Best Podcast Episodes About JetStream Security

Best Podcast Episodes About JetStream Security

Everything podcasters are saying about JetStream Security — curated from top podcasts

Updated: Apr 02, 2026 – 56 episodes
Listen to the Playlist

Ridealong has curated the best and most interesting podcasts and clips about JetStream Security.

Top Podcast Clips About JetStream Security

Meet the Press
“… enforcing the law and doing everything in our power to keep America safe Bondi is the second Trump cabinet member fired in recent weeks. Homeland Security Secretary Kristi Noem was ousted four weeks ago today. And with me now to start us off, NBC News White House correspondent Monica Alba, NBC News Chief Justice and National Affairs correspondent Kelly O'Donnell, and NBC News Capitol Hill correspondent Melanie Zanona. Thanks to all of you for being here. Monica, let me start with you at the White House. I know you've been working your sources there. So what are they telling you about the timing …” “… is being done to prosecute those rivals. Incoming acting attorney general Todd Blanche who served as President Trump personal attorney during his New York hush money trial praised Bondi on social media posting quote We will continue backing the blue enforcing the law and doing everything in our power to keep America safe Bondi is the second Trump cabinet member fired in recent weeks. Homeland Security Secretary Kristi Noem was ousted four weeks ago today. And with me now to start us off, NBC News White House correspondent Monica Alba, NBC News Chief Justice and National Affairs correspondent Kelly O'Donnell, and NBC News Capitol Hill correspondent Melanie Zanona. Thanks to all of you for being here. Monica, let me start with you at the White House. I know you've been working your sources there. So what are they telling you about the timing of this? Why did President Trump want to fire Attorney General Bondi right now? Well, Kristen, once the president makes up his mind that he wants to replace somebody in his cabinet or in his inner circle, there is a very little bit of lag time that actually takes place between that decision and the actual announcement of it. Now, sometimes people …” View more
Ridealong summary
Pam Bondi's dismissal reflects President Trump's growing frustration with her handling of high-profile cases and his impatience with the Justice Department's progress.
Meet the Press · Meet the Press NOW — April 2 · Apr 02, 2026
TBPN
Ridealong summary
Google has revealed a significant breakthrough in quantum computing that could potentially break Bitcoin's encryption by 2029. This revelation has sparked concerns among crypto developers, as they scramble to find solutions before quantum technology advances further. With major implications for cryptocurrency security, the race to quantum-proof Bitcoin is more urgent than ever.
TBPN · AI Is Coming for Your Memes, Axios NPM Package Compromised, Claude Code Source Code Leak | Alex Pruden, Qasar Younis, Sebastian Mallaby, Forrest Heath, Dino Mavrookas, Will Ahmed, Jannick Malling, Ryan Daniels, Chris Yu · Mar 31, 2026
Tech Brew Ride Home
“… soldiers Tehran can call on. The Iranians are throwing everything they have at this, said Chris Krebs, who was a former director of the Cybersecurity and Information Security Agency, one of the most senior civilian U.S. cybersecurity officials. It's all hands on deck, Krebs said. If their cyber operators are breathing, then they will be on their keyboards. Their aims vary widely from sowing fear to causing chaos, hoovering up intelligence and isolating missile targets. In the murky world of cyber warfare, it is hard to tell who even has the upper hand. But winning in cyberspace has become so …” “… has been known for years for its hacking armies, and this conflict has been no different. Quoting the FT, they may use keyboards instead of rifles, but Iran's hackers who have fought Israel in the digital shadows for years are among the most battle-hardened soldiers Tehran can call on. The Iranians are throwing everything they have at this, said Chris Krebs, who was a former director of the Cybersecurity and Information Security Agency, one of the most senior civilian U.S. cybersecurity officials. It's all hands on deck, Krebs said. If their cyber operators are breathing, then they will be on their keyboards. Their aims vary widely from sowing fear to causing chaos, hoovering up intelligence and isolating missile targets. In the murky world of cyber warfare, it is hard to tell who even has the upper hand. But winning in cyberspace has become so critical to shaping perceptions and damaging enemy morale that Iran has invested heavily in efforts to pierce American and Israeli firewalls. Iran has three different levels of cyber operators, whose boundaries are often blurry, analysts and former officials said. The most experienced are run directly by the Islamic Revolutionary Guard Corps and …” View more
Ridealong summary
Iran has declared it will start targeting major US tech companies like Apple and Google, beginning April 1st, 2023. This comes in response to accusations that these firms are aiding US military operations, and highlights Iran's extensive cyber warfare capabilities, which have previously included attacks on critical infrastructure. As tensions rise, the implications for global tech security and investments in AI are significant.
