Best Podcast Episodes About JetStream Security

Best Podcast Episodes About JetStream Security

Everything podcasters are saying about JetStream Security — curated from top podcasts

Updated: Apr 27, 2026 – 73 episodes
Listen to the Playlist

Ridealong has curated the best and most interesting podcasts and clips about JetStream Security.

Top Podcast Clips About JetStream Security

TBPN
Ridealong summary
Quantum computing advancements could break Bitcoin's encryption by 2029, but there's time to adapt if developers act now.
Quantum computing advancements have made breaking Bitcoin's cryptography easier than previously thought, posing a significant threat to its security.
Quantum computing poses a real threat to Bitcoin's encryption, but the timeline gives the crypto community a chance to adapt before 2029.
Quantum computing advancements pose a real threat to Bitcoin's encryption, with Google suggesting a significant reduction in resources needed to break it, potentially destabilizing the cryptocurrency market.
TBPN · AI Is Coming for Your Memes, Axios NPM Package Compromised, Claude Code Source Code Leak | Alex Pruden, Qasar Younis, Sebastian Mallaby, Forrest Heath, Dino Mavrookas, Will Ahmed, Jannick Malling, Ryan Daniels, Chris Yu · Mar 31, 2026
The Watch Floor with Sarah Adams
Ridealong summary
Dating apps are being exploited in dangerous ways, as highlighted by a troubling scenario in Ukraine where Russian adversaries created fake profiles to target foreign volunteers. This alarming tactic underscores the risks associated with sharing personal information online, especially in conflict zones. A similar incident with the fitness app Strava revealed how user data could inadvertently compromise military locations, illustrating the need for caution in our digital interactions.
The Watch Floor with Sarah Adams · Your Phone Isn’t Safe Right Now · Mar 20, 2026
PBD Podcast
Ridealong summary
Gulf states are urging the U.S. to take decisive action against Iran, highlighting their strategic reliance on American support. Despite their limited leverage, they are actively seeking ways to assist, as tensions rise and the threat from Iran continues. Meanwhile, the U.S. is providing arms to Iranian protesters and Kurds, reflecting a complex geopolitical landscape.
PBD Podcast · US Pilot RESCUED + Trump's BRUTAL Iran Warning | PBD #771 · Apr 06, 2026
Ross Tucker Football Podcast: Daily NFL Podcast
Ridealong summary
The Bills struggle with their wide receiver corps, lacking a boundary X receiver to win one-on-one matchups, which hampers their passing game. Defensively, the team has improved with contributions from rookie defensive tackles Deion Walker and TJ Sanders.
Ross Tucker Football Podcast: Daily NFL Podcast · Greg Cosell: 2025 NFL Week 18 Preview Part One · Jan 01, 2026
Behind the Bastards
“So these security contractors will now live on the oil tanker or the container ship, either for its whole journey or for the duration of the time it's considered to be in danger. And also, I mean, if pirates try to get onto the big ship and all of the military guys are on a different ship, a little bit behind, you have to get those guys onto the other ship. Right, and then now you're shooting at the ship that you're supposed to be protecting, That does just make …” “So these security contractors will now live on the oil tanker or the container ship, either for its whole journey or for the duration of the time it's considered to be in danger. And also, I mean, if pirates try to get onto the big ship and all of the military guys are on a different ship, a little bit behind, you have to get those guys onto the other ship. Right, and then now you're shooting at the ship that you're supposed to be protecting, That does just make it a little bit more complicated, yeah. Yeah. Unfortunately, the way, according to reports I've read, I should say, the way they have got around this issue is by preemptively shooting at vessels that they consider to be a threat. And there are plenty of allegations of that. And we'll get on to the lack of really any means of legal accountability …” View more
Ridealong summary
The Maersk Alabama incident rattled the shipping industry and highlighted modern piracy's shift from theft to hostage-taking. In 2009, Somali pirates captured the U.S.-flagged ship, leading to a dramatic standoff with U.S. Navy SEALs that ended with the pirates being shot to rescue the captain. This event not only sparked fear in maritime security but also raised complex jurisdictional issues surrounding piracy.
Behind the Bastards · It Could Happen Here Weekly 224 · Mar 21, 2026
TBPN
“… jump off point into the OT or critical infrastructure sector of the network. Now, to put those four pieces of data points together, you need a board security engineer, you need a red team to come in and find it for you, and they might not ever find it. even though they might spend three months trying to look for it. So that could be one of 100 attack pads that exist in your environment. So that's kind of the pre-attack latent risk piece. And then on the post-attack side, you've got data that's just being emitted from everyone's devices inside these environments. And what that data can tell you is, …” “… in the Middle East. And the reason that attack was able to go down is because no one put the pieces of the puzzle together that, hey, we've got a senior engineering dude with a system that has weak controls applied to it that also serves as a jump off point into the OT or critical infrastructure sector of the network. Now, to put those four pieces of data points together, you need a board security engineer, you need a red team to come in and find it for you, and they might not ever find it. even though they might spend three months trying to look for it. So that could be one of 100 attack pads that exist in your environment. So that's kind of the pre-attack latent risk piece. And then on the post-attack side, you've got data that's just being emitted from everyone's devices inside these environments. And what that data can tell you is, all right, all this latent risk back here, is anyone actually taking advantage of it or exploiting it? This is where this second half of the equation is where you discover that. But what we've done over the past 20 years, because I don't know, the big four consulting firms of the world have told us to do it, is we send data to these data stores like …” View more
Ridealong summary
