Podcasts about Security Strategy

  • 230PODCASTS
  • 331EPISODES
  • 32mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jan 1, 2026LATEST

POPULARITY

20192020202120222023202420252026


Best podcasts about Security Strategy

Latest podcast episodes about Security Strategy

ITSPmagazine | Technology. Cybersecurity. Society
Five Patterns From 152 Episodes That Reshaped How I Think About Security, Technology, and Work Heading into 2026 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 1, 2026 13:26


Across 152 conversations this year, a set of recurring patterns kept surfacing, regardless of whether the discussion focused on application security, software supply chain risk, AI systems, or creative work. The industries varied. The roles varied. The challenges did not.One theme rises above the rest: visibility remains the foundation of everything else, yet organizations continue to accept blind spots as normal. Asset inventories are incomplete. Build systems are poorly understood. Dependencies change faster than teams can track them. The issue is not a lack of tools. It is a willingness to tolerate uncertainty because discovery feels hard or disruptive.Another pattern is equally consistent. Integration matters more than novelty. New features, including AI-driven ones, sound compelling until they fail to connect with what teams already rely on. Security programs fracture when tools operate in isolation. Coverage looks strong on paper while gaps quietly expand in practice. When tools fail to integrate into existing environments, they create complexity instead of reducing risk.Security also continues to struggle with how it shows up in daily work. Programs succeed when security is embedded into workflows, automated where possible, and invisible until it matters. They fail when security acts as a gate that arrives after decisions are already made. Teams either adopt security naturally or route around it entirely. There is no neutral middle ground.Context repeatedly separates effective leadership from noise. Risk only becomes meaningful when it is framed in terms of business operations, delivery speed, and real tradeoffs. Leaders who understand how the business actually functions communicate risk clearly and make better decisions under pressure.Finally, creativity remains undervalued in security conversations. Automation should remove repetitive tasks so people can focus on judgment, problem solving, and design. The same mindset that produces elegant guitars, photographs, or products applies directly to building resilient security programs.These five patterns are not independent ideas. Together, they describe a shift toward security that is visible, integrated, contextual, workflow-driven, and human-centered.Read the full article: https://www.linkedin.com/pulse/five-patterns-from-152-podcast-episodes-2025-changed-i-martin-cissp-st1ge________This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn: https://itspm.ag/future-of-cybersecuritySincerely, Sean Martin and TAPE9________Sean Martin is a life-long musician and the host of the Music Evolves Podcast; a career technologist, cybersecurity professional, and host of the Redefining CyberSecurity Podcast; and is also the co-host of the On Location Event Coverage Podcast. These shows are all part of ITSPmagazine—which he co-founded with his good friend Marco Ciappelli, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️Would you like Sean to work with you on a topic/series to help you tell your story? Visit his services page to learn more: https://www.seanmartin.com/servicesWant to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: https://www.itspmagazine.com/on-locationTo learn more about Sean, visit his personal website. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Redefining CyberSecurity
Five Patterns From 152 Episodes That Reshaped How I Think About Security, Technology, and Work Heading into 2026 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9

Redefining CyberSecurity

Play Episode Listen Later Jan 1, 2026 13:26


Across 152 conversations this year, a set of recurring patterns kept surfacing, regardless of whether the discussion focused on application security, software supply chain risk, AI systems, or creative work. The industries varied. The roles varied. The challenges did not.One theme rises above the rest: visibility remains the foundation of everything else, yet organizations continue to accept blind spots as normal. Asset inventories are incomplete. Build systems are poorly understood. Dependencies change faster than teams can track them. The issue is not a lack of tools. It is a willingness to tolerate uncertainty because discovery feels hard or disruptive.Another pattern is equally consistent. Integration matters more than novelty. New features, including AI-driven ones, sound compelling until they fail to connect with what teams already rely on. Security programs fracture when tools operate in isolation. Coverage looks strong on paper while gaps quietly expand in practice. When tools fail to integrate into existing environments, they create complexity instead of reducing risk.Security also continues to struggle with how it shows up in daily work. Programs succeed when security is embedded into workflows, automated where possible, and invisible until it matters. They fail when security acts as a gate that arrives after decisions are already made. Teams either adopt security naturally or route around it entirely. There is no neutral middle ground.Context repeatedly separates effective leadership from noise. Risk only becomes meaningful when it is framed in terms of business operations, delivery speed, and real tradeoffs. Leaders who understand how the business actually functions communicate risk clearly and make better decisions under pressure.Finally, creativity remains undervalued in security conversations. Automation should remove repetitive tasks so people can focus on judgment, problem solving, and design. The same mindset that produces elegant guitars, photographs, or products applies directly to building resilient security programs.These five patterns are not independent ideas. Together, they describe a shift toward security that is visible, integrated, contextual, workflow-driven, and human-centered.Read the full article: https://www.linkedin.com/pulse/five-patterns-from-152-podcast-episodes-2025-changed-i-martin-cissp-st1ge________This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn: https://itspm.ag/future-of-cybersecuritySincerely, Sean Martin and TAPE9________Sean Martin is a life-long musician and the host of the Music Evolves Podcast; a career technologist, cybersecurity professional, and host of the Redefining CyberSecurity Podcast; and is also the co-host of the On Location Event Coverage Podcast. These shows are all part of ITSPmagazine—which he co-founded with his good friend Marco Ciappelli, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️Would you like Sean to work with you on a topic/series to help you tell your story? Visit his services page to learn more: https://www.seanmartin.com/servicesWant to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: https://www.itspmagazine.com/on-locationTo learn more about Sean, visit his personal website. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

The John Batchelor Show
S8 Ep231: 15. Trump's Security Strategy: Homeland Defense Lacks Global Clarity. John Yoo praises the strategy's focus on homeland defense and the Western Hemisphere, reviving a corollary to the Monroe Doctrine. However, he criticizes the failure to expl

The John Batchelor Show

Play Episode Listen Later Dec 23, 2025 13:50


15. Trump's Security Strategy: Homeland Defense Lacks Global Clarity. John Yoo praises the strategy's focus on homeland defense and the Western Hemisphere, reviving a corollary to the Monroe Doctrine. However, he criticizes the failure to explicitly name China as an adversary or define clear goals for defending allies in Asia and Europe against great power rivals. 1770 FIVE VIEWS OF NY ENTRANCEC

No Password Required
No Password Required Podcast Episode 67 — Gina Yacone

No Password Required

Play Episode Listen Later Dec 21, 2025 40:17


Gina Yacone — Virtual CISO at Trace3 and Roller Derby Penalty Box VisitorLive from B-Sides Jacksonville, No Password Required welcomes Gina Yacone, Virtual CISO at Trace3. Jack Clabby of Carlton Fields, P.A. and Sarina Gandy, host and producer of the CyberBay Podcast, host a conversation on Gina's unconventional career path, leadership under pressure, and the power of community in cybersecurity. With career stops in private investigation, digital forensics, and executive security, Gina brings a people-first, purpose-driven perspective to complex cyber risk.Gina shares how her early work as a private investigator on high-profile criminal defense cases laid the foundation for her success in cybersecurity. She also reflects on raising her hand for big challenges, the rewards and risks of always saying yes, and how authenticity has guided her. She offers insight on why conference hallway conversations can be just as impactful as keynote sessions.A visible advocate for the cybersecurity community, Gina speaks openly about setting healthy mentorship boundaries and building resilient professional networks.The episode wraps with the Lifestyle Polygraph, where Gina lightens the mood with stories from her roller derby days, dream Amazing Race partners, and why John Wick might just be the ultimate executive assistant.Follow Gina on LinkedIn: https://www.linkedin.com/in/ginayacone/ Chapters:00:00 Introduction to Cybersecurity and B-Sides Jacksonville01:16 Gina Yacone's Unique Journey to Cybersecurity06:22 Navigating Burnout in Cybersecurity08:06 The Importance of Raising Your Hand10:04 Adapting Leadership Styles in Different Roles 14:03 Being a Role Model for Women in Cybersecurity16:34 How to Establish a Good Mentee and Mentor Relationship18:50 Feedback and Constructive Criticism22:55  The Value of Hallway Conversations26:19 The Lifestyle Polygraph: Fun and Insights38:54 Conclusion and Future Connections

American Diplomat
Clown Car or Security Strategy?

