POPULARITY
Over the last 48-72 hours, I completely fell down the rabbit hole with a new AI tool called Clawdbot (rebranded TODAY to Moltbot). Instead of my planned episode about what's on my mind in January 2026, I decided to share my raw, unfiltered experience setting up this AI assistant that runs 24/7 and integrates with all my tools. This isn't your typical AI chat interface—it's an always-on assistant I can text through Telegram that proactively handles research, automates workflows, and maintains institutional memory of all my content. I'll walk you through exactly how I discovered it, my security-first setup approach using a virtual private server, the learning curve (spoiler: it took me until 1:30 AM), and the specific ways I'm using it now. From automated guest research and fitness tracking to content ideation from my 300+ podcast transcripts, this tool is changing how I think about AI assistance. But I'm also wrestling with bigger questions about what this means for content creation, human creativity, and where we draw the line on AI-generated work. → Alex Finn video → Learn about Clawdbot → Setup video from Neil Stephenson → Setup video from VelvetShark Full transcript and show notes *** TIMESTAMPS (00:00) Discovery Through Alex Finn's Video (02:50) What Actually Is Clawdbot? (05:46) Security-First Setup on Virtual Private Server (09:48) Current Integrations: Notion, Oura, Fathom, and More (14:15) Guest Research and Automated Workflows (16:48) Writing Style Analysis Exercise (19:13) Privacy Controls and Fathom Integration (22:54) Security Threats and Ongoing Protection (25:05) Future Plans: Show Notes and Automation (28:38) Should You Use Clawdbot? Technical Requirements (33:16) Costs, Setup Time, and What Can Go Wrong (35:24) The Content Creation Philosophy Question (40:02) Five Types of Content I Still Consume (42:36) How Creators Need to Adapt to AI Reality *** ASK CREATOR SCIENCE → Submit your question here *** WHEN YOU'RE READY
Sarah Ference, CPA, an author of the JofA's Professional Liability Spotlight column, returns to the JofA podcast to discuss recent column topics and the advice CPAs can gain from them. In particular, Ference details data security preparedness, the value of engagement letters for tax-compliance services, common audit claims and defenses, and more. Editor's note: This episode is the JofA podcast's last until Jan. 8. n October: Are You Prepared for the Cost of a Data Security Incident? n November: Blocking and Tackling: Engagement Letters for Tax Compliance Services n December: Common Audit Claims and Defenses What you'll learn from this episode: Advice for CPA firms to guard against data security incidents. The ways engagement letters can prevent costly client disputes. The factors that often make audit claims the most expensive type of claims for firms. How to protect your firm when a client faces bankruptcy.
professorjrod@gmail.comIn this episode of Technology Tap: CompTIA Study Guide, we delve into endpoint security—a crucial topic for anyone preparing for IT certification exams, especially CompTIA. Traditional firewalls no longer fully protect your network; attackers now exploit endpoints like laptops, phones, printers, and smart devices to breach security. We explore how threats bypass perimeter defenses by targeting users and devices directly, and explain essential controls such as hardening, segmentation, encryption, patching, behavior analytics, and access management. Whether you're studying for your CompTIA exam or seeking practical IT skills development, this episode offers critical insights and IT certification tips to strengthen your understanding of cybersecurity fundamentals. Tune in to enhance your tech exam prep and advance your technology education journey.We start with foundations that actually move risk: baseline configurations, aggressive patch management, and closing unnecessary ports and services. From there we layer modern defenses—EDR and XDR for continuous telemetry and automated containment, UEBA to surface the 3 a.m. login or odd data pulls, and the underrated duo of least privilege and application allow listing to deny unknown code a chance to run. You'll hear why full disk encryption is non‑negotiable and how policy, not heroics, sustains security over time.Mobile endpoints take center stage with clear tactics for safer travel and remote work: stronger screen locks and biometrics, MDM policies that enforce remote wipe and jailbreak detection, and connection hygiene that favors VPN and cellular over public Wi‑Fi. We break down evil twin traps, side loading risks, and permission sprawl, then pivot to IoT realities—default passwords, stale firmware, exposed admin panels—and how VLAN isolation and firmware schedules defang them. A real case of a chatty lobby printer becoming an attack pivot drives home the need for logging and outbound controls through SIEM.The takeaway is simple and urgent: if it connects, it can be attacked, and if it's hardened, segmented, encrypted, and monitored, it can be defended. Subscribe for more practical security deep dives, share this with a teammate who owns devices or networks, and leave a review to tell us which control you'll deploy first.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Tony Connelly, Europe Editor, looks ahead to the NATO meeting of Allied Foreign Ministers.
In this candid podcast, Bureau Veritas Marine and Offshore's cyber security technical leader Panagiotis Anastasiou outlines his concerns about what he views as shipping's limited approach to cyber security and a need for increased awareness of its importance. His career-long knowledge and experience of cyber security arrangements in the aerospace sector — particularly with satellite technology — gives him an authoritative overview of cyber security and, for an industry that has autonomous vessels in development, he had expected to find shipping to be very advanced in its cyber security implementation and attitudes. Instead, he found that was not the case. His remarks include an example of a recent incident in which a service provider's systems were compromised, affecting at least 120 ships. The breach was subsequently repaired but the full story prompts Anastasiou to observe that “we fall in the same hole again and again”. He says this is because of limited efforts to prepare for cyber security difficulties. In contrast to shipping's approach, cyber security is the starting point when satellite systems are designed, he says. Controls, procedures and governance are built on that foundation, with ground infrastructure and component design following on. This approach should be common to all industries, including marine, he says. He acknowledges that maritime regulations now apply to cyber security which make it mandatory to take precautions, but he believes that shipowners and their system suppliers should go further. Attitudes must change So, he explains in the podcast that attitudes must change and he outlines some ideas about how cyber security awareness could be strengthened by better – and repeated – education and cyber drills that are backed up by companies' tested policies on how to respond to cyber security incidents. He goes on to describe how a cyber attack on a vessel might be triggered by an attack on shoreside systems, given the growing connectivity between ship and shore and vice versa. Not only that, but the implications of a maritime cyber attack can extend far beyond the company itself, since any resulting operational delay could have an impact on an entire supply chain. Class societies have addressed cyber security concerns by developing two Unified Requirements — UR 26 and UR 27 — and Anastasiou was a member of the International Association of Classification Societies (IACS) Cyber Systems Panel that developed them. But he suggests in the podcast that these should be viewed as starting points for class societies to evolve requirements to match the pace of change in technology. As a response to his remarks, he encourages listeners to conduct internal assessments of their own cyber security and to reach out to their class societies for guidance to improve their resilience.
