Podcast

Latest Episode

Cyber and Safety Brief: EU Attacks, U.S. Breaches, DoD Privacy Rule, NIST/AI Guidance, Santa Actor Released in Child Exploitation Case, Bucks Fire Cause — plus Pet Gift Picks

Officials identify cause of Bucks County fire that displaced family of eight

Officials have identified the cause of the Bucks County fire that displaced a family of eight, and quick action by neighbor Justin Ritorto and Officer Sean Peck—who entered the smoke-filled home to wake the residents—helped get everyone out.

Santa actor facing child sexual abuse material charges released from jail

Santa actor facing child sexual abuse material charges released from jail: A retired New Jersey elementary school teacher who performs as Santa was arrested on child pornography charges and has since been released from jail pending further proceedings.

Top Holiday Gifts for Dogs, Cats, and Their Owners

Top Holiday Gifts for Dogs, Cats, and Their Owners: a curated set of fun, unique picks that pamper the pets and spare the humans—playful toys and clever accessories that make care easier while keeping tails wagging and whiskers twitching. Because if we’re going to be staff to our four-legged overlords, we might as well upgrade the uniform.

France and Germany Confront Nation-State Cyberattacks

France and Germany confront nation-state cyberattacks: France’s Interior Ministry is probing a suspected state-backed hit on its email server, while Germany—blaming Russian government hackers for a 2024 breach of air traffic control systems—has summoned the Russian ambassador. Digital brinkmanship meets the diplomatic equivalent of “see me after class.”

Fieldtex and TriZetto Disclose New Health Data Breaches

Fieldtex and TriZetto disclose new health data breaches, joining the latest wave of HIPAA business associates acknowledging hacks. New York-based medical supply fulfillment company Fieldtex is notifying clients and more than 274,000 people about an August intrusion, while revenue cycle software firm TriZetto is contacting its customers and patients about its own breach—because in healthcare, nothing gets shared more freely than your data.

Defense Department Proposes Rule on Privacy Training

Defense Department Proposes Rule on Privacy Training: partnering with two other federal agencies, the Pentagon has issued a proposed rule designed to ensure government contractors give their staff adequate privacy training—basic homework to keep sensitive data from doing a casual tour of the public domain.

NIST SP 800-61 Rev. 1: Guide to Handling Computer Security Incidents

NIST SP 800-61 Rev. 1: Guide to Handling Computer Security Incidents lays out how organizations can build processes to rapidly detect and respond to cyber incidents—because yanking the power cord and panicking is not a strategy. The guidance pushes teams toward clear workflows, faster escalation, and coordinated action so breaches trigger muscle memory, not chaos.

Draft NIST FIPS Publication 201-2: Personal Identity Verification for Federal Employees and Contractors

Draft NIST FIPS Publication 201-2: Personal Identity Verification for Federal Employees and Contractors sets out the architecture and technical requirements for a common ID standard across the federal workforce and its contractors. Translation: one badge to rule the cubicles, replacing agency-by-agency ID bingo with standardized verification. A rare moment when bureaucracy claims it’s simplifying something—alert the archivists.

NIST SP 800-39: Guidance for Managing Information Security Risk

NIST SP 800-39: Guidance for Managing Information Security Risk lays out a tiered, grown-up approach to cybersecurity—aligning decisions across the organization, the mission/business processes, and the information systems that actually do the work. It pushes leaders to set risk appetite and responsibilities at the top, integrate risk into day-to-day mission workflows in the middle, and implement concrete controls and tradeoffs at the system level at the bottom. The method is continuous—frame, assess, respond, monitor—with feedback flowing up and down so boardroom bravado translates into real configurations, and system realities puncture PowerPoint fantasies. In short: less checkbox theater, more coherent risk management before the breach press conference.

Briefing the Board on Agentic AI

Briefing the Board on Agentic AI now means explaining the bots won’t wait for next quarter’s committee meeting. Boards are finally tuning in, but their governance machinery—built for leisurely PowerPoints, not runaway feedback loops—can’t keep pace with AI’s speed and complexity, warns JoAnn Stonier, former chief data and AI officer at Mastercard.

About

This podcast is a fully automated experiment in AI-generated content. Generative AI handles the entire process, including code, content selection, summarization, and audio production. The podcast processes material from various sources, condenses it into concise text, and converts it into speech. No human intervention is involved in the production process.

Subscribe

Spotify / Apple / Amazon / iHeart / Pandora / Pocket Casts / Deezer / Google / Podcast Index / RSS