American Diplomat

Play Episode Listen Later Dec 18, 2025 41:47


The Administration's new National Security Strategy document contains exaggerations, contradictions, insults, racism, posturing and slamming, which is to say nothing of the important topics it does not address. Amb. Charlie Ray takes the ideological manifesto apart for us, with discussion of the existential consequences for America and for our species.

The Briefing Room
Should we worry about America's security strategy?

The Briefing Room

Play Episode Listen Later Dec 18, 2025 28:46


As both the year and the current series of The Briefing Room draw to a close, Europe and much of the world have been digesting a lengthy document outlining the Trump administration's view of foreign policy. The National Security Strategy covers much of the globe but extra special vitriol was reserved for Europe with dire warnings that the continent is facing “civilisational erasure” partly due to immigration. At the same time the growing influence of “patriotic European parties” (those on the far right) is welcomed. But there's more - the US wants to dominate the “Western Hemisphere” - the Americas and countries on its doorstep. It wants more trade with Asia and China, as well as the Middle East. But there are notable absences -there's no talk of a significant threat from either Russia or China. David Aaronovitch and guests discuss what all this means and ask how worried we, in Europe, should be about the current US view of the world?Guests: Frank Gardner, BBC Security Correspondent Shashank Joshi, Defence Editor, The Economist Rebecca Lissner, Senior fellow for U.S. foreign policy at the Council on Foreign Relations and lecturer, Jackson School of Global Affair, Yale University. Dr Christoph Heusgen, Former Chairman Munich Security Conference and former German Ambassador to United NationsPresenter: David Aaronovitch Producers: Caroline Bayley, Kirsteen Knight, Cordelia Hemming Production Co-ordinator: Maria Ogundele Sound engineer: Neil Churchill Editor Richard Vadon

Automation Unplugged Podcast
#335: From CIA to CEO—Kris Coleman on Security, Strategy, and Service

Automation Unplugged Podcast

Play Episode Listen Later Dec 17, 2025 68:03


SHOW NOTESIn this episode, Kris and I discussed:How Red5 helps clients navigate security in an increasingly connected and vulnerable worldWhy smart home tech and AI-powered devices are reshaping the threat landscapeAnd the mission behind Fox Bravo Overland and its impact on the lives of those who serveKris brings a rare blend of operational expertise and personal passion, and this episode offers both insight and inspiration.Let's dive in to my conversation with Kris Coleman!To get transcripts, resources of what was mentioned in the show, and more visit: onefirefly.com/au335

Africalink | Deutsche Welle
US new security strategy: Good or bad for Africa?

Africalink | Deutsche Welle

Play Episode Listen Later Dec 16, 2025 24:46


For decades, US policy in Africa has centered on aid and development. But what if the future lies in trade, investment, and strategic partnerships? Adwoa Domena speaks to Dr. Samuel Afriyie, political and international relations expert and DW's Eric Mawuena Egbeta in Accra.

Alternative Visions
Alternative Visions - Trump's 'National Security Strategy of the USA' Doc

Alternative Visions

Play Episode Listen Later Dec 15, 2025 59:52


Today's show focuses on the details and directions for the US Empire revealed in Trump's just released 'National Security Strategy of the USA' document. Is the US Empire re-orienting and restructuring? IF so where? A detailed look and analysis of the document, including its new priority and focus on the Western Hemisphere, a longer term focus on Asia-China-Taiwan, and its criticism of Europe and NATO.  The document confirms Trump economic and geopolitical policies to date, where it's going next three years, and predictions previously made on this radio show.  The show also reviews key economic and political events of the past week. (Notice: next week's show will focus on our annual review of the US & global economy in 2025).

The Rest Is Politics
477. How Trump's Security Strategy Destroys The Old World Order

The Rest Is Politics

Play Episode Listen Later Dec 10, 2025 51:00


Has Trump's 2025 National Security Strategy officially upended 80 years of American foreign policy? Why does it warn of Europe's "civilisational erasure" while downplaying threats from its traditional adversaries?And is it finally time for the UK and Europe to chart their own course?  Join Rory and Alastair as they answer all these questions and more. __________  Gift The Rest Is Politics Plus this Christmas - give someone a whole year of Rory and Alastair's miniseries, ad-free listening, early access to episodes and live show tickets, an exclusive members' newsletter, discounted book prices, and a private chatroom on Discord. Just go to https://therestispolitics.supportingcast.fm/gifts And of course, you can still join for yourself any time at therestispolitics.com or on apple podcasts. The Rest Is Politics is powered by Fuse Energy. The Rest Is Politics is powered by Fuse Energy. Fuse are giving away free TRIP Plus membership for all of 2025 to new sign ups

Talking Politics
How Trump's new Security Strategy changes EVERYTHING for Britain and Europe

Talking Politics

Play Episode Listen Later Dec 10, 2025 30:43


Tom and Robert discuss Trump's National Security Strategy - a 33-page document which sets down in black and white his vision of the world, and which has ramped up anxiety across Europe. In it, the threat of aggression from Russia and President Putin are all but disregarded - no wonder Moscow says it's 'largely consistent' with their own vision for global affairs. There's also little attention paid to the threat from China; instead, it's Britain and the EU who come under fire, as it warns of "civilisational erasure" as a result of immigration. What can Britain, and its European allies, do as the United States appears to take another step away from them? And how grave are the implications of this new Strategy for Ukraine? Got a question for the team? Email talkingpolitics@itv.com

The Socialist Program with Brian Becker
Same Empire, New Rhetoric: Inside Trump's Security Strategy [Preview]

The Socialist Program with Brian Becker

Play Episode Listen Later Dec 9, 2025 10:04


Every four years, the U.S. government releases something called a ‘National Security Strategy' (NSS). The Trump administration released its NSS in the last few days, and the media in the U.S. and all over the world is buzzing about what this strategy means. Today, we will talk about some of its key positions and answer the question: do they constitute a new foreign policy for the United States? Brian Becker is joined by Layan Fuleihan to discuss.This is a preview of a patrons-only episode. Subscribe at https://www.patreon.com/TheSocialistProgram to hear the full episode, get access to all our patrons-only content, and help make this show possible.

Ukrainecast
What does the new US security strategy mean for Ukraine?

Ukrainecast

Play Episode Listen Later Dec 9, 2025 29:55


The newly published US ‘National Security Strategy' is being seen by some as further evidence that in the era of Trump western nations are no longer united in the way they view the world. From its scathing narrative of European decline, to an altogether rosier depiction of Russia, the document has turned longstanding US foreign policy on its head. So what can it tell us about Washington's intentions when it comes to ending the war in Ukraine?Also today, Jamie and Vitaly are joined by Mariam Lambert, co-founder of the Emile Foundation, an organisation focussed on reuniting Ukrainian children with their families after being forcibly relocated by Russia. Experts at Yale University estimate there could be as many as 35,000 Ukrainian children being held illegally in Russia and its occupied territories. Russia insists it is protecting vulnerable children by moving them away from active war zones to ensure their safety. Today's episode is presented by Jamie Coomarasamy and Vitaly Shevchenko. The producers were Laurie Kalus and Julia Webster. The technical producer was Mike Regaard. The executive producer was Chris Gray. The series producer is Chris Flynn. The senior news editor is Sam Bonham. Email Ukrainecast@bbc.co.uk with your questions and comments. You can also send us a message or voice note via WhatsApp, Signal or Telegram to +44 330 1239480You can join the Ukrainecast discussion on Newscast's Discord server here: tinyurl.com/ukrainecastdiscord

The Economist Morning Briefing
Kremlin welcomes Donald Trump's security strategy; Germany's chancellor visits Israel, and more

The Economist Morning Briefing

Play Episode Listen Later Dec 8, 2025 3:09


Dmitry Peskov, the Kremlin's spokesman, said that America's new National Security Strategy was “largely consistent with our vision”. Hosted on Acast. See acast.com/privacy for more information.