Life, Culture and Current Events from a Biblical Perspective with Neil Johnson.Your support sends the gospel to every corner of Australia through broadcast, online and print media: https://vision.org.au/donateSee omnystudio.com/listener for privacy information.
In this in-depth conversation, we sit down with Santosh Kumar Dhakal, a Military General, to break down the realities behind the Gen Z Protest in Nepal, the allegations against the army, and the rising regional tensions. He explains how the meeting unfolded, including the global parallels with the Gen Z movement, the revolutions in Iran, Sri Lanka, and Bangladesh, and offers clarity on the role of the Nepal Army during mass protests. We also discuss accusations that the army failed to protect key buildings, whether the army can act without orders, and how Nepal's national security and defense system actually operates. The conversation expands to highlight the precipitating and underlying causes and the likely influence of varied actors beyond the objectives of the Gen Zs. It highlights the importance of geopolitics and the security concerns of our neighbors, having symbiotic relations with Nepal's own security. He also talked about China and India's security concerns vis-à-vis Nepal's security concerns. GET CONNECTED WITH Santosh Kumar Dhakal: Facebook - https://www.facebook.com/santosh.k.dhakal?mibextid=wwXIfr&rdid=VaLxSoPZUjvlUeBZ&share_url=https%3A%2F%2Fwww.facebook.com%2Fshare%2F197fRS2ntC%2F%3Fmibextid%3DwwXIfr# SPONSOR : Our title sponsor "PROTON NEPAL" Instagram: https://www.instagram.com/protonnepal/ Facebook: https://www.facebook.com/ProtonCarsNepal College partner : Model Institute of Technology Instagram: https://www.instagram.com/mitnepal/ MIT: https://mitnepal.edu.np/ Facebook: https://www.facebook.com/MITechCollege
A government watchdog is sounding the alarm about a growing national security threat, one that comes from the everyday digital traces service members and their families leave online. A new Government Accountability Office report warns that publicly accessible data from social media posts and location tracking to routine Defense Department press releases can be pieced together by bad actors to identify military personnel and disrupt military operations. GAO says the Pentagon has taken some steps to address the threat, but its efforts remain scattered and lack coordination. For more, Federal News Network's Anastasia Obis spoke with Joe Kirschbaum, director of the defense capabilities and management team at GAO.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Mary Vought, Vice President of Strategic Communications at The Heritage Foundation, joins the show to discuss how the government shutdown is affecting SNAP benefits and the growing number of Americans who rely on the program. She breaks down SNAP eligibility, long term usage trends, and ongoing concerns about fraud and abuse within SNAP and other welfare programs. The conversation covers reform efforts, audits, and the need for stronger oversight across the safety net system. Mary also highlights a new security concern as terrorist groups, including the Islamic State, begin using AI, video games, and cryptocurrency for propaganda, recruitment, and funding.
Vassy Kapelos is joined by National Defence Minister David McGuinty, Interim Parliamentary Budget Officer Jason Jacques, strategists Kathleen Monk, Kory Teneycke, and Scott Reid, Canadian Security Intelligence Service Director Daniel Rogers, Bloomberg’s Nojoud Al Mallees, The Globe and Mail’s Robert Fife, and CTV News’ Mike Le Couteur.
Venezuela Pressure Campaign and Asian Diplomacy. Mary Kissel analyzes the massive US military buildup near Venezuela, staged from Roosevelt Roads, noting that the Trump administration prioritizes removing Maduro due to national security threats. She emphasizes that the State Department possesses numerous non-military levers, like sanctions and international pressure through the OAS, to induce Maduro's exit without direct intervention. Kissel also characterizes President Trump's diplomatic engagement at ASEAN and APEC as very successful, securing vital commitments on rare earth mining and processing to counter Chinese economic threats in the Pacific.
Venezuela Pressure Campaign and Asian Diplomacy. Mary Kissel analyzes the massive US military buildup near Venezuela, staged from Roosevelt Roads, noting that the Trump administration prioritizes removing Maduro due to national security threats. She emphasizes that the State Department possesses numerous non-military levers, like sanctions and international pressure through the OAS, to induce Maduro's exit without direct intervention. Kissel also characterizes President Trump's diplomatic engagement at ASEAN and APEC as very successful, securing vital commitments on rare earth mining and processing to counter Chinese economic threats in the Pacific. 1876 BOLIVAR ENTERS CARACAS
OpenAI has officially transitioned to a for-profit corporation, a move approved by Delaware Attorney General Kathy Jennings. This restructuring allows OpenAI to raise capital more effectively while maintaining oversight from its original non-profit entity. Microsoft now holds a 27% stake in the new structure, valued at over $100 billion, and OpenAI has committed to purchasing $250 billion in Microsoft Azure cloud services. This agreement includes provisions for Artificial General Intelligence (AGI), which will require verification from an independent expert panel before any declarations are made. Critics have raised concerns about the potential compromise of the non-profit's independence under this new arrangement.Research from cybersecurity firm SPLX indicates that AI agents, such as OpenAI's Atlas, are becoming new security threats due to vulnerabilities that allow malicious actors to manipulate their outputs. A survey revealed that only 17.5% of U.S. business leaders have an AI governance program in place, highlighting a significant gap in responsible AI use. The National Institute of Standards and Technology emphasizes the importance of identity governance in managing AI risks, suggesting that organizations must embed identity controls throughout AI deployment to mitigate potential threats.Additionally, a critical vulnerability in Microsoft Windows Server Update Services (WSUS) is currently being exploited, with around 100,000 instances reported in just one week. This vulnerability allows unauthenticated actors to execute arbitrary code on affected systems, raising concerns among cybersecurity experts, especially since Microsoft has not updated its guidance on the matter. Meanwhile, Microsoft 365 Copilot has introduced a new feature enabling users to build applications and automate workflows using natural language, which could lead to governance challenges as employees create their own automations.For Managed Service Providers (MSPs) and IT service leaders, these developments underscore the need for enhanced governance and security measures. The shift of OpenAI to a for-profit model signals a tighter integration with Microsoft, necessitating familiarity with Azure's AI stack. The vulnerabilities associated with AI agents and the WSUS exploit highlight the importance of proactive security measures. MSPs should prioritize establishing governance frameworks around AI usage and ensure robust identity management to mitigate risks associated with these emerging technologies.Four things to know today00:00 OpenAI Officially Becomes a For-Profit Corporation, Cementing $100B Partnership with Microsoft03:30 AI Agents Are Becoming a Security Nightmare—Because No One Knows Who They Really Are07:53 Hackers Are Targeting WSUS Servers — and You Could Be Distributing Malware Without Knowing It09:28 Microsoft's New Copilot Features Turn AI from Assistant to App Creator, Raising Governance Questions This is the Business of Tech. Supported by: https://scalepad.com/dave/https://getflexpoint.com/msp-radio/