Cyber attackers are advancing daily, while organizations struggle to keep up at human speed. To combat this, we need a cohesive command and control system for cyber defense, similar to military initiatives, to fuse data and enhance responsiveness. This shift is crucial for identifying and mitigating risks before they escalate into major breaches.
TBPN · Ellison's Media Empire, Ken Burns Joins, Cursor Mic Drop | Matthew Belloni, Gokul Rajaram, Nik Seetharaman, Raj Rajamani, James Everingham, Dr. Felix Ejeckam · Mar 03, 2026
TBPN
“… their customer base is not using these tools maliciously. the hackers sort of wind up on the lagging edge, not on the frontier, but all of the cybersecurity companies like Palo Alto Networks, like CrowdStrike, like the folks that you've had at your conference, they maintain access to the frontier, and so they're always fighting with a bigger weapon. Is that sort of the equilibrium we should expect here? That's a great question. And by the way, we did have today the two top cybersecurity experts at Antropic, the head of security and the head of product security, sharing the roadmap and thoughts …” “… this person just spent $5 million on our API and it's all cyber attack related prompts. Like, let's maybe turn them off or figure out what's going on over there. They have a huge incentive to sort of, you know, control their customer base so that their customer base is not using these tools maliciously. the hackers sort of wind up on the lagging edge, not on the frontier, but all of the cybersecurity companies like Palo Alto Networks, like CrowdStrike, like the folks that you've had at your conference, they maintain access to the frontier, and so they're always fighting with a bigger weapon. Is that sort of the equilibrium we should expect here? That's a great question. And by the way, we did have today the two top cybersecurity experts at Antropic, the head of security and the head of product security, sharing the roadmap and thoughts about the upcoming capabilities of Antropic and other platforms. I think the answer to that is our continuous investment in innovation in the space. It's not just about Weez that I mentioned or Sierra. Those are large established startups. But we did have one company going out of stealth last week, Onyx Security. All they do is agent security. We had …” View more
Ridealong summary
Threat actors are outpacing defenders in the race to leverage AI for cyber attacks, creating a significant risk. While cybersecurity companies are innovating to combat this threat, the gap in adoption speeds leaves defenders at a disadvantage. However, the emergence of new security-focused startups may shift the balance in the coming years.
TBPN · AI Side Quests, Zaslav's Payday, SF Housing Market is Back | Shyam Sankar, Gili Raanan, Anna Patterson, Jake Loosararian, carried_no_interest · Mar 17, 2026
The Bobby Bones Show
Ridealong summary
In this hilarious segment, a dinner check sparks a debate about restaurant behavior, leading to a wild story of credit card hacking at a place called Poppy Garden. The punchline hits when the host discovers that even after getting hacked, he can still use Apple Pay with his new card number before it arrives!
The Bobby Bones Show · Best 7 Segments From The Bobby Bones Show This Week · Mar 21, 2026
The Dan Patrick Show
Ridealong summary
The Miami Dolphins and New York Jets are both predicted to have an over/under of five and a half wins this upcoming NFL season, sparking a heated debate on who will come out on top. In a lively discussion, fans express their loyalty while weighing in on the teams' prospects, with the Dolphins facing significant scrutiny. This rivalry sets the stage for an exciting season ahead as fans place their bets.
The Dan Patrick Show · Hour 2 – Seth Greenberg, Oscars Odds · Mar 13, 2026
Embracing Digital Transformation
Ridealong summary
Unprotected printers can compromise your entire network, and many are left vulnerable by default settings. The surprising truth is that even a simple USB upload can turn a printer into a gateway for malware, spreading it throughout the system. This highlights the critical need for better security measures in seemingly harmless office devices.
Embracing Digital Transformation · #341 The Hidden Cyber Threats in Printers and IoT Devices · Apr 09, 2026
Smashing Security
Ridealong summary
Bragging about your cryptocurrency wealth can put you at risk of robbery or worse. Criminals often target individuals based on their lifestyle cues and online presence, making it crucial to keep your assets private. This alarming reality is highlighted by the experiences of high-net-worth individuals who may even require bodyguards due to threats.
Smashing Security · LinkedIn is spying on you, and you agreed to nothing · Apr 08, 2026
CISO Series Podcast
“… going on, of course, but very few times do we communicate that we need something for our program that we don't get. Also, find a way to show that security is an enabler of the business. Like a good example is a password manager because everybody hates passwords, right? Or implementing password lists throughout your organization, which is hard to do. But if you can find those quick wins, easy wins, you're a hero. Like I'm a hero with my husband because of a password manager. So it works. You know, my co-host, Mike Johnson, CISO of Rivian, his thing is he tries to talk to the employees about their …” “there are some healthy challenging going on, of course, but very few times do we communicate that we need something for our program that we don't get. Also, find a way to show that security is an enabler of the business. Like a good example is a password manager because everybody hates passwords, right? Or implementing password lists throughout your organization, which is hard to do. But if you can find those quick wins, easy wins, you're a hero. Like I'm a hero with my husband because of a password manager. So it works. You know, my co-host, Mike Johnson, CISO of Rivian, his thing is he tries to talk to the employees about their personal security. And if he does that first, then they get understand business security because if you can't get them to understand their own security, I mean, that's a crazy logical leap to business security. Yes, you're both nodding your heads. I don't think it's a crazy leap. I use it all the time. No, no, I'm saying if you don't do it, it's a …” View more
Ridealong summary