Tech Brew Ride Home · Will Iran Target Tech? · Mar 31, 2026
Proven Podcast
“… it means always incorrect we're still using it and we're still uploading vast amounts of information into it which is an absolute nightmare from a security person uh it just it's a nightmare what do you tell the organizations you're working with they're like hey yeah i know you want to work” “… expect 300 guys to stop the entire army that's coming at you. You got to get them in sources. You got to get them held. Now, I want to talk about the introduction of AI. Now, AI, we already know, doesn't mean artificial intelligence. We already know it means always incorrect we're still using it and we're still uploading vast amounts of information into it which is an absolute nightmare from a security person uh it just it's a nightmare what do you tell the organizations you're working with they're like hey yeah i know you want to work” View more
Ridealong summary
Paying ransom for your data might not guarantee recovery, and you could lose a year's worth of information if you're unprepared. MK Palmore, a cybersecurity expert, emphasizes the importance of conducting risk assessments and having immutable backups to protect against ransomware attacks. Ignoring these steps can leave your organization vulnerable to devastating data loss.
Proven Podcast · FBI Cyber Expert Saves Your Business - M.K. Palmore · Apr 01, 2026
Connections Podcast
Ridealong summary
AI has already led to the loss of 90,000 jobs in the past year, and experts warn this is just the beginning. Holly Elmore from PauseAI argues that we must create international treaties to prevent further job loss and even potential human extinction, rejecting the idea that we should simply adapt to AI's rise. The urgency of addressing these issues is clear, as the technology poses unforeseen dangers to society.
Connections Podcast · The movement to head off an AI catastrophe · Mar 30, 2026
Morning Brew Daily
“… is Iran, which the U.S. is targeting. Moving on, the long national nightmare of long national lines might soon be over. Trump directed Homeland Security to start paying TSA workers just before the weekend, even though Congress failed to agree on a path to end the partial government shutdown. That means agents could start seeing paychecks as soon as today, but don't expect the lines that TSA just snap back to normal immediately. Almost 500 TSA agents have fully quit since the funding lapse in mid-February. That is in addition to the 1,000 agents that quit during the 43-day government shutdown …” “… Iran is earning about $139 million a day from oil sales in March, up from $115 million into February. So that's around 30% more revenue. It seems like the only person benefiting, at least economically, in terms of selling their oil on the global markets is Iran, which the U.S. is targeting. Moving on, the long national nightmare of long national lines might soon be over. Trump directed Homeland Security to start paying TSA workers just before the weekend, even though Congress failed to agree on a path to end the partial government shutdown. That means agents could start seeing paychecks as soon as today, but don't expect the lines that TSA just snap back to normal immediately. Almost 500 TSA agents have fully quit since the funding lapse in mid-February. That is in addition to the 1,000 agents that quit during the 43-day government shutdown last year. Those roles won't be easy to replace. It takes four to six months to complete training. Plus, it's not like people are applying in droves for a job that increasingly gets caught up in political skirmishes leading to lost paychecks. Adam Stahl, TSA's chief of staff, said last week that the situation will get worse before it gets better, …” View more
Ridealong summary
The TSA is facing a staffing crisis, leading to record-long security lines at airports. Despite Trump’s order to restore pay for TSA workers, many have quit, resulting in a 40% call-out rate at some airports. With lengthy training processes and a lack of job security, the situation is expected to worsen before it improves.
