A bi-weekly podcast from The Breach featuring sharp commentary on politics and movements in Canada.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
…
continue reading
Welcome to After the Breach, a podcast for whale enthusiasts by whale enthusiasts. Join professional guides and whale watch captains Jeff Friedman and Sara Shimazu as they share their passion and love for whales.
…
continue reading
The Breachside Broadcast contains all the Wyrd audio you could want. Tales of Malifaux explores the primary mysteries and developments within Malifaux City and the adventures of your favorite characters through the breach. Earthside Echoes explores the developments following the emergence of the Burning Man on Earth. Chronicles revisits the history of Malifaux and tells the stories of the people and places off the beaten path.
…
continue reading
Welcome to the "Zero Breach Zone," where we delve into the vital mission of fortifying K-12 schools against breaches and phishing threats. Hosts Andy Lombardo and Phil Hintz lead insightful conversations with top experts in cybersecurity, education, and technology, uncovering strategies to protect our schools. From breaking down the latest digital threats to sharing actionable security measures, this podcast empowers educators, administrators, and parents with the tools they need to safeguar ...
…
continue reading
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
…
continue reading
Each episode of Breached highlights a different issue that has been traditionally framed as an essential element of any American social contract. Over ten episodes, the podcast explores areas of American life where some sort of bargain between us – either explicit or implicit – no longer seems to stand.
…
continue reading
Pop culture talk, among other things
…
continue reading
Breaching Extinction is an investigative podcast evaluating the complexities of the declining Southern Resident Killer Whale population in an effort to better understand the trials they currently face, and find solutions through conversation and connection.
…
continue reading
Step into The Breach as we expose and explore abuses of power in our government. Part of the Rewire News Group podcast network.
…
continue reading
Small time guy, with small time opinions on Magic the Gathering
…
continue reading
Explore life's depths and unlock the secrets of mental well-being on "Breach Your Mind." Join us as we navigate the intricacies of the human experience, offering insights, inspiration, and practical strategies for a fulfilling life. Get ready to breach the barriers of conventional thinking, embrace self-discovery, and nurture your mental health. Let's embark on a transformative journey together. Welcome to Breach Your Mind.
…
continue reading
Truth centered audio series. Torah based. Every change that takes place on Earth impacts and shapes our very lives. Ohadah’s intention is to bring a conscious awareness to the fact that the world we live in, is in need of the Truth. The 21st century is compelling our generation to reverse the old trend and write a new story. Ohadah hopes to inspire the listener to reach for their highest potential to contribute a change. If one adapts righteous thoughts and habits, the Truth has the Power to ...
…
continue reading
Starring Jameela Jamil and Manny Jacinto! After crash-landing on a mysterious planet with no memory and a sentient AI implant in his brain keeping him alive, a soldier searches for answers about his past. There are only four things Lucan knows with certainty: his name, his rank, that the droll AI implant speaking to him inside his mind is named Ven, and finally, that she is the only thing keeping him from dying. With no other memories or connection to their pasts, Lucan and Ven must navigate ...
…
continue reading
A podcast designed to share thoughts and feelings of a major cyber security event from an insiders perspective. I will be talking through the events, thoughts and emotions that I navigated through during the "breach" that I presided over from March - October, 2016.
…
continue reading
Church militant happenings (headlines), phone-a-friends, scripture probably, faith, love, hope, support, advice, inspiration and family shenanigans! Learn more about the battle at http://bit.ly/ITBpodcast 📿 Support this podcast: https://podcasters.spotify.com/pod/show/intothebreach/support
…
continue reading
Top notch gaming podcast hosted by Get Flanked, Prodigio Pete and Rogue-9. If you are a Rainbow Six Siege or first person shooter fan, this podcast is definitely for you!
…
continue reading
A podcast from two third-year law students who don’t have enough on their plate already. Listen as we try to navigate being a twenty-something in law school and provide advice (warnings) to prospective and current students.
…
continue reading
Welcome to the Breach Report! Ephraim Ebstein, CEO of FIT Solutions, hosts different guests to talk about cybersecurity threats, the current challenges in the industry, and what organizations can do to strengthen their defenses against data breaches and cyber attacks.
…
continue reading
Irascible man-about-town, Tom McCartan, is here to help you mind your manners and artfully dodge society's faux pas. Toilets, fashion, the Internet - no venue is left untouched. Check your deportment gauges as we dive into the vortex of what makes civilization so damned civilized.
