Ridealong has curated the best and most interesting podcasts and clips about Gambit Security.
Top Podcast Clips About Gambit Security
“… enforcing the law and doing everything in our power to keep America safe Bondi is the second Trump cabinet member fired in recent weeks. Homeland Security Secretary Kristi Noem was ousted four weeks ago today. And with me now to start us off, NBC News White House correspondent Monica Alba, NBC News Chief Justice and National Affairs correspondent Kelly O'Donnell, and NBC News Capitol Hill correspondent Melanie Zanona. Thanks to all of you for being here. Monica, let me start with you at the White House. I know you've been working your sources there. So what are they telling you about the timing …”“… is being done to prosecute those rivals. Incoming acting attorney general Todd Blanche who served as President Trump personal attorney during his New York hush money trial praised Bondi on social media posting quote We will continue backing the blue enforcing the law and doing everything in our power to keep America safe Bondi is the second Trump cabinet member fired in recent weeks. Homeland Security Secretary Kristi Noem was ousted four weeks ago today. And with me now to start us off, NBC News White House correspondent Monica Alba, NBC News Chief Justice and National Affairs correspondent Kelly O'Donnell, and NBC News Capitol Hill correspondent Melanie Zanona. Thanks to all of you for being here. Monica, let me start with you at the White House. I know you've been working your sources there. So what are they telling you about the timing of this? Why did President Trump want to fire Attorney General Bondi right now? Well, Kristen, once the president makes up his mind that he wants to replace somebody in his cabinet or in his inner circle, there is a very little bit of lag time that actually takes place between that decision and the actual announcement of it. Now, sometimes people …”View more
Ridealong summary
Pam Bondi's dismissal reflects President Trump's growing frustration with her handling of high-profile cases and his impatience with the Justice Department's progress.
Meet the Press·Meet the Press NOW — April 2·Apr 02, 2026
Ridealong summary
Google has revealed a significant breakthrough in quantum computing that could potentially break Bitcoin's encryption by 2029. This revelation has sparked concerns among crypto developers, as they scramble to find solutions before quantum technology advances further. With major implications for cryptocurrency security, the race to quantum-proof Bitcoin is more urgent than ever.
TBPN·AI Is Coming for Your Memes, Axios NPM Package Compromised, Claude Code Source Code Leak | Alex Pruden, Qasar Younis, Sebastian Mallaby, Forrest Heath, Dino Mavrookas, Will Ahmed, Jannick Malling, Ryan Daniels, Chris Yu·Mar 31, 2026
“… it means always incorrect we're still using it and we're still uploading vast amounts of information into it which is an absolute nightmare from a security person uh it just it's a nightmare what do you tell the organizations you're working with they're like hey yeah i know you want to work”“… expect 300 guys to stop the entire army that's coming at you. You got to get them in sources. You got to get them held. Now, I want to talk about the introduction of AI. Now, AI, we already know, doesn't mean artificial intelligence. We already know it means always incorrect we're still using it and we're still uploading vast amounts of information into it which is an absolute nightmare from a security person uh it just it's a nightmare what do you tell the organizations you're working with they're like hey yeah i know you want to work”View more
Ridealong summary
Paying ransom for your data might not guarantee recovery, and you could lose a year's worth of information if you're unprepared. MK Palmore, a cybersecurity expert, emphasizes the importance of conducting risk assessments and having immutable backups to protect against ransomware attacks. Ignoring these steps can leave your organization vulnerable to devastating data loss.
Proven Podcast·FBI Cyber Expert Saves Your Business - M.K. Palmore·Apr 01, 2026
Ridealong summary
AI has already led to the loss of 90,000 jobs in the past year, and experts warn this is just the beginning. Holly Elmore from PauseAI argues that we must create international treaties to prevent further job loss and even potential human extinction, rejecting the idea that we should simply adapt to AI's rise. The urgency of addressing these issues is clear, as the technology poses unforeseen dangers to society.
Connections Podcast·The movement to head off an AI catastrophe·Mar 30, 2026
“… is Iran, which the U.S. is targeting. Moving on, the long national nightmare of long national lines might soon be over. Trump directed Homeland Security to start paying TSA workers just before the weekend, even though Congress failed to agree on a path to end the partial government shutdown. That means agents could start seeing paychecks as soon as today, but don't expect the lines that TSA just snap back to normal immediately. Almost 500 TSA agents have fully quit since the funding lapse in mid-February. That is in addition to the 1,000 agents that quit during the 43-day government shutdown …”“… Iran is earning about $139 million a day from oil sales in March, up from $115 million into February. So that's around 30% more revenue. It seems like the only person benefiting, at least economically, in terms of selling their oil on the global markets is Iran, which the U.S. is targeting. Moving on, the long national nightmare of long national lines might soon be over. Trump directed Homeland Security to start paying TSA workers just before the weekend, even though Congress failed to agree on a path to end the partial government shutdown. That means agents could start seeing paychecks as soon as today, but don't expect the lines that TSA just snap back to normal immediately. Almost 500 TSA agents have fully quit since the funding lapse in mid-February. That is in addition to the 1,000 agents that quit during the 43-day government shutdown last year. Those roles won't be easy to replace. It takes four to six months to complete training. Plus, it's not like people are applying in droves for a job that increasingly gets caught up in political skirmishes leading to lost paychecks. Adam Stahl, TSA's chief of staff, said last week that the situation will get worse before it gets better, …”View more
Ridealong summary
The TSA is facing a staffing crisis, leading to record-long security lines at airports. Despite Trump’s order to restore pay for TSA workers, many have quit, resulting in a 40% call-out rate at some airports. With lengthy training processes and a lack of job security, the situation is expected to worsen before it improves.
Morning Brew Daily·Investors Lose Patience with Iran War & TSA Workers Finally Get Paid·Mar 30, 2026
“… that. So here in the U.S., think if you're in some big airport, like one of the major hubs, let's be JFK or LAX, and you see someone photographing security, that's weird. I mean, I know now all the press is doing it because we have three hour waits at TSA. So it is a little different now and it's going to be a little more complicated, but it is strange for anyone to be videoing or filming or taping anything in TSA, right? The majority of us get in and we want to get out as soon as possible. We aren't going to take a picture to remember our time at the security checkout line. Now we're going to …”“… the parade route multiple times to obviously review traffic, see where there could be, you know, ingress and egress, look where police officers were kind of congregating and setting up their posts. You know, very important to carry an attack like that. So here in the U.S., think if you're in some big airport, like one of the major hubs, let's be JFK or LAX, and you see someone photographing security, that's weird. I mean, I know now all the press is doing it because we have three hour waits at TSA. So it is a little different now and it's going to be a little more complicated, but it is strange for anyone to be videoing or filming or taping anything in TSA, right? The majority of us get in and we want to get out as soon as possible. We aren't going to take a picture to remember our time at the security checkout line. Now we're going to move on to the concept that terrorists, of course, practice ports of the attack before it occurs, right? This is famously called dry run. So they might approach entry points. They might time the peak moments of a crowd, like at a concert or a sporting event. They might check reactions to different security issues going on. Like, let's say if there's a …”View more
Ridealong summary
Terrorists are increasingly using encrypted communication apps like Signal and WhatsApp, as well as gaming platforms, to coordinate their activities away from prying eyes. This segment highlights how these methods complicate monitoring efforts and discusses the warning signs of radicalization, such as a sudden disappearance from social media or work. Recognizing these changes in behavior could be crucial in preventing potential attacks.
The Watch Floor with Sarah Adams·The Government Isn’t Telling You This·Mar 31, 2026
Ridealong summary
Dating apps are being exploited in dangerous ways, as highlighted by a troubling scenario in Ukraine where Russian adversaries created fake profiles to target foreign volunteers. This alarming tactic underscores the risks associated with sharing personal information online, especially in conflict zones. A similar incident with the fitness app Strava revealed how user data could inadvertently compromise military locations, illustrating the need for caution in our digital interactions.
The Watch Floor with Sarah Adams·Your Phone Isn’t Safe Right Now·Mar 20, 2026
“… to these guys to keep them from getting the opportunity. Is that right? I think so. And one of the other issues, I think, for anybody who's doing IT security is, you know, the famous expression is it's not possible to prove a negative. It's how do you get credit for your organization not being attacked? How do you demonstrate that it's because you have the budget that you have for IT and the equipment that you have and the staff that you have? You know, certainly there's profit pressure in any enterprise. And so when the guys who are controlling the purse strings look around for where they can cut, …”“… it worth to you for us not to tell the world or to leak the personal and business data that we have stolen from you? Right. So they have the means. They have the motive. The motive is extortion and payment. Yeah. The opportunity, it's really up to these guys to keep them from getting the opportunity. Is that right? I think so. And one of the other issues, I think, for anybody who's doing IT security is, you know, the famous expression is it's not possible to prove a negative. It's how do you get credit for your organization not being attacked? How do you demonstrate that it's because you have the budget that you have for IT and the equipment that you have and the staff that you have? You know, certainly there's profit pressure in any enterprise. And so when the guys who are controlling the purse strings look around for where they can cut, They're like, well, we haven't had any problems with our IT. Everything's going great. So let's cut there. And it's like, wait a minute. The reason everything is going great and you haven had any attacks is that we been able to keep the defenses up We been able to purchase expensive network gear that even though the old stuff was still working, it …”View more
Ridealong summary
Organizations are finally realizing that neglecting cybersecurity can lead to devastating breaches and public shame. With a surge in data extortion tactics, IT departments must demonstrate the importance of sustained funding to keep defenses strong. If businesses want to avoid being on the infamous breach list, they need to take IT security seriously now more than ever.