Morning Brew Daily · Investors Lose Patience with Iran War & TSA Workers Finally Get Paid · Mar 30, 2026
The Watch Floor with Sarah Adams
“… that. So here in the U.S., think if you're in some big airport, like one of the major hubs, let's be JFK or LAX, and you see someone photographing security, that's weird. I mean, I know now all the press is doing it because we have three hour waits at TSA. So it is a little different now and it's going to be a little more complicated, but it is strange for anyone to be videoing or filming or taping anything in TSA, right? The majority of us get in and we want to get out as soon as possible. We aren't going to take a picture to remember our time at the security checkout line. Now we're going to …” “… the parade route multiple times to obviously review traffic, see where there could be, you know, ingress and egress, look where police officers were kind of congregating and setting up their posts. You know, very important to carry an attack like that. So here in the U.S., think if you're in some big airport, like one of the major hubs, let's be JFK or LAX, and you see someone photographing security, that's weird. I mean, I know now all the press is doing it because we have three hour waits at TSA. So it is a little different now and it's going to be a little more complicated, but it is strange for anyone to be videoing or filming or taping anything in TSA, right? The majority of us get in and we want to get out as soon as possible. We aren't going to take a picture to remember our time at the security checkout line. Now we're going to move on to the concept that terrorists, of course, practice ports of the attack before it occurs, right? This is famously called dry run. So they might approach entry points. They might time the peak moments of a crowd, like at a concert or a sporting event. They might check reactions to different security issues going on. Like, let's say if there's a …” View more
Ridealong summary
The 2016 Nice attack in France exemplifies how terrorists conduct reconnaissance before an attack, such as driving the parade route multiple times to assess security. In the U.S., suspicious behaviors like photographing airport security should raise alarms, as they may indicate a 'dry run' for planning a potential attack. Recognizing these early signs can help prevent future incidents.
The Watch Floor with Sarah Adams · The Government Isn’t Telling You This · Mar 31, 2026
The Watch Floor with Sarah Adams
Ridealong summary
Dating apps are being exploited in dangerous ways, as highlighted by a troubling scenario in Ukraine where Russian adversaries created fake profiles to target foreign volunteers. This alarming tactic underscores the risks associated with sharing personal information online, especially in conflict zones. A similar incident with the fitness app Strava revealed how user data could inadvertently compromise military locations, illustrating the need for caution in our digital interactions.
The Watch Floor with Sarah Adams · Your Phone Isn’t Safe Right Now · Mar 20, 2026
Ross Tucker Football Podcast: Daily NFL Podcast
Ridealong summary
The Bills struggle with their wide receiver corps, lacking a boundary X receiver to win one-on-one matchups, which hampers their passing game. Defensively, the team has improved with contributions from rookie defensive tackles Deion Walker and TJ Sanders.
Ross Tucker Football Podcast: Daily NFL Podcast · Greg Cosell: 2025 NFL Week 18 Preview Part One · Jan 01, 2026
Behind the Bastards
“Now, one thing that the world of private maritime security shows us is that neoliberal globalism is willing to look the other way a great deal and allow a great deal of violence on behalf of corporations, not on behalf of the state. When people are getting engaged by these vessels, it is to protect property. Granted, sometimes it is also to protect life. These pirates have killed people and kidnapped people and such But the state has been willing to cede its monopoly on violence at the high seas …” “Now, one thing that the world of private maritime security shows us is that neoliberal globalism is willing to look the other way a great deal and allow a great deal of violence on behalf of corporations, not on behalf of the state. When people are getting engaged by these vessels, it is to protect property. Granted, sometimes it is also to protect life. These pirates have killed people and kidnapped people and such But the state has been willing to cede its monopoly on violence at the high seas because it couldn find a good solution to this and it been willing to overlook a lot of loss of life and i just don see a way that this doesn't lead to more loss of life and that is probably what we have to look forward to it may have already begun happening in the strait of homoose between when we record this and when you hear it but it is deeply …” View more
Ridealong summary
The Maersk Alabama incident rattled the shipping industry and highlighted modern piracy's shift from theft to hostage-taking. In 2009, Somali pirates captured the U.S.-flagged ship, leading to a dramatic standoff with U.S. Navy SEALs that ended with the pirates being shot to rescue the captain. This event not only sparked fear in maritime security but also raised complex jurisdictional issues surrounding piracy.
