Ridealong has curated the best and most interesting podcasts and clips about JetStream Security.
Top Podcast Clips About JetStream Security
“… enforcing the law and doing everything in our power to keep America safe Bondi is the second Trump cabinet member fired in recent weeks. Homeland Security Secretary Kristi Noem was ousted four weeks ago today. And with me now to start us off, NBC News White House correspondent Monica Alba, NBC News Chief Justice and National Affairs correspondent Kelly O'Donnell, and NBC News Capitol Hill correspondent Melanie Zanona. Thanks to all of you for being here. Monica, let me start with you at the White House. I know you've been working your sources there. So what are they telling you about the timing …”“… is being done to prosecute those rivals. Incoming acting attorney general Todd Blanche who served as President Trump personal attorney during his New York hush money trial praised Bondi on social media posting quote We will continue backing the blue enforcing the law and doing everything in our power to keep America safe Bondi is the second Trump cabinet member fired in recent weeks. Homeland Security Secretary Kristi Noem was ousted four weeks ago today. And with me now to start us off, NBC News White House correspondent Monica Alba, NBC News Chief Justice and National Affairs correspondent Kelly O'Donnell, and NBC News Capitol Hill correspondent Melanie Zanona. Thanks to all of you for being here. Monica, let me start with you at the White House. I know you've been working your sources there. So what are they telling you about the timing of this? Why did President Trump want to fire Attorney General Bondi right now? Well, Kristen, once the president makes up his mind that he wants to replace somebody in his cabinet or in his inner circle, there is a very little bit of lag time that actually takes place between that decision and the actual announcement of it. Now, sometimes people …”View more
Ridealong summary
Pam Bondi's dismissal reflects President Trump's growing frustration with her handling of high-profile cases and his impatience with the Justice Department's progress.
Meet the Press·Meet the Press NOW — April 2·Apr 02, 2026
Ridealong summary
Google has revealed a significant breakthrough in quantum computing that could potentially break Bitcoin's encryption by 2029. This revelation has sparked concerns among crypto developers, as they scramble to find solutions before quantum technology advances further. With major implications for cryptocurrency security, the race to quantum-proof Bitcoin is more urgent than ever.
TBPN·AI Is Coming for Your Memes, Axios NPM Package Compromised, Claude Code Source Code Leak | Alex Pruden, Qasar Younis, Sebastian Mallaby, Forrest Heath, Dino Mavrookas, Will Ahmed, Jannick Malling, Ryan Daniels, Chris Yu·Mar 31, 2026
“… soldiers Tehran can call on. The Iranians are throwing everything they have at this, said Chris Krebs, who was a former director of the Cybersecurity and Information Security Agency, one of the most senior civilian U.S. cybersecurity officials. It's all hands on deck, Krebs said. If their cyber operators are breathing, then they will be on their keyboards. Their aims vary widely from sowing fear to causing chaos, hoovering up intelligence and isolating missile targets. In the murky world of cyber warfare, it is hard to tell who even has the upper hand. But winning in cyberspace has become so …”“… has been known for years for its hacking armies, and this conflict has been no different. Quoting the FT, they may use keyboards instead of rifles, but Iran's hackers who have fought Israel in the digital shadows for years are among the most battle-hardened soldiers Tehran can call on. The Iranians are throwing everything they have at this, said Chris Krebs, who was a former director of the Cybersecurity and Information Security Agency, one of the most senior civilian U.S. cybersecurity officials. It's all hands on deck, Krebs said. If their cyber operators are breathing, then they will be on their keyboards. Their aims vary widely from sowing fear to causing chaos, hoovering up intelligence and isolating missile targets. In the murky world of cyber warfare, it is hard to tell who even has the upper hand. But winning in cyberspace has become so critical to shaping perceptions and damaging enemy morale that Iran has invested heavily in efforts to pierce American and Israeli firewalls. Iran has three different levels of cyber operators, whose boundaries are often blurry, analysts and former officials said. The most experienced are run directly by the Islamic Revolutionary Guard Corps and …”View more
Ridealong summary
Iran has declared it will start targeting major US tech companies like Apple and Google, beginning April 1st, 2023. This comes in response to accusations that these firms are aiding US military operations, and highlights Iran's extensive cyber warfare capabilities, which have previously included attacks on critical infrastructure. As tensions rise, the implications for global tech security and investments in AI are significant.
“… it means always incorrect we're still using it and we're still uploading vast amounts of information into it which is an absolute nightmare from a security person uh it just it's a nightmare what do you tell the organizations you're working with they're like hey yeah i know you want to work”“… expect 300 guys to stop the entire army that's coming at you. You got to get them in sources. You got to get them held. Now, I want to talk about the introduction of AI. Now, AI, we already know, doesn't mean artificial intelligence. We already know it means always incorrect we're still using it and we're still uploading vast amounts of information into it which is an absolute nightmare from a security person uh it just it's a nightmare what do you tell the organizations you're working with they're like hey yeah i know you want to work”View more
Ridealong summary
Paying ransom for your data might not guarantee recovery, and you could lose a year's worth of information if you're unprepared. MK Palmore, a cybersecurity expert, emphasizes the importance of conducting risk assessments and having immutable backups to protect against ransomware attacks. Ignoring these steps can leave your organization vulnerable to devastating data loss.
Proven Podcast·FBI Cyber Expert Saves Your Business - M.K. Palmore·Apr 01, 2026
Ridealong summary
AI has already led to the loss of 90,000 jobs in the past year, and experts warn this is just the beginning. Holly Elmore from PauseAI argues that we must create international treaties to prevent further job loss and even potential human extinction, rejecting the idea that we should simply adapt to AI's rise. The urgency of addressing these issues is clear, as the technology poses unforeseen dangers to society.
Connections Podcast·The movement to head off an AI catastrophe·Mar 30, 2026
“… is Iran, which the U.S. is targeting. Moving on, the long national nightmare of long national lines might soon be over. Trump directed Homeland Security to start paying TSA workers just before the weekend, even though Congress failed to agree on a path to end the partial government shutdown. That means agents could start seeing paychecks as soon as today, but don't expect the lines that TSA just snap back to normal immediately. Almost 500 TSA agents have fully quit since the funding lapse in mid-February. That is in addition to the 1,000 agents that quit during the 43-day government shutdown …”“… Iran is earning about $139 million a day from oil sales in March, up from $115 million into February. So that's around 30% more revenue. It seems like the only person benefiting, at least economically, in terms of selling their oil on the global markets is Iran, which the U.S. is targeting. Moving on, the long national nightmare of long national lines might soon be over. Trump directed Homeland Security to start paying TSA workers just before the weekend, even though Congress failed to agree on a path to end the partial government shutdown. That means agents could start seeing paychecks as soon as today, but don't expect the lines that TSA just snap back to normal immediately. Almost 500 TSA agents have fully quit since the funding lapse in mid-February. That is in addition to the 1,000 agents that quit during the 43-day government shutdown last year. Those roles won't be easy to replace. It takes four to six months to complete training. Plus, it's not like people are applying in droves for a job that increasingly gets caught up in political skirmishes leading to lost paychecks. Adam Stahl, TSA's chief of staff, said last week that the situation will get worse before it gets better, …”View more
Ridealong summary
The TSA is facing a staffing crisis, leading to record-long security lines at airports. Despite Trump’s order to restore pay for TSA workers, many have quit, resulting in a 40% call-out rate at some airports. With lengthy training processes and a lack of job security, the situation is expected to worsen before it improves.