The Smart 7 is an award winning daily podcast, in association with METRO, that gives you everything you need to know in 7 minutes, at 7am, 7 days a week…With over 19 million downloads and consistently charting, including as No. 1 News Podcast on Spotify, we're a trusted source for people every day and we've won Gold at the Signal International Podcast awardsIf you're enjoying it, please follow, share, or even post a review, it all helps... Today's episode includes the following: https://x.com/i/status/1978827902884970771 https://x.com/i/status/1978728530935423065 https://x.com/i/status/1978766434898530536 https://x.com/i/status/1978794976877084905 https://x.com/i/status/1978792805959946627 https://x.com/i/status/1978793043995324750 https://x.com/i/status/1978904671524655173 https://x.com/i/status/1978853444736737511 https://x.com/i/status/1978830795021181001 Contact us over @TheSmart7pod or visit www.thesmart7.com or find out more at www.metro.co.uk Voiced by Jamie East, using AI, written by Liam Thompson, researched by Lucie Lewis and produced by Daft Doris. Hosted on Acast. See acast.com/privacy for more information.
Unleashed: The Political News Hour with Bruce Robertson – Instead of encouraging real dialogue and open discussion, Democrats fight a war laced with lies, intimidation, corruption, and violence against anyone who dares to question them or step out of line. They are trying to provoke a civil war so that they can tighten their control even more over our society and take more rights away...
Eva Posner, Founder of Evinco Strategies, focuses on the immense challenges facing political campaigns in this current environment of political violence, the 25-minute news cycle, and economic uncertainty. This climate has deterred qualified candidates from running and made it more difficult for campaigns to raise money, particularly from larger donors. We talk about: How the threat of political violence is impacting the physical safety and mental health of candidates and their staff While partisan outrage drives small-donor online donations, sustained funding from major donors has become harder to secure Why the nationalization of state and local campaigns sets unrealistic fundraising expectations for candidates The role of social media in amplifying campaign ground efforts and breaking through the noise #EvincoStrategies #PoliticalCampaigns #PolitcalViolence #Fundraising #PoliticalCandidates EvincoStrategies.com
Congressman Tim Walberg, representing Michigan's Fifth District and serving on the House Energy and Commerce Committee and the House Education and Workforce Committee, joins The Steve Gruber Show to discuss some of the biggest stories shaping the nation. From the political divide following Charlie Kirk's passing, to the shocking Dallas ICE facility attack, and now the indictment of former FBI Director James Comey, Walberg weighs in on the state of our country, accountability in government, and why principled leadership is more important than ever.
In this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:• TribalNet: Casino-systems suppliers protecting operations from cyberattacks • TribalNet: AI main focus of tribal technology conference• TribalNet 2025: Cybersecurity Is Central to IT Modernization for Tribes• The Gate 15 Interview EP 62: Justine Bone, Executive Director, Crypto ISACMain Topics:U.S. Secret Service dismantles imminent telecommunications threat in New York tristate area. The U.S. Secret Service dismantled a network of electronic devices located throughout the New York tristate area that were used to conduct multiple telecommunications-related threats directed towards senior U.S. government officials, which represented an imminent threat to the agency's protective operations. This protective intelligence investigation led to the discovery of more than 300 co-located SIM servers and 100,000 SIM cards across multiple sites. In addition to carrying out anonymous telephonic threats, these devices could be used to conduct a wide range of telecommunications attacks. This includes disabling cell phone towers, enabling denial of services attacks and facilitating anonymous, encrypted communication between potential threat actors and criminal enterprises. While forensic examination of these devices is ongoing, early analysis indicates cellular communications between nation-state threat actors and individuals that are known to federal law enforcement.Ransomware!• EU cyber agency says airport software held to ransom by criminals • A Cyberattack on Jaguar Land Rover Is Causing a Supply Chain Disaster • Rising cyberattacks on K-12 schools prompt concern as Uvalde CISD grapples with ransomwareCyber threat information law hurtles toward expiration, with poor prospects for renewal• Rand Paul's last-minute demands push key cybersecurity law to the brink• Peters Urges Senate to Quickly Extend Critical Cybersecurity Protections That Expire on October 1st• Health-ISAC CSO: A Looming Deadline: The Cybersecurity Information Sharing Act of 2015• RER and Coalition Urges TRIA Reauthorization• Commentary: Shrinking cyber budgets and rising threats: Why public-private partnerships are now mission-criticalUS threats and violence• MN man threatened people via email as retaliation for Charlie Kirk's death: Charges• NH Man Arrested for Allegedly Plotting to Kill Republican Governor Kelly Ayotte With Pipe Bombs• NCTC Supports U.S. Law Enforcement, First Responders by Sharing Intel Product Aimed at Deterring Attacks by Al-Qa'ida• ISIS calls for slaughter of Christians and Jews in UK attacks – 'shoot, stab, and ram' Quick Hits:• FBI PSA: Threat Actors Spoofing the FBI IC3 Website for Possible Malicious Activity• NHC issuing advisories for the Atlantic on Hurricane Gabrielle• UK NPSA: Vehicle Security Barriers at Event Venues • TikTok: Statement from ByteDanceo Deal to Keep TikTok in U.S. Is Near. These Are the Details.o Trump expected to approve TikTok deal via executive order later this week, WSJ reports• OpenAI admits AI hallucinations are mathematically inevitable, not just engineering flaws
In a nation where the foundations are trembling, today's broadcast will shatter the illusion of stability. We're plunging into the unfiltered reality of election integrity, national security, and global power schemes with two of the most knowledgeable and unyielding voices in the battle. Former CIA officer and national security expert Clare Lopez joins us to unravel the hidden ties between radical Islamic movements and Marxist factions within the U.S. Lopez reveals the ideological assault endangering our nation—and how immigration, ideology, and subterfuge fuel it. Next, Dr. Jerome Corsi, Harvard-educated author and investigative journalist, exposes shocking claims about an Obama-Biden pact with Honduras that allegedly unleashed waves of illegal immigration, cartel influence, and political money laundering. Corsi details how this scheme supposedly leveraged immigration policies, religious figures, and financial ruses to bankroll political agendas, while systematically undermining election integrity. His evidence-based revelations will challenge your understanding of our borders, elections, and government. Far beyond a simple program, it's a bold summons to confront the truth, time for vigilance, action, and resolve. We'll also spotlight the unjust prosecution of Tina Peters, contrasting her severe punishment with the leniency shown to proven election fraudsters. Prepare for bold truths, unapologetic insights, and revelations the mainstream media avoids. Today's Untamed is a must-watch. The future of America is on the line.