Behind the Bastards · It Could Happen Here Weekly 224 · Mar 21, 2026
The Bobby Bones Show
Ridealong summary
In this hilarious segment, a dinner check sparks a debate about restaurant behavior, leading to a wild story of credit card hacking at a place called Poppy Garden. The punchline hits when the host discovers that even after getting hacked, he can still use Apple Pay with his new card number before it arrives!
The Bobby Bones Show · Best 7 Segments From The Bobby Bones Show This Week · Mar 21, 2026
Embracing Digital Transformation
“… in the web server and then everything was fixed. And we were pulling our hair out for over a week on that particular issue. How do you handle the security handouts? Because you mentioned the certifications and things like this. When you have so many vendors and you're actually moving data between all these vendors, there's so many questions on this one. But let's talk about security first. How do you handle the security between these? Do you have a common security design pattern that you use? Because that's a lot of vendors, 25 vendors. That's a lot. It's a lot. Yeah, for sure. So we rigorous …” “… logs okay try it now click oh and that's when it's like ah we didn't give you the new root CA here and they you know They send us the PKS file or what, I can't remember at this point. But they send us the group of certificates and we get those loaded in the web server and then everything was fixed. And we were pulling our hair out for over a week on that particular issue. How do you handle the security handouts? Because you mentioned the certifications and things like this. When you have so many vendors and you're actually moving data between all these vendors, there's so many questions on this one. But let's talk about security first. How do you handle the security between these? Do you have a common security design pattern that you use? Because that's a lot of vendors, 25 vendors. That's a lot. It's a lot. Yeah, for sure. So we rigorous risk assessments, and that's the number one thing that the NCUA is always looking for us in our regulation is the credit union performing reasonable information security risk assessments of all vendors and everything that we do. So when I first got here, we put into play just adhering to the NIST standards, the 800-DASH document on guide to risk …” View more
Ridealong summary
A week-long vendor issue was resolved when a missing encryption certificate was finally identified. This incident highlights the importance of rigorous risk assessments and adherence to NIST standards for managing security across multiple vendors. By implementing these practices, organizations can effectively mitigate risks and ensure compliance with regulatory requirements.
Embracing Digital Transformation · #337 Mastering Vendor Security in Financial Services: A 12-Year Journey · Mar 25, 2026
Mark Levin Podcast
“… And from Modesto to Monterey, from Folsom to Fresno, they are saying hell no to the way that this White House is running the Department of Homeland Security. They don't want another penny for ICE or Border Patrol. Ah, I see. Not another penny. And yet when you look at the people of Chicago, more and more of them are turning out and condemning what illegal aliens are doing to their communities. The amount of money, the amount of money that is diverted from communities that need it, with American citizens, often who are black or who are Hispanic or whatever they are, The amount of money, which is …” “… to. They're not allowed to. Go ahead. Americans in the streets, and then have Americans wait millions of hours in lines at the airports, and that we won't forget the chaos. And I can't speak for the rest of the country. I can speak for Californians. And from Modesto to Monterey, from Folsom to Fresno, they are saying hell no to the way that this White House is running the Department of Homeland Security. They don't want another penny for ICE or Border Patrol. Ah, I see. Not another penny. And yet when you look at the people of Chicago, more and more of them are turning out and condemning what illegal aliens are doing to their communities. The amount of money, the amount of money that is diverted from communities that need it, with American citizens, often who are black or who are Hispanic or whatever they are, The amount of money, which is scarce to begin with, for schooling and health care and security and all the rest of it. The amount that is drained out of American communities from American citizens and given to illegal aliens. It is a crime, in my view. It's a sin. It's a disgrace.” View more
Ridealong summary
Local police in California are restricted from sharing information with ICE, leading to chaos in communities as residents express frustration over the federal government's handling of immigration. Many citizens feel that resources are being drained from their neighborhoods to support illegal immigrants, affecting schools, healthcare, and security. This clash between local law enforcement and federal immigration policy is creating a growing divide among Californians.