A strong security culture can drive business success, but it starts with the security team understanding their role as business architects. By asking 'why' repeatedly, security leaders can instill a business mindset within their teams, leading to better decision-making and resilience. This approach not only improves security but also enhances product velocity and customer trust.
CISO Series Podcast · Do You Think These Compliance Boxes Check Themselves? (LIVE in Clearwater, FL) · Mar 31, 2026
Connections Podcast
Ridealong summary
AI has already led to the loss of 90,000 jobs in the past year, and experts warn this is just the beginning. Holly Elmore from PauseAI argues that we must create international treaties to prevent further job loss and even potential human extinction, rejecting the idea that we should simply adapt to AI's rise. The urgency of addressing these issues is clear, as the technology poses unforeseen dangers to society.
Connections Podcast · The movement to head off an AI catastrophe · Mar 30, 2026
Morning Brew Daily
“… is Iran, which the U.S. is targeting. Moving on, the long national nightmare of long national lines might soon be over. Trump directed Homeland Security to start paying TSA workers just before the weekend, even though Congress failed to agree on a path to end the partial government shutdown. That means agents could start seeing paychecks as soon as today, but don't expect the lines that TSA just snap back to normal immediately. Almost 500 TSA agents have fully quit since the funding lapse in mid-February. That is in addition to the 1,000 agents that quit during the 43-day government shutdown …” “… Iran is earning about $139 million a day from oil sales in March, up from $115 million into February. So that's around 30% more revenue. It seems like the only person benefiting, at least economically, in terms of selling their oil on the global markets is Iran, which the U.S. is targeting. Moving on, the long national nightmare of long national lines might soon be over. Trump directed Homeland Security to start paying TSA workers just before the weekend, even though Congress failed to agree on a path to end the partial government shutdown. That means agents could start seeing paychecks as soon as today, but don't expect the lines that TSA just snap back to normal immediately. Almost 500 TSA agents have fully quit since the funding lapse in mid-February. That is in addition to the 1,000 agents that quit during the 43-day government shutdown last year. Those roles won't be easy to replace. It takes four to six months to complete training. Plus, it's not like people are applying in droves for a job that increasingly gets caught up in political skirmishes leading to lost paychecks. Adam Stahl, TSA's chief of staff, said last week that the situation will get worse before it gets better, …” View more
Ridealong summary
The TSA is facing a staffing crisis, leading to record-long security lines at airports. Despite Trump’s order to restore pay for TSA workers, many have quit, resulting in a 40% call-out rate at some airports. With lengthy training processes and a lack of job security, the situation is expected to worsen before it improves.
Morning Brew Daily · Investors Lose Patience with Iran War & TSA Workers Finally Get Paid · Mar 30, 2026
Embracing Digital Transformation
“… in the web server and then everything was fixed. And we were pulling our hair out for over a week on that particular issue. How do you handle the security handouts? Because you mentioned the certifications and things like this. When you have so many vendors and you're actually moving data between all these vendors, there's so many questions on this one. But let's talk about security first. How do you handle the security between these? Do you have a common security design pattern that you use? Because that's a lot of vendors, 25 vendors. That's a lot. It's a lot. Yeah, for sure. So we rigorous …” “… logs okay try it now click oh and that's when it's like ah we didn't give you the new root CA here and they you know They send us the PKS file or what, I can't remember at this point. But they send us the group of certificates and we get those loaded in the web server and then everything was fixed. And we were pulling our hair out for over a week on that particular issue. How do you handle the security handouts? Because you mentioned the certifications and things like this. When you have so many vendors and you're actually moving data between all these vendors, there's so many questions on this one. But let's talk about security first. How do you handle the security between these? Do you have a common security design pattern that you use? Because that's a lot of vendors, 25 vendors. That's a lot. It's a lot. Yeah, for sure. So we rigorous risk assessments, and that's the number one thing that the NCUA is always looking for us in our regulation is the credit union performing reasonable information security risk assessments of all vendors and everything that we do. So when I first got here, we put into play just adhering to the NIST standards, the 800-DASH document on guide to risk …” View more
Ridealong summary
A week-long vendor issue was resolved when a missing encryption certificate was finally identified. This incident highlights the importance of rigorous risk assessments and adherence to NIST standards for managing security across multiple vendors. By implementing these practices, organizations can effectively mitigate risks and ensure compliance with regulatory requirements.
Embracing Digital Transformation · #337 Mastering Vendor Security in Financial Services: A 12-Year Journey · Mar 25, 2026
"The Cognitive Revolution" | AI Builders, Researchers, and Live Player Analysis
“… take the vacation with the kids, do the fun stuff, support the charities, whatever the case may be, but just at least have that kind of baseline security that gives me the confidence that I can drop out of any commercial relationships that I might need to drop out of. Any provisions you would offer to my plan?” “… exposed to it with the goal of hopefully being able to drop whatever commitments i have forego all income contribute however i can contribute to be useful and then beyond that i think basically spend and or give it all away is kind of my mindset. Like, take the vacation with the kids, do the fun stuff, support the charities, whatever the case may be, but just at least have that kind of baseline security that gives me the confidence that I can drop out of any commercial relationships that I might need to drop out of. Any provisions you would offer to my plan?” View more