Guest Arnie Bellini, Cyber Security Expert and founder of ConnectWise, joins to discuss foreign hacking threats to the US. Discussion of Russian and foreign government threats on US infrastructure, firewalls and security and more. With the growth of AI, are we protected both as a society and as a consumer on cyber hacks? Guest Drew Allen, host "The Drew Allen Show" podcast, joins to break down the Russian Hoax against President Trump, exposing the deep state, and more. Discussion of the Obama administration, Russian threats against the DNC, Obamas and Clintons, and the faux claims against Trump. Is John Bolton the first in many to be exposed?
Dan is joined by Mamta Gupta, She leads the Security Product Marketing, Datacenter and the Communications Segment Marketing Teams at Lattice. She brings with her over 20 years of FPGA experience in product development with special focus on security, aerospace and defense segments. Dan explores the growing area of cybersecurity… Read More
Ex CIA operative, Andrew Bustamante joins Jillian to discuss everything from Esptein to Edward Snowden, regime changes, the surveillance state to the future of AI in surveillance. Then, real-world spycraft you can use to get the things you want. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
In this episode, Mark Ledlow is joined by Benjamin Whitfield, a seasoned security professional with a military and agency background and a former CIA. They discuss Ben's transition from being an executive in Silicon Valley to an independent consultant, and delve into the complexities of the security industry. Key topics include the role of Chief Security Officers, the importance of sales in security, and the need for risk-based assessment. They also explore emerging trends in security, the impact of the new administration, and the importance of continuing education for security professionals.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSBuilding relationships is crucial for ensuring security programs are funded and supported. The role of a Chief Security Officer (CSO) involves significant political and sales skills. Proper risk assessments tailored to the company culture are essential for effective security programs. The executive protection industry's future might see growth due to increasing threats and new economic sectors like cryptocurrency. Ongoing education and adaptation to emerging trends and technologies are vital for security professionals.QUOTES"It's all sales... Your job really is to advocate for how do you protect people, facilities, operations as much as possible given what the political climate is in your company." "If you build a program that meets the absolute corporate need, your job isn't going away." "In Silicon Valley, I'll stereotype. I'm just the kid wearing the hoodie. You're the kid wearing the hoodie who's now worth, you know, a billion dollars." "There are multiple ways where a company can provide, can have security for its senior most executives." "The CSO chair is, you're playing politics, you're fighting for budget with everybody else."Get to know more about Benjamin Whitfield through the links below.https://www.linkedin.com/in/benjaminwhitfield/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
WORLD: Beijing exec warns of persisting national security threats | June 22, 2025Visit our website at https://www.manilatimes.netFollow us:Facebook - https://tmt.ph/facebookInstagram - https://tmt.ph/instagramTwitter - https://tmt.ph/twitterDailyMotion - https://tmt.ph/dailymotionSubscribe to our Digital Edition - https://tmt.ph/digitalSign up to our newsletters: https://tmt.ph/newslettersCheck out our Podcasts:Spotify - https://tmt.ph/spotifyApple Podcasts - https://tmt.ph/applepodcastsAmazon Music - https://tmt.ph/amazonmusicDeezer: https://tmt.ph/deezerStitcher: https://tmt.ph/stitcherTune In: https://tmt.ph/tunein#TheManilaTimes Hosted on Acast. See acast.com/privacy for more information.