Battle Lines: Israel-Gaza
More Russia, less China and no Europe: Trump's new security strategy unveiled

Battle Lines: Israel-Gaza

Play Episode Listen Later Dec 8, 2025 41:01


Donald Trump has detonated a political earthquake with a National Security Strategy that doesn't just tweak America's global role, it torches seven decades of US foreign policy. In a move that's left European allies stunned and scrambling, Trump's new blueprint casts Europe as weak, directionless and on the brink of “civilisational erasure,” while pointedly avoiding calling Russia a threat. And guess who's absolutely thrilled? The Kremlin. Vladimir Putin's spokesman practically applauded the document, hailing it as “largely consistent” with Moscow's own vision. While EU leaders warn the strategy dangerously rewrites reality and echoes far-right rhetoric, Trump is pushing ahead, embracing “patriotic” parties across Europe and accusing the EU of holding back peace in Ukraine. It's a bold, brash, America-First gambit and one that's left America's closest allies wondering if Washington has just switched sides. To find out more, Roland talks to former British Ambassador to the United States Kim Darroch. ► Sign up to our most popular newsletter, From the Editor. Look forward to receiving free-thinking comment and the day's biggest stories, every morning. telegraph.co.uk/fromtheeditorhttps://linktr.ee/BattleLinesContact us with feedback or ideas:battlelines@telegraph.co.uk @venetiarainey@RolandOliphant Hosted on Acast. See acast.com/privacy for more information.

ThePrint
CutTheClutter: Warning to Europe, message to Putin, & India mention: Trump 2.0 security strategy, & Monroe doctrine

ThePrint

Play Episode Listen Later Dec 8, 2025 29:06


Trump administration has released its first National Security Strategy of the second term. The key policy document has a warning for Europe & it calls for an end to NATO expansion. The document also highlights the ‘Trump corollary' to Monroe doctrine. ThePrint Editor-in-Chief Shekhar Gupta breaks down the major highlights of this crucial document, what it says about US' policy & how Europe has reacted. He also explains the Monroe doctrine. #CutTheClutter Ep 1768 https://www.whitehouse.gov/wp-content/uploads/2025/12/2025-National-Security-Strategy.pdf ---------------------------------------------------------------------------------------------  @MSArenaOfficial  #Victoris #VictorisSUV #GotItAll #MarutiSuzukiSUV #MarutiSuzukiArena

Afternoon Drive with John Maytham
US announces new security strategy

Afternoon Drive with John Maytham

Play Episode Listen Later Dec 8, 2025 9:18 Transcription Available


Dr Jakkie Cilliers, chairman of the Board of ISS and head of African Futures Programmes, talks to John Maytham about the United States’ new National Security Strategy. Afternoon Drive with John Maytham is the late afternoon show on CapeTalk. Presenter John Maytham is an actor and author-turned-talk radio veteran and seasoned journalist. His show serves a round-up of local and international news coupled with the latest in business, sport, traffic, and weather. The host’s eclectic interests mean the program often surprises the audience with intriguing book reviews and inspiring interviews profiling artists. A daily highlight is Rapid Fire, just after 5:30 pm. CapeTalk fans call in to stump the presenter with their general knowledge questions. Another firm favourite is the humorous Thursday crossing with award-winning journalist Rebecca Davis, called “Plan B”. Thank you for listening to a podcast from Afternoon Drive with John Maytham Listen live on Primedia+ weekdays from 15:00 and 18:00 (SA Time) to Afternoon Drive with John Maytham broadcast on CapeTalk https://buff.ly/NnFM3Nk For more from the show, go to https://buff.ly/BSFy4Cn or find all the catch-up podcasts here https://buff.ly/n8nWt4x Subscribe to the CapeTalk Daily and Weekly Newsletters https://buff.ly/sbvVZD5 Follow us on social media: CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/CapeTalk CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567 See omnystudio.com/listener for privacy information.

The Smart 7
Russia welcomes latest US Security Strategy, New King of the Jungle and Lando Norris makes F1 History

The Smart 7

Play Episode Listen Later Dec 8, 2025 7:35


The Smart 7 is an award winning daily podcast, in association with METRO, that gives you everything you need to know in 7 minutes, at 7am, 7 days a week…With over 19 million downloads and consistently charting, including as No. 1 News Podcast on Spotify, we're a trusted source for people every day and we've won Gold at the Signal International Podcast awardsIf you're enjoying it, please follow, share, or even post a review, it all helps... Today's episode includes the following: https://x.com/i/status/1997587793644515627https://x.com/i/status/1997644409945375053https://x.com/i/status/1997628060699398210https://x.com/i/status/1997636781114556809 https://x.com/i/status/1997633625370542479 https://x.com/i/status/1997610712760533170https://x.com/i/status/1997681982260613157 https://www.tiktok.com/@thesun/video/7581256018588470550https://youtu.be/Fv0leN8TmR8 Contact us over @TheSmart7pod or visit www.thesmart7.com or find out more at www.metro.co.uk Voiced by Jamie East, using AI, written by Liam Thompson, researched by Lucie Lewis and produced by Daft Doris. Hosted on Acast. See acast.com/privacy for more information.

Daily 5 Minute Headlines
Russia Welcomes US Security Strategy & More

Daily 5 Minute Headlines

Play Episode Listen Later Dec 8, 2025


Listen to the December 8th, 2025, daily headline round-up and find all the top news that you need to know.

FIVE MINUTE NEWS
Trump's Neo-Nazi Security Strategy Document Shocks European Allies as America Aligns with Far Right.

FIVE MINUTE NEWS

Play Episode Listen Later Dec 6, 2025 11:30


The White House has released a controversial new National Security Strategy (NSS) that marks a major realignment of U.S. foreign policy under the "America First" banner. The document lays out Trump's vision for ensuring America's "dominance" in the Western Hemisphere, cultivating "resistance" within Europe, reestablishing "strategic stability" with Russia, and accepting Middle Eastern leaders "as they are." Current and former European officials are already pushing back against the strategy's assertions regarding European alliances and demographics. SPONSOR: AURA Frames: Exclusive $35 off Carver Mat at https://on.auraframes.com/FIVEMIN. Promo Code FIVEMIN Independent media has never been more important. Please support this channel by subscribing here: https://www.youtube.com/channel/UCkbwLFZhawBqK2b9gW08z3g?sub_confirmation=1 Join this channel with a membership for exclusive early access and bonus content: https://www.youtube.com/channel/UCkbwLFZhawBqK2b9gW08z3g/join Five Minute News is an Evergreen Podcast, covering politics, inequality, health and climate - delivering independent, unbiased and essential news for the US and across the world. Visit us online at http://www.fiveminute.news Follow us on Bluesky https://bsky.app/profile/fiveminutenews.bsky.social Follow us on Instagram http://instagram.com/fiveminnews Support us on Patreon http://www.patreon.com/fiveminutenews You can subscribe to Five Minute News with your preferred podcast app, ask your smart speaker, or enable Five Minute News as your Amazon Alexa Flash Briefing skill. CONTENT DISCLAIMER The views and opinions expressed on this channel are those of the guests and authors and do not necessarily reflect the official policy or position of Anthony Davis or Five Minute News LLC. Any content provided by our hosts, guests or authors are of their opinion and are not intended to malign any religion, ethnic group, club, organization, company, individual or anyone or anything, in line with the First Amendment right to free and protected speech. Learn more about your ad choices. Visit megaphone.fm/adchoices

Newshour
US security strategy warns of “civilisational erasure” in Europe

Newshour

Play Episode Listen Later Dec 5, 2025 47:27


A new US security strategy warns that Europe faces “civilisational erasure” and calls on Europeans to shoulder more of the burden for defence. It comes as the German parliament votes to introduce voluntary military service; we hear from a student protesting the change.Also in the programme: a big deal in Hollywood, as Netflix agrees to buy the film and streaming services of Warner Bros; and travel chaos in India as the country's largest airline IndiGo cancels hundreds of flights over new rules for pilots.

AP Audio Stories
Trump's security strategy slams European allies and asserts US power in the Western Hemisphere

AP Audio Stories

Play Episode Listen Later Dec 5, 2025 0:44


AP's Lisa Dwyer reports on a new National Security strategy by the Trump administration.