Morning Brew Daily·Investors Lose Patience with Iran War & TSA Workers Finally Get Paid·Mar 30, 2026
“… that. So here in the U.S., think if you're in some big airport, like one of the major hubs, let's be JFK or LAX, and you see someone photographing security, that's weird. I mean, I know now all the press is doing it because we have three hour waits at TSA. So it is a little different now and it's going to be a little more complicated, but it is strange for anyone to be videoing or filming or taping anything in TSA, right? The majority of us get in and we want to get out as soon as possible. We aren't going to take a picture to remember our time at the security checkout line. Now we're going to …”“… the parade route multiple times to obviously review traffic, see where there could be, you know, ingress and egress, look where police officers were kind of congregating and setting up their posts. You know, very important to carry an attack like that. So here in the U.S., think if you're in some big airport, like one of the major hubs, let's be JFK or LAX, and you see someone photographing security, that's weird. I mean, I know now all the press is doing it because we have three hour waits at TSA. So it is a little different now and it's going to be a little more complicated, but it is strange for anyone to be videoing or filming or taping anything in TSA, right? The majority of us get in and we want to get out as soon as possible. We aren't going to take a picture to remember our time at the security checkout line. Now we're going to move on to the concept that terrorists, of course, practice ports of the attack before it occurs, right? This is famously called dry run. So they might approach entry points. They might time the peak moments of a crowd, like at a concert or a sporting event. They might check reactions to different security issues going on. Like, let's say if there's a …”View more
Ridealong summary
The 2016 Nice attack in France exemplifies how terrorists conduct reconnaissance before an attack, such as driving the parade route multiple times to assess security. In the U.S., suspicious behaviors like photographing airport security should raise alarms, as they may indicate a 'dry run' for planning a potential attack. Recognizing these early signs can help prevent future incidents.
The Watch Floor with Sarah Adams·The Government Isn’t Telling You This·Mar 31, 2026
Ridealong summary
Dating apps are being exploited in dangerous ways, as highlighted by a troubling scenario in Ukraine where Russian adversaries created fake profiles to target foreign volunteers. This alarming tactic underscores the risks associated with sharing personal information online, especially in conflict zones. A similar incident with the fitness app Strava revealed how user data could inadvertently compromise military locations, illustrating the need for caution in our digital interactions.
The Watch Floor with Sarah Adams·Your Phone Isn’t Safe Right Now·Mar 20, 2026
Ridealong summary
The Bills struggle with their wide receiver corps, lacking a boundary X receiver to win one-on-one matchups, which hampers their passing game. Defensively, the team has improved with contributions from rookie defensive tackles Deion Walker and TJ Sanders.
Ross Tucker Football Podcast: Daily NFL Podcast·Greg Cosell: 2025 NFL Week 18 Preview Part One·Jan 01, 2026
“Now, one thing that the world of private maritime security shows us is that neoliberal globalism is willing to look the other way a great deal and allow a great deal of violence on behalf of corporations, not on behalf of the state. When people are getting engaged by these vessels, it is to protect property. Granted, sometimes it is also to protect life. These pirates have killed people and kidnapped people and such But the state has been willing to cede its monopoly on violence at the high seas …”“Now, one thing that the world of private maritime security shows us is that neoliberal globalism is willing to look the other way a great deal and allow a great deal of violence on behalf of corporations, not on behalf of the state. When people are getting engaged by these vessels, it is to protect property. Granted, sometimes it is also to protect life. These pirates have killed people and kidnapped people and such But the state has been willing to cede its monopoly on violence at the high seas because it couldn find a good solution to this and it been willing to overlook a lot of loss of life and i just don see a way that this doesn't lead to more loss of life and that is probably what we have to look forward to it may have already begun happening in the strait of homoose between when we record this and when you hear it but it is deeply …”View more
Ridealong summary
The Maersk Alabama incident rattled the shipping industry and highlighted modern piracy's shift from theft to hostage-taking. In 2009, Somali pirates captured the U.S.-flagged ship, leading to a dramatic standoff with U.S. Navy SEALs that ended with the pirates being shot to rescue the captain. This event not only sparked fear in maritime security but also raised complex jurisdictional issues surrounding piracy.
Behind the Bastards·It Could Happen Here Weekly 224·Mar 21, 2026
Ridealong summary
In this hilarious segment, a dinner check sparks a debate about restaurant behavior, leading to a wild story of credit card hacking at a place called Poppy Garden. The punchline hits when the host discovers that even after getting hacked, he can still use Apple Pay with his new card number before it arrives!
The Bobby Bones Show·Best 7 Segments From The Bobby Bones Show This Week·Mar 21, 2026
“… in the web server and then everything was fixed. And we were pulling our hair out for over a week on that particular issue. How do you handle the security handouts? Because you mentioned the certifications and things like this. When you have so many vendors and you're actually moving data between all these vendors, there's so many questions on this one. But let's talk about security first. How do you handle the security between these? Do you have a common security design pattern that you use? Because that's a lot of vendors, 25 vendors. That's a lot. It's a lot. Yeah, for sure. So we rigorous …”“… logs okay try it now click oh and that's when it's like ah we didn't give you the new root CA here and they you know They send us the PKS file or what, I can't remember at this point. But they send us the group of certificates and we get those loaded in the web server and then everything was fixed. And we were pulling our hair out for over a week on that particular issue. How do you handle the security handouts? Because you mentioned the certifications and things like this. When you have so many vendors and you're actually moving data between all these vendors, there's so many questions on this one. But let's talk about security first. How do you handle the security between these? Do you have a common security design pattern that you use? Because that's a lot of vendors, 25 vendors. That's a lot. It's a lot. Yeah, for sure. So we rigorous risk assessments, and that's the number one thing that the NCUA is always looking for us in our regulation is the credit union performing reasonable information security risk assessments of all vendors and everything that we do. So when I first got here, we put into play just adhering to the NIST standards, the 800-DASH document on guide to risk …”View more
Ridealong summary
A week-long vendor issue was resolved when a missing encryption certificate was finally identified. This incident highlights the importance of rigorous risk assessments and adherence to NIST standards for managing security across multiple vendors. By implementing these practices, organizations can effectively mitigate risks and ensure compliance with regulatory requirements.
Embracing Digital Transformation·#337 Mastering Vendor Security in Financial Services: A 12-Year Journey·Mar 25, 2026
“… And from Modesto to Monterey, from Folsom to Fresno, they are saying hell no to the way that this White House is running the Department of Homeland Security. They don't want another penny for ICE or Border Patrol. Ah, I see. Not another penny. And yet when you look at the people of Chicago, more and more of them are turning out and condemning what illegal aliens are doing to their communities. The amount of money, the amount of money that is diverted from communities that need it, with American citizens, often who are black or who are Hispanic or whatever they are, The amount of money, which is …”“… to. They're not allowed to. Go ahead. Americans in the streets, and then have Americans wait millions of hours in lines at the airports, and that we won't forget the chaos. And I can't speak for the rest of the country. I can speak for Californians. And from Modesto to Monterey, from Folsom to Fresno, they are saying hell no to the way that this White House is running the Department of Homeland Security. They don't want another penny for ICE or Border Patrol. Ah, I see. Not another penny. And yet when you look at the people of Chicago, more and more of them are turning out and condemning what illegal aliens are doing to their communities. The amount of money, the amount of money that is diverted from communities that need it, with American citizens, often who are black or who are Hispanic or whatever they are, The amount of money, which is scarce to begin with, for schooling and health care and security and all the rest of it. The amount that is drained out of American communities from American citizens and given to illegal aliens. It is a crime, in my view. It's a sin. It's a disgrace.”View more
Ridealong summary
Local police in California are restricted from sharing information with ICE, leading to chaos in communities as residents express frustration over the federal government's handling of immigration. Many citizens feel that resources are being drained from their neighborhoods to support illegal immigrants, affecting schools, healthcare, and security. This clash between local law enforcement and federal immigration policy is creating a growing divide among Californians.
Mark Levin Podcast·3/27/26 - Memeable Christianity: When Faith Meets Gen Z Culture and Podcasters·Mar 28, 2026
“… jump off point into the OT or critical infrastructure sector of the network. Now, to put those four pieces of data points together, you need a board security engineer, you need a red team to come in and find it for you, and they might not ever find it. even though they might spend three months trying to look for it. So that could be one of 100 attack pads that exist in your environment. So that's kind of the pre-attack latent risk piece. And then on the post-attack side, you've got data that's just being emitted from everyone's devices inside these environments. And what that data can tell you is, …”“… in the Middle East. And the reason that attack was able to go down is because no one put the pieces of the puzzle together that, hey, we've got a senior engineering dude with a system that has weak controls applied to it that also serves as a jump off point into the OT or critical infrastructure sector of the network. Now, to put those four pieces of data points together, you need a board security engineer, you need a red team to come in and find it for you, and they might not ever find it. even though they might spend three months trying to look for it. So that could be one of 100 attack pads that exist in your environment. So that's kind of the pre-attack latent risk piece. And then on the post-attack side, you've got data that's just being emitted from everyone's devices inside these environments. And what that data can tell you is, all right, all this latent risk back here, is anyone actually taking advantage of it or exploiting it? This is where this second half of the equation is where you discover that. But what we've done over the past 20 years, because I don't know, the big four consulting firms of the world have told us to do it, is we send data to these data stores like …”View more
Ridealong summary
Cyber attackers are advancing daily, while organizations struggle to keep up at human speed. To combat this, we need a cohesive command and control system for cyber defense, similar to military initiatives, to fuse data and enhance responsiveness. This shift is crucial for identifying and mitigating risks before they escalate into major breaches.