Security Now (Audio)·SN 1068: The Call is Coming from Inside the House - Live From Zero Trust World 2026·Mar 05, 2026
“… matches. And now his accountant has been hacked by the Iranians. It's just like L after L after L for cash, in addition to the actual potential security concerns about him being compromised by our foe. So that's my general take on this. And we don't know what the hell's in this cash.”“… the embarrassing videos of him like doing shotgunning beers in the hockey team locker room. the embarrassing story that Will Sommer wrote about, about using the plane that we all pay for to fly around his girlfriend. She can sing at semi-pro wrestling matches. And now his accountant has been hacked by the Iranians. It's just like L after L after L for cash, in addition to the actual potential security concerns about him being compromised by our foe. So that's my general take on this. And we don't know what the hell's in this cash.”View more
Ridealong summary
The breach of FBI Director Kash Patel's emails by Iran-linked hackers is a significant failure, highlighting vulnerabilities in national security and the ineffectiveness of current leadership.
Schools are increasingly investing in advanced security measures like CCTV cameras and ballistic chalkboards, driven by available subsidies. Brett Adcock discusses how the technology sector could have already beta-tested these systems in schools if not for a pivot in their strategy aimed at reducing costs. The urgency for effective school security solutions is clear as both public and private institutions seek affordable options to ensure student safety.
The Shawn Ryan Show·#292 Brett Adcock - Shawn Ryan Meets a Humanoid Robot·Mar 30, 2026
“… 31 so not 27 no 31 which is another wait for it CVSS 10 critical vulnerability in Cisco systems. As I said at the top of the show, what would the Security Now podcast be without a brand new shiny Cisco CVSS critical 10.0. The NIST NVD, the National Vulnerability Database, says of the new one, 31, they write, a vulnerability in the web-based management interface, who would have guessed, of Cisco secure firewall management center, apparently not that secure software, could allow an unauthenticated remote attacker to execute arbitrary Java code as root on an affected device. In other words, there …”“… very bad 10.0 CVE 2026-20127, which was that widely exploited authentication zero day discovered while being exploited in Cisco's Catalyst SD-WAN enterprise product line. really anyone could be forgiven for confusing that one with cisco's cve 2026 201 31 so not 27 no 31 which is another wait for it CVSS 10 critical vulnerability in Cisco systems. As I said at the top of the show, what would the Security Now podcast be without a brand new shiny Cisco CVSS critical 10.0. The NIST NVD, the National Vulnerability Database, says of the new one, 31, they write, a vulnerability in the web-based management interface, who would have guessed, of Cisco secure firewall management center, apparently not that secure software, could allow an unauthenticated remote attacker to execute arbitrary Java code as root on an affected device. In other words, there you go, Cisco 10.0. They wrote, this vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted, serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the …”View more
Ridealong summary
A newly discovered critical vulnerability in Cisco's secure firewall management center could allow attackers to execute arbitrary Java code as root, putting countless enterprises at risk. This flaw, CVE-2026-20131, was disclosed on March 4, 2026, and is already being exploited in ransomware campaigns. The ongoing issues with Cisco's authentication systems highlight the urgent need for better security measures in enterprise environments.
Security Now (Audio)·SN 1071: Bucketsquatting - Meta and TikTok's Tracking Pixels·Mar 24, 2026
“Now, one thing that the world of private maritime security shows us is that neoliberal globalism is willing to look the other way a great deal and allow a great deal of violence on behalf of corporations, not on behalf of the state. When people are getting engaged by these vessels, it is to protect property. Granted, sometimes it is also to protect life. These pirates have killed people and kidnapped people and such But the state has been willing to cede its monopoly on violence at the high seas …”“Now, one thing that the world of private maritime security shows us is that neoliberal globalism is willing to look the other way a great deal and allow a great deal of violence on behalf of corporations, not on behalf of the state. When people are getting engaged by these vessels, it is to protect property. Granted, sometimes it is also to protect life. These pirates have killed people and kidnapped people and such But the state has been willing to cede its monopoly on violence at the high seas because it couldn find a good solution to this and it been willing to overlook a lot of loss of life and i just don see a way that this doesn't lead to more loss of life and that is probably what we have to look forward to it may have already begun happening in the strait of homoose between when we record this and when you hear it but it is deeply …”View more
Ridealong summary
The Maersk Alabama incident rattled the shipping industry and highlighted modern piracy's shift from theft to hostage-taking. In 2009, Somali pirates captured the U.S.-flagged ship, leading to a dramatic standoff with U.S. Navy SEALs that ended with the pirates being shot to rescue the captain. This event not only sparked fear in maritime security but also raised complex jurisdictional issues surrounding piracy.
Behind the Bastards·It Could Happen Here Weekly 224·Mar 21, 2026
Ridealong summary
The breach of FBI Director Kash Patel's emails underscores a critical failure in cybersecurity and highlights the incompetence within the FBI's leadership, particularly in handling Iran-related counterintelligence.
The Adam Mockler Show·Trump makes EVERYONE GASP by ADMITTING THIS·Mar 19, 2026
Ridealong summary
In this hilarious segment, a dinner check sparks a debate about restaurant behavior, leading to a wild story of credit card hacking at a place called Poppy Garden. The punchline hits when the host discovers that even after getting hacked, he can still use Apple Pay with his new card number before it arrives!
The Bobby Bones Show·Best 7 Segments From The Bobby Bones Show This Week·Mar 21, 2026
“… in the web server and then everything was fixed. And we were pulling our hair out for over a week on that particular issue. How do you handle the security handouts? Because you mentioned the certifications and things like this. When you have so many vendors and you're actually moving data between all these vendors, there's so many questions on this one. But let's talk about security first. How do you handle the security between these? Do you have a common security design pattern that you use? Because that's a lot of vendors, 25 vendors. That's a lot. It's a lot. Yeah, for sure. So we rigorous …”“… logs okay try it now click oh and that's when it's like ah we didn't give you the new root CA here and they you know They send us the PKS file or what, I can't remember at this point. But they send us the group of certificates and we get those loaded in the web server and then everything was fixed. And we were pulling our hair out for over a week on that particular issue. How do you handle the security handouts? Because you mentioned the certifications and things like this. When you have so many vendors and you're actually moving data between all these vendors, there's so many questions on this one. But let's talk about security first. How do you handle the security between these? Do you have a common security design pattern that you use? Because that's a lot of vendors, 25 vendors. That's a lot. It's a lot. Yeah, for sure. So we rigorous risk assessments, and that's the number one thing that the NCUA is always looking for us in our regulation is the credit union performing reasonable information security risk assessments of all vendors and everything that we do. So when I first got here, we put into play just adhering to the NIST standards, the 800-DASH document on guide to risk …”View more
Ridealong summary
A week-long vendor issue was resolved when a missing encryption certificate was finally identified. This incident highlights the importance of rigorous risk assessments and adherence to NIST standards for managing security across multiple vendors. By implementing these practices, organizations can effectively mitigate risks and ensure compliance with regulatory requirements.
Embracing Digital Transformation·#337 Mastering Vendor Security in Financial Services: A 12-Year Journey·Mar 25, 2026
“… And from Modesto to Monterey, from Folsom to Fresno, they are saying hell no to the way that this White House is running the Department of Homeland Security. They don't want another penny for ICE or Border Patrol. Ah, I see. Not another penny. And yet when you look at the people of Chicago, more and more of them are turning out and condemning what illegal aliens are doing to their communities. The amount of money, the amount of money that is diverted from communities that need it, with American citizens, often who are black or who are Hispanic or whatever they are, The amount of money, which is …”“… to. They're not allowed to. Go ahead. Americans in the streets, and then have Americans wait millions of hours in lines at the airports, and that we won't forget the chaos. And I can't speak for the rest of the country. I can speak for Californians. And from Modesto to Monterey, from Folsom to Fresno, they are saying hell no to the way that this White House is running the Department of Homeland Security. They don't want another penny for ICE or Border Patrol. Ah, I see. Not another penny. And yet when you look at the people of Chicago, more and more of them are turning out and condemning what illegal aliens are doing to their communities. The amount of money, the amount of money that is diverted from communities that need it, with American citizens, often who are black or who are Hispanic or whatever they are, The amount of money, which is scarce to begin with, for schooling and health care and security and all the rest of it. The amount that is drained out of American communities from American citizens and given to illegal aliens. It is a crime, in my view. It's a sin. It's a disgrace.”View more
Ridealong summary
Local police in California are restricted from sharing information with ICE, leading to chaos in communities as residents express frustration over the federal government's handling of immigration. Many citizens feel that resources are being drained from their neighborhoods to support illegal immigrants, affecting schools, healthcare, and security. This clash between local law enforcement and federal immigration policy is creating a growing divide among Californians.