In this episode of Cybersecurity Today, host Jim Love discusses critical AI-related security issues, such as the Echo Leak vulnerability in Microsoft's AI, MCP's universal integration risks, and Meta's privacy violations in Europe. The episode also explores the dangers of internet-exposed cameras as discovered by BitSight, highlighting the urgent need for enhanced AI security and the legal repercussions for companies like Meta. 00:00 Introduction to AI Security Issues 00:24 Echo Leak: The Zero-Click AI Vulnerability 03:17 MCP Protocol: Universal Interface, Universal Vulnerabilities 07:01 Meta's Privacy Scandal: Local Host Tracking 10:11 The Peep Show: Internet-Connected Cameras Exposed 12:08 Conclusion and Call to Action
On today's episode, Vince speaks with Jason D. Owens, former Chief of the U.S. Border Patrol under the Biden administration. Owens discusses his career in the Border Patrol, the challenges faced during his tenure, and the realities of retirement. The conversation covers issues including border security, the impact of transnational cartels, human trafficking, and the role of specialized units like BORTAC. Owens also addresses the importance of technology, recruitment efforts, and threats posed by non-state actors at both the southern and northern borders. Borderland is an IRONCLAD Original SPONSORS: 1stPhorm visit: https://www.1stphorm.com/borderland Free shipping through this link on any orders over $75 Free 30 days in the app for new customers (offer comes via email after the purchase) 110% money back guarantee on all of our products. We believe fully in our products. If you don't love the product or you aren't getting the results you hoped for, let us know and we'll give you your money back … plus 10%! Learn more about your ad choices. Visit megaphone.fm/adchoices
Chrome to actively refuse admin privileges. Android Messenger is getting manual key verification. Pwn2Own to add AI "pwning" as in-scope attack targets. AI has already been found to be replicating. Microsoft not killing off Office on Win10 after October. 23andMe's asset purchaser revealed. Many fun talking points thanks to our listeners. Steve's review of "Andor", season 2. What's been discovered inside the U.S. power grid Show Notes - https://www.grc.com/sn/SN-1026-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bigid.com/securitynow material.security joindeleteme.com/twit promo code TWIT bitwarden.com/twit drata.com/securitynow
Chrome to actively refuse admin privileges. Android Messenger is getting manual key verification. Pwn2Own to add AI "pwning" as in-scope attack targets. AI has already been found to be replicating. Microsoft not killing off Office on Win10 after October. 23andMe's asset purchaser revealed. Many fun talking points thanks to our listeners. Steve's review of "Andor", season 2. What's been discovered inside the U.S. power grid Show Notes - https://www.grc.com/sn/SN-1026-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bigid.com/securitynow material.security joindeleteme.com/twit promo code TWIT bitwarden.com/twit drata.com/securitynow
Chrome to actively refuse admin privileges. Android Messenger is getting manual key verification. Pwn2Own to add AI "pwning" as in-scope attack targets. AI has already been found to be replicating. Microsoft not killing off Office on Win10 after October. 23andMe's asset purchaser revealed. Many fun talking points thanks to our listeners. Steve's review of "Andor", season 2. What's been discovered inside the U.S. power grid Show Notes - https://www.grc.com/sn/SN-1026-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bigid.com/securitynow material.security joindeleteme.com/twit promo code TWIT bitwarden.com/twit drata.com/securitynow
Chrome to actively refuse admin privileges. Android Messenger is getting manual key verification. Pwn2Own to add AI "pwning" as in-scope attack targets. AI has already been found to be replicating. Microsoft not killing off Office on Win10 after October. 23andMe's asset purchaser revealed. Many fun talking points thanks to our listeners. Steve's review of "Andor", season 2. What's been discovered inside the U.S. power grid Show Notes - https://www.grc.com/sn/SN-1026-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bigid.com/securitynow material.security joindeleteme.com/twit promo code TWIT bitwarden.com/twit drata.com/securitynow
Chrome to actively refuse admin privileges. Android Messenger is getting manual key verification. Pwn2Own to add AI "pwning" as in-scope attack targets. AI has already been found to be replicating. Microsoft not killing off Office on Win10 after October. 23andMe's asset purchaser revealed. Many fun talking points thanks to our listeners. Steve's review of "Andor", season 2. What's been discovered inside the U.S. power grid Show Notes - https://www.grc.com/sn/SN-1026-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bigid.com/securitynow material.security joindeleteme.com/twit promo code TWIT bitwarden.com/twit drata.com/securitynow
Chrome to actively refuse admin privileges. Android Messenger is getting manual key verification. Pwn2Own to add AI "pwning" as in-scope attack targets. AI has already been found to be replicating. Microsoft not killing off Office on Win10 after October. 23andMe's asset purchaser revealed. Many fun talking points thanks to our listeners. Steve's review of "Andor", season 2. What's been discovered inside the U.S. power grid Show Notes - https://www.grc.com/sn/SN-1026-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bigid.com/securitynow material.security joindeleteme.com/twit promo code TWIT bitwarden.com/twit drata.com/securitynow
Chrome to actively refuse admin privileges. Android Messenger is getting manual key verification. Pwn2Own to add AI "pwning" as in-scope attack targets. AI has already been found to be replicating. Microsoft not killing off Office on Win10 after October. 23andMe's asset purchaser revealed. Many fun talking points thanks to our listeners. Steve's review of "Andor", season 2. What's been discovered inside the U.S. power grid Show Notes - https://www.grc.com/sn/SN-1026-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bigid.com/securitynow material.security joindeleteme.com/twit promo code TWIT bitwarden.com/twit drata.com/securitynow
See More HERE! In this episode of Fintech Confidential, host Tedd Huff is joined by CI (Confidential Informant), Robert Musiala, co-leader of the Web3 and Digital Assets team at BakerHostetler, to discuss the significant developments in the crypto and fintech space during April 2025. Robert shares his expertise on blockchain law and compliance, providing insights into the evolving regulatory landscape and its impact on the industry.The conversation covers the mainstream adoption of stablecoins, the implications of the Payment Stablecoin Act, and the integration of crypto with traditional financial systems. They also delve into the expansion of programmable money, the shifting regulatory environment, and the growing security threats in the crypto space.Takeaways:1️⃣ Stablecoins are becoming a viable solution for faster and more transparent payments.2️⃣ The Payment Stablecoin Act is prompting companies to adjust their strategies in anticipation of new regulations.3️⃣ Kraken's expansion demonstrates the blending of crypto and traditional finance.4️⃣ Programmable money is enabling automation in financial processes.5️⃣ Security remains a top concern, with sophisticated attacks targeting the crypto infrastructure.Links:Guest:Robert A. Musiala Jr. BakerHostetler Profile: https://www.bakerlaw.com/professionals/robert-a-musiala-jr/LinkedIn: https://www.linkedin.com/in/robert-a-musiala-jr-esq-cfcs-b6534bb/Company:BakerHostetler: https://www.bakerlaw.com/The Blockchain Monitor: https://www.theblockchainmonitor.com/Fintech Confidential:Podcast: https://fintechconfidential.com/listenNotifications: https://fintechconfidential.com/accessLinkedIn: https://www.linkedin.com/company/fintechconfidentialX: https://x.com/FTconfidentialInstagram: https://www.instagram.com/fintechconfidentialFacebook: https://www.facebook.com/fintechconfidentialSupporters:Bitcoin 2025 - Bringing together digital asset leaders in Las Vegas to explore Bitcoin's role in capital markets, featuring speakers like Michael Saylor, Caitlin Long, and Elizabeth Stark - https://fintechconfidential.com/btc25DFNS - Offering Wallets as a Service with military-grade security and enterprise-grade scalability - https://fintechconfidential.com/dfnsSkyflow - Helping FinTechs build secure experiences without managing customer data directly - https://skyflowsecure.comHawk AI - Providing real-time fraud prevention and AML compliance for FinTechs - https://getHawkai.comAbout:Guest: Robert Musiala has been working in the blockchain and digital assets market since 2012 and has led multiple digital asset investigations, including as the court-appointed receiver over cryptocurrency investment funds used in a major fraud. He advises on various regulatory compliance issues involving digital assets and has drafted/negotiated agreements for a wide range of transactions in the fintech, digital assets, Web3, and NFT markets. He is the inventor of two blockchain patents and co-leader of the Web3 and Digital Assets team at BakerHostetler.Host: Tedd Huff is the Founder of Voalyre and Diamond D3, professional services consulting firms focused on global payments and marketing. He is also a video podcast host and executive producer on the Fintech Confidential network. Over the past 24 years, he has contributed to FinTech startups as an Advisory Board Member, Co-Founder, and Chief Experience Officer, providing strategic and tactical direction for global companies, focusing on growth...
