Dunn Geerat Vermeij BTO - Biological Technologies Office of DARPA Bioeconomy.XYZ The Nobel Turing Challenge Range by David Epstein NSCEB Interim Report AI Safety Institute The Echo Wife by Sara Gailey Have a question or comment? Message us here: Text or Call (804) 505-5553 Instagram / TikTok / Twitter / LinkedIn / Youtube / GrowEverything website Email: groweverything@messaginglab.com Music by: Nihilore Production by: Amplafy Media
#ISRAEL: Rocketed everyday in the hundreds. Lieutenant Colonel (Res.) Sarit Zehavi. Founder and president of Alma – a nonprofit and an independent research and education center specializing in Israel's security challenges on its northern border. 1950 Ramallah
Bob Zemke, Director at Extreme Networks, provides network infrastructure and security solutions to help hospitals build resilient and secure networks. Critical security challenges hospitals face in managing networks include the proliferation of connected devices and the vulnerability of medical devices to cyber threats. In addition to education and collaboration between stakeholders, strategies for reducing security risks include network segmentation, AI-powered monitoring, and behavior analysis to help hospitals proactively address possible threats. Bob explains, "There are multiple factors that we take into play. First, how do we build a resilient network that can handle the amount of devices and traffic types? How do we prioritize the type of traffic flowing through, like the wires of the infrastructure and the wireless connectivity? And then how do we understand through analytics the behavior of those applications so that the healthcare organization, the security team can understand what is standard traffic or potentially rogue behaviors or traffic? What is performance impacting? So, visibility becomes just as important as the segmentation of device types and users on a network." "It's a security and performance risk. And if you think back to guest WiFi, when we started designing this about 20 years ago, we always laughed. It was like, well, we're building it, but how many people will bring a laptop into a hospital and want to connect as a guest user? Or even how many wireless devices compared to wired would be in a hospital network. Fast forward 20 years, you now have more mobile or wireless connected devices than wired in a given hospital network. So, you have to deal with RF performance management and security. And then you have the personal devices, which again, now with the mobile phone, people expect it." #ExtremeNetworks #Cybersecurity #Hospitals #CyberThreats #MedicalDevices #AI #NetworkSecurity #HospitalNetworkSecurity #SecurityRisks #HealthTech #EnhancePatientCare #WiFi extremenetworks.com Download the transcript here
Bob Zemke, Director at Extreme Networks, provides network infrastructure and security solutions to help hospitals build resilient and secure networks. Critical security challenges hospitals face in managing networks include the proliferation of connected devices and the vulnerability of medical devices to cyber threats. In addition to education and collaboration between stakeholders, strategies for reducing security risks include network segmentation, AI-powered monitoring, and behavior analysis to help hospitals proactively address possible threats. Bob explains, "There are multiple factors that we take into play. First, how do we build a resilient network that can handle the amount of devices and traffic types? How do we prioritize the type of traffic flowing through, like the wires of the infrastructure and the wireless connectivity? And then how do we understand through analytics the behavior of those applications so that the healthcare organization, the security team can understand what is standard traffic or potentially rogue behaviors or traffic? What is performance impacting? So, visibility becomes just as important as the segmentation of device types and users on a network." "It's a security and performance risk. And if you think back to guest WiFi, when we started designing this about 20 years ago, we always laughed. It was like, well, we're building it, but how many people will bring a laptop into a hospital and want to connect as a guest user? Or even how many wireless devices compared to wired would be in a hospital network. Fast forward 20 years, you now have more mobile or wireless connected devices than wired in a given hospital network. So, you have to deal with RF performance management and security. And then you have the personal devices, which again, now with the mobile phone, people expect it." #ExtremeNetworks #Cybersecurity #Hospitals #CyberThreats #MedicalDevices #AI #NetworkSecurity #HospitalNetworkSecurity #SecurityRisks #HealthTech #EnhancePatientCare #WiFi extremenetworks.com Listen to the podcast here
