Épisodes

  • How Intellectuals Dismantle Society From Within
    Feb 20 2026

    This podcast profiles the life and philosophy of Thomas Sowell, a prominent economist who critiques the "anointed" class of intellectuals for prioritizing abstract theories over empirical reality. The texts argue that modern intellectuals often champion a vision of "liberation" from traditional social restraints, which Sowell contends has historically led to disastrous outcomes like family disintegration and increased crime. Through books like Intellectuals and Society, he highlights a dangerous lack of accountability among idea workers who influence public policy without facing the consequences of their failed prescriptions. Parables within the collection further illustrate the risks of abandoning ancestral wisdom and the necessity of pairing personal freedom with individual responsibility. Ultimately, the sources celebrate Sowell’s commitment to hard data and his belief that the prosperity of ordinary people depends on a refuge from the presumptuous social engineering of elites.

    Afficher plus Afficher moins
    38 min
  • Rumi’s Animals Roast Your Ego
    Feb 20 2026

    This podcast examines the mystical and pedagogical dimensions of Sufism, primarily through the symbolic Quranic narrative of Moses and the spiritual guide Khidr. Scholars and poets like Rumi and al-Qushayri use this story to illustrate the master-disciple relationship, emphasizing that true wisdom often transcends external law and human logic. The texts explore how mystical "unveiling" allows practitioners to move beyond physical senses to perceive divine realities and achieve spiritual purity. Further commentary connects these Islamic traditions to broader philosophical frameworks, including Neoplatonism and historical hagiographies of various saints. Ultimately, the collection highlights the transformation of the soul from worldly attachment to a state of divine union and contentment.

    Afficher plus Afficher moins
    17 min
  • Ethics & Privacy - Podcast 06 - The Intellectual Property Survival Guide
    Feb 19 2026

    This podcast examines the complex legal and historical landscape of intellectual property, specifically focusing on copyrights, trademarks, and patents. One article outlines the evolution of the fair use defense in the software industry, while another explores how international systems distinguish between the flexible fair useapproach and the rigid fair dealing rules. The United States Patent and Trademark Office provides practical guidance on the registration process and the necessity of avoiding consumer confusion. A biographical account of actress Hedy Lamarr highlights the real-world impact of patents, detailing her contribution to frequency-hopping technology. Finally, a satirical cartoon critiques the entertainment industry for using copyright laws to prioritize corporate profits over human rights and technological progress. Together, these materials illustrate the ongoing tension between protecting individual innovation and ensuring public access to information.

    Afficher plus Afficher moins
    18 min
  • CVSS, CVE, VPR, & NVD
    Feb 18 2026

    This podcast examines the essential frameworks used to identify, analyze, and rank security threats, specifically focusing on the roles of MITRE and the National Vulnerability Database (NVD). While MITRE serves as the primary authority for assigning CVE identifiers, the NVD enriches this data with CVSS scores to help organizations gauge the technical severity of vulnerabilities. The documentation highlights that CVSS measures severity rather than total risk, prompting the development of more dynamic systems like Tenable’s Vulnerability Priority Rating (VPR) and CVSS v4.0. These newer models integrate threat intelligence, environmental context, and supplemental metrics such as exploit maturity and safety impacts. Furthermore, the texts present a risk-based methodology for prioritizing patches by simulating attack paths within specific hardware contexts, such as residential gateways. Ultimately, the sources advocate for moving beyond static severity scores to achieve a more nuanced, context-aware assessment of cybersecurity risks.

    Afficher plus Afficher moins
    37 min
  • MITRE ATT&CK, Lockheed Cyber Kill Chain, & The Diamond Model Of Intrusion Analysis
    Feb 18 2026

    This podcast analyzes and compares three primary frameworks used in modern cybersecurity: the Lockheed Martin Cyber Kill Chain, the MITRE ATT&CK Matrix, and the Diamond Model of Intrusion Analysis. The Cyber Kill Chain offers a linear perspective on the stages of an attack, while MITRE ATT&CK provides an extensive database of specific adversary behaviors and technical methods. In contrast, the Diamond Model focuses on the underlying relationships between an attacker, their capabilities, the infrastructure used, and the ultimate victim. Experts suggest that integrating these models allows organizations to move beyond simple alerts toward a more strategic understanding of adversary motives and threat attribution. By combining these methodologies, security teams can better identify defensive gaps, conduct more accurate threat hunting, and communicate complex risks to stakeholders. This comprehensive approach transforms raw data into actionable intelligence to counter sophisticated threats like Advanced Persistent Threats.

    Afficher plus Afficher moins
    27 min
  • NIST Cybersecurity Framework (NIST CSF)
    Feb 18 2026

    The NIST Cybersecurity Framework (CSF) 2.0 serves as a foundational guide for organizations of all sizes to manage and reduce cybersecurity risks through a standardized taxonomy of functions and outcomes. A central component of this manual is the use of Organizational Profiles, which allow entities to document their Current Profile of existing practices and define a Target Profile representing their desired security posture. By performing a Gap Analysis between these two states, organizations can identify deficiencies and build a prioritized Action Plan to improve their resilience. The framework is supported by a suite of online resources, including Implementation Examples for practical application and Informative References that link to global standards like ISO/IEC 27001. Ultimately, this version emphasizes governance and supply chain risk, ensuring that cybersecurity strategy is integrated into broader enterprise risk management objectives. This structured approach fosters clear communication between technical practitioners and executive leadership to drive continuous improvement over time.

    Afficher plus Afficher moins
    30 min
  • Security Analytics - Podcast 04 - Machine Learning Security Applications For Business
    Feb 16 2026

    This podcast investigates advanced methods for enhancing cybersecurity through the application of machine learning. The primary study details the creation of a neural network specifically designed to identify and categorize DDoS flooding attacks, such as SYN and UDP flooding, with high precision. By utilizing a 24-106-5 architecture, the researchers achieved an accuracy rate of over 95% in both simulated and laboratory environments. A second source complements this by exploring the detection of pivoting activity, using statistical correlation and Principal Component Analysis to identify malicious movements within a network. Together, these sources demonstrate how automated data analysis can distinguish between legitimate traffic and sophisticated threats. Consequently, the findings suggest that neural networks and algorithmic feature extraction are essential for maintaining robust, modern information security systems.

    Afficher plus Afficher moins
    15 min
  • AI RMF Podcast 09 - NIST AI 100 - 2e2025 - Adversarial Machine Learning
    Feb 15 2026

    National Institute of Standards and Technology AI 100-2e2025, Adversarial Machine Learning, examines the security risks posed by malicious actors who intentionally manipulate machine learning systems and outlines strategies to strengthen their resilience. The report explains how adversarial attacks can occur during different phases of the AI lifecycle, including data poisoning during training, model evasion through carefully crafted inputs, model extraction, and inference-time manipulation. It emphasizes that AI systems introduce new attack surfaces beyond traditional cybersecurity threats, requiring specialized risk assessment, testing, and monitoring approaches. The publication promotes secure-by-design principles, robust evaluation techniques, red-teaming, and continuous monitoring to detect and mitigate adversarial behaviors. Ultimately, NIST AI 100-2e2025 reinforces the need to integrate AI security into broader risk management and governance frameworks, ensuring machine learning systems remain reliable, trustworthy, and resilient in adversarial environments.

    Afficher plus Afficher moins
    14 min