Space Cafe Radio
Space Café Radio - Germany's Space Security Strategy: A New Era with Michael Kniepen

Space Cafe Radio

Play Episode Listen Later Nov 20, 2025 21:26


Unveiling Germany's Historic Space Safety and Security StrategyIn this episode of Space Cafe Radio, host Torsten Kriening talks with Michael Kniepen, Head of Division politics at the German Ministry of Defense, about Germany's first-ever Space Safety and Security Strategy, released on November 19, 2025. Join us as we discuss the significance of this document, and explore the political, military, and European implications. Learn about Germany's newfound recognition of space as a contested domain, the investments needed for space security, and how this strategy aims to integrate European partners into a cohesive space security architecture. Tune in for insights on the strategic shifts and future prospects of German and European space defense.Useful document:Space Safety and Security Strategy GermanySpace Café Radio brings you talks, interviews, and reports from the team of SpaceWatchers while out on the road. Each episode has a specific topic, unique content, and a personal touch. Enjoy the show, and let us know your thoughts at radio@spacewatch.globalWe love to hear from you. Send us your thought, comments, suggestions, love lettersSupport the showYou can find us on: Spotify and Apple Podcast!Please visit us at SpaceWatch.Global, subscribe to our newsletters. Follow us on LinkedIn and X!

T-Minus Space Daily
Germany unveils a new space security strategy.

T-Minus Space Daily

Play Episode Listen Later Nov 19, 2025 14:56


Germany introduces a new space security strategy. Canada plans to increase its investment in European Space Agency (ESA) programs by $528.5 million. PowerBank Corporation is collaborating with Orbit AI to launch the Orbital Cloud, and more. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. Selected Reading Germany Braces for Wars in Space With New Security Strategy - Bloomberg Canada Deepens Space Ties with Europe Through Historic Investment PowerBank and Smartlink AI ("Orbit AI") to Launch the First "Orbital Cloud" for AI Infrastructure into Space Redwire Awarded $44 Million DARPA Contract to Advance Very Low-Earth Orbit Mission Spire Global Ships Nine Satellites to Launch Site Loft Orbital purchases power from Star Catcher's orbital energy grid Jiga Secures $12M Series A to Eliminate Hardware Sourcing Bottleneck Threatening AI Scale Eutelsat Launches a €828 million Reserved Capital Increase, Representing the First Step in Its Comprehensive Financing Strategy Sidus Space and Lonestar Data Holdings, LLC Drive Rapid Progress on Commercial Pathfinder Mission with Completion of Kickoff Meeting and System Requirements Review Planet and Quantum Systems Partner on Joint Satellite and Drone Monitoring Capabilities for European Defense Customers Scientists just discovered a new crater on the moon — they call it a 'freckle'- Space Share your feedback. What do you think about T-Minus Space Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Bernie and Sid
Security, Strategy, and Success: Hochul-Mamdani Collaboration, Alina Habba's Office Turmoil, and Judge's MVP | 11-14-25

Bernie and Sid

Play Episode Listen Later Nov 14, 2025 158:43


On this Friday edition of Sid & Friends in the Morning, Sid covers several major topics, beginning with a report on New York Governor Kathy Hochul and NYC Mayor-elect Zohran Mamdani's meeting to discuss state preparations against potential actions from the Trump administration and economic plans including universal free childcare. Sid also discusses an incident in New Jersey involving an assault on U.S. Attorney Alina Habba's office, with the FBI investigating the attack. Additionally, Rosenberg delves into sports analysis, with predictions for upcoming college and NFL games, and touches upon Captain Aaron Judge of the New York Yankees winning his third American League MVP award. Alina Habba, Brian Kilmeade, Emily Austin, Inna Vernikov, K.T. McFarland & Laura Loomer join Sid on this Friday installment of Sid & Friends in the Morning. Learn more about your ad choices. Visit megaphone.fm/adchoices

Retire With Style
Episode 204: How Your Retirement Style Shapes Your Social Security Strategy

Retire With Style

Play Episode Listen Later Nov 11, 2025 50:12


In this episode, Alex and Wade unpack the complexities of Social Security claiming strategies, weighing the benefits of delaying versus claiming early. They examine key financial considerations such as survivor benefits, tax planning opportunities, and the psychological factors that shape these decisions. The discussion also highlights how the Retirement Income Style Awareness (RISA) tool can help align Social Security choices with individual retirement preferences. Ultimately, the episode underscores the long-term financial impact of claiming decisions.   Takeaways Delaying Social Security can significantly increase lifetime benefits. Social Security provides inflation-protected lifetime income. Survivor benefits are a crucial consideration for couples. Building a social security delay bridge can ease financial pressure. Claiming early may be necessary for those without sufficient resources. Psychological factors play a role in claiming decisions. Discount rates can influence the perceived value of Social Security benefits. RISA helps align retirement income strategies with personal preferences. Claiming early can be rational under certain circumstances. Social Security reforms are likely but won't eliminate the program. Chapters 00:00 Introduction and Context 00:56 The Case for Delaying Social Security 12:07 Understanding RISA and Claiming Early 16:06 Psychological Factors in Claiming Decisions 24:38 Understanding Technical Liquidity and Early Claiming 26:18 Medical Considerations for Early Claiming 28:50 Real-Life Implications of Claiming Strategies 31:11 Legitimate Reasons for Claiming Early 34:22 The Role of Discount Rates in Claiming Decisions 39:20 Dependent Benefits and Claiming Early 42:04 Concerns About Social Security's Future 45:08 Final Thoughts on Claiming Strategies   Links  Explore the New RetireWithStyle.com! We've launched a brand-new home for the podcast! Visit RetireWithStyle.com to catch up on all our latest episodes, explore topics by category, and send us your questions or ideas for future episodes. If there's something you've been wondering about retirement, we want to hear it! The Retirement Planning Guidebook: 2nd Edition has just been updated for 2025! Visit your preferred book retailer or simply click here to order your copy today: https://www.wadepfau.com/books/ This episode is sponsored by Retirement Researcher https://retirementresearcher.com/. Download their free eBook, 8 Tips to Becoming A Retirement Income Investor at retirementresearcher.com/8tips

Retirement Starts Today Radio
This Social Security Strategy Gives Retirees More to Spend

Retirement Starts Today Radio

Play Episode Listen Later Nov 10, 2025 20:09


A new report says retirees who use a so-called "bridge strategy" can actually spend more and need fewer assets to retire securely. That's right. By delaying Social Security and using other savings to "bridge the gap," you could improve your lifetime income, reduce longevity risk, and build more peace of mind into your plan.  We will break down the research and find ways to make Social Security work harder for you. After that, I'll answer a listener question: What's the difference between a 5 year MYGA and a 5 year SPIA?  Resource: Article by John Manganaro on ThinkAdvisor: This Social Security Strategy Gives Retirees More to Spend Connect with Benjamin Brandt Get the Retire-Ready Toolkit: http://retirementstartstodayradio.com Subscribe to the newsletter: https://retirementstartstodayradio.com/newsletter Work with Benjamin: https://retirementstartstoday.com/start Follow Retirement Starts Today in:Apple Podcasts, Spotify, Overcast, Pocket Casts, Amazon Music, or iHeart Get the book!Retirement Starts Today: Your Non-financial Guide to an Even Better Retirement  

ITSPmagazine | Technology. Cybersecurity. Society
Beyond the Title: What It Really Takes to Be a CISO Today — Insights Following A Conversation with Solarwinds CISO, Tim Brown | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 16, 2025 8:26


What does it really take to be a CISO the business can rely on? In this episode, Sean Martin shares insights from a recent conversation with Tim Brown, CISO at SolarWinds, following his keynote at AISA CyberCon and his role in leading a CISO Bootcamp for current and future security leaders. The article at the heart of this episode focuses not on technical skills or frameworks, but on the leadership qualities that matter most: context, perspective, communication, and trust.Tim's candid reflections — including the personal toll of leading through a crisis — remind us that clarity doesn't come from control. It comes from connection. CISOs must communicate risk in ways that resonate across teams and business leaders. They need to build trusted relationships before they're tested and create space for themselves and their teams to process pressure in healthy, sustainable ways.Whether you're already in the seat or working toward it, this conversation invites you to rethink what preparation really looks like. It also leaves you with two key questions: Where do you get your clarity, and who are you learning from? Tune in, reflect, and join the conversation.

