Wenn Systeme versagen, wollen alle wissen: Wie war das möglich? Bei Firewall erzählen wir in jeder Folge die wahre Geschichte eines Angriffs: Wie russische Geheimdienste einen deutschen Agenten zum Maulwurf machen. Warum China die AfD für sich instrumentalisiert. Wieso Wirecard-Betrüger Jan Marsalek den deutschen Behörden entkommt. Und wie Scam-Farmen Tinder-Nutzer ausbeuten. Gemeinsam mit SPIEGEL-Reportern sucht Host Sandra Sperber jeden Donnerstag Schwachstellen in Systemen und findet die, ...
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
…
continue reading
grc
…
continue reading
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
…
continue reading
Die neue Podcast-Serie der SZ: „The Great Firewall: Wie China das Internet verändert“. Ein Podcast über die Zensur und Propaganda im chinesischen Internet - was längst auch uns betrifft. Ab dem 26. Juli gibt es jeden Dienstag eine neue Folge. Außerdem finden Sie auf dem Kanal weiterhin alle Folgen von „Suisse Secrets“ - der Podcast zur Recherche. Sie möchten mehr über unsere Werbepartner erfahren? Hier finden Sie alle Infos & Rabatte: https://linktr.ee/the_great_firewall
…
continue reading
Where we talk and discuss what the great firewall of China is, and the ethics of it Cover art photo provided by JJ Ying on Unsplash: https://unsplash.com/@jjying
…
continue reading
A great WordPress.com site
…
continue reading

1
Has New York Lost Its Gods?
42:31
42:31
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
42:31Jonathan Mahler’s The Gods of New York is a brilliant chronicle of the late 1980s, when a rotating cast of outrageous characters — Trump, Koch, Sharpton, among others — hogged the headlines. Bradley talks to Mahler about the clash of epic egos, as well as shifting social conditions. How exactly did homelessness and untreated mental illness go from …
…
continue reading

1
Putins Schattenkrieger (3/3): Die Cyberarmee
33:23
33:23
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
33:23Am 30. April 2015 bekommen einige Mitglieder des Deutschen Bundestags eine scheinbar harmlose E-Mail. Der Absender nutzt eine Adresse der Vereinten Nationen, eine UN-Kennung. Im Betreff: »Ukraine Conflict«. Das wirkt erst einmal plausibel. Immerhin hat Russland 2014 die Krim-Halbinsel besetzt. Tatsächlich handelt es sich um eine sogenannte Phishing…
…
continue reading

1
CISCO Hacks, SIM Farms, & Nursery Breaches
56:10
56:10
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
56:10In this episode of the podcast, Ryan Williams Sr. and Shannon Tynes discuss the latest cybersecurity news, including CISA's emergency directive regarding Cisco vulnerabilities, the rise of SIM farms threatening US infrastructure, and the alarming trend of cybercriminals targeting children's data for ransom. They emphasize the importance of cybersec…
…
continue reading

1
Putins Schattenkrieger (2/3): Die Illegalen
30:48
30:48
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
30:48Es ist die fast perfekte Fassade: Sie Hausfrau. Er Ingenieur. Bis 2011 ein GSG-9-Kommando das unscheinbare Einfamilienhaus stürmt und einer der spektakulärsten Spionagefälle in Deutschland nach dem Ende des Kalten Kriegs auffliegt. In der zweiten Folge dieser dreiteiligen Podcastserie über russische Spionage erzählt SPIEGEL-Redakteur Fidelius Schmi…
…
continue reading

1
Beyond the Firewall | Episode 9 - Why 95% of AI Projects Fail
36:20
36:20
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
36:20In this conversation, Erez Zevulunov and Ryan Morris discuss the challenges and realities of AI deployment in businesses. They explore the hype cycle surrounding new technologies, the importance of human involvement in AI implementation, and the potential for job transformation rather than outright displacement. The discussion emphasizes the need f…
…
continue reading
Not much will change with Eric Adams' withdrawal from the New York City mayor's race, but it is a good moment to reflect on how we reached this point. Zohran Mamdani is going to be the next mayor because progressives spent years laying the groundwork for a candidate like him. If the city's business and real-estate interests wish to have real politi…
…
continue reading

1
Ente: Private by Design
1:02:51
1:02:51
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:02:51It’s rare these days to find a well-designed and useful application that was made to be private from the get-go. Too many apps today view your personal data as a cash cow to be mercilessly milked, claiming to value your privacy when they really value the extra revenue they can make off of your private data. When I find useful apps that are private …
…
continue reading

1
Tim Tipton Jr.: Grit, Legacy & Access In Cybersecurity
54:44
54:44
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
54:44In this episode of Ask a CISSP, the Thursday episode of the Other Side of the Firewall podcast, Ryan Williams Sr. interviews Tim Tipton Jr., a cybersecurity architect, author, and Grammy-winning music producer. They discuss Tim's journey into cybersecurity, his military background, and the importance of making the field accessible to all. Tim share…
…
continue reading

1
The Second Tour of Duty
46:36
46:36
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
46:36Randy Mastro, who served as Chief of Staff and Deputy Mayor for Operations under Mayor Giuliani, talks to Bradley about his return to City Hall this year as the First Deputy Mayor to bolster an Adams administration shaken by key departures but also looking to run through the tape. He explains how social media and hyper-partisanship have made the ta…
…
continue reading

1
To Blow Up the World ...
38:57
38:57
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
38:57...or not to blow up the world, that is the question. Taking off from Kathryn Bigelow new movie A House of Dynamite, Bradley goes down the list of the last 10 American presidents and decides how each one would respond to an incoming nuclear attack from an unknown source. Plus, he writes a speech that Bibi Netanyahu could give but never will, and ex…
…
continue reading

