Player FM - Internet Radio Done Right
Checked 1M ago
Aggiunto due anni fa
Contenuto fornito da RealTime Cyber. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da RealTime Cyber o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Player FM - App Podcast
Vai offline con l'app Player FM !
Vai offline con l'app Player FM !
Podcast che vale la pena ascoltare
SPONSORIZZATO
Hilde Mosse comes from one of the wealthiest families in Berlin and stands to inherit an enormous fortune. But she longs for something more meaningful than the luxurious lifestyle her family provides. So Hilde decides to pursue her dream of becoming a doctor. As the Nazis take power in Germany and the Mosse family is forced to flee, Dr. Hilde Mosse lands in New York having nearly lost everything.. She finds her calling treating the mental health of Black youth – and the symptoms of a racist system. In addition to photographs, school records, and correspondence spanning Hilde Mosse’s entire lifetime, the Mosse Family Collection in the LBI Archives includes the diaries she kept between 1928 and 1934, from the ages of 16-22. Hilde’s papers are just part of the extensive holdings related to the Mosse Family at LBI. Learn more at lbi.org/hilde . Exile is a production of the Leo Baeck Institute, New York and Antica Productions. It’s narrated by Mandy Patinkin. This episode was written by Lauren Armstrong-Carter. Our executive producers are Laura Regehr, Rami Tzabar, Stuart Coxe, and Bernie Blum. Our producer is Emily Morantz. Research and translation by Isabella Kempf. Voice acting by Hannah Gelman. Sound design and audio mix by Philip Wilson. Theme music by Oliver Wickham. Please consider supporting the work of the Leo Baeck Institute with a tax-deductible contribution by visiting lbi.org/exile2025 . The entire team at Antica Productions and Leo Baeck Institute is deeply saddened by the passing of our Executive Producer, Bernie Blum. We would not have been able to tell these stories without Bernie's generous support. Bernie was also President Emeritus of LBI and Exile would not exist without his energetic and visionary leadership. We extend our condolences to his entire family. May his memory be a blessing. This episode of Exile is made possible in part by a grant from the Conference on Jewish Material Claims Against Germany, which is supported by the German Federal Ministry of Finance and the Foundation Remembrance, Responsibility and Future.…
RealTime Cyber
Segna tutti come (non) riprodotti ...
Manage series 3422494
Contenuto fornito da RealTime Cyber. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da RealTime Cyber o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
We Cover the Cyberspace.
21 episodi
Segna tutti come (non) riprodotti ...
Manage series 3422494
Contenuto fornito da RealTime Cyber. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da RealTime Cyber o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
We Cover the Cyberspace.
21 episodi
Tutti gli episodi
×R
RealTime Cyber

1 Behind the Scenes of Election Security: CISO of AZ Sec of State 1:04:08
1:04:08
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto1:04:08
Michael Moore is the Chief Information Security Officer (CISO) for the Arizona Secretary of State's Office which plays a major role in running elections. We sit down and talk about how elections are run, how votes are cast, authenticated, and counted, how they ensure security and integrity of ballot tabulators, cyber threats to elections, and respond to allegations of voter fraud and voter suppression.…
R
RealTime Cyber

In this episode, we sit down with Secret Service Agent William Mack to discuss a series of high-profile cryptocurrency money laundering investigations; From transnational money laundering operations to domestic wire fraud, we discuss the investigation and the cyber criminal organizations behind the scams.…
Ryan Murray is the Deputy Director of Arizona Homeland Security and Chief Information Security Officer of Arizona. We talk about a wide range of cybersecurity issues facing the State of Arizona from DeepFakes, AI powered Hackers, to Chinese State Sponsored Hackers positioning themselves in Critical Infrastructure. Chapters: 0:00 The Journey to Becoming a CISO 5:35 The 5 Year Plan for Collective Defense 13:04 Threat Actors using Artificial Intelligence 15:56 DeepFake Threats 17:21 Artificial Intelligence In Government 20:50 Chinese Hackers in the Power Grid & Critical Infra 28:16 Things he Believed Before Becoming a CISO 31:14 The Most Stressful Part of Being a CISO 32:54 Building a Cybersecurity Culture…
Phillip Hinders is a Digital Forensics examiner for the State of Ohio. He supported cybersecurity incident response efforts for the State of Ohio before working as a digital forensics examiner supporting law enforcement, mainly conducting digital forensics with tools like Cellebrite and Grey Key.
Wynter Deagle is a Data Privacy and Cybersecurity Attorney out of California. She has proactively counseled companies and defended companies in data privacy litigation. She shares insights from her experience with us. Chapters: 0:00 How Data Privacy came to Light 4:08 Are you Opting in or Opting out? 6:16 Healthcare Companies have the Facebook Pixel? 11:21 Are Data Brokers Actually Affected by New Privacy Laws? 14:33 Some Companies DO Respect your Privacy 18:08 The End of "Free" 25:30 Companies Collect More Data Than They Think 29:51 What Every Company & Consumer Should Know 33:54 Is it Possible to fix AI Privacy Issues?…
Mark Reed is a former U.S Air Force officer who worked on Satellites before transitioning to private sector Satellite & Space Technology Startups. We talk about the nature of space technologies, technical limitations, satellite traffic control, electronic warfare in space, GPS signals, and some concerning trends around GPS signals jamming and interference with aircraft here on earth. Chapters: 0:00 From U.S Air Force to Satellite Startups 3:48 Will Satellites Crash into Each Other? 12:45 Intelligence Collection in Space 22:09 Technical Limitation of Satellites 30:04 You Probably Didn't Know this About GPS 37:12 GPS Jamming & Spoofing Attacks on Airlines 42:34 Electronic Warfare in Space is Happening…
Gary Miller from Citizen Lab has made a career Exposing Cyber Threats and Digital Surveillance. He specializes in mobile network threat intelligence and surveillance monitoring. He has testified to Congress, the Department of Justice, as well as been a contributor with the Washington Post and the Intercept. Chapters: 0:00 Concerning Discoveries While Working in Telecom 4:57 Why Your Cellphone is so Vulnerable 10:18 The Concerning Observation of Huawei 14:00 NSO Group Tries to Buy Access to Cellular Network 18:58 Detecting Pegasus Spyware 24:06 Internet Censorship & Surveillance in Iran 31:37 Internet Behavioral Profiling 33:55 Internet Shutdowns? 36:06 Western Internet Vendors Called out! 40:50 How to Protect Yourself…
Trevor Costanzi is a Senior DevSecOps Engineer. He opens up about a wide variety of topics throughout his Cybersecurity and IT Career. He gives unique insights into what made him successful. 0:00 How he Went From Help Desk to Security Engineer 3:49 How the Equifax Breach Changed the Company Security Culture 6:06 How DevOps Changed Software Development 11:48 Should You Use ChatGPT to Write Code? 15:27 Advice for Getting into DevOps/DevSecOps 20:41 Advice for Starting a Cybersecurity Career…
Recently the SEC pulled a 180 on their policy toward cryptocurrencies and sued Binance and Coinbase. Sam Lyman is a Public Policy Director in Washington who covers Blockchain. He is also a Forbes Contributor, covering Fintech and Digital Assets. He breaks down the historical politics and policy behind crypto and the recent assault against crypto. He can be found at: https://www.forbes.com/sites/samlyman/?sh=79368a3850bb https://twitter.com/@SamLyman33…
R
RealTime Cyber