Redefining CyberSecurity
Beyond the Title: What It Really Takes to Be a CISO Today — Insights Following A Conversation with Solarwinds CISO, Tim Brown | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9

Redefining CyberSecurity

Play Episode Listen Later Oct 16, 2025 8:26


What does it really take to be a CISO the business can rely on? In this episode, Sean Martin shares insights from a recent conversation with Tim Brown, CISO at SolarWinds, following his keynote at AISA CyberCon and his role in leading a CISO Bootcamp for current and future security leaders. The article at the heart of this episode focuses not on technical skills or frameworks, but on the leadership qualities that matter most: context, perspective, communication, and trust.Tim's candid reflections — including the personal toll of leading through a crisis — remind us that clarity doesn't come from control. It comes from connection. CISOs must communicate risk in ways that resonate across teams and business leaders. They need to build trusted relationships before they're tested and create space for themselves and their teams to process pressure in healthy, sustainable ways.Whether you're already in the seat or working toward it, this conversation invites you to rethink what preparation really looks like. It also leaves you with two key questions: Where do you get your clarity, and who are you learning from? Tune in, reflect, and join the conversation.

Packet Pushers - Full Podcast Feed
PP082: Building a Workable Mobile Security Strategy In a World of Risky Apps

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Oct 14, 2025 62:01


Today we're bringing back one of our favorite guests — Akili Akridge. He's a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he's a straight-talking expert on all things mobile security. We're digging into mobile threats, why they keep CISOs up... Read more »

Packet Pushers - Fat Pipe
PP082: Building a Workable Mobile Security Strategy In a World of Risky Apps

Packet Pushers - Fat Pipe

Play Episode Listen Later Oct 14, 2025 62:01


Today we're bringing back one of our favorite guests — Akili Akridge. He's a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he's a straight-talking expert on all things mobile security. We're digging into mobile threats, why they keep CISOs up... Read more »

The Social-Engineer Podcast
Ep. 296 - Human Element Series - The Imagination Dilemma with Dr. Lydia Kostopoulos REPLAY

The Social-Engineer Podcast

Play Episode Listen Later Sep 29, 2025 40:56


REPLAY (Original Air Date March 10, 2025) Today we are joined by Dr. Lydia Kostopoulos. Dr. Kostopoulos is a globally recognized strategist that brings clarity and context as to what is on the horizon. Her unique expertise at the intersection of emerging technology, security and macro-trends has been sought by the United Nations, U.S. Special Operations, the European Commission, NATO, multi-nationals, tech companies, design agencies, academia, such as MIT and Oxford Saïd Business School, and foreign governments. She helps her clients understand new technologies, emerging value chains, and contextualizes the convergences of our time. She founded the boutique consultancy Abundance Studio and has experience working in the US, Europe, Middle East and East Asia. [March 10, 2025]   00:00 - Intro 00:19 - Intro Links -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                02:10 - Dr. Lydia Kostopoulos Intro 03:30 - From Counter Terrorism to Conflict Landscapes 05:35 - The Imagination Dilemma 09:13 - Technological Tit for Tat 11:38 - Four Facets of Imagination 12:18 - Facet 1) Identity 13:36 - Facet 2) Convergence 15:38 - Facet 3) Humanity 16:48 - Facet 4) Dreams 18:18 - Turning Crisis Into Strategy 22:39 - Being Human 26:04 - Future-Proofing Organizations 29:51 - Real Value Proposition 31:26 - Webinar Series -          Website: imaginationdilemma.com -          YouTube: @ImaginationDilemma 32:12 - Find Dr. Lydia Kostopoulos online -          Website: abundance.studio -          LinkedIn: in/lydiak -          Instagram: @HiLydiak 32:46 - Book Recommendations -          The 100-Year Life - Andrew Scott & Lynda Gratton -          Imagination Dilemma - Dr. Lydia Kostopoulos 37:02 - Mentors -          Parents -          Women Suffragists 38:15 - Guest Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Service Management Leadership Podcast with Jeffrey Tefertiller
Ep 64: “Business-First Security Strategy” – Jeffrey Wheatman

Service Management Leadership Podcast with Jeffrey Tefertiller

Play Episode Listen Later Aug 28, 2025 28:32


In this episode, Jeffrey Wheatman and I explore the future of security and risk management, discussing the persistent communication challenges CISOs face, the need for business-focused risk quantification, vendor accountability, and the importance of building feedback loops while moving away from blame-based cultures toward continuous improvement.

The Fearless Mindset
Episode 261 - Inside the Circle of Trust: Managing Security & Service for the Ultra-Wealthy

The Fearless Mindset

Play Episode Listen Later Aug 12, 2025 32:22


In this episode, Mark Ledlow explores the dynamics of family offices, wealth management, and protective intelligence with Jennifer Laurence, an Estate Management Consultant in Private UHNW Service, and a Founder and President of Luxury Lifestyle Logistics, as they delve into the complexities of servicing high-net-worth individuals. They discuss the evolution of protective intelligence, the necessity of precise communication between executive assistants and security teams, and the operational challenges within high-net-worth estate management. Jennifer also shares her insights on creating a cohesive service culture tailored to individual family needs and the importance of professionalizing estate management practices. As the episode concludes, Jennifer shares information about her consultancy, Luxury Lifestyle Logistics, which specializes in estate management consulting.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSEstate management for high-net-worth individuals requires personalized, holistic solutions beyond standard hospitality. Security is a spectrum: risk assessments and tailored strategies are essential for each client's unique profile. Privacy and confidentiality are major concerns for both clients and staff in luxury estate management. Every data point—utility bills, car titles, reservations—can be a vulnerability for high-profile individuals. The “circle of trust” must be carefully managed to balance service and privacy.QUOTES“We're serving individuals in their homes, and it's a very close, personable working relationship.” “Security risk is a spectrum. You have to understand what you can do internally, externally, and when it's right to bring in somebody full-time.” “Every single data point that you put your name on is ultimately a weak point for threat mitigation.” “You don't get to make your dinner reservations in your last name anymore. The world is too rich in data.” “Protective intelligence—that's the new era of security.”Get to know more about Jennifer Laurence through the links below.https://www.linkedin.com/in/jenniferlaurence/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.

The Progress Report
Digital frontiers: Securing media and entertainment in the connected age

The Progress Report

Play Episode Listen Later Jul 30, 2025 24:42


Today's digital entertainment ecosystem spans streaming platforms, mobile applications, gaming networks and content delivery systems—creating unprecedented opportunities and security challenges. Forward-thinking leaders are working to balance seamless user experiences with robust security frameworks in an era where digital content is ubiquitous and consumers demand instant, secure access across every device.  Tune in as experts discuss how the evolution of digital entertainment platforms is transforming security paradigms, creating new business models and why protecting the modern media value chain has become a C-suite priority that extends far beyond technical considerations.  Featured experts Tony Lauro, Senior Director of Security Strategy, Akamai Technologies Tina Slivka, Vice President, Consult Lead for US Telecom, Media and Technology, Kyndryl 

Cracking Cyber Security Podcast from TEISS
teissTalk: Refining your API security strategy to protect against AI-driven attacks

Cracking Cyber Security Podcast from TEISS

Play Episode Listen Later Jul 24, 2025 45:30


Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threatsMeeting API compliance and data protection challenges with emerging technologiesMoving towards a mature posture for API securityThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Tiago Rosado, Chief Information Security Officer, Asitehttps://www.linkedin.com/in/tiagorosado/Anne Coulombe, CISO, Bleuet LLChttps://www.linkedin.com/in/annecoulombe/Menachem Perlman,  Director, Global Solutions Engineering at Akamai Technologies - API Security,  Akamaihttps://www.linkedin.com/in/menachemperlman/

Global Security Briefing
Does the Trump Administration Have an Indo-Pacific Security Strategy?