Mark Levin Podcast·3/27/26 - Memeable Christianity: When Faith Meets Gen Z Culture and Podcasters·Mar 28, 2026
“… their customer base is not using these tools maliciously. the hackers sort of wind up on the lagging edge, not on the frontier, but all of the cybersecurity companies like Palo Alto Networks, like CrowdStrike, like the folks that you've had at your conference, they maintain access to the frontier, and so they're always fighting with a bigger weapon. Is that sort of the equilibrium we should expect here? That's a great question. And by the way, we did have today the two top cybersecurity experts at Antropic, the head of security and the head of product security, sharing the roadmap and thoughts …”“… this person just spent $5 million on our API and it's all cyber attack related prompts. Like, let's maybe turn them off or figure out what's going on over there. They have a huge incentive to sort of, you know, control their customer base so that their customer base is not using these tools maliciously. the hackers sort of wind up on the lagging edge, not on the frontier, but all of the cybersecurity companies like Palo Alto Networks, like CrowdStrike, like the folks that you've had at your conference, they maintain access to the frontier, and so they're always fighting with a bigger weapon. Is that sort of the equilibrium we should expect here? That's a great question. And by the way, we did have today the two top cybersecurity experts at Antropic, the head of security and the head of product security, sharing the roadmap and thoughts about the upcoming capabilities of Antropic and other platforms. I think the answer to that is our continuous investment in innovation in the space. It's not just about Weez that I mentioned or Sierra. Those are large established startups. But we did have one company going out of stealth last week, Onyx Security. All they do is agent security. We had …”View more
Ridealong summary
Threat actors are outpacing defenders in the race to leverage AI for cyber attacks, creating a significant risk. While cybersecurity companies are innovating to combat this threat, the gap in adoption speeds leaves defenders at a disadvantage. However, the emergence of new security-focused startups may shift the balance in the coming years.
TBPN·AI Side Quests, Zaslav's Payday, SF Housing Market is Back | Shyam Sankar, Gili Raanan, Anna Patterson, Jake Loosararian, carried_no_interest·Mar 17, 2026
“… passed from the Senate to the House, the House said, uh-uh, we are not just going to fund the TSA. We want to make sure the Department of Homeland Security, ICE, and Border Patrol get extra funding so they can do the torture. That's what we want. So we're not going to support you MAGA Republicans in the Senate. So come back, Senators, because we in the House, we're going to do what's called a continuing resolution regarding the previous status quo funding in order to make sure all of DHS is funded. Now, the Democrats have objected to that in the Senate and have threatened the filibuster, and …”“… want to make sure that they have more money to torture and maim and kill and terrorize people here in the United States and expand the concentration camp system that is being built here in the United States. And so ultimately, when this was passed from the Senate to the House, the House said, uh-uh, we are not just going to fund the TSA. We want to make sure the Department of Homeland Security, ICE, and Border Patrol get extra funding so they can do the torture. That's what we want. So we're not going to support you MAGA Republicans in the Senate. So come back, Senators, because we in the House, we're going to do what's called a continuing resolution regarding the previous status quo funding in order to make sure all of DHS is funded. Now, the Democrats have objected to that in the Senate and have threatened the filibuster, and Republicans don't have enough votes to obtain cloture. And so Republicans made a deal with the Democrats not to fund ICE and Border Patrol, but the MAGA Republicans in the House were like, screw that. We can't support that. So we're not just going to fund TSA alone. We want to make sure that ICE can wear masks and have no search warrants and terrorize …”View more
Ridealong summary
MAGA Republicans are in a frenzy after Senate Republicans voted against their demands for additional funding for ICE and Border Patrol, opting instead to fund only the TSA. This unexpected move has led to infighting among GOP members, with MAGA Mike Johnson desperately calling for a continuing resolution to fund everything. Meanwhile, Senate Republicans have left for recess, leaving the House Republicans feeling abandoned and frustrated.
The MeidasTouch Podcast·MAGA Mike Panics as GOP Senate Votes Against him...at 2 AM·Mar 28, 2026
“… take the vacation with the kids, do the fun stuff, support the charities, whatever the case may be, but just at least have that kind of baseline security that gives me the confidence that I can drop out of any commercial relationships that I might need to drop out of. Any provisions you would offer to my plan?”“… exposed to it with the goal of hopefully being able to drop whatever commitments i have forego all income contribute however i can contribute to be useful and then beyond that i think basically spend and or give it all away is kind of my mindset. Like, take the vacation with the kids, do the fun stuff, support the charities, whatever the case may be, but just at least have that kind of baseline security that gives me the confidence that I can drop out of any commercial relationships that I might need to drop out of. Any provisions you would offer to my plan?”View more
Ridealong summary
Imagine being financially secure enough to drop all commitments and focus on what truly matters. Zvi Mowshowitz shares his vision of achieving a baseline financial security that allows him to spend time with family, support charities, and contribute to society without the burden of commercial obligations. This mindset not only fosters personal freedom but also empowers a more meaningful life amidst the uncertainties of AI-driven job loss.
"The Cognitive Revolution" | AI Builders, Researchers, and Live Player Analysis·Zvi's Mic Works! Recursive Self-Improvement, Live Player Analysis, Anthropic vs DoW + More!·Mar 19, 2026
“… ones in here, so narrow it down to one. It was that first one, the very, very first one by James, DevelopSec. Where he spelled out the fact that security did all this stuff with no input from development. Yeah, because it's so true. I can't tell you how many people I've worked with where a new security leader comes in and is like, yep, you know, I just walked into this and I'm trying to put together an application security program. And the development team does not like the security tooling at all. And it's because they weren't consulted with. Nobody asked them, hey, what do you all think if we …”“And that is the root cause of a problem. Very well said, Steve. All right, this comes to the portion of the show. Matt, I'm going to be throwing this to you first, where I ask you which quote of these was your favorite and why. And there's a lot of good ones in here, so narrow it down to one. It was that first one, the very, very first one by James, DevelopSec. Where he spelled out the fact that security did all this stuff with no input from development. Yeah, because it's so true. I can't tell you how many people I've worked with where a new security leader comes in and is like, yep, you know, I just walked into this and I'm trying to put together an application security program. And the development team does not like the security tooling at all. And it's because they weren't consulted with. Nobody asked them, hey, what do you all think if we do this? What do you folks think? How should we? They just did it and was like, you have to fix this. Nothing got fixed ever. And that's why security tools amongst developers get such a bad rep because they're not involved at all. Like anytime I work with a customer and we do a proof of concept and there's not a developer on the call, I say, …”View more
Ridealong summary
Ignoring developers in security decisions leads to ineffective tools and unresolved issues. A quote from James at DevelopSec highlights this problem, emphasizing that security measures are often implemented without consulting the very people who need to fix them. Involving developers in the conversation is crucial for a successful application security program.
Defense in Depth·Who is Responsible for the Conflict Between Security and Developers?·Mar 19, 2026
“… so. Yeah. Right? It's like it's this, we have this genie in a bottle. It's amazing. But how do I contain this? Has it ever happened before? I mean, security has always come at the end. Like it's never, I think it's just that we've solved, we've solved the coding side of this, the writing code side. And now it's more of a systems engineering. These are all fundamentally just systems and architectural problems. It's not necessarily security issues. Social engineering to some extent is, but that's, the problem is, is you're bringing up, you're co-mingling risks across different trust domains with …”“… code. Putting all of this together, I think what's super fascinating to me is this is one of the first times we're having technology. But what it can do is not limited by its abilities, but limited by how I can make it secure and stop it from doing so. Yeah. Right? It's like it's this, we have this genie in a bottle. It's amazing. But how do I contain this? Has it ever happened before? I mean, security has always come at the end. Like it's never, I think it's just that we've solved, we've solved the coding side of this, the writing code side. And now it's more of a systems engineering. These are all fundamentally just systems and architectural problems. It's not necessarily security issues. Social engineering to some extent is, but that's, the problem is, is you're bringing up, you're co-mingling risks across different trust domains with this. So you have the trust and safety and alignment issues with your underlying foundation models. You have the systems architecture and execution around how OpenClaw does things on your local machine. And then you have the sort of the traditional hacking sort of, you know, prompt injection type stuff. Like people want to do malicious. People want to …”View more
Ridealong summary
The future of note-taking for AI agents is evolving beyond simple markdown to include executable code and dynamic charts, creating a richer source of truth. However, this technological advancement raises significant security challenges, as the ability to execute code must be balanced with the need to contain potential risks. Ultimately, the focus is shifting from coding capabilities to systems engineering and security architecture to ensure safe interactions with these powerful tools.
