Wenn Systeme versagen, wollen alle wissen: Wie war das möglich? Bei Firewall erzählen wir in jeder Folge die wahre Geschichte eines Angriffs: Wie russische Geheimdienste einen deutschen Agenten zum Maulwurf machen. Warum China die AfD für sich instrumentalisiert. Wieso Wirecard-Betrüger Jan Marsalek den deutschen Behörden entkommt. Und wie Scam-Farmen Tinder-Nutzer ausbeuten. Gemeinsam mit SPIEGEL-Reportern sucht Host Sandra Sperber jeden Donnerstag Schwachstellen in Systemen und findet die, ...
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
…
continue reading
grc
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Die neue Podcast-Serie der SZ: „The Great Firewall: Wie China das Internet verändert“. Ein Podcast über die Zensur und Propaganda im chinesischen Internet - was längst auch uns betrifft. Ab dem 26. Juli gibt es jeden Dienstag eine neue Folge. Außerdem finden Sie auf dem Kanal weiterhin alle Folgen von „Suisse Secrets“ - der Podcast zur Recherche. Sie möchten mehr über unsere Werbepartner erfahren? Hier finden Sie alle Infos & Rabatte: https://linktr.ee/the_great_firewall
…
continue reading
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
…
continue reading
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
…
continue reading
Where we talk and discuss what the great firewall of China is, and the ethics of it Cover art photo provided by JJ Ying on Unsplash: https://unsplash.com/@jjying
…
continue reading
A great WordPress.com site
…
continue reading
Now that Trump has decided to restore the throwback name of the Department of Defense (now the Department of War), maybe it's time we started calling all federal agencies according to what they really do — so Bradley plays an epic name game. Plus, he assesses the looming real-world conditions that will test Zohran Mamdani's commitment to his progre…
…
continue reading

1
Leakage, TTPs, and Backdoors — Oh My!
56:38
56:38
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
56:38In this episode, Ryan Williams Sr. and Shannon Tynes discuss the latest cybersecurity news, including a ransomware attack in Nevada and the federal response to improve cybersecurity funding. They dive into the implications of AI in cybersecurity, the Salt Typhoon hack as a national defense crisis, and personal reflections on gaming, particularly th…
…
continue reading
Here's one thing we know about the Democratic Party right now — they are practically in a death spiral and must do something heroic to have any shot at the White House in 2028. If they think they can go about picking a candidate the regular, super-boring way, they're toast. So Bradley has a plan to bring fun and genuine excitement into the process,…
…
continue reading
The next step in reducing our digital footprint is to identify all of our online accounts, including the long forgotten and unused ones. The easiest place to start is by using the tool we should already have: our password manager. By its very nature, it contains a list of all our accounts. You may have used your browser to remember your passwords, …
…
continue reading
We take our cell phones with us everywhere – which makes them the perfect tracking device. Just walking around with your device will give your location away in multiple ways. But even if you had no apps on your phone, the cellular chips in our devices will constantly be interacting with every cell tower that’s in range, negotiating the best tower t…
…
continue reading

1
A Restaurant That Does Everything Right
33:48
33:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
33:48What if you could eat at a place where the food was fresh and healthy, prices were geared to what customers could afford and the staff was treated equitably? Legendary food writer Mark Bittman joins Firewall to discuss the imminent launch of Community Kitchen, his nonprofit corrective to a food world gone awry. Send us an email with your thoughts o…
…
continue reading
While all of you were enjoying a Firewall-free week, Bradley was undergoing Transcranial Magnetic Stimulation, a therapy designed to mitigate obsessive-compulsive disorder. "They put this thing over your head, and effectively, every two seconds, you get 30 pulses or shocks," he says. "They call them pulses because shock sounds bad. If you are a lis…
…
continue reading
In this episode, the hosts discuss the intersection of gaming and cybersecurity, focusing on the rise of cheating in video games and its implications for cybersecurity practices. They explore the economic aspects of cheating, the legal ramifications for developers, and the importance of third-party risk management. The conversation also touches on …
…
continue reading
The world wide web, as we know it today, has been around for over 30 years. In that time, most of us have created many dozens, perhaps hundreds, of online accounts. How many of those accounts are still alive somewhere? What data do they hold? And how good are the passwords you used? Today we’re going to start on the path to finding all those accoun…
…
continue reading