Global Security Briefing

Play Episode Listen Later Jul 23, 2025 48:26


Tensions in the Indo-Pacific are testing US power and alliances. What does this mean for regional strategy and for the UK? In this episode of Global Security Briefing, host Neil Melvin is joined by Dr. Kori Schake, senior fellow and the director of foreign and defence policy studies at the American Enterprise Institute, and Dr Philip Shetler-Jones, senior research fellow, RUSI, to examine whether the Trump administration has a coherent Indo-Pacific strategy or is simply reacting to China's growing influence. As Washington debates its role in Asia amid military overstretch, defence industrial challenges, and diverging views on alliance priorities, the UK faces key questions about its own Indo-Pacific tilt. With British carriers deploying to the region and AUKUS under scrutiny, this episode explores whether the US has the will and means to lead, how regional actors are responding, and what all this means for UK strategy in an era of intensifying great power competition.

The Fearless Mindset
Episode 258 - More Than Security: How Risk, Privacy, and Precision Shape UHNW Living

The Fearless Mindset

Play Episode Listen Later Jul 22, 2025 24:30


In this episode, Mark Ledlow is joined by Jennifer Laurence, an Estate Management Consultant in Private UHNW Service, and a Founder and President of Luxury Lifestyle Logistics. They discuss her role in estate management consultancy, focusing on operational logistics, standard procedures, and family management for high-net-worth individuals. Jennifer shares her insights into personalized service, the nuances of security for the ultra-wealthy, and the importance of protecting every aspect of a client's lifestyle. They also dive into Jennifer's passion for archery and how it serves as her personal therapy. Mark and Jennifer further delve into the critical need for risk assessment and the subtle complexities of maintaining privacy and security in the lives of affluent families.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSEstate management for high-net-worth individuals requires personalized, holistic solutions beyond standard hospitality. Security is a spectrum: risk assessments and tailored strategies are essential for each client's unique profile. Privacy and confidentiality are major concerns for both clients and staff in luxury estate management. Every data point—utility bills, car titles, reservations—can be a vulnerability for high-profile individuals. The “circle of trust” must be carefully managed to balance service and privacy.QUOTES“We're serving individuals in their homes, and it's a very close, personable working relationship.” “Security risk is a spectrum. You have to understand what you can do internally, externally, and when it's right to bring in somebody full-time.” “Every single data point that you put your name on is ultimately a weak point for threat mitigation.” “You don't get to make your dinner reservations in your last name anymore. The world is too rich in data.” “Protective intelligence—that's the new era of security.”Get to know more about Jennifer Laurence through the links below.https://www.linkedin.com/in/jenniferlaurence/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.

Trust Issues
EP 11 - AI, identity, and the calm before the breach

Trust Issues

Play Episode Listen Later Jul 15, 2025 46:14


What does it take to stay calm in the face of constant cyber pressure—and why does that mindset matter more than ever? In this episode of Security Matters, host David Puner speaks with Den Jones, founder and CEO of 909Cyber, about his transition from enterprise chief security officer (CSO) to cybersecurity consultant. They explore what it means to lead with clarity and composure in a high-stakes environment, the realities of launching a firm in a crowded market, and how pragmatic security strategies—especially around identity, AI, and Zero Trust—can help organizations navigate AI-driven threats, talent shortages, and operational complexity. It's a candid conversation about what works and what doesn't when it comes to modern security leadership.

Clear Money Talk
Just The Answer: Are You Leaving Money on the Table with Your Social Security Strategy?

Clear Money Talk

Play Episode Listen Later Jul 7, 2025 6:43


Many individuals overlook the specific details that could affect their Social Security benefits, such as the timing of claims and the intricacies of spousal and survivor benefits. In this episode, Tim Clairmont MSFS™, LACP™, Wealth Advisor, and Tyler Andrews CFP®, Wealth Advisor, discuss how different scenarios—whether you're married, divorced, widowed, or still working—can impact your Social Security strategy. They also touch on the taxes that could eat into your benefits and how to incorporate Social Security into your broader financial plan. If you're looking to gain a deeper understanding of how your unique circumstances could influence your Social Security decisions, this episode offers practical insights to help you make more informed choices. 

Clear Money Talk
Are You Leaving Money on the Table with Your Social Security Strategy?

Clear Money Talk

Play Episode Listen Later Jul 7, 2025 36:02


Many individuals overlook the specific details that could affect their Social Security benefits, such as the timing of claims and the intricacies of spousal and survivor benefits. In this episode, Tim Clairmont MSFS™, LACP™, Wealth Advisor, and Tyler Andrews CFP®, Wealth Advisor, discuss how different scenarios—whether you're married, divorced, widowed, or still working—can impact your Social Security strategy. They also touch on the taxes that could eat into your benefits and how to incorporate Social Security into your broader financial plan. If you're looking to gain a deeper understanding of how your unique circumstances could influence your Social Security decisions, this episode offers practical insights to help you make more informed choices. 

The China in Africa Podcast
China's Africa Security Strategy: Training, Arms, and Political Influence

The China in Africa Podcast

Play Episode Listen Later Jun 20, 2025 57:00


Over the past 25 years, China's military engagement with Africa has grown dramatically. In 2000, fewer than 5% of African weapons came from China. Today, Chinese-made armored vehicles are used by 70% of African militaries, and China has become the continent's largest arms supplier. Officer training programs have followed a similar trajectory. At the turn of the century, fewer than 200 African officers were trained in China; today, that number exceeds 2,000. Paul Nantulya, a veteran China–Africa military analyst and research associate at the Africa Center for Strategic Studies, joins Eric and Cobus to unpack his latest findings on how Beijing is deepening its defense ties across the continent. JOIN THE DISCUSSION: X: @ChinaGSProject | @eric_olander | @stadenesque Facebook: www.facebook.com/ChinaAfricaProject YouTube: www.youtube.com/@ChinaGlobalSouth Now on Bluesky! Follow CGSP at @chinagsproject.bsky.social FOLLOW CGSP IN FRENCH AND ARABIC: Français: www.projetafriquechine.com | @AfrikChine Arabic: عربي: www.alsin-alsharqalawsat.com | @SinSharqAwsat JOIN US ON PATREON! Become a CGSP Patreon member and get all sorts of cool stuff, including our Week in Review report, an invitation to join monthly Zoom calls with Eric & Cobus, and even an awesome new CGSP Podcast mug! www.patreon.com/chinaglobalsouth

Easy Prey
Safe AI Implementation

Easy Prey

Play Episode Listen Later Apr 23, 2025 46:47


Red models associated with AI technologies highlight real-world vulnerabilities and the importance of proactive security measures. It is vital to educate users about how to explore the challenges and keep AI systems secure. Today's guest is Dr. Aditya Sood. Dr. Sood is the VP of Security Engineering and AI Strategy at Aryaka and is a security practitioner, researcher, and consultant with more than 16 years of experience. He obtained his PhD in computer science from Michigan State University and has authored several papers for various magazines and journals. In this conversation, he will shed light on AI-driven threats, supply chain risks, and practical ways organizations can stay protected in an ever-changing environment. Get ready to learn how the latest innovations and evolving attack surfaces affect everyone from large companies to everyday users, and why a proactive mindset is key to staying ahead. Show Notes: [01:02] Dr. Sood has been working in the security industry for the last 17 years. He has a PhD from Michigan State University. Prior to Aryaka, he was a Senior Director of Threat Research and Security Strategy for the Office of the CTO at F5. [02:57] We discuss how security issues with AI are on the rise because of the recent popularity and increased use of AI. [04:18] The large amounts of data are convoluting how things are understood, the complexity is rising, and the threat model is changing. [05:14] We talk about the different AI attacks that are being encountered and how AI can be used to defend against these attacks. [06:00] Pre-trained models can contain vulnerabilities. [07:01] AI drift or model or concept drift is when data in the training sets is not updated. The data can be used in a different way. AI hallucinations also can create false output. [08:46] Dr. Sood explains several types of attacks that malicious actors are using. [10:07] Prompt injections are also a risk. [12:13] We learn about the injection mapping strategy. [13:54] We discuss the possibilities of using AI as a tool to bypass its own guardrails. [15:18] It's an arms race using AI to attack Ai and using AI to secure AI. [16:01] We discuss AI workload analysis. This helps to understand the way AI processes. This helps see the authorization boundary and the security controls that need to be enforced. [17:48] Being aware of the shadow AI running in the background. [19:38] Challenges around corporations having the right security people in place to understand and fight vulnerabilities. [20:55] There is risk with the data going to the cloud through the LLM interface. [21:47] Dr. Sood breaks down the concept of shadow AI. [23:50] There are also risks for consumers using AI. [29:39] The concept of Black Box AI models and bias being built into the particular AI. [33:45] The issue of the ground set of truth and how the models are trained. [37:09] It's a balancing act when thinking about the ground set of truth for data. [39:08] Dr. Sood shares an example from when he was researching for his book. [39:51] Using the push and pretend technique to trick AI into bypassing guardrails. [42:51] We talk about the dangers of using APIs that aren't secure. [43:58] The importance of understanding the entire AI ecosystem. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Aditya K Sood Aditya K Sood - LinkedIn Aditya K Sood - X Aryaka COMBATING CYBERATTACKS TARGETING THE AI ECOSYSTEM: Assessing Threats, Risks, and Vulnerabilities Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