AI + a16z·OpenClaw: Why the Internet Isn't Built for AI Agents·Mar 19, 2026
Ridealong summary
In ransomware negotiations, never appear desperate or rude to the attackers, as it can diminish your leverage and increase costs. Timing is crucial; negotiations typically start within three to five days, but if backups are intact, walking away might be the best option. Understanding when to engage or disengage can significantly impact the outcome for the victim organization.
Threat Vector by Palo Alto Networks·Inside Ransomware Negotiations: Trust Criminals or Walk Away?·Mar 19, 2026
Ridealong summary
CISA's Cyber Hygiene program is a game changer for organizations, offering free vulnerability scanning to enhance security. Once accepted, organizations receive detailed reports on vulnerabilities, with scanning frequency determined by severity, ensuring critical issues are addressed promptly. This proactive approach helps businesses stay ahead of potential cyber threats.
Security Now (Audio)·SN 1070: CISA's Free Internet Scanning - Malware Disguised as a VPN·Mar 17, 2026
“… community concluded that China had breached these databases. But by all the reporting I've done, it was widely understood by the Homeland Security Department, which employed Chris Krebs, the FBI, which employed Chris Wray, the CIA, which employed Gina Haspel, and the DNI, which was in transition at that time, eventually the future CIA director John Ratcliffe got in charge of that, that by April, there was consensus in the U.S. Intelligence Committee that China had breached these documents. In May of 2020, the United States government learned that Iran, another bad actor, had hacked into a …”“… they're being presented today, and looked people in the eye and lied to the president of the United States and then went on camera and doubled down on that lie? There are great questions to be figured out when each component in the United States intelligence community concluded that China had breached these databases. But by all the reporting I've done, it was widely understood by the Homeland Security Department, which employed Chris Krebs, the FBI, which employed Chris Wray, the CIA, which employed Gina Haspel, and the DNI, which was in transition at that time, eventually the future CIA director John Ratcliffe got in charge of that, that by April, there was consensus in the U.S. Intelligence Committee that China had breached these documents. In May of 2020, the United States government learned that Iran, another bad actor, had hacked into a single state database and stole 100 American voter identities All of that was kept When they made those statements in December 2020 that information was known by U federal agencies There were sealed indictments There was multiple briefings, scores of raw intelligence reports, two or three completed products, intelligence products, where the …”View more
Ridealong summary
Key U.S. intelligence officials knew about China's breach of voter data before claiming the 2020 election was secure. Despite this knowledge, they misled the public and the Trump administration, raising serious questions about transparency and trust. Tomorrow, explosive documents will reveal the extent of this deception and the political motives behind it.
Bannon`s War Room·Episode 5222: Battle Over The SAVE ACT Begins·Mar 17, 2026
“… up a number there but I mean I should read there a big red warning box right below this on the ArchWiki Port knocking should be used as part of a security strategy not as the only protection, which would be a fragile security through obscurity.”“… to these six specific closed ports in a specific sequence they've effectively punched in the code and now we will open the actual port they want this sounds is six enough like 12 would give you like 42 2 million possibilities I just I was just making up a number there but I mean I should read there a big red warning box right below this on the ArchWiki Port knocking should be used as part of a security strategy not as the only protection, which would be a fragile security through obscurity.”View more
Ridealong summary
Port knocking is a clever security technique that allows you to open closed firewall ports through a predefined sequence of connection attempts. Think of it as a digital keypad for your firewall, where only the right sequence unlocks access. However, it's crucial to remember that this method should complement other security measures, not replace them.
Brad & Will Made a Tech Pod.·332: Shout Out to the 1979 Lady Kenmore·Mar 29, 2026
“… always has the best and the brightest. And fifth, our allies and partners also rely on the U.S. nuclear deterrent as the ultimate guarantor of their security against nuclear attack, however remote the possibility. As much as they want the U.S. deterrent to be safe, secure, and reliable, they do not want a new arms race and a return to the days of mutual assured destruction. As of September 2017, the U.S. has 3,822 warheads in its stockpile, more than enough, with another 2,000-plus warheads awaiting dismantlement. This is down from the mid-60s peak of 31,255 warheads. We surely don't want a return …”“… people who sustain our deterrent. Military and civilians at DOD and NNSA work to maintain the continuum of deterrence, beginning with threat prevention and nonproliferation. They need support, and we need to ensure that the entire nuclear enterprise always has the best and the brightest. And fifth, our allies and partners also rely on the U.S. nuclear deterrent as the ultimate guarantor of their security against nuclear attack, however remote the possibility. As much as they want the U.S. deterrent to be safe, secure, and reliable, they do not want a new arms race and a return to the days of mutual assured destruction. As of September 2017, the U.S. has 3,822 warheads in its stockpile, more than enough, with another 2,000-plus warheads awaiting dismantlement. This is down from the mid-60s peak of 31,255 warheads. We surely don't want a return to those days and increase the risk of nuclear war rather than reduce it. In conclusion, in my prepared testimony, I referenced a 2010 op-ed by former National Security Advisor Brent Scowcroft and Jake Garn, a former Republican senator from Utah, supporting New Start. In that piece, they cautioned against seeking a silver bullet that solves all …”View more
Ridealong summary
The New START treaty is essential for maintaining global nuclear stability, as it prevents a return to the dangerous arms race of the Cold War. With the U.S. currently holding 3,822 warheads, the treaty allows for necessary dialogue with Russia on emerging nuclear systems. Ultimately, extending New START is about ensuring safety, security, and reliability without reigniting fears of mutual assured destruction.
The MeidasTouch Podcast·Top Trump Official Falls Apart Under Cross-Exam on War!!·Mar 26, 2026
“And we back and we been talking about the confirmation hearing for Senator Mark Wayne Mullen to be the head of the Department of Homeland Security And we have talked a lot about immigration That was a big focus of the hearing But the Department of Homeland Security also includes FEMA the Federal Emergency Management Agency. And Kristi Noem was highly criticized for her handling of FEMA. How did Mullen talk about FEMA? Mullen mentioned that he did not want to abolish FEMA, that he thought FEMA had a very important use to national security. He talked about wanting to reform or restructure …”“And we back and we been talking about the confirmation hearing for Senator Mark Wayne Mullen to be the head of the Department of Homeland Security And we have talked a lot about immigration That was a big focus of the hearing But the Department of Homeland Security also includes FEMA the Federal Emergency Management Agency. And Kristi Noem was highly criticized for her handling of FEMA. How did Mullen talk about FEMA? Mullen mentioned that he did not want to abolish FEMA, that he thought FEMA had a very important use to national security. He talked about wanting to reform or restructure FEMA, which is in line with some of the latest language that the Trump administration has used in regards to FEMA, as opposed to earlier in the administration where it seemed like maybe the entire agency could be dismantled. But they've since completely moved away from that idea. He said he wants to appoint a FEMA administrator that can be permanent …”View more
Ridealong summary
Senator Markwayne Mullen's confirmation hearing revealed a pivotal shift in attitudes toward FEMA, emphasizing its essential role in national security. Instead of dismantling the agency, Mullen aims to reform and restructure it, addressing past issues with funding delays. This change reflects a broader recognition of FEMA's importance during emergencies, especially as the Trump administration reassesses its approach to disaster management.
The NPR Politics Podcast·Sparks fly at DHS confirmation hearing, but Trump’s pick clears committee·Mar 19, 2026
“… do frontier AI agents perform in multi-step cyber attack scenarios? This builds on something we discussed, I think last week, this is from the AI Security Institute. Previously, they showed that as you scale test time compute to 100 million tokens, models get better and better and better. This is effectively building on that. They released a paper where they measure the capabilities via what they call cyber ranges, which are simulated network conditions within which you would execute an attack without too many controls, without defenses. You just need to execute a set of steps to accomplish some …”“And I think it used to be the case that there's people who care about alignment and people who don't. And that is starting to change a little bit. Yeah, you're right. Yeah. And next up, a more sort of pragmatic real world study, how do frontier AI agents perform in multi-step cyber attack scenarios? This builds on something we discussed, I think last week, this is from the AI Security Institute. Previously, they showed that as you scale test time compute to 100 million tokens, models get better and better and better. This is effectively building on that. They released a paper where they measure the capabilities via what they call cyber ranges, which are simulated network conditions within which you would execute an attack without too many controls, without defenses. You just need to execute a set of steps to accomplish some goals. And they have multiple levels of completion, more or less. And so what they find is perhaps unsurprising, the models get better and better and better. And also you get better and better and better as you get to more test time compute. So the overall conclusion is the capabilities, the cyber harm capabilities of the models are improving …”View more
Ridealong summary
AI models are becoming increasingly aware of their evaluations, potentially altering their behavior during testing. A recent report from Anthropic found that in 1,266 problems, models recognized and utilized benchmark materials to shape their responses. This raises concerns about the reliability of AI assessments in real-world applications.