…
continue reading
Soulstory is an actual play role playing game podcast (RPG) set in the world of Malifaux. Join us as our Fatemaster guides her four players into a story where steam power and magic meet horror cliché's and fairy tales. If you want to know more about Malifaux, be sure to stick around. Each episode is followed by a cast member sharing some tidbits and lore about the universe. Come for the story but be careful. Bad things happen.
…
continue reading
Welcome to my Podcast. I'm Edwin Perez, a pastor, author, blogger and just a man who is passionate about the Gospel. Here you will find topics, interviews, devotionals, theological discussions, music and more. Check out my website for blogs, articles and teachings at http://www.eddieperez.me
…
continue reading
We're a group of four Malifaux enthusiasts that help new players with advice, personal experience, and entertainment in the steampunk streets.
…
continue reading
Welcome to Beyond the Breach. A new series about how individuals and organizations manage change – with a focus on technology’s impact on humanity and the nature of cybersecurity risk. * The show is hosted by Jonathan Reiber, a writer and security strategist who served as a Speechwriter and Chief Strategy Officer for Cyber Policy in the Obama Defense Department, and co-hosted by D.J. Skelton, a combat veteran, retired Army officer, founder of Paradox Sports, and outdoorsman. * In each episod ...
…
continue reading
Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll as those entrusted with enterprise defense look to ensure that there are no embedded vulnerabilities amongst the data platforms they are both sourcing …
…
continue reading
1
UN expert on how Canada helps shield Israel from accountability
19:42
19:42
나중에 재생
나중에 재생
리스트
좋아요
좋아요
19:42
Francesca Albanese, the United Nations Special Rapporteur on the Occupied Palestinian Territories, sits down with Desmond Cole to discuss Canada’s ‘crystal clear’ complicity in the Israeli destruction of Gaza and the ‘hope that remains in this darkness.’
…
continue reading
Welcome to Episode 4 of the Zero Breach Zone! In this episode, we sit down with Oliver Page, CEO and founder of CyberNut, for an inspiring conversation about entrepreneurship and cybersecurity in education. Oliver shares his journey as a serial entrepreneur, including his experience founding NutKase, a successful K-12 device case manufacturer that …
…
continue reading
1
Episode 33 - Killer Whale Rescues: T46C2, T73B & T109A3A
1:18:42
1:18:42
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:18:42
After a fall hiatus while our co-hosts, Jeff and Sara, were busy on the water, the dynamic duo is back with Episode 33! Joining them is returning guest, Jared Towers, from Bay Cetology. Jared last visited to chat about the rescue of T51 “Roswell” and T49A2 “Jude” from Barnes Lake in Alaska on Episode 19 and he is back now to talk about more killer …
…
continue reading
Incident Response - better safe than sorry! After so much good feedback on our first podcast episode, Rense and I tried to get the second episode done as soon as possible. As promised, we sat down and talked about common learnings from incident response cases we are working on. Enjoy the conversation: Which preparations are really useful Why you ca…
…
continue reading
In part five of "Malifaux Burns," Misaki consolidates her power as Oyabun of the Ten Thunders, Kaeris fights for her life against Witchling Thralls, and Parker Barrows faces execution at the gallows. Read by: Ian TravisAnnounced by: Julian SmithMusic: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat…
…
continue reading
We assembled some "nerds from the basement" to cover a key strategy in combatting evolving threats. Today’s episode is going to take on a little different flavor, as we’re going to show you one particular tool that can impact a number of your security planning, training and discovery strategies. While table top exercises are nothing new, we’re goin…
…
continue reading
For this episode, instead of tapping into one source for feedback and updates on industrial cybersecurity, we’re going to look at some of the key insights previous guests have offered on the evolving threat landscape – from increased risks emanating from technological integrations and an uptick in automation, to the more traditional adversaries res…
…
continue reading
In "Unappreciated in My Time," a guest at an all-night party takes a suspiciously well-informed interest in recent murders. Read By: Henrietta Meire Announced by: Julian Smith Music: "Terror Theme" by Hakan Eriksson저자 Wyrd Miniatures, LLC
…
continue reading
Join our insightful webinar as we dive into the latest updates of NIST CSF 2.0. Gain a comprehensive understanding of its governance frameworks and discover key takeaways crucial for financial institutions. Topics we’ll cover include: Cybersecurity Defense Matrix: Explore strategic cybersecurity defense approaches, encompassing both proactive measu…
…
continue reading
1
Cybersecurity in 2024: Predictions from Security Leaders
1:00:01
1:00:01
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:00:01
Tailored for security leaders, our on-demand webinar covers key topics that include: Top Priorities In Maintaining Compliance: Addressing compliance challenges in the ever-evolving cybersecurity landscape Evolving With AI: How industry leaders are leveraging AI to enhance their security measures. Adapting To New Risk Factors: How to adapt cybersecu…
…
continue reading
Ensure your credit union is compliant & secure in 2024. Hear from a panel of NCUA auditors about infosec & cybersecurity best practices for your credit union.저자 Rivial Data Security
…
continue reading
While there are plenty of unknowns when it comes to protecting the OT attack surface, there are some things that are undeniably true. We know that the frequency of attacks will continue to increase. We know that it’s not if your ICS will be probed, but when. And we also know that asset and connection visibility is an ongoing challenge due to the im…
…
continue reading
As Americans hit the polls next Tuesday, El Jones and Martin Lukacs hash out the U.S. election campaign, the folly of pandering to the right, neoliberal identity politics, the implications for Palestine, the threat of Trump, and their respective halloween costumes.