Paul's Security Weekly TV
I SIEM, you SIEM, we all SIEM for a Data Security Strategy - Colby DeRodeff - ESW #402

Paul's Security Weekly TV

Play Episode Listen Later Apr 14, 2025 35:43


We wanted security data? We got it! Now, what the heck do we DO with all of it? The core challenge of security operations, incident response, and even compliance is still a data management and analysis problem. Which is why we're seeing companies like Abstract Security pop up to address some of these challenges. Abstract just released a comprehensive eBook on security data strategy, linked below, and you don't even need to give up an email address to read it! In this interview, we'll talk through some of the highlights: Challenges Myths Pillars of a data security strategy Understanding the tools available Segment Resources A Leader's Guide to Security Data Strategy eBook Show Notes: https://securityweekly.com/esw-402

ITSPmagazine | Technology. Cybersecurity. Society
Detection vs. Noise: What MITRE ATT&CK Evaluations Reveal About Your Security Tools | A Conversation with Allie Mellen | Redefining CyberSecurity with Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 17, 2025 36:06


⬥GUEST⬥Allie Mellen, Principal Analyst,  Forrester | On LinkedIn: https://www.linkedin.com/in/hackerxbella/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On ITSPmagazine: https://www.itspmagazine.com/sean-martin⬥EPISODE NOTES⬥In this episode, Allie Mellen, Principal Analyst on the Security and Risk Team at Forrester, joins Sean Martin to discuss the latest results from the MITRE ATT&CK Ingenuity Evaluations and what they reveal about detection and response technologies.The Role of MITRE ATT&CK EvaluationsMITRE ATT&CK is a widely adopted framework that maps out the tactics, techniques, and procedures (TTPs) used by threat actors. Security vendors use it to improve detection capabilities, and organizations rely on it to assess their security posture. The MITRE Ingenuity Evaluations test how different security tools detect and respond to simulated attacks, helping organizations understand their strengths and gaps.Mellen emphasizes that MITRE's evaluations do not assign scores or rank vendors, which allows security leaders to focus on analyzing performance rather than chasing a “winner.” Instead, organizations must assess raw data to determine how well a tool aligns with their needs.Alert Volume and the Cost of Security DataOne key insight from this year's evaluation is the significant variation in alert volume among vendors. Some solutions generate thousands of alerts for a single attack scenario, while others consolidate related activity into just a handful of actionable incidents. Mellen notes that excessive alerting contributes to analyst burnout and operational inefficiencies, making alert volume a critical metric to assess.Forrester's analysis includes a cost calculator that estimates the financial impact of alert ingestion into a SIEM. The results highlight how certain vendors create a massive data burden, leading to increased costs for organizations trying to balance security effectiveness with budget constraints.The Shift Toward Detection and Response EngineeringMellen stresses the importance of detection engineering, where security teams take a structured approach to developing and maintaining high-quality detection rules. Instead of passively consuming vendor-generated alerts, teams must actively refine and tune detections to align with real threats while minimizing noise.Detection and response should also be tightly integrated. Forrester's research advocates linking every detection to a corresponding response playbook. By automating these processes through security orchestration, automation, and response (SOAR) solutions, teams can accelerate investigations and reduce manual workloads.Vendor Claims and the Reality of Security ToolsWhile many vendors promote their performance in the MITRE ATT&CK Evaluations, Mellen cautions against taking marketing claims at face value. Organizations should review MITRE's raw evaluation data, including screenshots and alert details, to get an unbiased view of how a tool operates in practice.For security leaders, these evaluations offer an opportunity to reassess their detection strategy, optimize alert management, and ensure their investments in security tools align with operational needs.For a deeper dive into these insights, including discussions on AI-driven correlation, alert fatigue, and security team efficiency, listen to the full episode.⬥SPONSORS⬥LevelBlue: https://itspm.ag/attcybersecurity-3jdk3ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Inspiring Post: https://www.linkedin.com/posts/hackerxbella_go-beyond-the-mitre-attck-evaluation-to-activity-7295460112935075845-N8GW/Blog | Go Beyond The MITRE ATT&CK Evaluation To The True Cost Of Alert Volumes: https://www.forrester.com/blogs/go-beyond-the-mitre-attck-evaluation-to-the-true-cost-of-alert-volumes/⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast: 

The Social-Engineer Podcast
Ep. 296 - Human Element Series - The Imagination Dilemma with Dr. Lydia Kostopoulos

The Social-Engineer Podcast

Play Episode Listen Later Mar 10, 2025 39:12


Today we are joined by Dr. Lydia Kostopoulos. Dr. Kostopoulos is a globally recognized strategist that brings clarity and context as to what is on the horizon. Her unique expertise at the intersection of emerging technology, security and macro-trends has been sought by the United Nations, U.S. Special Operations, the European Commission, NATO, multi-nationals, tech companies, design agencies, academia, such as MIT and Oxford Saïd Business School, and foreign governments. She helps her clients understand new technologies, emerging value chains, and contextualizes the convergences of our time. She founded the boutique consultancy Abundance Studio and has experience working in the US, Europe, Middle East and East Asia. [March 10, 2025]   00:00 - Intro 00:19 - Intro Links -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                02:10 - Dr. Lydia Kostopoulos Intro 03:30 - From Counter Terrorism to Conflict Landscapes 05:35 - The Imagination Dilemma 09:13 - Technological Tit for Tat 11:38 - Four Facets of Imagination 12:18 - Facet 1) Identity 13:36 - Facet 2) Convergence 15:38 - Facet 3) Humanity 16:48 - Facet 4) Dreams 18:18 - Turning Crisis Into Strategy 22:39 - Being Human 26:04 - Future-Proofing Organizations 29:51 - Real Value Proposition 31:26 - Webinar Series -          Website: imaginationdilemma.com -          YouTube: @ImaginationDilemma 32:12 - Find Dr. Lydia Kostopoulos online -          Website: abundance.studio -          LinkedIn: in/lydiak -          Instagram: @HiLydiak 32:46 - Book Recommendations -          The 100-Year Life - Andrew Scott & Lynda Gratton -          Imagination Dilemma - Dr. Lydia Kostopoulos 37:02 - Mentors -          Parents -          Women Suffragists 38:15 - Guest Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

ITSPmagazine | Technology. Cybersecurity. Society
Redefining Zero Trust: “Near Zero Trust” | A Real-World Success Story Through Proactive Security | A Zero Trust World Conversation with Avi Solomon | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 26, 2025 15:37