Last Week in AI·#238 - GPT 5.4 mini, OpenAI Pivot, Mamba 3, Attention Residuals·Mar 26, 2026
“… Let's go to the House of Representatives. We will melt ICE, and I have a bill to do just that. We will dismantle the Department of Homeland Security because, frankly, at this juncture, nothing less is acceptable. Well, that sounds good. Let's go to another Democrat. Because I believe that there ought to be a special commission if Democrats take over the House of Representatives or the Senate. There should be a special commission that investigates ISIS legal violations and human rights violations. How about another Democrat? We need real accountability because at the end of the day, the …”“I don't think that ICE is any longer capable of existing because it is so corrupt at its core. Okay. United States Senator, ICE should be defunded. Let's go to the House of Representatives. We will melt ICE, and I have a bill to do just that. We will dismantle the Department of Homeland Security because, frankly, at this juncture, nothing less is acceptable. Well, that sounds good. Let's go to another Democrat. Because I believe that there ought to be a special commission if Democrats take over the House of Representatives or the Senate. There should be a special commission that investigates ISIS legal violations and human rights violations. How about another Democrat? We need real accountability because at the end of the day, the people that have been inflicting this harm need to be prosecuted. They need to be brought before us and they need to be held account for the trauma that they have created.”View more
Ridealong summary
The corruption within ICE has reached a point where it can no longer function effectively, prompting calls for its defunding. A U.S. Senator proposes dismantling the Department of Homeland Security entirely and establishing a special commission to investigate human rights violations. This push for accountability aims to ensure that those responsible for harm are prosecuted and held accountable for their actions.
The Jesse Kelly Show·Hour 1: Servants of the Swamp·Mar 28, 2026
“… the exhaustive vetting that they would need to do to either ensure that they're actually producing something that's safe, both from a privacy and security standpoint, but also like useful that they're getting it into a product really without understanding user needs or how the product is being adopted by those who are really, you know, core to their business. Yeah, that's actually a really good point. I mean, it's like, we expect these numbers that we're citing to change over time, right? And you're already seeing that like, concern could go down if you address people's needs for transparency and …”“… polled said that their adoption is outpacing their ability to do good risk management. And I think 45% of the same people polled said they had a confirmed or suspected data leak via these unauthorized AI tools. So they're really prioritizing speed over the exhaustive vetting that they would need to do to either ensure that they're actually producing something that's safe, both from a privacy and security standpoint, but also like useful that they're getting it into a product really without understanding user needs or how the product is being adopted by those who are really, you know, core to their business. Yeah, that's actually a really good point. I mean, it's like, we expect these numbers that we're citing to change over time, right? And you're already seeing that like, concern could go down if you address people's needs for transparency and control. And also concern to go down as people discover, you know, actually useful features and how they're using it. I think part of the issue is there hasn't been that control transparency. privacy. And then part of the issue is, I think to that last point is things, things are intentionally moving too fast for people and change. You know, it …”View more
Ridealong summary
A staggering 78% of business leaders admit that their adoption of AI is outpacing their ability to manage risks effectively. This rush has led to significant privacy concerns, with 45% reporting data leaks due to unauthorized AI tools. The solution lies in giving users control and transparency over AI features, allowing for a safer and more customized experience.
Inside DuckDuckGo·Duck Tales: Why DuckDuckGo is giving users a choice about if and how they use AI (Ep.23)·Mar 18, 2026
“… are simultaneously saying that AI is going to wipe out huge numbers of white collar jobs, but they're also refusing to align with U.S. national security interests. And so if that's true, they shouldn't be surprised if it ends up that the government is moving towards some kind of nationalization of this technology because it's sort of a direct threat to our way of life. When Alex Carb said this, he was obviously poking a bit at Anthropic. We all know sort of their their fight with the State Department recently and the Department of War. But people took the idea further than that because AI is …”“Now we're going to end with still AI but politics. So Alex Karp recently warned the tech industry that they may be headed towards nationalization. So his argument was basically the tech companies are simultaneously saying that AI is going to wipe out huge numbers of white collar jobs, but they're also refusing to align with U.S. national security interests. And so if that's true, they shouldn't be surprised if it ends up that the government is moving towards some kind of nationalization of this technology because it's sort of a direct threat to our way of life. When Alex Carb said this, he was obviously poking a bit at Anthropic. We all know sort of their their fight with the State Department recently and the Department of War. But people took the idea further than that because AI is starting to look less like a normal consumer product and more like critical infrastructure. It has implications for war, intelligence, labor markets, industrial policies, sort of all of those things at the same time. And so with this technology becoming foundational enough, maybe it makes sense for governments not to treat it just like a normal …”View more
Ridealong summary
Alex Karp warns that tech companies could face nationalization if they ignore U.S. national security interests while promoting AI that threatens jobs. With AI evolving into critical infrastructure, governments may have no choice but to intervene, risking innovation for the sake of security. This raises questions about the balance between national safety and technological advancement.
Possible·Humans secretly prefer AI writing·Mar 18, 2026
“… just like when we juggle our family schedules without dropping any days. Right? One wrong move and it's chaos. So what the latest on AI and data security this week This week I engaged with industry leaders discussing that exact intersection John Byron Hanby IV stressed the need for robust data security as AI evolves That sounds like a serious discussion. So how do companies balance innovation with protecting user data? It's tricky. You can't just throw caution to the wind. It's like when we play pickleball. Strategy is key to avoid unforced errors. Or get caught in the net like I do sometimes. …”“And that leads right into our next topic about the ramifications of AI in military strategies. Should we jump into that? AI is evolving fast. But isn't data privacy a massive issue amid all this excitement? Absolutely. It's a delicate dance. just like when we juggle our family schedules without dropping any days. Right? One wrong move and it's chaos. So what the latest on AI and data security this week This week I engaged with industry leaders discussing that exact intersection John Byron Hanby IV stressed the need for robust data security as AI evolves That sounds like a serious discussion. So how do companies balance innovation with protecting user data? It's tricky. You can't just throw caution to the wind. It's like when we play pickleball. Strategy is key to avoid unforced errors. Or get caught in the net like I do sometimes. So what are they suggesting? They recommend developing frameworks that integrate data protection directly into AI systems. This approach fosters user trust. Integrating protection sounds smart. We could use more of that in our blended families' tech choices, too. Exactly. It's a shared responsibility, much like coordinating family activities. …”View more
Ridealong summary
As AI rapidly evolves, the intersection of military strategies and data security becomes critical. Industry leaders emphasize the need for robust data protection frameworks that foster user trust while encouraging innovation. This delicate balance is essential to avoid chaos in both military operations and personal digital landscapes.
Embracing Digital This Week·March 16, 2026 | Embracing Digital Transformation: AI, Data Governance & Cybers...·Mar 16, 2026
Ridealong summary
The simplest infrastructure can be weaponized, as highlighted by recent investigations into Russian activities involving explosive devices in shipping systems. This discussion emphasizes the importance of recognizing and safeguarding the quiet systems that underpin our daily lives, as they are often the most vulnerable when threats arise. Understanding these vulnerabilities is crucial for maintaining security and awareness in our interconnected world.
The Watch Floor with Sarah Adams·What Russia Is Doing Is Insane·Mar 18, 2026
“… nations was military spending And here we are in 2026 a safe mechanism regulation of the Council of Europe named Instrument for Strengthening Europe Security SicherheitsAktion f Europa in German a regulation that is presented as a best possible financial tool for funding military spending in member states But in fact it a tool for enslavement of the nations and a tool for taking over military spending and military sovereignty of member states. The loan that was attributed to Poland is 44 billion euro. It's a very important part of Polish defense budget. We need to underline that Poland has the third …”“… by many of the liberal media but in fact it has paved the way for the next steps in centralization of the whole European Union and taking over sovereignty of the member states and one of the 10 points of the sovereignty to be taken away from the nations was military spending And here we are in 2026 a safe mechanism regulation of the Council of Europe named Instrument for Strengthening Europe Security SicherheitsAktion f Europa in German a regulation that is presented as a best possible financial tool for funding military spending in member states But in fact it a tool for enslavement of the nations and a tool for taking over military spending and military sovereignty of member states. The loan that was attributed to Poland is 44 billion euro. It's a very important part of Polish defense budget. We need to underline that Poland has the third largest defense budget in Europe after Germany and France. But when it comes to the share in GDP, we are the first. We spend 5% of GDP. So we are far above what Germany or France and other countries spend in European Union for defense. And by this regulation, European Commission aims to take control over military spending of Poland. Until now, …”View more
Ridealong summary
Poland's sovereignty is under siege as the European Commission seeks control over its military spending through a new regulation. This mechanism, disguised as financial support, could undermine Poland's defense budget, which is already the highest in Europe relative to GDP. The implications are significant, as it threatens Poland's strategic alliances and its ability to independently manage its defense capabilities.