Ridealong summary
Imagine being financially secure enough to drop all commitments and focus on what truly matters. Zvi Mowshowitz shares his vision of achieving a baseline financial security that allows him to spend time with family, support charities, and contribute to society without the burden of commercial obligations. This mindset not only fosters personal freedom but also empowers a more meaningful life amidst the uncertainties of AI-driven job loss.
"The Cognitive Revolution" | AI Builders, Researchers, and Live Player Analysis · Zvi's Mic Works! Recursive Self-Improvement, Live Player Analysis, Anthropic vs DoW + More! · Mar 19, 2026
Defense in Depth
“… ones in here, so narrow it down to one. It was that first one, the very, very first one by James, DevelopSec. Where he spelled out the fact that security did all this stuff with no input from development. Yeah, because it's so true. I can't tell you how many people I've worked with where a new security leader comes in and is like, yep, you know, I just walked into this and I'm trying to put together an application security program. And the development team does not like the security tooling at all. And it's because they weren't consulted with. Nobody asked them, hey, what do you all think if we …” “And that is the root cause of a problem. Very well said, Steve. All right, this comes to the portion of the show. Matt, I'm going to be throwing this to you first, where I ask you which quote of these was your favorite and why. And there's a lot of good ones in here, so narrow it down to one. It was that first one, the very, very first one by James, DevelopSec. Where he spelled out the fact that security did all this stuff with no input from development. Yeah, because it's so true. I can't tell you how many people I've worked with where a new security leader comes in and is like, yep, you know, I just walked into this and I'm trying to put together an application security program. And the development team does not like the security tooling at all. And it's because they weren't consulted with. Nobody asked them, hey, what do you all think if we do this? What do you folks think? How should we? They just did it and was like, you have to fix this. Nothing got fixed ever. And that's why security tools amongst developers get such a bad rep because they're not involved at all. Like anytime I work with a customer and we do a proof of concept and there's not a developer on the call, I say, …” View more
Ridealong summary
Ignoring developers in security decisions leads to ineffective tools and unresolved issues. A quote from James at DevelopSec highlights this problem, emphasizing that security measures are often implemented without consulting the very people who need to fix them. Involving developers in the conversation is crucial for a successful application security program.
Defense in Depth · Who is Responsible for the Conflict Between Security and Developers? · Mar 19, 2026
AI + a16z
“… so. Yeah. Right? It's like it's this, we have this genie in a bottle. It's amazing. But how do I contain this? Has it ever happened before? I mean, security has always come at the end. Like it's never, I think it's just that we've solved, we've solved the coding side of this, the writing code side. And now it's more of a systems engineering. These are all fundamentally just systems and architectural problems. It's not necessarily security issues. Social engineering to some extent is, but that's, the problem is, is you're bringing up, you're co-mingling risks across different trust domains with …” “… code. Putting all of this together, I think what's super fascinating to me is this is one of the first times we're having technology. But what it can do is not limited by its abilities, but limited by how I can make it secure and stop it from doing so. Yeah. Right? It's like it's this, we have this genie in a bottle. It's amazing. But how do I contain this? Has it ever happened before? I mean, security has always come at the end. Like it's never, I think it's just that we've solved, we've solved the coding side of this, the writing code side. And now it's more of a systems engineering. These are all fundamentally just systems and architectural problems. It's not necessarily security issues. Social engineering to some extent is, but that's, the problem is, is you're bringing up, you're co-mingling risks across different trust domains with this. So you have the trust and safety and alignment issues with your underlying foundation models. You have the systems architecture and execution around how OpenClaw does things on your local machine. And then you have the sort of the traditional hacking sort of, you know, prompt injection type stuff. Like people want to do malicious. People want to …” View more
Ridealong summary
The future of note-taking for AI agents is evolving beyond simple markdown to include executable code and dynamic charts, creating a richer source of truth. However, this technological advancement raises significant security challenges, as the ability to execute code must be balanced with the need to contain potential risks. Ultimately, the focus is shifting from coding capabilities to systems engineering and security architecture to ensure safe interactions with these powerful tools.
AI + a16z · OpenClaw: Why the Internet Isn't Built for AI Agents · Mar 19, 2026
Threat Vector by Palo Alto Networks
Ridealong summary
In ransomware negotiations, never appear desperate or rude to the attackers, as it can diminish your leverage and increase costs. Timing is crucial; negotiations typically start within three to five days, but if backups are intact, walking away might be the best option. Understanding when to engage or disengage can significantly impact the outcome for the victim organization.
Threat Vector by Palo Alto Networks · Inside Ransomware Negotiations: Trust Criminals or Walk Away? · Mar 19, 2026
Security Now (Audio)
Ridealong summary
CISA's Cyber Hygiene program is a game changer for organizations, offering free vulnerability scanning to enhance security. Once accepted, organizations receive detailed reports on vulnerabilities, with scanning frequency determined by severity, ensuring critical issues are addressed promptly. This proactive approach helps businesses stay ahead of potential cyber threats.
Security Now (Audio) · SN 1070: CISA's Free Internet Scanning - Malware Disguised as a VPN · Mar 17, 2026