TBPN·Ellison's Media Empire, Ken Burns Joins, Cursor Mic Drop | Matthew Belloni, Gokul Rajaram, Nik Seetharaman, Raj Rajamani, James Everingham, Dr. Felix Ejeckam·Mar 03, 2026
“… their customer base is not using these tools maliciously. the hackers sort of wind up on the lagging edge, not on the frontier, but all of the cybersecurity companies like Palo Alto Networks, like CrowdStrike, like the folks that you've had at your conference, they maintain access to the frontier, and so they're always fighting with a bigger weapon. Is that sort of the equilibrium we should expect here? That's a great question. And by the way, we did have today the two top cybersecurity experts at Antropic, the head of security and the head of product security, sharing the roadmap and thoughts …”“… this person just spent $5 million on our API and it's all cyber attack related prompts. Like, let's maybe turn them off or figure out what's going on over there. They have a huge incentive to sort of, you know, control their customer base so that their customer base is not using these tools maliciously. the hackers sort of wind up on the lagging edge, not on the frontier, but all of the cybersecurity companies like Palo Alto Networks, like CrowdStrike, like the folks that you've had at your conference, they maintain access to the frontier, and so they're always fighting with a bigger weapon. Is that sort of the equilibrium we should expect here? That's a great question. And by the way, we did have today the two top cybersecurity experts at Antropic, the head of security and the head of product security, sharing the roadmap and thoughts about the upcoming capabilities of Antropic and other platforms. I think the answer to that is our continuous investment in innovation in the space. It's not just about Weez that I mentioned or Sierra. Those are large established startups. But we did have one company going out of stealth last week, Onyx Security. All they do is agent security. We had …”View more
Ridealong summary
Threat actors are outpacing defenders in the race to leverage AI for cyber attacks, creating a significant risk. While cybersecurity companies are innovating to combat this threat, the gap in adoption speeds leaves defenders at a disadvantage. However, the emergence of new security-focused startups may shift the balance in the coming years.
TBPN·AI Side Quests, Zaslav's Payday, SF Housing Market is Back | Shyam Sankar, Gili Raanan, Anna Patterson, Jake Loosararian, carried_no_interest·Mar 17, 2026
“… passed from the Senate to the House, the House said, uh-uh, we are not just going to fund the TSA. We want to make sure the Department of Homeland Security, ICE, and Border Patrol get extra funding so they can do the torture. That's what we want. So we're not going to support you MAGA Republicans in the Senate. So come back, Senators, because we in the House, we're going to do what's called a continuing resolution regarding the previous status quo funding in order to make sure all of DHS is funded. Now, the Democrats have objected to that in the Senate and have threatened the filibuster, and …”“… want to make sure that they have more money to torture and maim and kill and terrorize people here in the United States and expand the concentration camp system that is being built here in the United States. And so ultimately, when this was passed from the Senate to the House, the House said, uh-uh, we are not just going to fund the TSA. We want to make sure the Department of Homeland Security, ICE, and Border Patrol get extra funding so they can do the torture. That's what we want. So we're not going to support you MAGA Republicans in the Senate. So come back, Senators, because we in the House, we're going to do what's called a continuing resolution regarding the previous status quo funding in order to make sure all of DHS is funded. Now, the Democrats have objected to that in the Senate and have threatened the filibuster, and Republicans don't have enough votes to obtain cloture. And so Republicans made a deal with the Democrats not to fund ICE and Border Patrol, but the MAGA Republicans in the House were like, screw that. We can't support that. So we're not just going to fund TSA alone. We want to make sure that ICE can wear masks and have no search warrants and terrorize …”View more
Ridealong summary
MAGA Republicans are in a frenzy after Senate Republicans voted against their demands for additional funding for ICE and Border Patrol, opting instead to fund only the TSA. This unexpected move has led to infighting among GOP members, with MAGA Mike Johnson desperately calling for a continuing resolution to fund everything. Meanwhile, Senate Republicans have left for recess, leaving the House Republicans feeling abandoned and frustrated.
The MeidasTouch Podcast·MAGA Mike Panics as GOP Senate Votes Against him...at 2 AM·Mar 28, 2026
Ridealong summary
The Miami Dolphins and New York Jets are both predicted to have an over/under of five and a half wins this upcoming NFL season, sparking a heated debate on who will come out on top. In a lively discussion, fans express their loyalty while weighing in on the teams' prospects, with the Dolphins facing significant scrutiny. This rivalry sets the stage for an exciting season ahead as fans place their bets.
The Dan Patrick Show·Hour 2 – Seth Greenberg, Oscars Odds·Mar 13, 2026
“… take the vacation with the kids, do the fun stuff, support the charities, whatever the case may be, but just at least have that kind of baseline security that gives me the confidence that I can drop out of any commercial relationships that I might need to drop out of. Any provisions you would offer to my plan?”“… exposed to it with the goal of hopefully being able to drop whatever commitments i have forego all income contribute however i can contribute to be useful and then beyond that i think basically spend and or give it all away is kind of my mindset. Like, take the vacation with the kids, do the fun stuff, support the charities, whatever the case may be, but just at least have that kind of baseline security that gives me the confidence that I can drop out of any commercial relationships that I might need to drop out of. Any provisions you would offer to my plan?”View more
Ridealong summary
Imagine being financially secure enough to drop all commitments and focus on what truly matters. Zvi Mowshowitz shares his vision of achieving a baseline financial security that allows him to spend time with family, support charities, and contribute to society without the burden of commercial obligations. This mindset not only fosters personal freedom but also empowers a more meaningful life amidst the uncertainties of AI-driven job loss.
"The Cognitive Revolution" | AI Builders, Researchers, and Live Player Analysis·Zvi's Mic Works! Recursive Self-Improvement, Live Player Analysis, Anthropic vs DoW + More!·Mar 19, 2026
“… company, global and regional banks and financial services organizations, universities around the world, instant messenger software companies, cybersecurity technology companies, casinos, and more. We want to take this opportunity to give our sincere thanks, they wrote, to the entities who engaged with us when we realized what we'd stumbled into, including the UK's NCSC, who helped with introductions to the correct teams for us to speak to. AWS, who took those around 150 S3 buckets off our hands to sinkhole. A major unnamed SSL VPN appliance vendor who worked with us very quickly and directly to …”“… laboratories, state governments, etc. The UK, Poland, Australia, South Korea, Turkey, Taiwan, Chile, and more. Then there were military networks and the networks of Fortune 500s, Fortune 100s, a payment card network, a major industrial product company, global and regional banks and financial services organizations, universities around the world, instant messenger software companies, cybersecurity technology companies, casinos, and more. We want to take this opportunity to give our sincere thanks, they wrote, to the entities who engaged with us when we realized what we'd stumbled into, including the UK's NCSC, who helped with introductions to the correct teams for us to speak to. AWS, who took those around 150 S3 buckets off our hands to sinkhole. A major unnamed SSL VPN appliance vendor who worked with us very quickly and directly to take relevant S3 buckets off our hands. And CISA, who very quickly remediated an example that affected CISA.gov. Wow. Yeah. Yeah. AWS's agreement to sinkhole the identified S3 buckets means that the release of this research does not increase the risk exposed to any party. The same issues discussed in this research could not be recreated against the …”View more
Ridealong summary
A single oversight in internet security could have led to catastrophic supply chain attacks involving major organizations like NASA and Fortune 500 companies. Thanks to quick action from AWS and other entities, the identified vulnerabilities were contained, preventing potential disasters. This incident highlights the dire need for better security practices in the tech industry, reminding us that not all threats are complex—sometimes, they're alarmingly simple.