Mark Levin Podcast · 3/27/26 - Memeable Christianity: When Faith Meets Gen Z Culture and Podcasters · Mar 28, 2026
TBPN
“… jump off point into the OT or critical infrastructure sector of the network. Now, to put those four pieces of data points together, you need a board security engineer, you need a red team to come in and find it for you, and they might not ever find it. even though they might spend three months trying to look for it. So that could be one of 100 attack pads that exist in your environment. So that's kind of the pre-attack latent risk piece. And then on the post-attack side, you've got data that's just being emitted from everyone's devices inside these environments. And what that data can tell you is, …” “… in the Middle East. And the reason that attack was able to go down is because no one put the pieces of the puzzle together that, hey, we've got a senior engineering dude with a system that has weak controls applied to it that also serves as a jump off point into the OT or critical infrastructure sector of the network. Now, to put those four pieces of data points together, you need a board security engineer, you need a red team to come in and find it for you, and they might not ever find it. even though they might spend three months trying to look for it. So that could be one of 100 attack pads that exist in your environment. So that's kind of the pre-attack latent risk piece. And then on the post-attack side, you've got data that's just being emitted from everyone's devices inside these environments. And what that data can tell you is, all right, all this latent risk back here, is anyone actually taking advantage of it or exploiting it? This is where this second half of the equation is where you discover that. But what we've done over the past 20 years, because I don't know, the big four consulting firms of the world have told us to do it, is we send data to these data stores like …” View more
Ridealong summary
Cyber attackers are advancing daily, while organizations struggle to keep up at human speed. To combat this, we need a cohesive command and control system for cyber defense, similar to military initiatives, to fuse data and enhance responsiveness. This shift is crucial for identifying and mitigating risks before they escalate into major breaches.
TBPN · Ellison's Media Empire, Ken Burns Joins, Cursor Mic Drop | Matthew Belloni, Gokul Rajaram, Nik Seetharaman, Raj Rajamani, James Everingham, Dr. Felix Ejeckam · Mar 03, 2026
TBPN
“… their customer base is not using these tools maliciously. the hackers sort of wind up on the lagging edge, not on the frontier, but all of the cybersecurity companies like Palo Alto Networks, like CrowdStrike, like the folks that you've had at your conference, they maintain access to the frontier, and so they're always fighting with a bigger weapon. Is that sort of the equilibrium we should expect here? That's a great question. And by the way, we did have today the two top cybersecurity experts at Antropic, the head of security and the head of product security, sharing the roadmap and thoughts …” “… this person just spent $5 million on our API and it's all cyber attack related prompts. Like, let's maybe turn them off or figure out what's going on over there. They have a huge incentive to sort of, you know, control their customer base so that their customer base is not using these tools maliciously. the hackers sort of wind up on the lagging edge, not on the frontier, but all of the cybersecurity companies like Palo Alto Networks, like CrowdStrike, like the folks that you've had at your conference, they maintain access to the frontier, and so they're always fighting with a bigger weapon. Is that sort of the equilibrium we should expect here? That's a great question. And by the way, we did have today the two top cybersecurity experts at Antropic, the head of security and the head of product security, sharing the roadmap and thoughts about the upcoming capabilities of Antropic and other platforms. I think the answer to that is our continuous investment in innovation in the space. It's not just about Weez that I mentioned or Sierra. Those are large established startups. But we did have one company going out of stealth last week, Onyx Security. All they do is agent security. We had …” View more
Ridealong summary
Threat actors are outpacing defenders in the race to leverage AI for cyber attacks, creating a significant risk. While cybersecurity companies are innovating to combat this threat, the gap in adoption speeds leaves defenders at a disadvantage. However, the emergence of new security-focused startups may shift the balance in the coming years.