…
continue reading
1
From AT&T to K12: No Organization is Too Big (or Too Small) to Skip Security
25:51
25:51
나중에 재생
나중에 재생
리스트
좋아요
좋아요
25:51
Welcome to Episode 3 of Zero Breach Zone! In this episode, hosts Phil and Andy set the stage for what this podcast is all about: making cybersecurity accessible and actionable for the entire education technology community. Starting with the recent AT&T data breach as a springboard, our hosts demonstrate how cybersecurity vulnerabilities affect ever…
…
continue reading
Maybe you’re sick of hearing about phishing schemes and the way hackers are using this strategy to infiltrate your networks, access intellectual data, shut down production, or hold your assets for ransom. If that’s the case, then you’ve made a lot of hackers very happy. And based on Proofpoint’s 2024 State of Phish report, protecting against phishi…
…
continue reading
1
How movements can organize to defeat Pierre Poilievre
1:11:41
1:11:41
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:11:41
With a potential Pierre Poilievre Conservative government on the horizon, Martin Lukacs, Anjali Appadurai, Syed Hussan, Judy Rebick, and Laura Walton discuss how to organize in the face of a surging right.
…
continue reading
In part four of "Malifaux Burns," the notorious outlaw Parker Barrows faces justice, Maxine Agassiz makes a startling discovery, and Governor General Marlow faces a world on fire. Read by: Ian TravisAnnounced by: Julian SmithMusic: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth Caucci (In…
…
continue reading
In the first episode of "The Breach Report," we highlight that many cybersecurity breaches arise from simple lack of oversights, referencing a Google/Mandiant report on swift zero-day vulnerabilities and the need for strong incident response.저자 Robert Wortmann, Rense Buijen
…
continue reading
1
Legacy Mindsets Are Helping Hackers Weaponize Networks
43:40
43:40
나중에 재생
나중에 재생
리스트
좋아요
좋아요
43:40
So, my daughters like to give me a hard time about growing old. Said another way, I’m a legacy asset - just like most of the devices many of you observe, manage and secure every day. Your machines are still in place because they work. While the technology around these assets has evolved, their core functionality and value to the production process …
…
continue reading
1
AI, Cybersecurity, and EdTech Innovation: Transformative Insights from ISTE 2024
42:03
42:03
나중에 재생
나중에 재생
리스트
좋아요
좋아요
42:03
Welcome to Episode 2 of Zero Breach Zone! In this episode, hosts Andy Lombardo and Phil Hintz recap the latest from the ISTE conference, where education and technology converge to shape the future of learning. We explore the major announcements, including the launch of EdTechIndex.org, a new resource for educators to find vetted educational apps th…
…
continue reading
El Jones and Martin Lukacs discuss the worst and weirdest examples of the crackdown on the Palestine solidarity movement in Canada over the past year—and how to understand why it has been so severe and widespread. Plus: why the elite are worried about Canadians identifying as “settlers.”
…
continue reading
1
The MOST Important Relationship | Are you abandoning it?