Preview: Author James Stavridis, author "To Risk It All," comments upon the critical morale needed to respond to national security threats. More later" 1942 LEXINGTON
Keeping ATMs secure from attacks is a never-ending battle. Just when one area of attack is shut off, criminals discover a different vulnerability. One such vulnerability is Man in the Middle attacks, which can be difficult to detect as they imitate a legitimate transaction. In today's episode of the Bank Customer Experience podcast, Bradley Cooper, editor of ATM Marketplace spoke with Levi Daily, chief technology officer at Cook Solutions Group, and Michael Strange, director of technology services at Cook Solutions Group, about how to respond to new ATM security threats like Man in the Middle attacks."Criminal organizations and gangs have identified vulnerabilities including weak security protocols and a general lack of awareness around ATMs. As ATMs become more connected and criminal organizations start using more sophisticated tools and techniques, these sorts of attacks will increase," Strange said in an email statement following the podcast.During this discussion, Strange and Daily gave an in-depth explanation of ATM security topics including:What are the most common threats?Are there any regions getting hit harder than others?How do Man in the Middle attacks work?How can a layered defense help prevent these attacks?You can listen to the podcast in its entirety above.
While President Trump and the Department of Government Efficiency have kept their promise to cut government waste, there have been cuts at the Department of Defense, concerning some about Americas' ability to protect itself against foreign adversaries. Chairman of the House Permanent Select Committee on Intelligence, Representative Rick Crawford (AR-1), announced that the 2025 Annual Worldwide Threats Assessment Full Committee Hearing will be held on Wednesday. He discusses what he thinks are the major adversaries the U.S. should watch out for and how to maintain strong alliances to address these threats. The Chairman also describes the ongoing war in Ukraine and how the Trump Administration can assist in a peaceful resolution with Russia. For decades, there have been numerous conspiracy theories related to the assassination of President John F. Kennedy. President Trump's recent release of thousands of pages of files was intended to shed light on the murder. Gerald Posner, American investigative journalist and the author “Case Closed: Lee Harvey Oswald and the Assassination of JFK,” reveals why, despite the new information, he still thinks Oswald acted alone. Plus, commentary from former NCAA athlete Minna Svard. Photo Credit: AP Learn more about your ad choices. Visit podcastchoices.com/adchoices
While President Trump and the Department of Government Efficiency have kept their promise to cut government waste, there have been cuts at the Department of Defense, concerning some about Americas' ability to protect itself against foreign adversaries. Chairman of the House Permanent Select Committee on Intelligence, Representative Rick Crawford (AR-1), announced that the 2025 Annual Worldwide Threats Assessment Full Committee Hearing will be held on Wednesday. He discusses what he thinks are the major adversaries the U.S. should watch out for and how to maintain strong alliances to address these threats. The Chairman also describes the ongoing war in Ukraine and how the Trump Administration can assist in a peaceful resolution with Russia. For decades, there have been numerous conspiracy theories related to the assassination of President John F. Kennedy. President Trump's recent release of thousands of pages of files was intended to shed light on the murder. Gerald Posner, American investigative journalist and the author “Case Closed: Lee Harvey Oswald and the Assassination of JFK,” reveals why, despite the new information, he still thinks Oswald acted alone. Plus, commentary from former NCAA athlete Minna Svard. Photo Credit: AP Learn more about your ad choices. Visit podcastchoices.com/adchoices
Join America's Roundtable (https://americasrt.com/) radio co-hosts Natasha Srdoc and Joel Anand Samy with U.S. Senator Marsha Blackburn, senior senator for Tennessee and the first woman to represent the Volunteer State in the United States Senate. She serves on the Deputy Whip Team and is a member of the Finance Committee; the Commerce, Science & Transportation Committee; the Veterans' Affairs Committee; and the Judiciary Committee. Senator Marsha Blackburn serves as the Ranking Member on the Commerce Subcommittee on Consumer Protection, Product Safety, and Data Security and on the Judiciary Subcommittee on Human Rights and the Law. Before her election to the Senate, Marsha represented Tennessee's 7th Congressional District in the United States House of Representatives. The conversation focuses on the following topics: ✅ President Trump's State of the Union Address, presenting his vision for a Golden Age of America. ✅ Senator Blackburn requiring transparency and accountability, working with FBI Director Kash Patel in obtaining unredacted Epstein logs and other pertinent materials ✅ Senator Blackburn spearheading DOGE Acts to hold the federal government accountable for managing taxpayer dollars. Collaborative efforts with Elon Mask in making the federal government more efficient and slash wasteful spending. ✅ Strengthening the economic partnership between the U.S. and Taiwan. ✅ Senator Blackburn's recently introduced Tax Administration Simplification Act, to provide straightforward, taxpayer-focused improvements to streamline tax filing and payment for individuals and small businesses. ✅ Strengthening US-Israel ties and combating anti-Semitism with new leadership in Congress and the White House. ✅ Making America Healthy Again | Healthy foods and eating habits for a healthier America. Throughout her time in Congress, Marsha has led the fight to hold Communist China accountable. Her in-depth analyses of the Chinese Communist Party's threats to American sovereignty have prompted Congress to examine legislation countering Beijing's malign influence on global supply chains, technology infrastructure, and international organizations. After Beijing took over the once autonomous region of Hong Kong in 2019, Marsha led bipartisan legislation, which was signed into law by President Trump, that prohibits the U.S. export of crowd control equipment to the Hong Kong Police Force. Her bipartisan Open Technology Fund Authorization Act, which supports internet freedom by addressing authoritarian regimes' efforts to censor the internet, was also signed into law. At the same time Marsha has stood up to Communist China, she has worked to bolster the U.S.