TBPN · AI Side Quests, Zaslav's Payday, SF Housing Market is Back | Shyam Sankar, Gili Raanan, Anna Patterson, Jake Loosararian, carried_no_interest · Mar 17, 2026
The MeidasTouch Podcast
“… passed from the Senate to the House, the House said, uh-uh, we are not just going to fund the TSA. We want to make sure the Department of Homeland Security, ICE, and Border Patrol get extra funding so they can do the torture. That's what we want. So we're not going to support you MAGA Republicans in the Senate. So come back, Senators, because we in the House, we're going to do what's called a continuing resolution regarding the previous status quo funding in order to make sure all of DHS is funded. Now, the Democrats have objected to that in the Senate and have threatened the filibuster, and …” “… want to make sure that they have more money to torture and maim and kill and terrorize people here in the United States and expand the concentration camp system that is being built here in the United States. And so ultimately, when this was passed from the Senate to the House, the House said, uh-uh, we are not just going to fund the TSA. We want to make sure the Department of Homeland Security, ICE, and Border Patrol get extra funding so they can do the torture. That's what we want. So we're not going to support you MAGA Republicans in the Senate. So come back, Senators, because we in the House, we're going to do what's called a continuing resolution regarding the previous status quo funding in order to make sure all of DHS is funded. Now, the Democrats have objected to that in the Senate and have threatened the filibuster, and Republicans don't have enough votes to obtain cloture. And so Republicans made a deal with the Democrats not to fund ICE and Border Patrol, but the MAGA Republicans in the House were like, screw that. We can't support that. So we're not just going to fund TSA alone. We want to make sure that ICE can wear masks and have no search warrants and terrorize …” View more
Ridealong summary
MAGA Republicans are in a frenzy after Senate Republicans voted against their demands for additional funding for ICE and Border Patrol, opting instead to fund only the TSA. This unexpected move has led to infighting among GOP members, with MAGA Mike Johnson desperately calling for a continuing resolution to fund everything. Meanwhile, Senate Republicans have left for recess, leaving the House Republicans feeling abandoned and frustrated.
The MeidasTouch Podcast · MAGA Mike Panics as GOP Senate Votes Against him...at 2 AM · Mar 28, 2026
The Dan Patrick Show
Ridealong summary
The Miami Dolphins and New York Jets are both predicted to have an over/under of five and a half wins this upcoming NFL season, sparking a heated debate on who will come out on top. In a lively discussion, fans express their loyalty while weighing in on the teams' prospects, with the Dolphins facing significant scrutiny. This rivalry sets the stage for an exciting season ahead as fans place their bets.