Security Now (Audio)·SN 1071: Bucketsquatting - Meta and TikTok's Tracking Pixels·Mar 24, 2026
“… ones in here, so narrow it down to one. It was that first one, the very, very first one by James, DevelopSec. Where he spelled out the fact that security did all this stuff with no input from development. Yeah, because it's so true. I can't tell you how many people I've worked with where a new security leader comes in and is like, yep, you know, I just walked into this and I'm trying to put together an application security program. And the development team does not like the security tooling at all. And it's because they weren't consulted with. Nobody asked them, hey, what do you all think if we …”“And that is the root cause of a problem. Very well said, Steve. All right, this comes to the portion of the show. Matt, I'm going to be throwing this to you first, where I ask you which quote of these was your favorite and why. And there's a lot of good ones in here, so narrow it down to one. It was that first one, the very, very first one by James, DevelopSec. Where he spelled out the fact that security did all this stuff with no input from development. Yeah, because it's so true. I can't tell you how many people I've worked with where a new security leader comes in and is like, yep, you know, I just walked into this and I'm trying to put together an application security program. And the development team does not like the security tooling at all. And it's because they weren't consulted with. Nobody asked them, hey, what do you all think if we do this? What do you folks think? How should we? They just did it and was like, you have to fix this. Nothing got fixed ever. And that's why security tools amongst developers get such a bad rep because they're not involved at all. Like anytime I work with a customer and we do a proof of concept and there's not a developer on the call, I say, …”View more
Ridealong summary
Ignoring developers in security decisions leads to ineffective tools and unresolved issues. A quote from James at DevelopSec highlights this problem, emphasizing that security measures are often implemented without consulting the very people who need to fix them. Involving developers in the conversation is crucial for a successful application security program.
Defense in Depth·Who is Responsible for the Conflict Between Security and Developers?·Mar 19, 2026
“… so. Yeah. Right? It's like it's this, we have this genie in a bottle. It's amazing. But how do I contain this? Has it ever happened before? I mean, security has always come at the end. Like it's never, I think it's just that we've solved, we've solved the coding side of this, the writing code side. And now it's more of a systems engineering. These are all fundamentally just systems and architectural problems. It's not necessarily security issues. Social engineering to some extent is, but that's, the problem is, is you're bringing up, you're co-mingling risks across different trust domains with …”“… code. Putting all of this together, I think what's super fascinating to me is this is one of the first times we're having technology. But what it can do is not limited by its abilities, but limited by how I can make it secure and stop it from doing so. Yeah. Right? It's like it's this, we have this genie in a bottle. It's amazing. But how do I contain this? Has it ever happened before? I mean, security has always come at the end. Like it's never, I think it's just that we've solved, we've solved the coding side of this, the writing code side. And now it's more of a systems engineering. These are all fundamentally just systems and architectural problems. It's not necessarily security issues. Social engineering to some extent is, but that's, the problem is, is you're bringing up, you're co-mingling risks across different trust domains with this. So you have the trust and safety and alignment issues with your underlying foundation models. You have the systems architecture and execution around how OpenClaw does things on your local machine. And then you have the sort of the traditional hacking sort of, you know, prompt injection type stuff. Like people want to do malicious. People want to …”View more
Ridealong summary
The future of note-taking for AI agents is evolving beyond simple markdown to include executable code and dynamic charts, creating a richer source of truth. However, this technological advancement raises significant security challenges, as the ability to execute code must be balanced with the need to contain potential risks. Ultimately, the focus is shifting from coding capabilities to systems engineering and security architecture to ensure safe interactions with these powerful tools.
AI + a16z·OpenClaw: Why the Internet Isn't Built for AI Agents·Mar 19, 2026
Ridealong summary
In ransomware negotiations, never appear desperate or rude to the attackers, as it can diminish your leverage and increase costs. Timing is crucial; negotiations typically start within three to five days, but if backups are intact, walking away might be the best option. Understanding when to engage or disengage can significantly impact the outcome for the victim organization.
Threat Vector by Palo Alto Networks·Inside Ransomware Negotiations: Trust Criminals or Walk Away?·Mar 19, 2026
Ridealong summary
CISA's Cyber Hygiene program is a game changer for organizations, offering free vulnerability scanning to enhance security. Once accepted, organizations receive detailed reports on vulnerabilities, with scanning frequency determined by severity, ensuring critical issues are addressed promptly. This proactive approach helps businesses stay ahead of potential cyber threats.
Security Now (Audio)·SN 1070: CISA's Free Internet Scanning - Malware Disguised as a VPN·Mar 17, 2026
“… community concluded that China had breached these databases. But by all the reporting I've done, it was widely understood by the Homeland Security Department, which employed Chris Krebs, the FBI, which employed Chris Wray, the CIA, which employed Gina Haspel, and the DNI, which was in transition at that time, eventually the future CIA director John Ratcliffe got in charge of that, that by April, there was consensus in the U.S. Intelligence Committee that China had breached these documents. In May of 2020, the United States government learned that Iran, another bad actor, had hacked into a …”“… they're being presented today, and looked people in the eye and lied to the president of the United States and then went on camera and doubled down on that lie? There are great questions to be figured out when each component in the United States intelligence community concluded that China had breached these databases. But by all the reporting I've done, it was widely understood by the Homeland Security Department, which employed Chris Krebs, the FBI, which employed Chris Wray, the CIA, which employed Gina Haspel, and the DNI, which was in transition at that time, eventually the future CIA director John Ratcliffe got in charge of that, that by April, there was consensus in the U.S. Intelligence Committee that China had breached these documents. In May of 2020, the United States government learned that Iran, another bad actor, had hacked into a single state database and stole 100 American voter identities All of that was kept When they made those statements in December 2020 that information was known by U federal agencies There were sealed indictments There was multiple briefings, scores of raw intelligence reports, two or three completed products, intelligence products, where the …”View more
Ridealong summary
Key U.S. intelligence officials knew about China's breach of voter data before claiming the 2020 election was secure. Despite this knowledge, they misled the public and the Trump administration, raising serious questions about transparency and trust. Tomorrow, explosive documents will reveal the extent of this deception and the political motives behind it.
Bannon`s War Room·Episode 5222: Battle Over The SAVE ACT Begins·Mar 17, 2026
Ridealong summary
The New York Jets have cycled through nearly 40 quarterbacks over the years, highlighting a deep-rooted problem in their franchise. With names like Geno Smith and Sam Darnold, it's clear that the Jets have struggled to find stability at the position. This ongoing quarterback carousel raises questions about the team's future and their ability to finally break the cycle of disappointment.
The Dan Patrick Show·Hour 2 – Italian Americans on Team Italy, Maxx Crosby Questions·Mar 12, 2026
Ridealong summary
Jets fans are caught in a cycle of disappointment, feeling like their team's management is taking them backward instead of forward. Bruno, a long-suffering fan, emphasizes that without wins, fans need hope to keep their spirits up, drawing parallels to iconic stories of resilience. The conversation highlights the struggle of fans who just want to believe in a brighter future for their team.
The Dan Patrick Show·C&R - Jets Down, Raiders Up, Rich's Circus·Mar 11, 2026
Ridealong summary
The Jets are considering a one-year deal for Kyler Murray, which could set them up for a stronger quarterback class next year. With an influx of draft picks, they might be able to secure a top talent while avoiding a risky pick this season. This strategy could reshape their future and align better with their current system.
Tranquilo Sports Talk·NFL Teams Making Moves, Arnold Palmer, & DUDE OF THE WEEK | GBD #6·Mar 06, 2026
Ridealong summary
A Jets fan expresses unwavering loyalty despite years of disappointment, refusing to switch to the rival Patriots even in the face of past mistakes. He laments the loss of former players like Sam Darnold and Mike Vrabel to the Patriots, feeling tormented by the success of the other team's fans. This passionate rant highlights the emotional toll of sports loyalty and rivalry.