-Taiwan relationship. In August 2022, she visited Taiwan, met with President Tsai Ing-wen in Taipei, and called to strengthen connections between the U.S. and Taiwan. During this visit, Marsha made her stance clear: Taiwan is a country. On border policy, Marsha bases her approach on the simple truth that until our borders are secure, every town will be a border town and every state will be a border state. In the Senate, she has led the charge to fully fund the United States Border Patrol, restart construction of a physical barrier, impose harsher criminal penalties for drug smuggling, and fight for law and order on behalf of the thousands of women and girls lost to cross-border human trafficking. Further reading: Blackburn, Hassan, Colleagues Introduce the “Patients Before Middlemen Act” to Bring Down Cost of Prescription Drugs (https://www.blackburn.senate.gov/2025/3/health%20care/blackburn-hassan-colleagues-introduce-the-patients-before-middlemen-act-to-bring-down-cost-of-prescription-drugs) Blackburn, Kelly Push for More Federal Resources to Combat Fentanyl Crisis in Tennessee (https://www.blackburn.senate.gov/2025/2/crime/national%20security/blackburn-kelly-pushes-for-more-federal-resources-to-combat-fentanyl-crisis-in-arizona) Blackburn, Schatz Introduce Bill to Strengthen U.S.-Taiwan Partnership, Safeguard U.S. from Communist China's Security Threats (https://www.blackburn.senate.gov/2025/2/china/jobs%20and%20economy/national%20security/blackburn-schatz-introduce-bill-to-strengthen-u-s-taiwan-partnership-safeguard-u-s-from-communist-china-s-security-threats) americasrt.com (https://americasrt.com/) https://ileaderssummit.org/ | https://jerusalemleaderssummit.com/ America's Roundtable on Apple Podcasts: https://podcasts.apple.com/us/podcast/americas-roundtable/id1518878472 Twitter: @MarshaBlackburn @ileaderssummit @NatashaSrdoc @JoelAnandUSA @supertalk America's Roundtable is co-hosted by Natasha Srdoc and Joel Anand Samy, co-founders of International Leaders Summit and the Jerusalem Leaders Summit. America's Roundtable (https://americasrt.com/) radio program - a strategic initiative of International Leaders Summit, focuses on America's economy, healthcare reform, rule of law, security and trade, and its strategic partnership with rule of law nations around the world. The radio program features high-ranking US administration officials, cabinet members, members of Congress, state government officials, distinguished diplomats, business and media leaders and influential thinkers from around the world. Tune into America's Roundtable Radio program from Washington, DC via live streaming on Saturday mornings via 65 radio stations at 7:30 A.M. (ET) on Lanser Broadcasting Corporation covering the Michigan and the Midwest market, and at 7:30 A.M. (CT) on SuperTalk Mississippi — SuperTalk.FM reaching listeners in every county within the State of Mississippi, and neighboring states in the South including Alabama, Arkansas, Louisiana and Tennessee. Listen to America's Roundtable on digital platforms including Apple Podcasts, Spotify, Amazon, Google and other key online platforms. Listen live, Saturdays at 7:30 A.M. (CT) on SuperTalk | https://www.supertalk.fm
Become A Patreon
Anil Kollipara "You shouldn't wait around. You should be out there trying to break it, to fix it in advance," says Anil Kollipara, Vice President, Product Management, Spirent. In this edition of Technology Reseller News, publisher Doug Green sits down with Anil Kollipara, Vice President, Product Management at Spirent, to discuss a critical theme in modern telecom: operational resilience. As Mobile World Congress (MWC) approaches, the industry faces growing demands for always-on, secure, and reliable networks. Kollipara explains why continuous testing, security validation, and AI-driven automation are now essential for maintaining uptime and mitigating risk. The New Reality: Why Telecoms Must Build Resilience Now With telcos under pressure to launch new services, comply with increasing regulations, and secure networks against evolving threats, operational resilience has become a business imperative. Kollipara highlights key challenges: Rising Complexity – With 5G, cloud-native architectures, Open RAN, and AI, networks are more complex than ever, spanning multiple vendors and increasing risks. Security Threats & Compliance – As attack surfaces expand, regulators are enforcing stricter security and uptime requirements, making compliance failures costly. Customer Expectations – Downtime isn't an option. Even a short service disruption can lead to frustration, revenue loss, and customer churn. Why Traditional Testing Fails Kollipara explains that traditional telecom testing models are outdated. Many operators still assume their vendors will handle testing, which is no longer a viable approach. Recent real-world incidents, such as supply chain vulnerabilities, have cost companies hundreds of millions in losses. He emphasizes that telcos must own their testing process and adopt a zero-trust change management approach: Proactive vs. Reactive Testing – Instead of waiting for failures, operators should continuously test, stress, and break their networks in controlled environments before customers feel the impact. Continuous Testing Pipeline – A lab-to-live methodology ensures that networks are resilient at every stage—from pre-launch simulations to real-time service monitoring. Security & AI-Driven Automation – AI-powered fault detection, remediation, and security testing can predict and prevent outages before they occur. The ROI of Continuous Testing While continuous testing may seem costly, the return on investment (ROI) is undeniable. Kollipara outlines key benefits: Massive Cost Avoidance – Avoid fines, legal costs, and customer losses from regulatory non-compliance or service disruptions. Operational Efficiency – AI and automation reduce reliance on manual testing, cutting costs while increasing accuracy and speed. Customer Retention & Revenue Growth – A more reliable network leads to higher customer satisfaction, reduced churn, and new monetization opportunities. Trends to Watch at Mobile World Congress As MWC 2025 kicks off, AI-driven testing, cloud-native resilience, and next-gen security strategies will be major talking points. Kollipara teases some of the latest innovations Spirent will showcase: AI Agents for Network Operations – Accelerating root cause analysis and remediation of issues in real-time. SCNF Resiliency Testing – A new test category focused on validating how telecom applications behave in cloud-native failures. 5G & Edge Security Strategies – How operators can harden security as networks expand beyond traditional data centers. Learn More & Meet Spirent at MWC For a deeper dive into operational resilience, continuous testing, and AI-driven automation, visit Spirent's website. If you're attending Mobile World Congress, be sure to connect with Anil Kollipara and the Spirent team for expert insights into the future of telecom resilience. Description of Spirent: Spirent Communications plc.