In this episode, we sat down with Lukasz Gogolkiewicz, an Australia-based Cybersecurity Leader and former pentester, to explore his journey from offensive security into cybersecurity leadership. Lukasz, also a speaker coach at BlackHat USA, brings valuable insights into what it takes to shift from being technical to managing compliance, governance, and broader security programs in industries like retail and advertising. Throughout the conversation, we dive into the specific challenges of transitioning from a purely cloud-based tech company to a bricks-and-mortar retail operation, highlighting how the threat models differ dramatically between these environments. Lukasz shares his unique perspective on cybersecurity frameworks like NIST CSF 2.0, essential for building resilient programs, and offers practical advice for selecting the right framework based on your organization's needs. Guest Socials: Lukasz's Linkedin Podcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - Cloud Security Podcast- Youtube - Cloud Security Newsletter - Cloud Security BootCamp Questions asked: (00:00) Introduction (03:00) A bit about Lukasz (04:32) Security Challenges for Tech First advertising company (05:16) Security Challenges for Retail Industry (06:00) Difference between the two industries (07:01) Best way to build Cybersecurity Program (09:44) NIST CSF 2.0 (13:02) Why go with a framework? (16:26) Which framework to start with for your cybersecurity program? (18:33) Technical CISO vs Non Technical CISO (25:37) The Fun Section Resources spoken about during the interview: NIST CSF 2.0 CIS Benchmark ASD Essential Eight Mapping between the frameworks https://www.cisecurity.org/insights/white-papers/cis-controls-v8-mapping-to-nist-csf-2-0 https://www.cisecurity.org/insights/white-papers/cis-controls-v8-mapping-to-asds-essential-eight Verizon Data Breach Investigations Report (DBIR) Lukasz Woodwork Channel BSides Melbourne
In today's episode, Steve speaks with David Weisong, CIO of Information Systems at Energy Solutions, a growing company with many US government clients. He speaks with Steve about his experiences overseeing a full migration of the company's security framework, how he got buy-in for security from the C-suite, and how he has approached the challenge of staffing. Key Takeaways: 1. Organisations are advised to focus on protecting critical assets and closely monitoring any supply chain issues. 2. Security leaders and teams are also having to prepare policies for AI use and investigate cloud provider dependencies. 3. Security leaders and teams should be monitoring developments in quantum, staying in step with regulations and needed skills. Tune in to hear more about: 1. Security risks in technology innovation and adoption (1:29) 2. The impact of quantum computing on cybersecurity and the need for organisations to prioritise legacy technology updates (6:59) 3. Volatility, uncertainty, and technological change in the security industry (12:45) 4. How technology innovations can disrupt and improve organisations (18:22) 5. Managing innovation in a rapidly changing digital landscape (20:40) 6. Limitations of accessing powerful technologies due to restrictions, threats, and security concerns (26:12) 7. Emerging threats and risks in technology, including quantum computing, AI, and legacy systems (32:18) Standout Quotes: 1. “We're a professional services organisation, so our contracts are the foundation. And if they're not 100% met, then you actually don't proceed. So it became very easy to say, there's cause and effect here. And that's where that's taken a lot of … repeat exposure, I think, is one part of it, but also setting the stage that it's dynamic. It's not like, oh, yeah, we're done with that, so we can just kind of move on. It's like, we're done with this particular initiative right now. And there are more, and it will be changing probably, quarter to quarter.” - David Weisong 2. “There's a lot of things that are being put onto platforms or systems that you sometimes get into the area where you might have a unique combination of things that creates problems. And so that's where I think the industry is looking at it still in a category basis. I think there's a need for a more holistic approach, dare I say, coordination or cooperation between companies and their solution offerings.” - David Weisong 3. “When I think about the three to five year window, I mean, there's clearly more fraud and more cybersecurity attacks. It is significant, and it's not decreasing. And so the ability for both organisations to share and for the industry that serving up different solutions, there has to be a coordination and a collaboration around that. Because the priority could change from year to year.” - David Weisong Mentioned in this episode: Times Higher Education: We need a social science of data by Cristina Alaimo and Jannis Kallinikos ISF Analyst Insight Podcast Read the transcript of this episode Subscribe to the ISF Podcast wherever you listen to podcasts Connect with us on LinkedIn and Twitter From the Information Security Forum, the leading authority on cyber, information security, and risk management.