New Heights with Jason & Travis Kelce·Michael Strahan on Championship Sunday, Super Bowl Predictions, Sack Records and Life After the NFL | EP 177·Jan 28, 2026
“… up a number there but I mean I should read there a big red warning box right below this on the ArchWiki Port knocking should be used as part of a security strategy not as the only protection, which would be a fragile security through obscurity.”“… to these six specific closed ports in a specific sequence they've effectively punched in the code and now we will open the actual port they want this sounds is six enough like 12 would give you like 42 2 million possibilities I just I was just making up a number there but I mean I should read there a big red warning box right below this on the ArchWiki Port knocking should be used as part of a security strategy not as the only protection, which would be a fragile security through obscurity.”View more
Ridealong summary
Port knocking is a clever security technique that allows you to open closed firewall ports through a predefined sequence of connection attempts. Think of it as a digital keypad for your firewall, where only the right sequence unlocks access. However, it's crucial to remember that this method should complement other security measures, not replace them.
Brad & Will Made a Tech Pod.·332: Shout Out to the 1979 Lady Kenmore·Mar 29, 2026
“… always has the best and the brightest. And fifth, our allies and partners also rely on the U.S. nuclear deterrent as the ultimate guarantor of their security against nuclear attack, however remote the possibility. As much as they want the U.S. deterrent to be safe, secure, and reliable, they do not want a new arms race and a return to the days of mutual assured destruction. As of September 2017, the U.S. has 3,822 warheads in its stockpile, more than enough, with another 2,000-plus warheads awaiting dismantlement. This is down from the mid-60s peak of 31,255 warheads. We surely don't want a return …”“… people who sustain our deterrent. Military and civilians at DOD and NNSA work to maintain the continuum of deterrence, beginning with threat prevention and nonproliferation. They need support, and we need to ensure that the entire nuclear enterprise always has the best and the brightest. And fifth, our allies and partners also rely on the U.S. nuclear deterrent as the ultimate guarantor of their security against nuclear attack, however remote the possibility. As much as they want the U.S. deterrent to be safe, secure, and reliable, they do not want a new arms race and a return to the days of mutual assured destruction. As of September 2017, the U.S. has 3,822 warheads in its stockpile, more than enough, with another 2,000-plus warheads awaiting dismantlement. This is down from the mid-60s peak of 31,255 warheads. We surely don't want a return to those days and increase the risk of nuclear war rather than reduce it. In conclusion, in my prepared testimony, I referenced a 2010 op-ed by former National Security Advisor Brent Scowcroft and Jake Garn, a former Republican senator from Utah, supporting New Start. In that piece, they cautioned against seeking a silver bullet that solves all …”View more
Ridealong summary
The New START treaty is essential for maintaining global nuclear stability, as it prevents a return to the dangerous arms race of the Cold War. With the U.S. currently holding 3,822 warheads, the treaty allows for necessary dialogue with Russia on emerging nuclear systems. Ultimately, extending New START is about ensuring safety, security, and reliability without reigniting fears of mutual assured destruction.
The MeidasTouch Podcast·Top Trump Official Falls Apart Under Cross-Exam on War!!·Mar 26, 2026
“… Let's go to the House of Representatives. We will melt ICE, and I have a bill to do just that. We will dismantle the Department of Homeland Security because, frankly, at this juncture, nothing less is acceptable. Well, that sounds good. Let's go to another Democrat. Because I believe that there ought to be a special commission if Democrats take over the House of Representatives or the Senate. There should be a special commission that investigates ISIS legal violations and human rights violations. How about another Democrat? We need real accountability because at the end of the day, the …”“I don't think that ICE is any longer capable of existing because it is so corrupt at its core. Okay. United States Senator, ICE should be defunded. Let's go to the House of Representatives. We will melt ICE, and I have a bill to do just that. We will dismantle the Department of Homeland Security because, frankly, at this juncture, nothing less is acceptable. Well, that sounds good. Let's go to another Democrat. Because I believe that there ought to be a special commission if Democrats take over the House of Representatives or the Senate. There should be a special commission that investigates ISIS legal violations and human rights violations. How about another Democrat? We need real accountability because at the end of the day, the people that have been inflicting this harm need to be prosecuted. They need to be brought before us and they need to be held account for the trauma that they have created.”View more
Ridealong summary
The corruption within ICE has reached a point where it can no longer function effectively, prompting calls for its defunding. A U.S. Senator proposes dismantling the Department of Homeland Security entirely and establishing a special commission to investigate human rights violations. This push for accountability aims to ensure that those responsible for harm are prosecuted and held accountable for their actions.
The Jesse Kelly Show·Hour 1: Servants of the Swamp·Mar 28, 2026
“… the exhaustive vetting that they would need to do to either ensure that they're actually producing something that's safe, both from a privacy and security standpoint, but also like useful that they're getting it into a product really without understanding user needs or how the product is being adopted by those who are really, you know, core to their business. Yeah, that's actually a really good point. I mean, it's like, we expect these numbers that we're citing to change over time, right? And you're already seeing that like, concern could go down if you address people's needs for transparency and …”“… polled said that their adoption is outpacing their ability to do good risk management. And I think 45% of the same people polled said they had a confirmed or suspected data leak via these unauthorized AI tools. So they're really prioritizing speed over the exhaustive vetting that they would need to do to either ensure that they're actually producing something that's safe, both from a privacy and security standpoint, but also like useful that they're getting it into a product really without understanding user needs or how the product is being adopted by those who are really, you know, core to their business. Yeah, that's actually a really good point. I mean, it's like, we expect these numbers that we're citing to change over time, right? And you're already seeing that like, concern could go down if you address people's needs for transparency and control. And also concern to go down as people discover, you know, actually useful features and how they're using it. I think part of the issue is there hasn't been that control transparency. privacy. And then part of the issue is, I think to that last point is things, things are intentionally moving too fast for people and change. You know, it …”View more
Ridealong summary
A staggering 78% of business leaders admit that their adoption of AI is outpacing their ability to manage risks effectively. This rush has led to significant privacy concerns, with 45% reporting data leaks due to unauthorized AI tools. The solution lies in giving users control and transparency over AI features, allowing for a safer and more customized experience.
Inside DuckDuckGo·Duck Tales: Why DuckDuckGo is giving users a choice about if and how they use AI (Ep.23)·Mar 18, 2026
“… just like when we juggle our family schedules without dropping any days. Right? One wrong move and it's chaos. So what the latest on AI and data security this week This week I engaged with industry leaders discussing that exact intersection John Byron Hanby IV stressed the need for robust data security as AI evolves That sounds like a serious discussion. So how do companies balance innovation with protecting user data? It's tricky. You can't just throw caution to the wind. It's like when we play pickleball. Strategy is key to avoid unforced errors. Or get caught in the net like I do sometimes. …”“And that leads right into our next topic about the ramifications of AI in military strategies. Should we jump into that? AI is evolving fast. But isn't data privacy a massive issue amid all this excitement? Absolutely. It's a delicate dance. just like when we juggle our family schedules without dropping any days. Right? One wrong move and it's chaos. So what the latest on AI and data security this week This week I engaged with industry leaders discussing that exact intersection John Byron Hanby IV stressed the need for robust data security as AI evolves That sounds like a serious discussion. So how do companies balance innovation with protecting user data? It's tricky. You can't just throw caution to the wind. It's like when we play pickleball. Strategy is key to avoid unforced errors. Or get caught in the net like I do sometimes. So what are they suggesting? They recommend developing frameworks that integrate data protection directly into AI systems. This approach fosters user trust. Integrating protection sounds smart. We could use more of that in our blended families' tech choices, too. Exactly. It's a shared responsibility, much like coordinating family activities. …”View more
Ridealong summary
As AI rapidly evolves, the intersection of military strategies and data security becomes critical. Industry leaders emphasize the need for robust data protection frameworks that foster user trust while encouraging innovation. This delicate balance is essential to avoid chaos in both military operations and personal digital landscapes.
Embracing Digital This Week·March 16, 2026 | Embracing Digital Transformation: AI, Data Governance & Cybers...·Mar 16, 2026
Ridealong summary
Geno Smith's potential return to the Jets raises questions about quarterback mobility in the NFL. As teams draft new talent, the dynamics around experienced quarterbacks like Smith indicate a shift in how franchises view their roles. This change could signal a new era of quarterback longevity and talent distribution in the league.