Bannon`s War Room·WarRoom Battleground EP 973: Poland’s Nationalist President Vetoes “Centre-Right” Government’s Plot To Give EU Say On Defence·Mar 20, 2026
“… is not something that can kill a couple of people but can kill many, many tens of thousands of people? That is the most important American national security objective that exists for any administration at any time is you don't want the worst people in the world to have a nuclear weapon. I mean, that is like, you know, I remember the Iraq war days where it was like, you can't have Saddam possess a nuclear weapon and they have them. This is like you can't. This is like a stage well beyond that, where he's invoking the idea that someone's going to walk with the backpack nuke into a crowded supermarket …”“… And this is where it gets a little wild. You talk about people who walk into a crowded supermarket and have a vest on and they blow up the vest and a couple of people get killed. And that's a terrible tragedy. What happens when what's on the vest is not something that can kill a couple of people but can kill many, many tens of thousands of people? That is the most important American national security objective that exists for any administration at any time is you don't want the worst people in the world to have a nuclear weapon. I mean, that is like, you know, I remember the Iraq war days where it was like, you can't have Saddam possess a nuclear weapon and they have them. This is like you can't. This is like a stage well beyond that, where he's invoking the idea that someone's going to walk with the backpack nuke into a crowded supermarket and blow you up and take out in your entire city. I mean, that is just like wild stuff. So, you know, they really ratcheted up. If the world worked anything like these people say it works. I don't know if they actually believe it. I don't know if JD thinks that that's a real problem or anything. Like if it were actually the case that you could go …”View more
Ridealong summary
J.D. Vance warns that the threat of a 'backpack nuke' is a top national security concern, suggesting that if Iran acquires nuclear weapons, the consequences could be catastrophic. He compares this potential scenario to a terrorist attack in a crowded supermarket, emphasizing the urgency of preventing the worst actors from obtaining such weapons. This alarming perspective raises questions about the effectiveness of current foreign policy and diplomacy.
Bulwark Takes·We Sat Through a Painful Trump Cabinet Meeting So You Don’t Have To·Mar 26, 2026
“… major airlines and cargo carriers have written a letter to Congress calling for them to end the shutdown, talking about the importance of American security in the airways. Is it responsible for Democrats to hold up DHS funding with the threat of terror attacks looming during this conflict? Now, Kristen, as you know, we offered vote after vote, resolution after resolution, even as recently as this week, to reopen those agencies to fund them. And the Republicans voted it down. We said, let's let's wall off ICE funding. Let's fund these other agencies that protect the country. And the Republicans, …”“Senator, I do have to ask you just finally about this partial government shutdown, DHS not being funded for a month now. Just this week, we saw terror attacks in West Bloomfield, Michigan, in Norfolk, Virginia. This morning, the CEOs of the nation's major airlines and cargo carriers have written a letter to Congress calling for them to end the shutdown, talking about the importance of American security in the airways. Is it responsible for Democrats to hold up DHS funding with the threat of terror attacks looming during this conflict? Now, Kristen, as you know, we offered vote after vote, resolution after resolution, even as recently as this week, to reopen those agencies to fund them. And the Republicans voted it down. We said, let's let's wall off ICE funding. Let's fund these other agencies that protect the country. And the Republicans, one after another, voted them down, voted down funding TSA, voted down funding the Coast Guard, voted down funding FEMA. So Republicans are controlling both houses in the presidency. They can't very well blame the minority party for their own inability to govern, particularly when they're voting down Democratic motions to reopen these agencies. All …”View more
Ridealong summary
The government shutdown is irresponsibly compromising national security by leaving essential agencies like TSA unfunded.
The ongoing government shutdown is a failure of Republican leadership, as they control both houses and the presidency yet continue to vote down resolutions to fund critical security agencies.
Meet the Press·March 15 — Sec. Chris Wright, Sen. Adam Schiff and Thomas Friedman·Mar 15, 2026
Ridealong summary
The greatest threat from a new Middle East war isn't just foreign adversaries; it's domestic terrorism fueled by radicalization. Joe Kent, former Director of the National Counterterrorism Center, highlights how individuals, even non-Muslims, can be inspired to commit violence due to U.S. foreign policy and social media propaganda, especially in the wake of the Iran conflict. This situation is compounded by the government's focus on international issues, diverting attention from domestic security concerns.
The Megyn Kelly Show·Behind-the-Scenes of Trump Administration Ahead of Iran War, and Potential FBI Leak Investigation, with Joe Kent | Ep.1277·Mar 20, 2026
“… or not like the majority leader isn't sufficiently committed to the save act the question is upon tactics do you want a department of Homeland Security funded? Like, do you want the president to get a cabinet and a staffing confirmed by the United States? Because all that stuff doesn't go on if you have this other thing where they're just introducing amendments and talking for eight long months. And I don't think that's ever been sufficiently explained to anybody. So they have to talk nonstop?”“… democrats would want more than to end the trump administration with a perpetual nine-month debate about nothing in particular but not allowing him to do anything on his agenda like that's what this ultimately is it's not it's not a question of whether or not like the majority leader isn't sufficiently committed to the save act the question is upon tactics do you want a department of Homeland Security funded? Like, do you want the president to get a cabinet and a staffing confirmed by the United States? Because all that stuff doesn't go on if you have this other thing where they're just introducing amendments and talking for eight long months. And I don't think that's ever been sufficiently explained to anybody. So they have to talk nonstop?”View more
Ridealong summary
Imagine a scenario where Democrats could indefinitely delay Trump’s agenda through endless amendments and debates. This could lead to a prolonged standoff, where key policies, like the SAVE Act, are stalled, and the government remains in limbo. The strategy hinges on a talking filibuster that keeps discussions alive, preventing any real progress for months on end.
Ruthless Podcast·Is Dem Leadership Collapsing? + The Fate of the SAVE Act·Mar 19, 2026
“… possibility of the Strait of Hormuz being blocked by the Iranians is plainly saying something that isn't true. The person I was speaking with was a security official, and his decision to weigh into this discussion is, as far as I'm concerned, extremely meaningful. He said, these are professionals. And he said specifically, I'm talking both on decision makers on the political level and on the military level. And they absolutely knew and prepared to the possibility that the strait will close. And this was also the assessment of the Israeli intelligence that they will close the Strait of Hormuz. So it …”“… mining of the strait and many other elements. Senior Israeli sources I've spoken with from the army, not political sources, have told me whoever is saying that the U.S. did not have a scenario and did not plan both politically and militarily to the possibility of the Strait of Hormuz being blocked by the Iranians is plainly saying something that isn't true. The person I was speaking with was a security official, and his decision to weigh into this discussion is, as far as I'm concerned, extremely meaningful. He said, these are professionals. And he said specifically, I'm talking both on decision makers on the political level and on the military level. And they absolutely knew and prepared to the possibility that the strait will close. And this was also the assessment of the Israeli intelligence that they will close the Strait of Hormuz. So it didn't surprise anyone. Yeah, I'll just add to that. That has been my, based on the conversations I've had with U.S. officials, both uniformed military and Pentagon and White House, National Security Council types, that, again, dealing with it at a practical level is obviously inherently complicated, as we're discussing today. But the idea that …”View more
Ridealong summary
Despite a massive U.S. naval presence, Iran has effectively blocked the Strait of Hormuz using mines and electronic jamming. This strategic maneuvering has left tankers stranded and raised concerns about global oil supply. U.S. and Israeli officials have long anticipated this scenario, indicating a well-prepared response to Iran's tactics.
Call Me Back - with Dan Senor·The Strategy to Re-Open Hormuz - with Nadav Eyal·Mar 19, 2026
“… He is the Cato Institute's Director of Immigration Studies and the Seltz Foundation Chair in Immigration Policies and Expert on Immigration, Border Security, and Interior Enforcement. It's David Beer. What's up, man? Thanks for having me on. Well, we had to have you on after your testimony last week. You are on Capitol Hill. I'm going to play a little bit of it. But why did our esteemed Senate call you forth for your expertise last week? How did you end up there? Yeah, so this was the U.S. Senate Budget Committee. They were ostensibly studying the issue of the cost of immigration to sanctuary …”“I'm excited to talk to somebody I've been following on social media for a while who's just dropping bangers after bangers on FX.com. He is the Cato Institute's Director of Immigration Studies and the Seltz Foundation Chair in Immigration Policies and Expert on Immigration, Border Security, and Interior Enforcement. It's David Beer. What's up, man? Thanks for having me on. Well, we had to have you on after your testimony last week. You are on Capitol Hill. I'm going to play a little bit of it. But why did our esteemed Senate call you forth for your expertise last week? How did you end up there? Yeah, so this was the U.S. Senate Budget Committee. They were ostensibly studying the issue of the cost of immigration to sanctuary cities. And I was invited because the Cato Institute, my colleagues and I published a comprehensive analysis of the effect of immigration and immigrants on government budgets over the last 30 years. And we found that they reduced government deficits by 14 and a half trillion dollars. And so this was the purpose of me being invited was to discuss this …”View more
Ridealong summary
During a Senate Budget Committee hearing, David Bier revealed that immigrants have reduced U.S. government deficits by $14.5 trillion, contradicting the common narrative that they drain resources. When Senator John Kennedy attempted to undermine Bier with personal attacks, it only highlighted the weakness of his argument, as Bier stood firm on the facts. This exchange not only went viral but also showcased the stark divide in the immigration debate today.