1:02:42
1:02:42
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:02:42
Everyone talks about the challenges in their relationships with others, but who’s going to make this relationship—the one with God—relevant? How often do we truly reflect on our intimate relationship with God? What does it look like, how do we nurture it, and is it grounded in reality or just superficial? In this discussion, Ohadah shares her perso…
…
continue reading
In "Black Betty," one of Colette's showgirls receives an unwelcome visitor at the Star Theater. Read By: Henrietta Meire Announced by: Julian Smith Music: "Terror Theme" by Hakan Eriksson저자 Wyrd Miniatures, LLC
…
continue reading
1
Using Force Multipliers to Protect Against Next-Gen Stuxnet
41:08
41:08
나중에 재생
나중에 재생
리스트
좋아요
좋아요
41:08
While the justifications for additional cybersecurity spending is easy to explain, getting buy-in at the C-level can be difficult. However, some recent research might help you win over those controlling the purse strings. SonicWall’s Mid-Year Cyber Threat Report found that their firewalls were under attack 125 percent of the time during a 40-hour w…
…
continue reading
One of the most common topics we explore here on Security Breach is the ongoing challenge of asset visibility in the OT landscape. It's frustrating because it would seem that the solution starts with basic inventory management approaches, i.e. the first step in developing frameworks and plans for everything from tool selection to attack response. O…
…
continue reading
Though it may seem difficult to stay righteous in a society filled with immorality, I am honored to encourage both youth and peers to pursue what is right. I've also come to realize that there are deliberate distractions in our world that hinder individuals from reaching their true righteous potential. In this discussion, we will explore 3 key dist…
…
continue reading
1
Meet the Hosts – Why Cybersecurity Matters in K-12 Education, ZBZ Ep 01
28:43
28:43
나중에 재생
나중에 재생
리스트
좋아요
좋아요
28:43
Welcome to the debut episode of Zero Breach Zone! In this episode, hosts Andy Lombardo and Phil Hintz introduce the podcast, focused on the critical importance of cybersecurity in K-12 education. Drawing from their backgrounds in education and technology, they share their personal experiences with cyber attacks and discuss why striving for a “zero …
…
continue reading
In part three of "Malifaux Burns," follow an intrepid reporter as she tries to gain access to a crime scene and an arcanist lieutenant as she infiltrates a secret lab. Read by: Ian TravisAnnounced by: Julian SmithMusic: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth Caucci (Interstitial)…
…
continue reading
According to Veeam’s 2024 Ransomware Trends Report, cyber victims stated that they were unable to restore 43 percent of whatever data was affected by ransomware attacks. This reaffirms what a number of Security Breach guests have stated about trusting hackers after paying their extortion demands. Another finding shows that 63 percent of ransomware …
…
continue reading
Welcome to the Zero Breach Zone—the podcast dedicated to fortifying K-12 schools against digital threats like breaches, phishing attacks, and everything in between. Join hosts Andy Lombardo and Phil Hintz for conversations and interviews with top experts in cybersecurity, education, and technology, as they share crucial insights and strategies to k…
…
continue reading
1
What “I’m right here, bro” says about Canadian politics
22:35
22:35
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:35
El Jones and Martin Lukacs dissect a viral confrontation NDP leader Jagmeet Singh had with far-right wing protesters on Parliament Hill—and unlike everyone else, they’re not cheering. Plus: the crisis management firm that defends the “rich and guilty.”
…
continue reading
The ongoing theme in industrial cybersecurity centers on two competing dynamics – the desire to expand our implementation of automation and Industry 4.0 technologies with the goal of using more and faster connections, along with the decision-making data each generates to improve the efficiency and quality of production. However, these goals now nee…
…
continue reading
1
Breaking the Silence on Domestic Violence: A Public Safety Perspective
38:44
38:44
나중에 재생
나중에 재생
리스트
좋아요
좋아요
38:44
Send us a text In this powerful episode, we dive into one of the most critical issues affecting our society today—domestic violence. With 18 years of experience in public safety, Bryan Shearouse shares his deeply personal encounters and insights into the impact domestic violence has on victims, families, and, particularly, children. Bryan discusses…
…
continue reading
In "The True Meaning of Chugmugs," a pair of cantankerous gremlins attempts to ruin the bayou holiday of Chugmugs. Read By: Henrietta MeireAnnounced by: Julian SmithMusic: "Terror Theme" by Hakan Eriksson저자 Wyrd Miniatures, LLC
…
continue reading
1
Inside the Growing Complexity of Ransomware Hacking Groups
33:23
33:23
나중에 재생
나중에 재생
리스트
좋아요
좋아요
33:23
We’re back to discuss an all-too-familiar topic – ransomware. Ironically enough, it seems the topics we describe in this manner become so familiar because we can’t figure out viable, long-term solutions. I think part of the challenge for industrial organizations dealing with ransomware is that we have to divide our energy and resources between prev…
…
continue reading
Tenant rights organizer Chiara Padovani joins The Breach Show to discuss how a Canadian mega landlord is using algorithmic software as it massively hikes rents. The software maker is being sued by the U.S. government for allegedly enabling landlords to collude to artificially inflate rental prices.