The Right Time with Bomani Jones·Domonique Foxworth reacts to Daniel Jones Getting PAID, Ravens Next Steps & Geno’s Jets Reunion | 3.12·Mar 12, 2026
Ridealong summary
The simplest infrastructure can be weaponized, as highlighted by recent investigations into Russian activities involving explosive devices in shipping systems. This discussion emphasizes the importance of recognizing and safeguarding the quiet systems that underpin our daily lives, as they are often the most vulnerable when threats arise. Understanding these vulnerabilities is crucial for maintaining security and awareness in our interconnected world.
The Watch Floor with Sarah Adams·What Russia Is Doing Is Insane·Mar 18, 2026
Ridealong summary
The greatest threat from a new Middle East war isn't just foreign adversaries; it's domestic terrorism fueled by radicalization. Joe Kent, former Director of the National Counterterrorism Center, highlights how individuals, even non-Muslims, can be inspired to commit violence due to U.S. foreign policy and social media propaganda, especially in the wake of the Iran conflict. This situation is compounded by the government's focus on international issues, diverting attention from domestic security concerns.
The Megyn Kelly Show·Behind-the-Scenes of Trump Administration Ahead of Iran War, and Potential FBI Leak Investigation, with Joe Kent | Ep.1277·Mar 20, 2026
Ridealong summary
Geno Smith could be the Jets' surprising choice for quarterback, especially after the dark options of Carson Wentz. Despite mixed opinions, Smith's impressive stats when receivers are open suggest he might be a solid fit. This could lead to a redemption story for him in New York, overshadowing other less favorable candidates.
The Ryen Russillo Show·Bills Trade for DJ Moore + AJ Brown & Maxx Crosby Want Out w/ Dianna Russini, Plus Tatum’s Return w/ Jay King·Mar 05, 2026
“… or not like the majority leader isn't sufficiently committed to the save act the question is upon tactics do you want a department of Homeland Security funded? Like, do you want the president to get a cabinet and a staffing confirmed by the United States? Because all that stuff doesn't go on if you have this other thing where they're just introducing amendments and talking for eight long months. And I don't think that's ever been sufficiently explained to anybody. So they have to talk nonstop?”“… democrats would want more than to end the trump administration with a perpetual nine-month debate about nothing in particular but not allowing him to do anything on his agenda like that's what this ultimately is it's not it's not a question of whether or not like the majority leader isn't sufficiently committed to the save act the question is upon tactics do you want a department of Homeland Security funded? Like, do you want the president to get a cabinet and a staffing confirmed by the United States? Because all that stuff doesn't go on if you have this other thing where they're just introducing amendments and talking for eight long months. And I don't think that's ever been sufficiently explained to anybody. So they have to talk nonstop?”View more
Ridealong summary
Imagine a scenario where Democrats could indefinitely delay Trump’s agenda through endless amendments and debates. This could lead to a prolonged standoff, where key policies, like the SAVE Act, are stalled, and the government remains in limbo. The strategy hinges on a talking filibuster that keeps discussions alive, preventing any real progress for months on end.
Ruthless Podcast·Is Dem Leadership Collapsing? + The Fate of the SAVE Act·Mar 19, 2026
“… possibility of the Strait of Hormuz being blocked by the Iranians is plainly saying something that isn't true. The person I was speaking with was a security official, and his decision to weigh into this discussion is, as far as I'm concerned, extremely meaningful. He said, these are professionals. And he said specifically, I'm talking both on decision makers on the political level and on the military level. And they absolutely knew and prepared to the possibility that the strait will close. And this was also the assessment of the Israeli intelligence that they will close the Strait of Hormuz. So it …”“… mining of the strait and many other elements. Senior Israeli sources I've spoken with from the army, not political sources, have told me whoever is saying that the U.S. did not have a scenario and did not plan both politically and militarily to the possibility of the Strait of Hormuz being blocked by the Iranians is plainly saying something that isn't true. The person I was speaking with was a security official, and his decision to weigh into this discussion is, as far as I'm concerned, extremely meaningful. He said, these are professionals. And he said specifically, I'm talking both on decision makers on the political level and on the military level. And they absolutely knew and prepared to the possibility that the strait will close. And this was also the assessment of the Israeli intelligence that they will close the Strait of Hormuz. So it didn't surprise anyone. Yeah, I'll just add to that. That has been my, based on the conversations I've had with U.S. officials, both uniformed military and Pentagon and White House, National Security Council types, that, again, dealing with it at a practical level is obviously inherently complicated, as we're discussing today. But the idea that …”View more
Ridealong summary
Despite a massive U.S. naval presence, Iran has effectively blocked the Strait of Hormuz using mines and electronic jamming. This strategic maneuvering has left tankers stranded and raised concerns about global oil supply. U.S. and Israeli officials have long anticipated this scenario, indicating a well-prepared response to Iran's tactics.
Call Me Back - with Dan Senor·The Strategy to Re-Open Hormuz - with Nadav Eyal·Mar 19, 2026
“… He is the Cato Institute's Director of Immigration Studies and the Seltz Foundation Chair in Immigration Policies and Expert on Immigration, Border Security, and Interior Enforcement. It's David Beer. What's up, man? Thanks for having me on. Well, we had to have you on after your testimony last week. You are on Capitol Hill. I'm going to play a little bit of it. But why did our esteemed Senate call you forth for your expertise last week? How did you end up there? Yeah, so this was the U.S. Senate Budget Committee. They were ostensibly studying the issue of the cost of immigration to sanctuary …”“I'm excited to talk to somebody I've been following on social media for a while who's just dropping bangers after bangers on FX.com. He is the Cato Institute's Director of Immigration Studies and the Seltz Foundation Chair in Immigration Policies and Expert on Immigration, Border Security, and Interior Enforcement. It's David Beer. What's up, man? Thanks for having me on. Well, we had to have you on after your testimony last week. You are on Capitol Hill. I'm going to play a little bit of it. But why did our esteemed Senate call you forth for your expertise last week? How did you end up there? Yeah, so this was the U.S. Senate Budget Committee. They were ostensibly studying the issue of the cost of immigration to sanctuary cities. And I was invited because the Cato Institute, my colleagues and I published a comprehensive analysis of the effect of immigration and immigrants on government budgets over the last 30 years. And we found that they reduced government deficits by 14 and a half trillion dollars. And so this was the purpose of me being invited was to discuss this …”View more
Ridealong summary
During a Senate Budget Committee hearing, David Bier revealed that immigrants have reduced U.S. government deficits by $14.5 trillion, contradicting the common narrative that they drain resources. When Senator John Kennedy attempted to undermine Bier with personal attacks, it only highlighted the weakness of his argument, as Bier stood firm on the facts. This exchange not only went viral but also showcased the stark divide in the immigration debate today.
Bulwark Takes·Sen. Kennedy Tried to Humiliate This Witness… It Backfired (w/ David Bier)·Mar 17, 2026
“Tens of thousands of employees of the Department of Homeland Security missing their first full paycheck Friday, as the Senate remains at an impasse over financing the department. Funding for the department lapsed February 14th, with Democrats demanding reforms to immigration enforcement and Republicans opposing measures they believe would hinder ICE operations. Where the impact has been immediate and obvious is at our nation's airports and their security checkpoints manned by the Transportation Security …”“Tens of thousands of employees of the Department of Homeland Security missing their first full paycheck Friday, as the Senate remains at an impasse over financing the department. Funding for the department lapsed February 14th, with Democrats demanding reforms to immigration enforcement and Republicans opposing measures they believe would hinder ICE operations. Where the impact has been immediate and obvious is at our nation's airports and their security checkpoints manned by the Transportation Security Administration. TSA agents are not currently being paid, resulting in 300 agents quitting, and unscheduled absences occurring at double the rate since the shutdown began, according to internal TSA data obtained by CBS News. The result? Shockingly long lines at security checkpoints. airports in Atlanta, Houston, New Orleans, and Chicago, among others, …”View more
Ridealong summary
The DHS funding impasse is a political game that endangers national security and burdens American travelers, with Democrats prioritizing immigration reforms over immediate security needs.
