Jump to content
People were interested in these podcasts
Play Episode
53min
RealClear Defense presents Hot Wash
Did the Cold War Really End? 100 Years of Espionage with Calder Walton
Did the Cold War really end? As recently as this week, the New York Times confirmed that in 2020 Russian intelligence attempted to assassinate a defector on US soil, crossing a major red line even during the height of the Cold War. On today’s episode of the RealClearDefense podcast “Hot Wash” host John Sorensen and RCD contributor John Waters speak with Calder Walton, the historian who uncovered that attempted assassination and the author of a new book, “SPIES: The Epic Intelligence War Between the East and West.” Using archival evidence only declassified as recently as 2022, Walton looks at the 100 year espionage competition between the Soviet, American and British intelligence services. By comparing each side’s internal secrets the book reveals double agents, the tactics of disinformation, covert action, and assassinations. How did espionage shape the Cold War?Walton is the Assistant Director of the Harvard Belfer Center for Applied History and Intelligence Project. He is also the author of the three-volume Cambridge History of Espionage and Intelligence and Empire of Secrets: British Intelligence, the Cold War, and the Twilight of Empire."Follow Hot Wash on Twitter @hotwashrcdEmail comments and story suggestions to editors@realcleardefense.comSubscribe to the RealClearDefense Podcast "Hot Wash"Subscribe to the Morning Recon newsletterfor a daily roundup of news and opinion on the issues that matter for military, defense, veteran affairs, and national security.
The Movie Roulette Podcast
Filler, Volume 4 - The Power (Hour) Of Love
Send us a textHappy new year! It’s 2025! Can you even believe that?! We’ve got a special episode for you today. We’re doing a power hour! We do shots of beer every 2 minutes (hey, we’re old, and a power hour is a young man’s game). With each shot, we have to answer a question. We are joined by Tiffany Douglas (aka Jason’s MUCH better half). She wrote the questions, she asks the questions, she keeps time, and she tries to keep order in the studio (she should’ve brought a gavel). Jenna In The Corner (aka Shrout’s MUCH better half) also joins us off camera. Other guest appearances include Qwarstion Dunst, David Fucktion, and Dick Bigdick. It’s a party. Don’t get left out! Come drink with us!Support the showFollow Us Everywhere and Anywhere You Do You Social Medias Stuff: Instagram: https://www.instagram.com/themovieroulettepodcastTikTok:https://www.tiktok.com/@themovieroulettepodcastFacebook: https://www.facebook.com/themovieroulettepodcastYouTube: https://www.youtube.com/@TheMovieRoulettePodcast
PrOTect It All
Understanding Cybersecurity Challenges in Industrial Settings with Lesley Carhart
In this episode, host Aaron Crow converses with Lesley Carhart, Technical Director at Dragos, who brings over 15 years of experience in incident response and forensics within critical infrastructure sectors. The episode dives deep into the standard practices in industrial settings, such as operators shutting down power plants for safety and the lack of forensic investigation into equipment failures. Lesley emphasizes the importance of integrating cybersecurity into these environments, pointing out that many failures are due to maintenance or human error, though a notable portion does involve cyber threats. Listeners will learn about the challenges and necessary collaborations between operational technology (OT) and information technology (IT) teams. The discussion addresses cultural and trust barriers that hinder effective cybersecurity measures and advises on how organizations can improve their defenses regardless of size and resources. Lesley also highlights the evolving landscape of cyber threats, including the increasing sophistication of adversaries and the vulnerabilities caused by standardizations in industrial systems. Real-world examples underscore the complexity of securing these environments, emphasizing the need for proactive and informed cybersecurity practices, such as "cyber-informed engineering." Tune in to better understand the critical intersections of cybersecurity and industrial operations, and learn practical strategies to safeguard essential services. Key Moments:  05:00 IT-OT miscommunication leads to cybersecurity risks. 09:23 IT processes are too slow; bypassing is required for solutions. 11:36 Leaving an outdated system may pose less risk. 15:09 Slow changes in OT due to unforeseen impacts. 19:17 Include cybersecurity in root cause analysis discussions. 20:31 Nation-states analyze and bypass industrial control systems. 25:40 Cybersecurity is essential to combat potential system threats. 29:27 Communication, champions, and leadership crucia
CryptoSlate SlateCast
Building the decentralized data layer with Powerloom’s Swaroop Hegde
Swaroop Hegde, CEO and Co-Founder of Powerloom, joined CryptoSlate’s Editor-in-Chief, Liam “Akiba” Wright, and CEO Nate Whitehill on The SlateCast to discuss the future of decentralized data layers. Backed by notable names like Blockchain Capital and Filecoin, Powerloom is setting a new standard for composable and decentralized data solutions, reshaping how users interact with on-chain data and fostering innovation across web3 applications.The Challenge of Reliable On-Chain DataSwaroop began by highlighting the current inefficiencies in accessing and verifying on-chain data. Traditional methods rely heavily on centralized sources, such as CoinMarketCap or specific blockchain dashboards, leading to potential data manipulation and outdated information.“Most of the usage when it goes outside of the dApp is actually coming from some sort of centralized indexer,”Swaroop noted, emphasizing the vulnerabilities inherent in such a setup.Powerloom addresses these issues with a decentralized node network, enabling real-time data computation without the need for a centralized intermediary.“With over 5,300 nodes, even non-technical users can contribute to the network, ensuring verifiability and reliability,” he explained.Powerloom’s Unique Approach to Data CompositionUnlike traditional indexers, Powerloom operates on a demand-driven system that aggregates data atomically. Swaroop explained,“We don’t sit and index all the data. Instead, we focus on composing data dynamically based on demand.”This approach allows Powerloom to cater to a variety of use cases, from trading data to lending rates across multiple chains.The platform’s composability extends beyond Uniswap and Aave, creating “data markets” that empower users to craft personalized queries and insights. These markets are decentralized and verifiable, ensuring users can trust the integrity of their data.Introducing Generative Prediction Markets (GPM)A standout feature discussed was Powerloom’s Generative Prediction Markets

Report

×
×
  • Create New...