Today on Borderland, Vince sits down with former CIA covert operations officer and host of The President's Daily Brief podcast, Mike Baker. Mike has over 15 years of experience in counterterrorism, counter-narcotics, and intelligence operations worldwide. After his career in the CIA, he transitioned into the private sector, co-founding a global intelligence and security firm called Diligence LLC, which provides services in risk management and investigative support. BORDERLAND is an IRONCLAD Original. SPONSORS: MTNTOUGH FITNESS Go to: https://mtntough.com/ and download the MTNTOUGH app today, and use code “BORDERLAND” To get a 14-day free trial and one month free! That's six weeks of MTNTOUGH at no cost. Learn more about your ad choices. Visit megaphone.fm/adchoices
October 17, 2024: Josh Howell, Sales Engineering Manager (Healthcare East/Central) at Rubrik, and David Houlding, Director of Global Healthcare Security and Compliance Strategy at Microsoft Join Sarah and Bill for a Webinar. They delve into how their integrated approach strengthens cybersecurity and disaster recovery for healthcare organizations. How do cloud migrations and zero-trust architectures enhance security and cost-efficiency, especially in an industry prone to ransomware? The conversation highlights the complexity of modern healthcare environments, from multi-cloud infrastructures to compliance challenges. Key Points:02:37 Microsoft and Rubrik Partnership09:40 Ransomware Resilience and Data Recovery21:46 The Importance of Zero Trust Security26:00 Risk Minimization and Cost Savings27:50 Disaster Recovery in Cloud Migration33:06 Security Challenges and Solutions in Cloud Adoption47:32 The Human Element in CybersecuritySubscribe: This Week HealthTwitter: This Week HealthLinkedIn: Week HealthDonate: Alex's Lemonade Stand: Foundation for Childhood Cancer
Have you ever wondered how real-life altercations and unpredictable confrontations can completely shift your mindset and approach to life? In today's world, understanding how to manage aggression, make quick decisions under pressure, and adapt as you age can be the difference between staying safe or being caught off guard. This episode explores how these critical lessons apply to both everyday life and high-stress situations. Gain insights from experts in street altercations and security confrontations that you won't hear anywhere else. Learn how combat sports and survival instincts can sharpen your awareness and decision-making. Discover the profound impact of life experiences on your character and how these can shape your growth over time. Don't miss this episode—listen now to unlock these life-changing insights and start applying them to your own mindset today! Reflecting on Life's Tough Lessons: From Street Fights to Personal Growth In this episode of The Jiu Jitsu Mindset, Pete Deeley hosts Professor Todd Fox and other speakers as they reflect on personal anecdotes and transformative experiences. Discussions range from street and security altercations, the unpredictability of confrontations, and the critical lessons learned. They emphasize the importance of being aware of one's environment, understanding the implications of actions, and the shift in decision-making across different life stages. Insights from combat sports and survival instincts are also explored, highlighting how violence, aggression management, and ethical considerations shape personal growth. Listeners are encouraged to appreciate the evolving nature of choices and the cumulative impact of life experiences on character development. 00:00 Introduction and Guest Welcome 00:49 Defining Memorable Fights 01:44 A Lesson in Character and Friendship 04:20 The Fight That Changed Everything 08:15 Lessons Learned from Defeat 16:27 Security Challenges on Tour 22:45 Unexpected Conflict and Quick Thinking 26:39 The Thin Line Between Safety and Aggression 27:38 The Paradox of De-escalation and Assertion 29:01 Legal and Moral Compass in Self-Defense 29:52 Cultural Contexts and Survival Instincts 34:23 Generational Lessons and Street Wisdom 38:23 The Core of Human Behavior: Survival 54:09 Adapting to Different Environments 56:39 Final Thoughts and Reflections
In our latest podcast episode featuring Jeremy Snyder, Founder & CEO of FireTail.io, we explored the evolving cybersecurity landscape and the crucial role of API security in protecting modern enterprises and IoT devices.