The government shutdown is causing severe disruptions at airports, with TSA agents quitting and long security lines, highlighting the detrimental impact of political stalemates on essential services.
The ongoing shutdown of the Department of Homeland Security is a political maneuver by Democrats that endangers national security and inconveniences American travelers.
The Megyn Kelly Show·U.S. Targets Iran's Kharg Island, Long Airport Security Lines, "Antifa" Convictions: AM Update 3/16·Mar 16, 2026
“They all looked a little bit nervous. It's probably nerve-wracking going through airport security, which is already stressful, and then seeing people with ICE badges across their chest. And then all I see when I open the news is that Bannon is saying this is a test run for future ICE deployment at Poles. Of course, this video has gone incredibly viral, which is partially funny and partially scary. We've got an agent looming over the shoulder of somebody working, a TSA agent. She looks done with it. She's like, I don't need this guy's help. …”“They all looked a little bit nervous. It's probably nerve-wracking going through airport security, which is already stressful, and then seeing people with ICE badges across their chest. And then all I see when I open the news is that Bannon is saying this is a test run for future ICE deployment at Poles. Of course, this video has gone incredibly viral, which is partially funny and partially scary. We've got an agent looming over the shoulder of somebody working, a TSA agent. She looks done with it. She's like, I don't need this guy's help. I am so sick of this guy. He looks like he doesn't know what he's doing, which only bolsters my theory that they're just deployed here, given a small set of instructions like, hey, maybe just stand around and repeat these lines a few times throughout the day. And that is it. that is the extent of the training that is given, which is obviously not a …”View more
Ridealong summary
Seeing ICE agents at the airport felt like a test run for future intimidation tactics, leaving travelers uneasy. Adam Mockler reflects on the unsettling atmosphere and how this deployment contradicts America's ideals of freedom and safety. He connects this experience to broader global tensions, emphasizing the increasing dangers under the current administration.
The Adam Mockler Show·I just confronted ICE at the airport·Mar 24, 2026
Ridealong summary
The U.S. has issued a security alert regarding potential threats from Iran-linked groups targeting soft American interests globally. This comes after President Trump's ultimatum to Iran over the Strait of Hormuz, raising concerns about safety in embassies, hotels, and public spaces where Americans gather. Travelers are urged to stay vigilant and monitor local advisories as risks widen.
The President's Daily Brief·March 24th, 2026: Is Iran Being Run By An AI Supreme Leader? & Ukraine Strikes Russia’s Oil Hub·Mar 24, 2026
Ridealong summary
The Mumbai attacks of 2008 were a shocking event that highlighted the strategic thinking behind successful terrorist operations. This segment dives into the planning and execution of the attacks, focusing on what made them effective rather than the motivations behind them. By analyzing the attack's methodology, we gain insight into the complexities of such incidents and their implications on security today.
The Watch Floor with Sarah Adams·This Happens Before Every Attack·Mar 25, 2026
“… in the middle of these kinds of attacks? And now if you've seen any one of those disaster movies about a cyber attack, well, guess what? The Cybersecurity Agency is under DHS and that's shut down right now. And now you also see people if you're flying, you're going to see long, long lines. And I am there all the time. I ask all of those TSA agents, hey, do you do you like getting paid? Yeah, yeah, we do. Yeah, we do. People do like getting paid If I stop paying you guys would you keep showing up Wow Even you I really thought you would still show up for a while just for all the Celsius that you're …”“… the only Democrat to vote against this shutdown. It's wrong. You know, you witnessed what happened in Michigan. That individual drove into the synagogue. He showed up to kill 150 toddlers. So why would you want to make America more unsecure in the middle of these kinds of attacks? And now if you've seen any one of those disaster movies about a cyber attack, well, guess what? The Cybersecurity Agency is under DHS and that's shut down right now. And now you also see people if you're flying, you're going to see long, long lines. And I am there all the time. I ask all of those TSA agents, hey, do you do you like getting paid? Yeah, yeah, we do. Yeah, we do. People do like getting paid If I stop paying you guys would you keep showing up Wow Even you I really thought you would still show up for a while just for all the Celsius that you're drinking. Yeah, terror attack in Michigan, terror attack in New York, terror attack in Austin. He points out the cyber division is shut down right now. The Democrats are creating the conditions for more violence and more just general pain for you because of what's happening at the airport, and he's the only guy speaking up against it. Here he is …”View more
Ridealong summary
Democrat policies are creating dangerous conditions, according to Senator John Fetterman, who highlights the impact of defunding the Department of Homeland Security. With rising terror threats and long airport lines, he questions why his party is risking national security. Fetterman argues that the only unifying principle among Democrats is their hatred for Trump, rather than addressing real issues affecting Americans.
The Rubin Report·'Shark Tank' Legend Notices Something in Strait of Hormuz Others Are Unwilling to See·Mar 24, 2026
Ridealong summary
The presence of ICE at airports has dramatically reduced wait times and shifted the dynamics of airport security. With TSA agents fearing job loss, sick outs have surged, leaving some airports unaffected due to contract screeners. Meanwhile, the ongoing DHS funding debate is heating up as key senators negotiate potential changes.
Bannon`s War Room·WarRoom Battleground EP 975: Victory For Parents Against META; The Left Is Recruiting Homeless To Commit Voter Fraud In LA·Mar 24, 2026
“… going to kill it in the Senate. You're not going to get 60 votes, so that's not going to happen. And then you've got the defunding of Homeland Security. The TSA agents now, there are people wrapped around airports can't get through. The Democrats don't like ICE. Even though ICE is funded, they're taking it out on Homeland Security. It is our view that immigration enforcement in this country should be fair It should be just and it should be humane. That's not what's happening right now. In the United States of America. And that's why ICE needs to be reformed in a dramatic, bold, meaningful and …”“… can be easily overcome by the states which run the election. This is a general national law. Law of the land is you've got to show your American citizen in order to vote as the constitution states. That should be in place. Okay, so why? Okay. And they're going to kill it in the Senate. You're not going to get 60 votes, so that's not going to happen. And then you've got the defunding of Homeland Security. The TSA agents now, there are people wrapped around airports can't get through. The Democrats don't like ICE. Even though ICE is funded, they're taking it out on Homeland Security. It is our view that immigration enforcement in this country should be fair It should be just and it should be humane. That's not what's happening right now. In the United States of America. And that's why ICE needs to be reformed in a dramatic, bold, meaningful and transformational manner. And if that doesn't happen. The DHS funding bill will not move forward. So you're putting every single American in jeopardy. You're inconveniencing everybody at the airport and you're doing an irresponsible radical left policy. Again, it's on the Republicans to bring all of this out in the upcoming vote in November. But …”View more
Ridealong summary
The SAVE America Act is necessary for election integrity, but it faces insurmountable opposition from radical leftists who control the Democratic Party.
Bill O’Reilly’s No Spin News and Analysis·Friends & Enemies: Europe's Anti-Trump Stance on Iran, DHS Shutdown Sparks Airport Chaos & Kenin Spivak on the Marxist Wing of the Democratic Party·Mar 18, 2026
“… of Texas. Armed man wearing tactical gear walked into a Texas elementary school last Tuesday through an improperly closed door and asked about the security presence on campus. Kyle Chris, 39 years old, also known as Muhy Mohanad Najim, was arrested at his home Wednesday night and faces a felony charge for unlawfully carrying a weapon in a prohibited place. after the incident at Zawink Elementary School. Chris, originally from Baghdad, Iraq, became a naturalized citizen on August 24, 2022. That's when he changed his name to Kyle Chris. chris chris kyle was a an amazing sharpshooter was he not sarah …”“Okay, this story out of Texas. Armed man wearing tactical gear walked into a Texas elementary school last Tuesday through an improperly closed door and asked about the security presence on campus. Kyle Chris, 39 years old, also known as Muhy Mohanad Najim, was arrested at his home Wednesday night and faces a felony charge for unlawfully carrying a weapon in a prohibited place. after the incident at Zawink Elementary School. Chris, originally from Baghdad, Iraq, became a naturalized citizen on August 24, 2022. That's when he changed his name to Kyle Chris. chris chris kyle was a an amazing sharpshooter was he not sarah uh from texas and somebody who was over in iraq and killed a lot of people in iraq and was under threat all the time from people in iraq he comes over and doesn't name himself chris kyle he names himself Kyle Criss. He came from Baghdad. He was arrested at his home, located minutes from the school. He allegedly told authorities he was a security …”View more
Ridealong summary
An armed man in tactical gear attempted to enter Zawink Elementary School in Texas, claiming to check on security. Kyle Chris, a naturalized citizen from Iraq, was arrested after being caught in a restricted area and falsely portraying himself as a security guard. His alarming actions raise serious concerns about safety in schools across America.