1
Find Old Accounts (Part 2)
1:05:44
1:05:44
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:05:44In our quest to clean up and secure our data, today I will give you several clever and useful techniques for uncovering old, forgotten online accounts. We’ll scrape the bottom of the barrel to complete our list of accounts so that we can upgrade their security, see what data they have, and remove anything we no longer want floating around out there…
…
continue reading

1
Aerospace Attack, AI Malware & Synthetic Identities
57:47
57:47
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
57:47In this episode, Ryan Williams Sr. and Shannon Tynes discuss recent cybersecurity news, including a cyberattack on Collins Aerospace that disrupted flights at major European airports. They discuss the implications of AI in cybersecurity, particularly the emergence of AI-generated malware. The conversation shifts to the growing threat of synthetic i…
…
continue reading

1
A Whole New Way to Get Around
16:50
16:50
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
16:50When Danny Kim was nearly crushed by the 4,000-pound chassis of a truck he was working on, he had an epiphany. What if he could make an entirely new kind of car that combined the efficiency of a motorcycle with the safety of a regular car? Lit Motors was born. Bradley talks to Danny about his vision for a two-wheel vehicle with the soul of a spaces…
…
continue reading

1
Putins Schattenkrieger (1/3): Die Wegwerfagenten
34:22
34:22
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
34:22Beinahe wäre es zur Katastrophe gekommen: Am 20. Juli 2024 soll auf dem Flughafen Leipzig eine Frachtmaschine nach London starten. Ein Routineflug. Dann entzündet sich noch auf dem Rollfeld ein Paket mit Absender in Litauen. Wenig später wäre es in die Maschine verladen worden. Zwei Tage danach geht auf einem Flughafen in Großbritannien erneut ein …
…
continue reading

1
Youth Hacks, CVE Upgrades & AI ATOs
56:21
56:21
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
56:21In this episode, Ryan Williams Sr. and Shannon Tynes discuss various cybersecurity topics, including the alarming trend of children hacking their schools, the need for better cybersecurity education, and the modernization of the CVE program. They also explore the role of AI in streamlining cybersecurity processes and the importance of maintaining h…
…
continue reading

1
Jan Marsalek: Sein neues Leben als Agent in Moskau
40:03
40:03
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
40:03Jan Marsalek, der mutmaßliche Wirecard-Milliardenbetrüger und Agent wird seit Jahren gesucht. Seit 2020 ist er untergetaucht. Ein Rechercheteam um den SPIEGEL hat ihn nun aufgespürt - in Moskau. Bei Firewall hört ihr, wie Marsalek in Russland lebt, welche Tarnidentitäten er nutzt und welche Verbindungen er zu Putins Geheimdiensten hat. Von Moskau a…
…
continue reading
The killing of Charlie Kirk has kicked the forces of political polarization into high gear. But it’s worth taking a step back, says Bradley, to consider the degradation of everyday life that gives rise to such tragedies and think about what each one of us can do to ease the chaos. More locally, Bradley also discusses the data that proves that the b…
…
continue reading

1
On the Ethics of AI
1:08:08
1:08:08
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:08:08Artificial Intelligence (AI) is the Big Tech buzzword of the day. Every company who wants investment (public or private) is scrambling to have an “AI story”, adding chatbots and ‘agentic’ features in their products wherever possible. The AI companies themselves are constantly expanding their models, ingesting as much data (including highly personal…
…
continue reading

1
How to Invest in Your Own Taste
33:43
33:43
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
33:43Jenny Montgomery is a New Yorker on a mission — scouring galleries for art she loves and can afford to buy. Bradley talks to her about the city's art scene, where to see great work right now, and how to think about starting your own collection. Get rich quick? Forget about it. But live a richer cultural life? That's well within your reach. Discusse…
…
continue reading

1
“Grokking,” Sitecore RCE, & Agentic AI Risk
58:06
58:06
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
58:06In this episode, the hosts discuss the latest cybersecurity news, focusing on the malicious use of AI in social media, critical vulnerabilities that require immediate attention, and the implications of agentic AI on security. They reflect on personal experiences with technology and media, emphasizing the balance between convenience and security in …
…
continue reading

1
The De-Euphemizing of DC
50:36
50:36
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
50:36Now that Trump has decided to restore the throwback name of the Department of Defense (now the Department of War), maybe it's time we started calling all federal agencies according to what they really do — so Bradley plays an epic name game. Plus, he assesses the looming real-world conditions that will test Zohran Mamdani's commitment to his progre…
…
continue reading

1
Find Old Accounts (Part 1)
1:03:24
1:03:24
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:03:24The next step in reducing our digital footprint is to identify all of our online accounts, including the long forgotten and unused ones. The easiest place to start is by using the tool we should already have: our password manager. By its very nature, it contains a list of all our accounts. You may have used your browser to remember your passwords, …
…
continue reading

1
Leakage, TTPs, and Backdoors — Oh My!
56:38
56:38
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
56:38In this episode, Ryan Williams Sr. and Shannon Tynes discuss the latest cybersecurity news, including a ransomware attack in Nevada and the federal response to improve cybersecurity funding. They dive into the implications of AI in cybersecurity, the Salt Typhoon hack as a national defense crisis, and personal reflections on gaming, particularly th…
…
continue reading

1
How to Find a Rock Star
40:53
40:53
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
40:53Here's one thing we know about the Democratic Party right now — they are practically in a death spiral and must do something heroic to have any shot at the White House in 2028. If they think they can go about picking a candidate the regular, super-boring way, they're toast. So Bradley has a plan to bring fun and genuine excitement into the process,…
…
continue reading