The latest episode of the On Location series, recorded at ThreatLocker's Zero Trust World 2025 in Orlando, brings forward a deep and practical conversation about implementing Zero Trust principles in real-world environments. Hosted by Marco Ciappelli and Sean Martin, this episode features Avi Solomon, CIO of a law firm with nearly 30 years in IT and a strong focus on cybersecurity.The Journey to Proactive SecurityAvi Solomon shares his experience transitioning from traditional security models to a proactive, preventive approach with ThreatLocker. With a background in engineering, consulting, and security (CISSP certified), Solomon outlines his initial concerns with reactive endpoint detection and response (EDR) solutions. While EDR tools act as a secondary insurance policy, he emphasizes the need for a preventive layer to block threats before they manifest.Solomon's firm adopted ThreatLocker a year ago, replacing a legacy product to integrate its proactive security measures. He highlights the platform's maturation, including network control, storage control, application whitelisting, and cloud integration. The shift was not only a technological change but also a cultural one, aligning with the broader philosophy of Zero Trust—approaching security with a mindset that nothing within or outside the network should be trusted by default.Implementing Zero Trust with EaseA standout moment in the episode is Solomon's recount of his implementation process. His conservative approach included running ThreatLocker in observation mode for two months before transitioning fully to a secure mode. When the switch was finally flipped, the result was remarkable—zero disruptions, no pushback from users, and a smooth transition to a less risky security posture. Solomon attributes this success to ThreatLocker's intuitive deployment and adaptive learning capabilities, which allowed the system to understand normal processes and minimize false positives.Redefining Zero Trust: “Near Zero Trust”Solomon introduces a pragmatic take on Zero Trust, coining the term “Near Zero Trust” (NZT). While achieving absolute Zero Trust is an ideal, Solomon argues that organizations should strive to get as close as possible by layering strategic solutions. He draws a clever analogy comparing Zero Trust to driving safely before relying on a seatbelt—proactive behavior backed by reactive safeguards.Tune in to the full episode to explore more of Avi Solomon's insights, hear stories from the conference floor, and learn practical approaches to embedding Zero Trust principles in your organization's security strategy.Guest: Avi Solomon, Chief Information Officer at Rumberger | Kirk | On LinkedIn: https://www.linkedin.com/in/aviesolomon/Hosts:Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
Breaking the Spell: How to Avoid the Grand Delusion in Zero Trust | A Conversation with Dr. Chase Cunningham at Zero Trust World 2025 | On Location with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 25, 2025 9:34


At ThreatLocker Zero Trust World 2025 in Orlando, Chase Cunningham, often referred to as “Dr. Zero Trust,” delivered a thought-provoking session titled The Grand Delusion. The event, filled with IT professionals, managed service providers (MSPs), and small to midsize business (SMB) leaders, provided the perfect backdrop for a candid discussion about the state of cybersecurity and the real-world application of Zero Trust strategies.Challenging the Status QuoCunningham emphasized the need for businesses to adopt realistic cybersecurity practices that align with their resources and needs. He pointed out the pitfalls of smaller organizations attempting to emulate enterprise-level security strategies without the necessary infrastructure. “Cyber shouldn't be any different” than outsourcing taxes or other specialized tasks, he explained, advocating for MSPs and external services as practical solutions.Zero Trust as a Strategy, Not Just a TermThe session underscored that Zero Trust is not merely a buzzword but a strategic approach to security. Cunningham stressed the importance of questioning the validity of industry claims and seeking concrete data to support cybersecurity initiatives. He encouraged attendees to avoid being “delusional” by blindly accepting security solutions without a critical evaluation of their impact and effectiveness.Actionable Steps for Small BusinessesCunningham shared practical advice for implementing Zero Trust principles within smaller organizations. He recommended focusing on foundational controls like identity and access management, micro-segmentation, and application allow and block lists. He noted that achieving security is a journey, requiring a structured, strategic approach and an acceptance that immediate results are unlikely.The Future of Zero TrustLooking ahead, Cunningham expressed optimism about the continued evolution of Zero Trust. He highlighted its growing global significance, with his upcoming engagements in Taiwan, Colombia, and Europe serving as evidence of its widespread adoption. Ultimately, he framed Zero Trust as not only a business imperative but a fundamental human right in today's digital world.Tune in to this episode to hear more insights from Chase Cunningham and explore what Zero Trust means for businesses of all sizes.Guest

Help Me With HIPAA
Bare Minimum Isn't a Security Strategy - Ep 495

Help Me With HIPAA

Play Episode Listen Later Feb 7, 2025 36:48


If you've ever wondered what it's like to scream into the cybersecurity void, this episode might feel oddly relatable. We dive into why “bare minimum” isn't a security strategy—it's more like playing Russian roulette with your data. From regulatory head-scratchers to the harsh reality that a “bare minimum” security strategy is about as effective as locking your front door while leaving the windows wide open, this episode is your wake-up call, packed with sharp insights, analogies involving go-karts on the interstate, and the occasional frustrated sigh. More info at HelpMeWithHIPAA.com/495

ITSPmagazine | Technology. Cybersecurity. Society
Shadow IT: Securing Your Organization in a World of Unapproved Apps | A Zero Trust World Conversation with Ryan Bowman | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 7, 2025 23:34


Zero Trust World 2025, hosted by ThreatLocker, is fast approaching (February 19-21), bringing together security professionals, IT leaders, and business executives to discuss the principles and implementation of Zero Trust. Hosted by ThreatLocker, this event offers a unique opportunity to explore real-world security challenges and solutions.In a special On Location with Sean and Marco episode recorded ahead of the event, Ryan Bowman, VP of Solutions Engineering at ThreatLocker, shares insights into his upcoming session, The Dangers of Shadow IT. Shadow IT—the use of unauthorized applications and systems within an organization—poses a significant risk to security, operations, and compliance. Bowman's session aims to shed light on this issue and equip attendees with strategies to address it effectively.Understanding Shadow IT and Its RisksBowman explains that Shadow IT is more than just an inconvenience—it's a growing challenge for businesses of all sizes. Employees often turn to unauthorized tools and services because they perceive them as more efficient, cost-effective, or user-friendly than the official solutions provided by IT teams. While this may seem harmless, the reality is that these unsanctioned applications create serious security vulnerabilities, increase operational risk, and complicate compliance efforts.One of the most pressing concerns is data security. Employees using unauthorized platforms for communication, file sharing, or project management may unknowingly expose sensitive company data to external risks. When employees leave the organization or access is revoked, data stored in these unofficial systems can remain accessible, increasing the risk of breaches or data loss.Procurement issues also play a role in the Shadow IT problem. Bowman highlights cases where organizations unknowingly pay for redundant software services, such as using both Teams and Slack for communication, leading to unnecessary expenses. A lack of centralized oversight results in wasted resources and fragmented security controls.Zero Trust as a MindsetA recurring theme throughout the discussion is that Zero Trust is not just a technology or a product—it's a mindset. Bowman emphasizes that implementing Zero Trust requires organizations to reassess their approach to security at every level. Instead of inherently trusting employees or systems, organizations must critically evaluate every access request, application, and data exchange.This mindset shift extends beyond security teams. IT leaders must work closely with employees to understand why Shadow IT is being used and find secure, approved alternatives that still support productivity. By fostering open communication and making security a shared responsibility, organizations can reduce the temptation for employees to bypass official IT policies.Practical Strategies to Combat Shadow ITBowman's session will not only highlight the risks associated with Shadow IT but also provide actionable strategies to mitigate them. Attendees can expect insights into:• Identifying and monitoring unauthorized applications within their organization• Implementing policies and security controls that balance security with user needs• Enhancing employee engagement and education to prevent unauthorized technology use• Leveraging solutions like ThreatLocker to enforce security policies while maintaining operational efficiencyBowman also stresses the importance of rethinking traditional IT stereotypes. While security teams often impose strict policies to minimize risk, they must also ensure that these policies do not create unnecessary obstacles for employees. The key is to strike a balance between control and usability.Why This Session MattersWith organizations constantly facing new security threats, understanding the implications of Shadow IT is critical. Bowman's session at Zero Trust World 2025 will provide a practical, real-world perspective on how organizations can protect themselves without stifling innovation and efficiency.Beyond the technical discussions, the conference itself offers a unique chance to engage with industry leaders, network with peers, and gain firsthand experience with security tools in hands-on labs. With high-energy sessions, interactive learning opportunities, and keynotes from industry leaders like ThreatLocker CEO Danny Jenkins and Dr. Zero Trust, Chase Cunningham, Zero Trust World 2025 is shaping up to be an essential event for anyone serious about cybersecurity.For those interested in staying ahead of security challenges, attending Bowman's session on The Dangers of Shadow IT is a must.Guest: Ryan Bowman, VP of Solutions Engineering, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/ryan-bowman-3358a71b/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More