The Glenn Beck Program·Media Paints Michigan Synagogue Attacker as the VICTIM?! | Guest: Ryan Mauro | 3/16/26·Mar 16, 2026
“… AI Doom. That's good news because the AI found it, and I'm sure they fixed it. And this is one thing we're really starting to see AI being used in security audits very effectively. A new study says using AI leads to brain fry. Sigh. the article from Harvard Business Review quotes our friend Steve Yeggi saying I had a palpable sense of stress watching Gastown it was moving too fast for me I know the feeling yeah so don't let your brain fry using AI you know what touch grass we all got to touch grass a couple of days ago when Claude was down for like five hours we were all sitting here was doing a …”“… API was public, all they needed were the JSON keys. And the JSON keys were in the error logs of the database. So they were just able to use some SQL injection, get the error logs, boom, you're in. Gosh. That's fantastic. So actually, that's really not AI Doom. That's good news because the AI found it, and I'm sure they fixed it. And this is one thing we're really starting to see AI being used in security audits very effectively. A new study says using AI leads to brain fry. Sigh. the article from Harvard Business Review quotes our friend Steve Yeggi saying I had a palpable sense of stress watching Gastown it was moving too fast for me I know the feeling yeah so don't let your brain fry using AI you know what touch grass we all got to touch grass a couple of days ago when Claude was down for like five hours we were all sitting here was doing a show i guess it was it yesterday it felt like ages we were all sitting here doing a show and it's uh darren or somebody said hey uh claude says it's overloaded i said what and i tried it it was nobody could get into claude you should see it on reddit people say oh man i had to go outside where's my friend my friend's gone you know i think i actually …”View more
Ridealong summary
In a shocking security test, McKinsey's AI platform was hacked by its own autonomous agent, gaining full access to sensitive data in just two hours. This incident highlights the effectiveness of AI in security audits, but it also raises concerns about the stress and 'brain fry' experienced by users overwhelmed by AI tools, leading to feelings of inadequacy and imposter syndrome. It's a cautionary tale about the balance between leveraging AI and maintaining human creativity.
Intelligent Machines (Audio)·IM 862: Ménage à Claude - AI, Human Agency, and Economic Value·Mar 18, 2026
“… start asking questions, you're going to bring different perspectives. There was mention of first principles. What are even the first principles of security anymore? I don't think that's a useful approach. But periodically looking around and saying, hey, why do we keep doing this? Or go and ask your newest team member, hey, you're here. You started yesterday. As you're onboarding the next 30, 60, 90 days, what are some things that you wonder why we do them. And let's have a conversation about them. Have you have you said that to new hires? Because that is actually a good question. Oh, absolutely. …”“… back a decent EDR because you have to be compliant. From my perspective, years ago, I was introduced to the there's actually a concept called the beginner's mind. And it's the idea that if you don't have knowledge of something and you come in and you start asking questions, you're going to bring different perspectives. There was mention of first principles. What are even the first principles of security anymore? I don't think that's a useful approach. But periodically looking around and saying, hey, why do we keep doing this? Or go and ask your newest team member, hey, you're here. You started yesterday. As you're onboarding the next 30, 60, 90 days, what are some things that you wonder why we do them. And let's have a conversation about them. Have you have you said that to new hires? Because that is actually a good question. Oh, absolutely. Yeah. No, that's something that that I basically write into the onboarding document for anybody who is at least reporting directly to me. And I'm going to pause you here. Has one of those new hires said, why are we doing this? And you go, let me look at that. You're right. Like, like, have you had a moment like that? Yes, absolutely. And the …”View more
Ridealong summary
New employees often question outdated security practices, leading to valuable insights for improvement. One common issue raised is the problematic password requirements, prompting discussions on necessary changes. This highlights the importance of fresh perspectives in enhancing compliance and risk management strategies.
CISO Series Podcast·Why Highlight Diversity When We Can Just Hope You Don't Notice?·Mar 24, 2026
“… but I'm grateful for the opportunity to do it in this forum. As you stated, Congress provided by statute ODNI with the responsibility of election security and counterintelligence in 2021. As you also know, ODNI has purview and oversight. I know the history very well, but could you just address the question? ODNI also has purview and overview over two domestic related agencies, the Department of Homeland Security and the FBI, both of which have purview over election security responsibilities to ensure the integrity of our elections I want to correct one of your statements that you made multiple …”“… and rejected repeatedly. Now, where is the authority for you to involve yourself in a domestic law enforcement activity? Thank you, Vice Chairman. I appreciate the question. As you know, I've addressed every issue you've raised in detail in a letter, but I'm grateful for the opportunity to do it in this forum. As you stated, Congress provided by statute ODNI with the responsibility of election security and counterintelligence in 2021. As you also know, ODNI has purview and oversight. I know the history very well, but could you just address the question? ODNI also has purview and overview over two domestic related agencies, the Department of Homeland Security and the FBI, both of which have purview over election security responsibilities to ensure the integrity of our elections I want to correct one of your statements that you made multiple times which is false I did not participate in a law enforcement activity nor would I because that does not exist within my authorities You were present on the scene. Are the photos of you on the scene false? I was at Fulton County, sir, at the request of the president, and to work with the FBI to observe this action that had long been awaited. I was …”View more
Ridealong summary
In a heated Senate hearing, Tulsi Gabbard confronted Mark Warner over allegations of election security misconduct, claiming she was merely observing an FBI operation in Georgia. Warner challenged her involvement, questioning the legitimacy of the FBI's actions and the authority under which she operated. This exchange highlights the contentious atmosphere surrounding election integrity and the politicization of security efforts.
Bannon`s War Room·Episode 5226: Gloves Come Off In Blockbuster Intel And Mullin Confirmation Hearings Cont.·Mar 18, 2026
Ridealong summary
Many doubt Geno Smith's potential with the Jets, recalling his rocky past there, but is the media's skepticism fair? While some believe he could thrive if given a second chance, the narrative shifts dramatically depending on the team he joins. This segment explores the complexities of fan expectations and media perceptions surrounding his career move.
Pardon My Take·Maxx Crosby Is No Longer A Raven, Nate Tice Joins Us To Talk NFL Free Agency, World Baseball Classic, Hot Seat/Cool Throne And A Laser Tag Debate During Guys On Chicks·Mar 11, 2026
Ridealong summary
The New York Jets have made NFL history by starting the same five offensive linemen for all 17 games this season, a feat not achieved since 2023. This stability is crucial as they head into the playoffs, countering criticism about their performance and showcasing their potential for success. Despite mixed opinions about their coaching staff, the Jets' resilience highlights their determination to compete at a high level.
Pardon My Take·NFL With Steve Young, Super Wild Card Weekend Preview And Picks, Miami On To The Natty + Fyre Fest Of The Week·Jan 09, 2026
Ridealong summary
Lone wolf terrorism is a growing concern, as individuals radicalized online can strike without warning or clear connections to organized networks. This ideology spreads rapidly through digital channels, making detection incredibly challenging for authorities. Understanding this threat is crucial for protecting ourselves and our communities from these unpredictable attacks.
The Dan Bongino Show·Joe Kent is Wrong, And So is His Explanation (Ep. 2475)·Mar 18, 2026
Ridealong summary
Recent attacks show a potential shift in terrorism tactics, leaning towards inspired lone wolf events rather than organized sleeper cells. While concerns about Iran's influence linger, the nature of these attacks mirrors those seen with ISIS in the past decade. This raises critical questions about the implications for security and the ongoing issue of Islamophobia in society.