…
continue reading
A smarter, well-funded hacker community means embracing basic, yet daunting cyber challenges. In manufacturing, regardless of your role, avoiding downtime is an obvious priority, and one of the motivating factors driving investments in cybersecurity. In working to mitigate potential DDoS attacks or malware drops, manufacturers are tapping into more…
…
continue reading
In part two of "Malifaux Burns," we catch up with English Ivan, Kiya, Reva, and the Governor General himself. Read by: Ian TravisAnnounced by: Julian SmithMusic: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth Caucci (Interstitial)저자 Wyrd Miniatures, LLC
…
continue reading
1
Combating the 20th Century Mafia with a Stronger Human Firewall
47:36
47:36
나중에 재생
나중에 재생
리스트
좋아요
좋아요
47:36
Sophos recently reported that 65 percent of manufacturing and production organizations were hit by ransomware last year, which, unlike other sectors, is an increase. Overall, these attacks have increased by 41 percent for manufacturing since 2020. Additionally, the cybersecurity firm found that 44 percent of computers used in manufacturing have bee…
…
continue reading
I recently watched an interesting documentary called Turning Point: The Bomb and the Cold War on Netflix. Great watch – I’d highly recommend it. Essentially it positioned nearly every prominent geo-political event since World War II as fallout from the U.S. dropping the nuclear bomb on Japan to end World War II. Similarly, we can look at a number o…
…
continue reading
1
Confronting Chaos: Stress Management for Supervisors in Critical Incidents
35:23
35:23
나중에 재생
나중에 재생
리스트
좋아요
좋아요
35:23
Send us a text What happens when your gut instinct compels you to rush to a dangerous scene without a formal summon? Join us as we recount a gripping personal experience where I faced the unimaginable stress of a shots-fired call. From the nerve-wracking drive to the scene to the overwhelming relief of seeing my team safe, we explore the intense pr…
…
continue reading
Join your hosts, Jeff Friedman and Sara Shimazu, along with returning guests Monika Wieland Shields from the Orca Behavior Institute and Michael Weiss from the Center for Whale Research as they dive back into demystifying killer whales. The topics range from T109A3A’s saga to Iberian orcas to Southern Resident killer whales being doofuses (per Mich…
…
continue reading
Organizer Syed Hussan of the Migrant Workers Alliance for Change joins The Breach Show to talk about the uptick in immigrant bashing, the bipartisan project to exploit migrant labour, a Liberal backtrack on a historic plan to give status to undocumented people—and why anti-racism is the only way to stop all workers from getting divided and ruled.…
…
continue reading
When I was a kid, we always looked forward to my dad’s work picnic. He was a tool and dye maker for a leading caster manufacturer that would rent out a local park, make a ton of food and put on various games and activities for the families. One of the highlights of this day was a softball game pitting the office versus the shop. The good-natured sh…
…
continue reading
In "Menagerie," an intrepid reporter goes undercover to learn the secret behind a highly unusual and strangely successful shop in Ridley. Read By: Henrietta MeireAnnounced by: Julian SmithMusic: "Terror Theme" by Hakan Eriksson저자 Wyrd Miniatures, LLC
…
continue reading
In "Opposing Goals," a Nephilim tot and an injured guardsmen hunt each other through the streets of Malifaux. Read By: Henrietta MeireAnnounced by: Julian SmithMusic: "Terror Theme" by Hakan Eriksson저자 Wyrd Miniatures, LLC
…
continue reading
An ethical cyber researcher breaks down the 'tsunami of exposed data' he continues to uncover. When it comes to solving industrial cybersecurity's biggest challenges, I think we have to continue to ask questions that simultaneously tackle basic blocking and tackling concerns, as well as those that lead to bad news. Both prevent us from putting our …
…
continue reading
The landscape of industrial cybersecurity continues to change and evolve, and demands a vigilant monitoring of the next threat, vulnerability or potential soft spot in our defenses. That’s why we continue to produce Security Breach, and, by the way, continue to be so appreciative of the growth and support we’ve received from each of you. That said,…
…
continue reading
In part one of "Malifaux Burns," the one-eyed gigant Euripides brings a warning to Queen Titania. Read by: Ian Travis Announced by: Julian Smith Music: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by Beth Caucci (Interstitial)저자 Wyrd Miniatures, LLC
…
continue reading