1
Deepfakes, High Stakes, and OT Breaks
54:57
54:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
54:57In this episode of the podcast, the hosts discuss various topics related to cybersecurity, including the rise of deepfake technology and its implications for fraud, recent law enforcement actions against ransomware groups, and the importance of cybersecurity guidance for operational technology. They also share personal updates and reflections on th…
…
continue reading
Why don’t we have meaningful privacy laws in the US? While we haven’t been able to pass federal privacy legislation, many states have managed to pass laws protecting our data and establishing some basic privacy rights. Vermont House Representative Monique Priestley led a Herculean effort to pass privacy legislation in her state last year. While man…
…
continue reading
Two friends decided to turn their shared passion for tennis and food into — well, they don’t know what it could become, but for now it’s a Substack called The Play Boys. Bradley talks to Dave Allee and Paul Tedesco about the best and worst public courts in New York City, why breakfast is more central to their project than lunch or dinner, the surpr…
…
continue reading
If Zohran Mamdani stands any chance of succeeding on his social agenda, he'll need a strong economy. Bradley hand-picks the policies and ideas that the likely next mayor of New York City should embrace to drive innovation, attract investment, and create jobs. Growth, he argues, will do the most good for the most New Yorkers. Plus, Bradley reflects …
…
continue reading
It’s early August, which means it’s time for BSides Las Vegas and DEF CON, part of the trio of conferences that make up “hacker summer camp” (the other being Black Hat, which I don’t attend). It’s been a crazy, chaotic week – as usual – but in almost completely good ways. After the regular news, I’ve got some mini interviews with Jake Braun (DEF CO…
…
continue reading

1
Cloned Voices, Bad Choices, and Ransomware Invoices
55:59
55:59
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
55:59In this episode, Ryan Williams Sr. and Shannon Tynes discuss the latest trends in cybersecurity, focusing on the implications of AI in vishing attacks, the vulnerabilities in Microsoft Exchange servers, and the ongoing debate about ransomware payments in the public sector. They emphasize the importance of cyber hygiene, patch management, and the ne…
…
continue reading

1
Discussing Cybersecurity, Mind Privacy, and Cognitive Security With Allen Westley
47:48
47:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
47:48In this episode, Ryan Williams Sr. and Allen Westley discuss the evolving landscape of cybersecurity, focusing on mind privacy, cognitive security, and the implications of AI in both personal and professional contexts. They explore the risks associated with data aggregation and inference, the balance between innovation and security in government, a…
…
continue reading
What happens when a drugged-out visionary, a few brilliant businessmen and a generation of alt-rock misfits hit the road together? Tom Beaujour — co-author of Lollapalooza: The Uncensored Story of Alternative Rock's Wildest Festival — joins Bradley to tell the inside story of America’s most chaotic traveling circus. From onstage shotgun blasts to b…
…
continue reading

1
»Königreich Deutschland«: Der Fantasiestaat der Reichsbürger
45:28
45:28
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
45:28Peter Fitzek hat die größte Reichsbürger-Gruppe Deutschlands aufgebaut. Dabei hat er von seinen Fans Millionen kassiert und Behörden ausgetrickst. Es begann 2012. Peter Fitzek, ein gelernter Koch, ruft einen Staat aus und erklärte sich selbst zum Herrscher. Fitzeks Vision: ein besseres Deutschland, das angeblich dem Gemeinwohl dient. Doch dahinter …
…
continue reading
In this episode, the hosts discuss various topics in cybersecurity, including China's accusations against the U.S. regarding cyberattacks, the implications of zero-day vulnerabilities, the Minnesota National Guard's cybersecurity response, and the ongoing controversies surrounding the TikTok ban. The conversation highlights the complexities of cybe…
…
continue reading

1
A Contrarian Brief for Law School
1:03:07
1:03:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:03:07Though he went to law school himself, Bradley used to tell people it was a waste of time and money for anyone who wasn't dead set on practicing law. Now, with the age of AI upon us, he thinks it could be the best way for young people to develop their critical thinking skills. Plus, he torches Trump’s latest moves as a coordinated assault on America…
…
continue reading
Cory Doctorow has garnered a lot of needed attention to the decline of modern online platforms, including Google Search, Facebook and Twitter. Much of this is a result of coining the now-viral term Enshittification. Today we’ll talk about how the internet was broken and who’s to blame. We’ll also discuss the lack of privacy laws and the threats of …
…
continue reading
Bradley talks with Eric Soufer, partner at Tusk Strategies and head of their advanced technology & crypto practice, about the dramatic shift in the regulatory and political climate surrounding digital assets. They unpack the GENIUS and CLARITY Acts, explain why stablecoins are going mainstream, and assess how the crypto lobby pulled off one of the …
…
continue reading

1
Nacktbilder-Diebe: Eine Szene ohne Skrupel
35:58
35:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
35:58Intime Aufnahmen – gestohlen und ins Netz gestellt. Frauenfeindliche Foren verbreiten systematisch private Fotos und Sexvideos. Wer steckt dahinter und was treibt die Täter an? Es beginnt mit einer Google-Suche. Zufällig entdeckt Laura ein privates Foto, das sie selbst nie ins Netz gestellt hat. Sie sucht weiter und findet intimste Bilder von sich …
…
continue reading
As an American Jew raised in a household of Holocaust survivors, Bradley has always been unwavering in his support for Israel. But what once felt morally clear — Israel's strength as a shield against persecution — has given way to uncertainty, as the war in Gaza grinds on without a discernible ethical purpose. To preserve Judaism's core values, Bra…
…
continue reading