In this Replay of Screaming in the Cloud, we revisit our inspiring conversation with Jackie Singh. At the time, she had recently served as a senior cybersecurity staffer at the Biden campaign. But her venerated career is considerably more than that alone. Jackie's time spent in the Army, at the DoD, and eventually at work in the commercial world allows her to bring an adroit sensibility to her work and to this episode. Jackie goes into detail on her time spent at the Biden campaign and the intricacies of working in such highly politicized, and short term, environment. The cyber security threats she faced there were paramount, to downplay it, and have given Jackie a rich and constantly developing perspective on security. That in combination with her career has helped her develop a perspective that she has kindly discussed in detail during this episode! Tune in for the whole story.Show Highlights(0:00) Intro(1:16) Backblaze sponsor read(1:42) Working for the 2020 Biden Campaign(4:45) The high-stakes world of political information security(10:08) Breaking down Jackie's impressive resume(12:38) Being the target of a far-right tabloid hit piece(16:24) Contemporary politics, bad faith discourse, and its role in tech(23:34) Common Fate sponsor read(24:03) The ethics of reporting InfoSec vulnerabilities(31:13) Explaining “threat modeling”(36:49) Where you can find more from JackieAbout Jackie SinghJackie Singh is an Information Security professional with more than 20 years of hacking experience, beginning in her preteen. She began her career in the US Army, and deployed to Iraq in 2003. Jackie subsequently spent several years in Iraq in cleared roles for the Department of Defense.She is now an independent consultant. Her passion extends to evangelizing best practices, writing and research for her blog, tweeting informative content, speaking at conferences, contributing to podcasts, and collaborating with fellow journalists and security professionals.Links:Disclose.io: https://disclose.ioTwitter: https://twitter.com/hackingbutlegalOriginal Episode:https://www.lastweekinaws.com/podcast/screaming-in-the-cloud/security-challenges-and-working-for-president-biden-with-jackie-singh/SponsorsBackblaze: https://www.backblaze.com/Common Fate: http://commonfate.io/
Snir Ben Shimol from ZEST Security on their work, "How we hacked a cloud production environment by exploiting Terraform providers." In this blog, ZEST discusses the security risks associated with Terraform providers, particularly those from community sources. The research highlights the importance of carefully vetting providers, regular scanning, and following best practices like version pinning to mitigate potential vulnerabilities in cloud infrastructure management. The research can be found here: The hidden risks of Terraform providers Learn more about your ad choices. Visit megaphone.fm/adchoices
Northern Israel: Under constant attack. Lieutenant Colonel (Res.) Sarit Zehav iFounder and president of Alma – a nonprofit and an independent research and education center specializing in Israel's security challenges on its northern border. Malcolm Hoenlein @Conf_of_pres @mhoenlein1 1903 Galilee
Allen Pollack discusses the impact of new technology updates from Apple, challenges of app development in the mortgage industry, and the potential of AI chatbots like Claire in real estate.-----------------------------------------------------Allen Pollack, Tech ConsultantAllen Pollack, a Mortgage & Financial Services Technology Advisor, is a subject matter expert in the mortgage origination process along with software product management and software development.In today's financial services push to all things Digital, Allen has been helping lenders and financial services solution providers align their digital transformation and technology strategies by removing the human element of risk, and automating processes that drive efficiencies and margins into profits.Over the course of his career, Allen has co-created and developed technology business models that have birthed highly successful, innovative solutions and companies.Allen co-founded and served as CTO of New York Loan Exchange (NYLX), a loan product eligibility and pricing engine (PPE) that made an immediate impact on the industry, scaling the company quickly and forming partnerships with multiple mortgage and financial lending companies. In 2012, Allen was a co-founder of a merger between NYLX and Aklero Risk Analytics that created LoanLogics, A Mortgage Loan Quality and Performance Analytics company. Allen served as CTO where he continued to bring new and innovative product solutions to the market that made a significant impact to mortgage lenders that reduced risk, scaled business channels, and grew profits in a very competitive and highly regulated market.Allen is also is mortgage and finance technology contributor on a weekly live industry podcast, Lykken on Lending, and is launching a new podcast soon to be released, TechStack Radio, dedicated to technology and innovation in Financial Services.