Michael McLaughlin is a former senior adviser for U.S. Cyber Command (USCYBERCOM), where he was responsible for the coordination of Department of Defense (DOD) counterintelligence operations in cyberspace. He was the Chief of counterintelligence for the Cyber National Mission Force where he supported threat hunting teams (hunt teams) in Ukrainian networks. William Holstein is a journalist who has specialized in technology and China for over a decade. They CoAuthored the Book "Battlefield Cyber". You can find it here: https://www.amazon.com/Battlefield-Cyber-Undermining-Democracy-National/dp/1633889017 They talk about how America’s adversaries are fully engaged in a cyber war against the U.S. McLaughlin and Holstein propose MAJOR moves to improve digital security in the U.S. A Department of Digital Services could provide coordination and support we need. Corporations have to be willing to share information and protective technology, and there must be a concerted effort to remove embedded malware from systems in companies, government agencies, and the military.…
AnnMarie Giblin is a Cybersecurity Lawyer specializing in Proactive Cybersecurity. She talks about how cybersecurity laws are changing and what you can do to stay ahead. Chapters: 0:00 This Changed Cyber Negligence Law 2:30 The Changing Nature of Cybersecurity Lawsuits 9:47 Supply Chain Breaches are Changing Cybersecurity Law 12:40 You're Liable if You Aren't Doing This 17:59 This is The Cyber Liability Threshold 20:33 These New Data Privacy and Security Laws are Coming 26:42 This is How AI will Change Law and Regulation…
Brent Watkins served in the U.S Air Force during the cold war reverse engineering Soviet Technologies before joining the FBI and investigating cyber crimes. Chapters: 0:00 Air Force During the Cold War 1:36 Cyber Crime Investigations with the FBI 17:37 Tracking Terrorists Online 18:25 Investigating Hop Points 20:31 Investigating Cyber Criminal Groups 25:24 Corporate Espionage & Insider Threats 27:57 From FBI to Working in Threat Intelligence 3 1:57 Wire Fraud & Ransom Claw Backs 34: 36 What Are Cyber Criminals Like?…
Dallas Clounch, the "AI Surfer, is a former software developer and now AI Guru. He covers all things AI. You can Find More AI insights at: https://www.theaisurfer.com/ Facebook: https://www.facebook.com/theaisurfer?mibextid=LQQJ4d Instagram: https://instagram.com/theaisurfer?igshid=YmMyMTA2M2Y= TikTok (chinese spy app): https://www.tiktok.com/@theaisurfer?_t=8bRgi3AlW3i&_r=1 YouTube: https://www.youtube.com/ @theAIsurfer…
R
RealTime Cyber

1 CyberWarfare & Signals: Deciphered by U.S. Navy Cryptologic Officer 1:07:07
1:07:07
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto1:07:07
Ben Bissantz is a Cryptologic Warfare Officer for the U.S Navy. He's served in Electronic Warfare and Signals Intelligence for U.S Special Operations Command (USSOCOM) and Sealiftcommand. He's also served in the Navy Information Warfare Comminity’s Artificial Intelligence and Machine Learning Task Force. Chapters: 0:00 Announcement and Disclosure 1:00 Background from USSOCOM to Sealift 3:00 Cryptologic, Cyber, & Electronic warfare explained 13:42 Cyber in Ukraine 15:37 NotPetya implications on U.S Military 19:17 What would a cyber war look like? 22:53 Border Gateway Controls; Undersea Cables & Satcom 29:30 The Irreversible Vulnerability in SatCom 31:30 OSINT, the Deep Wed, & the Dark Web 40:59 Technical Take on the Chinse Spy Balloon 53:02 Hot Take on AI 57:15 Government & Military's use of AI 1:02:05 Self Driving Cars & Self Flying Planes…
Benvenuto su Player FM!
Player FM ricerca sul web podcast di alta qualità che tu possa goderti adesso. È la migliore app di podcast e funziona su Android, iPhone e web. Registrati per sincronizzare le iscrizioni su tutti i tuoi dispositivi.