The Dan Patrick Show · Hour 2 – Seth Greenberg, Oscars Odds · Mar 13, 2026
"The Cognitive Revolution" | AI Builders, Researchers, and Live Player Analysis
“… take the vacation with the kids, do the fun stuff, support the charities, whatever the case may be, but just at least have that kind of baseline security that gives me the confidence that I can drop out of any commercial relationships that I might need to drop out of. Any provisions you would offer to my plan?” “… exposed to it with the goal of hopefully being able to drop whatever commitments i have forego all income contribute however i can contribute to be useful and then beyond that i think basically spend and or give it all away is kind of my mindset. Like, take the vacation with the kids, do the fun stuff, support the charities, whatever the case may be, but just at least have that kind of baseline security that gives me the confidence that I can drop out of any commercial relationships that I might need to drop out of. Any provisions you would offer to my plan?” View more
Ridealong summary
Imagine being financially secure enough to drop all commitments and focus on what truly matters. Zvi Mowshowitz shares his vision of achieving a baseline financial security that allows him to spend time with family, support charities, and contribute to society without the burden of commercial obligations. This mindset not only fosters personal freedom but also empowers a more meaningful life amidst the uncertainties of AI-driven job loss.
"The Cognitive Revolution" | AI Builders, Researchers, and Live Player Analysis · Zvi's Mic Works! Recursive Self-Improvement, Live Player Analysis, Anthropic vs DoW + More! · Mar 19, 2026
Security Now (Audio)
“… company, global and regional banks and financial services organizations, universities around the world, instant messenger software companies, cybersecurity technology companies, casinos, and more. We want to take this opportunity to give our sincere thanks, they wrote, to the entities who engaged with us when we realized what we'd stumbled into, including the UK's NCSC, who helped with introductions to the correct teams for us to speak to. AWS, who took those around 150 S3 buckets off our hands to sinkhole. A major unnamed SSL VPN appliance vendor who worked with us very quickly and directly to …” “… laboratories, state governments, etc. The UK, Poland, Australia, South Korea, Turkey, Taiwan, Chile, and more. Then there were military networks and the networks of Fortune 500s, Fortune 100s, a payment card network, a major industrial product company, global and regional banks and financial services organizations, universities around the world, instant messenger software companies, cybersecurity technology companies, casinos, and more. We want to take this opportunity to give our sincere thanks, they wrote, to the entities who engaged with us when we realized what we'd stumbled into, including the UK's NCSC, who helped with introductions to the correct teams for us to speak to. AWS, who took those around 150 S3 buckets off our hands to sinkhole. A major unnamed SSL VPN appliance vendor who worked with us very quickly and directly to take relevant S3 buckets off our hands. And CISA, who very quickly remediated an example that affected CISA.gov. Wow. Yeah. Yeah. AWS's agreement to sinkhole the identified S3 buckets means that the release of this research does not increase the risk exposed to any party. The same issues discussed in this research could not be recreated against the …” View more
Ridealong summary
A single oversight in internet security could have led to catastrophic supply chain attacks involving major organizations like NASA and Fortune 500 companies. Thanks to quick action from AWS and other entities, the identified vulnerabilities were contained, preventing potential disasters. This incident highlights the dire need for better security practices in the tech industry, reminding us that not all threats are complex—sometimes, they're alarmingly simple.
Security Now (Audio) · SN 1071: Bucketsquatting - Meta and TikTok's Tracking Pixels · Mar 24, 2026
Defense in Depth
“… ones in here, so narrow it down to one. It was that first one, the very, very first one by James, DevelopSec. Where he spelled out the fact that security did all this stuff with no input from development. Yeah, because it's so true. I can't tell you how many people I've worked with where a new security leader comes in and is like, yep, you know, I just walked into this and I'm trying to put together an application security program. And the development team does not like the security tooling at all. And it's because they weren't consulted with. Nobody asked them, hey, what do you all think if we …” “And that is the root cause of a problem. Very well said, Steve. All right, this comes to the portion of the show. Matt, I'm going to be throwing this to you first, where I ask you which quote of these was your favorite and why. And there's a lot of good ones in here, so narrow it down to one. It was that first one, the very, very first one by James, DevelopSec. Where he spelled out the fact that security did all this stuff with no input from development. Yeah, because it's so true. I can't tell you how many people I've worked with where a new security leader comes in and is like, yep, you know, I just walked into this and I'm trying to put together an application security program. And the development team does not like the security tooling at all. And it's because they weren't consulted with. Nobody asked them, hey, what do you all think if we do this? What do you folks think? How should we? They just did it and was like, you have to fix this. Nothing got fixed ever. And that's why security tools amongst developers get such a bad rep because they're not involved at all. Like anytime I work with a customer and we do a proof of concept and there's not a developer on the call, I say, …” View more
Ridealong summary
Ignoring developers in security decisions leads to ineffective tools and unresolved issues. A quote from James at DevelopSec highlights this problem, emphasizing that security measures are often implemented without consulting the very people who need to fix them. Involving developers in the conversation is crucial for a successful application security program.