In this episode of Inside The Epicenter, Joel Rosenberg ventures deep into the labyrinth of tunnels beneath Gaza's Khan Yunis to expose the chilling reality of Hamas' stronghold. Joined by a military general, he uncovers shocking details of how Hamas leaders have constructed elaborate underground compounds, turning headquarters into cages to hold hostages. The eerie tour reveals the strategic complexity of the underground network, with Hamas using civilian areas, including schools, mosques, and even kindergartens, for their sinister operations. As the IDF closes in on Hamas, the hosts witness the devastation caused by the ongoing conflict and reflect on the courage and sacrifices made to bring security to the region. Join us as we delve into the heart of the battle and explore the harrowing truths hidden beneath the surface in this gripping episode. (00:05) Hostages found in terror tunnel built for terrorists. (04:20) Entering Khan Yunis, seeing tunnels where Hamas kept hostages. (08:03) Significant investment in building strategic underground tunnels. (12:36) Efficient underground maneuvers gain ground gradually. (16:04) Underground warfare is unprecedented and challenging. (18:27) Walking through tunnels that emerge in a neighborhood. (21:52) Update on Gaza tunnels, podcast feedback requested. Learn more about The Joshua Fund. Make a tax-deductible donation. The Joshua Fund Stock Media provided by DimmySad/Pond5 Verse of the Day: Psalms 121:45 - Behold, he that keepeth Israel shall neither slumber nor sleep. The Lord is thy keeper. The Lord is thy shade upon thy right hand. Prayer Request: Pray that God will reveal and bring to naught all evil plots against Israel. Pray that God will comfort Israel and heal the hearts of those affected by the Hamas attacks. Related Episodes: The Rise of Yahya Sinwar: Unveiling the Head of Hamas in Gaza #183 How to Show Love and Support for Israel and Her Neighbors #182 How to Use Military Strategies for Spiritual Battles #173 Former Defense Minister on Israel's Security Challenges #153 Discover more Christian podcasts at lifeaudio.com and inquire about advertising opportunities at lifeaudio.com/contact-us.
From the war in Ukraine, instability in the Middle East, and the potential for conflict in the Pacific, the U.S. military is involved to a certain degree in a variety of operations. In this ClubGPF live discussion, Colonel Scott Leonard, Chief of Staff to the Commandant of the U.S. Marine Corps (ret) joined GPF Chairman George Friedman to discuss global security challenges from a U.S. military perspective. To learn more about ClubGPF, including more free audio and video clips, visit http://ow.ly/qHIP50JUPW2.
#ISRAEL The North under siege.. Lieutenant Colonel (Res.) Sarit Zehavi. Malcolm Hoenlein @Conf_of_pres @mhoenlein1 Founder and president of Alma – a nonprofit and an independent research and education center specializing in Israel's security challenges on its northern border. https://www.reuters.com/world/middle-east/hamas-delegation-visit-egypt-soon-further-ceasefire-talks-statement-2024-05-02/ 1912 JORDAN VALLEY
#Hezbollah: The War in the North to come. Sari Zehavi, Lieutenant Colonel (Res.) Sarit Zehavi is the CEO and founder of Alma – a nonprofit and an independent research and education center specialized in Israel's security challenges on its northern border. Malcolm Hoenleinhttps://www.msn.com/en-us/news/world/moment-iron-dome-intercepts-more-than-a-dozen-hezbollah-missiles-over-israel/ar-BB1jqNm3 https://www.msn.com/en-gb/news/world/israeli-defence-minister-says-hezbollah-aggression-bringing-critical-point-nearer/ar-BB1jmVh9 1920 Galilee