Top Podcasts About JetStream Security

The Watch Floor with Sarah Adams
The Watch Floor with Sarah Adams
4 episodes
TBPN
TBPN
3 episodes
The Dan Patrick Show
The Dan Patrick Show
3 episodes
CISO Series Podcast
CISO Series Podcast
3 episodes
Security Now (Audio)
Security Now (Audio)
3 episodes
Bannon`s War Room
Bannon`s War Room
3 episodes
Pardon My Take
Pardon My Take
3 episodes
The Megyn Kelly Show
The Megyn Kelly Show
3 episodes

Stories Mentioning JetStream Security

Top Podcasts on Political Violence Against Trump
There is an increasing concern about political violence in the United States, particularly regarding threats against former President Donald Trump. This rise in threats highlights the ongoing tensions and security challenges in the political landscape, which could have significant implications for public safety and political stability.
May 02, 2026 · 25 clips · 15 podcasts
Top Podcasts on Bitcoin's Quantum Threat
The cryptocurrency market, including Bitcoin, is experiencing significant developments with the potential threat from quantum computing, increasing institutional adoption, and heightened regulatory scrutiny. These factors are shaping the future landscape of digital currencies, impacting their security, acceptance, and compliance requirements.
bitcoin
Apr 29, 2026 · 16 clips · 6 podcasts