Bulwark Takes·Sen. Kennedy Tried to Humiliate This Witness… It Backfired (w/ David Bier)·Mar 17, 2026
“Tens of thousands of employees of the Department of Homeland Security missing their first full paycheck Friday, as the Senate remains at an impasse over financing the department. Funding for the department lapsed February 14th, with Democrats demanding reforms to immigration enforcement and Republicans opposing measures they believe would hinder ICE operations. Where the impact has been immediate and obvious is at our nation's airports and their security checkpoints manned by the Transportation Security …”“Tens of thousands of employees of the Department of Homeland Security missing their first full paycheck Friday, as the Senate remains at an impasse over financing the department. Funding for the department lapsed February 14th, with Democrats demanding reforms to immigration enforcement and Republicans opposing measures they believe would hinder ICE operations. Where the impact has been immediate and obvious is at our nation's airports and their security checkpoints manned by the Transportation Security Administration. TSA agents are not currently being paid, resulting in 300 agents quitting, and unscheduled absences occurring at double the rate since the shutdown began, according to internal TSA data obtained by CBS News. The result? Shockingly long lines at security checkpoints. airports in Atlanta, Houston, New Orleans, and Chicago, among others, …”View more
Ridealong summary
The DHS funding impasse is a political game that endangers national security and burdens American travelers, with Democrats prioritizing immigration reforms over immediate security needs.
The government shutdown is causing severe disruptions at airports, with TSA agents quitting and long security lines, highlighting the detrimental impact of political stalemates on essential services.
The ongoing shutdown of the Department of Homeland Security is a political maneuver by Democrats that endangers national security and inconveniences American travelers.
The Megyn Kelly Show·U.S. Targets Iran's Kharg Island, Long Airport Security Lines, "Antifa" Convictions: AM Update 3/16·Mar 16, 2026
“They all looked a little bit nervous. It's probably nerve-wracking going through airport security, which is already stressful, and then seeing people with ICE badges across their chest. And then all I see when I open the news is that Bannon is saying this is a test run for future ICE deployment at Poles. Of course, this video has gone incredibly viral, which is partially funny and partially scary. We've got an agent looming over the shoulder of somebody working, a TSA agent. She looks done with it. She's like, I don't need this guy's help. …”“They all looked a little bit nervous. It's probably nerve-wracking going through airport security, which is already stressful, and then seeing people with ICE badges across their chest. And then all I see when I open the news is that Bannon is saying this is a test run for future ICE deployment at Poles. Of course, this video has gone incredibly viral, which is partially funny and partially scary. We've got an agent looming over the shoulder of somebody working, a TSA agent. She looks done with it. She's like, I don't need this guy's help. I am so sick of this guy. He looks like he doesn't know what he's doing, which only bolsters my theory that they're just deployed here, given a small set of instructions like, hey, maybe just stand around and repeat these lines a few times throughout the day. And that is it. that is the extent of the training that is given, which is obviously not a …”View more
Ridealong summary
Seeing ICE agents at the airport felt like a test run for future intimidation tactics, leaving travelers uneasy. Adam Mockler reflects on the unsettling atmosphere and how this deployment contradicts America's ideals of freedom and safety. He connects this experience to broader global tensions, emphasizing the increasing dangers under the current administration.
The Adam Mockler Show·I just confronted ICE at the airport·Mar 24, 2026
Ridealong summary
The U.S. has issued a security alert regarding potential threats from Iran-linked groups targeting soft American interests globally. This comes after President Trump's ultimatum to Iran over the Strait of Hormuz, raising concerns about safety in embassies, hotels, and public spaces where Americans gather. Travelers are urged to stay vigilant and monitor local advisories as risks widen.
The President's Daily Brief·March 24th, 2026: Is Iran Being Run By An AI Supreme Leader? & Ukraine Strikes Russia’s Oil Hub·Mar 24, 2026
Ridealong summary
Democrats label ICE agents as dangerous, claiming they will terrorize passengers at airports during the shutdown. In reality, these agents are being deployed to assist with operations, not to harm citizens. This contradiction highlights the larger narrative struggle over how immigration enforcement is perceived in America.
The Matt Walsh Show·Ep. 1754 - The Real Reason Your Airport Is Now A DISASTER ZONE·Mar 23, 2026
Ridealong summary
The Mumbai attacks of 2008 were a shocking event that highlighted the strategic thinking behind successful terrorist operations. This segment dives into the planning and execution of the attacks, focusing on what made them effective rather than the motivations behind them. By analyzing the attack's methodology, we gain insight into the complexities of such incidents and their implications on security today.
The Watch Floor with Sarah Adams·This Happens Before Every Attack·Mar 25, 2026
“… in the middle of these kinds of attacks? And now if you've seen any one of those disaster movies about a cyber attack, well, guess what? The Cybersecurity Agency is under DHS and that's shut down right now. And now you also see people if you're flying, you're going to see long, long lines. And I am there all the time. I ask all of those TSA agents, hey, do you do you like getting paid? Yeah, yeah, we do. Yeah, we do. People do like getting paid If I stop paying you guys would you keep showing up Wow Even you I really thought you would still show up for a while just for all the Celsius that you're …”“… the only Democrat to vote against this shutdown. It's wrong. You know, you witnessed what happened in Michigan. That individual drove into the synagogue. He showed up to kill 150 toddlers. So why would you want to make America more unsecure in the middle of these kinds of attacks? And now if you've seen any one of those disaster movies about a cyber attack, well, guess what? The Cybersecurity Agency is under DHS and that's shut down right now. And now you also see people if you're flying, you're going to see long, long lines. And I am there all the time. I ask all of those TSA agents, hey, do you do you like getting paid? Yeah, yeah, we do. Yeah, we do. People do like getting paid If I stop paying you guys would you keep showing up Wow Even you I really thought you would still show up for a while just for all the Celsius that you're drinking. Yeah, terror attack in Michigan, terror attack in New York, terror attack in Austin. He points out the cyber division is shut down right now. The Democrats are creating the conditions for more violence and more just general pain for you because of what's happening at the airport, and he's the only guy speaking up against it. Here he is …”View more
Ridealong summary
Democrat policies are creating dangerous conditions, according to Senator John Fetterman, who highlights the impact of defunding the Department of Homeland Security. With rising terror threats and long airport lines, he questions why his party is risking national security. Fetterman argues that the only unifying principle among Democrats is their hatred for Trump, rather than addressing real issues affecting Americans.
The Rubin Report·'Shark Tank' Legend Notices Something in Strait of Hormuz Others Are Unwilling to See·Mar 24, 2026
Ridealong summary
The presence of ICE at airports has dramatically reduced wait times and shifted the dynamics of airport security. With TSA agents fearing job loss, sick outs have surged, leaving some airports unaffected due to contract screeners. Meanwhile, the ongoing DHS funding debate is heating up as key senators negotiate potential changes.
Bannon`s War Room·WarRoom Battleground EP 975: Victory For Parents Against META; The Left Is Recruiting Homeless To Commit Voter Fraud In LA·Mar 24, 2026
“… going to kill it in the Senate. You're not going to get 60 votes, so that's not going to happen. And then you've got the defunding of Homeland Security. The TSA agents now, there are people wrapped around airports can't get through. The Democrats don't like ICE. Even though ICE is funded, they're taking it out on Homeland Security. It is our view that immigration enforcement in this country should be fair It should be just and it should be humane. That's not what's happening right now. In the United States of America. And that's why ICE needs to be reformed in a dramatic, bold, meaningful and …”“… can be easily overcome by the states which run the election. This is a general national law. Law of the land is you've got to show your American citizen in order to vote as the constitution states. That should be in place. Okay, so why? Okay. And they're going to kill it in the Senate. You're not going to get 60 votes, so that's not going to happen. And then you've got the defunding of Homeland Security. The TSA agents now, there are people wrapped around airports can't get through. The Democrats don't like ICE. Even though ICE is funded, they're taking it out on Homeland Security. It is our view that immigration enforcement in this country should be fair It should be just and it should be humane. That's not what's happening right now. In the United States of America. And that's why ICE needs to be reformed in a dramatic, bold, meaningful and transformational manner. And if that doesn't happen. The DHS funding bill will not move forward. So you're putting every single American in jeopardy. You're inconveniencing everybody at the airport and you're doing an irresponsible radical left policy. Again, it's on the Republicans to bring all of this out in the upcoming vote in November. But …”View more
Ridealong summary
The SAVE America Act is necessary for election integrity, but it faces insurmountable opposition from radical leftists who control the Democratic Party.