Defense in Depth · Who is Responsible for the Conflict Between Security and Developers? · Mar 19, 2026

Top Podcasts About JetStream Security

The Watch Floor with Sarah Adams
The Watch Floor with Sarah Adams
4 episodes
TBPN
TBPN
3 episodes
The Dan Patrick Show
The Dan Patrick Show
3 episodes
Bannon`s War Room
Bannon`s War Room
3 episodes
Pardon My Take
Pardon My Take
3 episodes
The MeidasTouch Podcast
The MeidasTouch Podcast
2 episodes
Security Now (Audio)
Security Now (Audio)
2 episodes
The Megyn Kelly Show
The Megyn Kelly Show
2 episodes

Stories Mentioning JetStream Security

Top Podcasts on Pam Bondi's Dismissal
Attorney General Pam Bondi has been fired as part of a series of staff changes within the Trump administration. This turnover highlights ongoing shifts in the administration's personnel, which could impact its policy direction and stability.
Pam Bondi
Apr 03, 2026 · 22 clips · 9 podcasts
Top Podcasts on US Government Shutdown
The United States is experiencing its longest government shutdown in history as a deal to fund the Department of Homeland Security collapses. The impasse affects various government operations and has significant implications for federal employees and services. The ongoing shutdown highlights political divisions and impacts the tech industry, particularly in areas reliant on government contracts.
Mar 31, 2026 · 11 clips · 7 podcasts
Best Podcasts on DHS Airport Disruptions
A prolonged stalemate in Congress over Department of Homeland Security (DHS) funding has led to significant disruptions, including unpaid TSA agents and widespread airport delays across the country. President Trump issued an emergency order to pay TSA workers, but the political battle between Democrats and Republicans over immigration policy and border security continues to impact national security and travel.
TSA
Mar 24, 2026 · 35 clips · 16 podcasts
Best Podcasts on TSA Shutdown Impact
Airports nationwide are experiencing severe delays and chaos due to a partial DHS government shutdown, leaving TSA agents unpaid and leading to staffing shortages. President Trump has responded by deploying ICE agents to assist with security, a move criticized by some as using American travelers as leverage in a political dispute over immigration. The situation has resulted in hours-long security lines and disrupted travel for many.
TSA Government shutdown
Mar 23, 2026 · 28 clips · 17 podcasts
Best Podcast Takes on Crosby & Murray Trades
The NFL free agency period has been active, with significant player movements and trade discussions. Key stories include quarterback Kyler Murray signing a one-year deal with the Minnesota Vikings and the Baltimore Ravens backing out of a trade for defensive end Maxx Crosby, leading to widespread speculation and analysis of team strategies.
NFL Las Vegas Raiders Maxx Crosby Kyler Murray
Mar 15, 2026 · 19 clips · 6 podcasts
Top Podcasts on SAVE America Act & Voter ID
Heated debates surrounding voter ID laws, election integrity, and the push for mass deportations are prominent in political discourse. Discussions center on the proposed "SAVE Act," which would require proof of citizenship to vote and faces strong opposition in the Senate, as well as the Trump administration's intensified immigration enforcement. Podcasts are analyzing the political motivations, practical implications, and national security aspects of these policies.
Mar 14, 2026 · 27 clips · 14 podcasts