In this episode, Mark Ledlow is joined by Fred Burton, Executive Director of Protection and Intelligence at Ontic and a best-selling author. They discuss the evolving threat landscape under the new U.S. administration, the impact of social media on security, and the importance of protective intelligence. Learn about the dynamic changes in the security industry and discover how businesses can prepare for the next four years. Don't miss this fascinating conversation with one of the industry's leading experts.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSGuest Introduction: Fred Burton, Executive Director of Protection of Intelligence at Ontic, a bestselling author with extensive experience in the intelligence space.Fred's Admiration for Mark: High respect for Fred Burton who introduces key figures such as Jack.Importance of Adaptability in Security: Security programs need to be tailored to the clients' needs and cultures; no one-size-fits-all approach.Evolving Threat Landscape: Historical context of the threat landscape and its evolution, noting present challenges like social media and insider threats.Focus on Protective Intelligence: Emphasis on the importance of protective intelligence in assessing and mitigating threats; the balance of general awareness and specific threat signals.Community Building: The importance of a supportive community and the role Ontic plays in fostering thought leadership in the security industry.QUOTES"There's never really one model that fits all when it comes to security programs.""The threat landscape today is so dynamic and so fluid.""The 24/7 social media platforms provide an endless and constant stream of adverse intelligence signals.""It's our job in this space to put together a security package to allow you to do whatever it is that you would like to do within reason.""The challenge is there's so much noise that protective intelligence analysts almost get paralyzed because they don't know what signals to capture.""You need to have general awareness collection but then also have to capture those adverse intelligence signals that directly impact your unique protective mission."Get to know more about Fred Burton through the link below.https://www.linkedin.com/in/thefredburton/2To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
#191: Securing the Public Cloud: How Seattle & LA County DCFS Are Transforming CybersecurityFrom Asset Management to AI: Building Modern Security for Vulnerable CommunitiesFeaturing:Greg Smith, Chief Information Security Officer and Director of Security & Infrastructure, City of Seattle ITAllen Ohanian, Chief Information Security Officer, Los Angeles County Department of Children and Family ServicesBrent Byrnes, Account Executive SLED, WizIn this episode, you'll learn:How Seattle's risk-based approach is transforming traditional government cybersecurityLA County DCFS's strategy for securing the nation's largest welfare agency's sensitive data in the cloudWhy emerging IoT devices and cloud assets are creating new visibility challenges for government infrastructureThe role of cloud visibility and democratized security in modern government environmentsReal-world lessons from Seattle's cross-agency incident response and recovery strategiesTimestamps(00:00) Introduction and Guest Backgrounds (03:14) Seattle's Evolution to Risk-Based Security (04:52) Securing LA County DCFS's Cloud Environment (07:38) Cloud Visibility in Government (09:22) Asset Management Challenges in Modern Infrastructure (12:45) Cross-Agency Incident Response: Seattle Library Case Study (16:33) Crisis Communication Strategies (22:18) AI Implementation and Security Threats (27:42) Managing Modern Security Vendors (31:15) Future of Government Cloud Security To hear more, visit www.techtables.com
Episode 4203: Dems Blame THEIR Failures On ‘Misinformation'; Inauguration Security Threats
As part of our special series on the U.S. presidential transition period, Sebastian Gorka breaks down the complexities of recent events in Syria, and what the incoming Trump administration's foreign policy may look like when it comes to NATO, the Middle East, Russia, and China.Gorka will serve as Trump's deputy assistant and senior director for counterterrorism at the National Security Council.Views expressed in this video are opinions of the host and the guest, and do not necessarily reflect the views of The Epoch Times.
WMAL GUEST: INTERVIEW - KT MCFARLAND - Former Deputy National Security Advisor to President Trump and author of “REVOLUTION" SOCIAL MEDIA: https://twitter.com/realKTMcFarland Where to find more about WMAL's morning show: Follow the Show Podcasts on Apple podcasts, Audible and Spotify. Follow WMAL's "O'Connor and Company" on X: @WMALDC, @LarryOConnor, @Jgunlock, @patricepinkfile, and @heatherhunterdc. Facebook: WMALDC and Larry O'Connor Instagram: WMALDC Show Website: https://www.wmal.com/oconnor-company/ How to listen live weekdays from 5 to 9 AM: https://www.wmal.com/listenlive/ Episode: Thursday, December 19, 2024 / 8 AM Hour See omnystudio.com/listener for privacy information.
Recorded Future - Inside Threat Intelligence for Cyber Security
A week before the election, we sat down with Ret. General Paul Nakasone and he talked about North Korea, Russian hackers, his life after the NSA and why he hasn't ruled out taking another government job.
Here's your Daily dose of Human Events with @JackPosobiec Save up to 65% on MyPillow products by going to https://www.MyPillow.com/POSO and use code POSO Go to https://www.BlackoutCoffee.com/POSO and use promo code POSO20 for 20% OFF your first order.Detox from your phone today with SLNT. Go to https://SLNT.COM/POSO. Use promocode POSO to save 15% plus free shipping on qualifying orders.Sign up today at hometitlelock.com/poso, or click on the link in the description, and use the promo code POSO, and you'll get your first 30 days of triple lock protection for FREE – AND a complete title scan of your home's title so you can make sure your home hasn't already been compromised. Use the promo code POSO at hometitlelock.com/poso or click on the link in the description below.Get $200 off a 3-month supply kit from ‘My Patriot Supply' when you go to https://www.preparewithposo.com. Support the show
PREVIEW: KOREAS: Colleague David Maxwell reports a dialogue between US and ROK and Japan public intellectuals looking to a unification of the Korean peninsula as an answer to the torment of the North Korean people and an end to the security threats. More tonight. 1951 USS St. Paul fires on North Korean forces.