Bill O’Reilly’s No Spin News and Analysis·Friends & Enemies: Europe's Anti-Trump Stance on Iran, DHS Shutdown Sparks Airport Chaos & Kenin Spivak on the Marxist Wing of the Democratic Party·Mar 18, 2026
“… of Texas. Armed man wearing tactical gear walked into a Texas elementary school last Tuesday through an improperly closed door and asked about the security presence on campus. Kyle Chris, 39 years old, also known as Muhy Mohanad Najim, was arrested at his home Wednesday night and faces a felony charge for unlawfully carrying a weapon in a prohibited place. after the incident at Zawink Elementary School. Chris, originally from Baghdad, Iraq, became a naturalized citizen on August 24, 2022. That's when he changed his name to Kyle Chris. chris chris kyle was a an amazing sharpshooter was he not sarah …”“Okay, this story out of Texas. Armed man wearing tactical gear walked into a Texas elementary school last Tuesday through an improperly closed door and asked about the security presence on campus. Kyle Chris, 39 years old, also known as Muhy Mohanad Najim, was arrested at his home Wednesday night and faces a felony charge for unlawfully carrying a weapon in a prohibited place. after the incident at Zawink Elementary School. Chris, originally from Baghdad, Iraq, became a naturalized citizen on August 24, 2022. That's when he changed his name to Kyle Chris. chris chris kyle was a an amazing sharpshooter was he not sarah uh from texas and somebody who was over in iraq and killed a lot of people in iraq and was under threat all the time from people in iraq he comes over and doesn't name himself chris kyle he names himself Kyle Criss. He came from Baghdad. He was arrested at his home, located minutes from the school. He allegedly told authorities he was a security …”View more
Ridealong summary
An armed man in tactical gear attempted to enter Zawink Elementary School in Texas, claiming to check on security. Kyle Chris, a naturalized citizen from Iraq, was arrested after being caught in a restricted area and falsely portraying himself as a security guard. His alarming actions raise serious concerns about safety in schools across America.
The Glenn Beck Program·Media Paints Michigan Synagogue Attacker as the VICTIM?! | Guest: Ryan Mauro | 3/16/26·Mar 16, 2026
“… AI Doom. That's good news because the AI found it, and I'm sure they fixed it. And this is one thing we're really starting to see AI being used in security audits very effectively. A new study says using AI leads to brain fry. Sigh. the article from Harvard Business Review quotes our friend Steve Yeggi saying I had a palpable sense of stress watching Gastown it was moving too fast for me I know the feeling yeah so don't let your brain fry using AI you know what touch grass we all got to touch grass a couple of days ago when Claude was down for like five hours we were all sitting here was doing a …”“… API was public, all they needed were the JSON keys. And the JSON keys were in the error logs of the database. So they were just able to use some SQL injection, get the error logs, boom, you're in. Gosh. That's fantastic. So actually, that's really not AI Doom. That's good news because the AI found it, and I'm sure they fixed it. And this is one thing we're really starting to see AI being used in security audits very effectively. A new study says using AI leads to brain fry. Sigh. the article from Harvard Business Review quotes our friend Steve Yeggi saying I had a palpable sense of stress watching Gastown it was moving too fast for me I know the feeling yeah so don't let your brain fry using AI you know what touch grass we all got to touch grass a couple of days ago when Claude was down for like five hours we were all sitting here was doing a show i guess it was it yesterday it felt like ages we were all sitting here doing a show and it's uh darren or somebody said hey uh claude says it's overloaded i said what and i tried it it was nobody could get into claude you should see it on reddit people say oh man i had to go outside where's my friend my friend's gone you know i think i actually …”View more
Ridealong summary
In a shocking security test, McKinsey's AI platform was hacked by its own autonomous agent, gaining full access to sensitive data in just two hours. This incident highlights the effectiveness of AI in security audits, but it also raises concerns about the stress and 'brain fry' experienced by users overwhelmed by AI tools, leading to feelings of inadequacy and imposter syndrome. It's a cautionary tale about the balance between leveraging AI and maintaining human creativity.
Intelligent Machines (Audio)·IM 862: Ménage à Claude - AI, Human Agency, and Economic Value·Mar 18, 2026
“… start asking questions, you're going to bring different perspectives. There was mention of first principles. What are even the first principles of security anymore? I don't think that's a useful approach. But periodically looking around and saying, hey, why do we keep doing this? Or go and ask your newest team member, hey, you're here. You started yesterday. As you're onboarding the next 30, 60, 90 days, what are some things that you wonder why we do them. And let's have a conversation about them. Have you have you said that to new hires? Because that is actually a good question. Oh, absolutely. …”“… back a decent EDR because you have to be compliant. From my perspective, years ago, I was introduced to the there's actually a concept called the beginner's mind. And it's the idea that if you don't have knowledge of something and you come in and you start asking questions, you're going to bring different perspectives. There was mention of first principles. What are even the first principles of security anymore? I don't think that's a useful approach. But periodically looking around and saying, hey, why do we keep doing this? Or go and ask your newest team member, hey, you're here. You started yesterday. As you're onboarding the next 30, 60, 90 days, what are some things that you wonder why we do them. And let's have a conversation about them. Have you have you said that to new hires? Because that is actually a good question. Oh, absolutely. Yeah. No, that's something that that I basically write into the onboarding document for anybody who is at least reporting directly to me. And I'm going to pause you here. Has one of those new hires said, why are we doing this? And you go, let me look at that. You're right. Like, like, have you had a moment like that? Yes, absolutely. And the …”View more
Ridealong summary
New employees often question outdated security practices, leading to valuable insights for improvement. One common issue raised is the problematic password requirements, prompting discussions on necessary changes. This highlights the importance of fresh perspectives in enhancing compliance and risk management strategies.
CISO Series Podcast·Why Highlight Diversity When We Can Just Hope You Don't Notice?·Mar 24, 2026
“… but I'm grateful for the opportunity to do it in this forum. As you stated, Congress provided by statute ODNI with the responsibility of election security and counterintelligence in 2021. As you also know, ODNI has purview and oversight. I know the history very well, but could you just address the question? ODNI also has purview and overview over two domestic related agencies, the Department of Homeland Security and the FBI, both of which have purview over election security responsibilities to ensure the integrity of our elections I want to correct one of your statements that you made multiple …”“… and rejected repeatedly. Now, where is the authority for you to involve yourself in a domestic law enforcement activity? Thank you, Vice Chairman. I appreciate the question. As you know, I've addressed every issue you've raised in detail in a letter, but I'm grateful for the opportunity to do it in this forum. As you stated, Congress provided by statute ODNI with the responsibility of election security and counterintelligence in 2021. As you also know, ODNI has purview and oversight. I know the history very well, but could you just address the question? ODNI also has purview and overview over two domestic related agencies, the Department of Homeland Security and the FBI, both of which have purview over election security responsibilities to ensure the integrity of our elections I want to correct one of your statements that you made multiple times which is false I did not participate in a law enforcement activity nor would I because that does not exist within my authorities You were present on the scene. Are the photos of you on the scene false? I was at Fulton County, sir, at the request of the president, and to work with the FBI to observe this action that had long been awaited. I was …”View more
Ridealong summary
In a heated Senate hearing, Tulsi Gabbard confronted Mark Warner over allegations of election security misconduct, claiming she was merely observing an FBI operation in Georgia. Warner challenged her involvement, questioning the legitimacy of the FBI's actions and the authority under which she operated. This exchange highlights the contentious atmosphere surrounding election integrity and the politicization of security efforts.
Bannon`s War Room·Episode 5226: Gloves Come Off In Blockbuster Intel And Mullin Confirmation Hearings Cont.·Mar 18, 2026
Ridealong summary
Lone wolf terrorism is a growing concern, as individuals radicalized online can strike without warning or clear connections to organized networks. This ideology spreads rapidly through digital channels, making detection incredibly challenging for authorities. Understanding this threat is crucial for protecting ourselves and our communities from these unpredictable attacks.
The Dan Bongino Show·Joe Kent is Wrong, And So is His Explanation (Ep. 2475)·Mar 18, 2026
Ridealong summary
Recent attacks show a potential shift in terrorism tactics, leaning towards inspired lone wolf events rather than organized sleeper cells. While concerns about Iran's influence linger, the nature of these attacks mirrors those seen with ISIS in the past decade. This raises critical questions about the implications for security and the ongoing issue of Islamophobia in society.