show episodes
 
Artwork

1
DataTalk

Experian

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Månedlig
 
Experian's DataTalk is a fun show featuring data science leaders and technologists from around the world. We talk about artificial intelligence, machine learning, deep learning, computer vision, data visualizations, data ethics, data philanthropy, and much more. Hosted by Mike Delgado
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daglig
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
GDPR Now!

Karen Heaton/Data Protection 4 Business

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Månedlig
 
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Månedlig
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Artwork

1
The Privacy Advisor Podcast

Jedidiah Bracy, IAPP Editorial Director

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Månedlig
 
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
  continue reading
 
Artwork

1
To The Point - Cybersecurity

Forcepoint | Global Cybersecurity Leader | Security. Simplified.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ukentlig
 
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
  continue reading
 
Artwork
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Smooth Scaling: System Design for High Traffic focuses on all things scalability, reliability, and performance. Tune in for expert advice on how to scale systems, control costs, boost availability, optimize performance, and get the most out of your tech stack. Host Jose Quaresma is the VP of Technical Engagement at Queue-it, working on the frontlines with some of the world’s biggest businesses on their busiest days, from Ticketmaster to Zalando to Home Office U.K. He’ll be joined by experts ...
  continue reading
 
This show is designed to keep you up to date on the latest trends happening in data, digital, outsourcing and software. Just 20-30 minutes long, each podcast session provides insight on legal issues relating to technology transactions and touches on relevant and timely topics.
  continue reading
 
Artwork

1
RowingChat

Rebecca Caroe

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ukentlig
 
Rowing Chat is the podcast network dedicated to rowing. We have many shows hosted from around the world on specialist topics from Strength Training to USA news, from interviews to data analysis. Produced by Rebecca Caroe, it brings rowing news, coaching advice and interviews to you. Go to https://rowing.chat/ for links to the latest episodes & subscribe in your favourite podcast software.
  continue reading
 
Artwork
 
Techlore Talks brings you in-depth conversations with the experts at the forefront of privacy, security, and digital rights. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode features meaningful discussions with the people building, researching, and advocating for digital freedom. From cybersecurity researchers and privacy tool developers to open-source advocates and digital rights activists—if they're shaping how we protect ourselves online, the ...
  continue reading
 
Techlore Surveillance Report is your weekly deep-dive into the privacy and security news that matters for your digital freedom. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode cuts through the noise to bring you carefully selected stories with the context, analysis, and historical perspective you need to truly understand what's happening to protect yourself (and others!) in the digital space. Topics covered include: • Privacy tool updates and v ...
  continue reading
 
Artwork
 
Software testing is the most important part of software development, but it is especially significant for healthcare software. Healthcare software applications manage patient data, offer medical services, and ensure compliance with various standards and regulations. Defects or errors in healthcare software can have consequences for patient security, data protection, and functional efficiency.
  continue reading
 
Artwork
 
Welcome to Avero GovTech Insights, your go-to podcast for the latest trends, insights, and innovations in government technology. Each episode brings you expert analysis and discussions on a wide range of topics, from data analytics to digital transformation and public sector ERP systems. Join us as we explore the technologies shaping the future of public services and discover how you can leverage them to drive efficiency, transparency, and better outcomes for your community.
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ukentlig
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
Cyber Security Café

Beverley Roche

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Månedlig
 
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
  continue reading
 
The federal government spends $90 billion on technology every year. If you are a tech innovator and want to expand your share of the market, this is the podcast for you to find new opportunities for growth. Every week, Federal Tech Podcast sits down with successful innovators who have solved complex computer system problems for federal agencies. They cover topics like Artificial Intelligence, Zero Trust, and the Hybrid Cloud. You can listen to the technical issues that concern federal agenci ...
  continue reading
 
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
  continue reading
 
Artwork

1
TMChats

Coforge

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Månedlig
 
Welcome to TMChats, the Innovation & Community Podcast powered by Coforge! We are a digital services and solutions provider and an Elite ServiceNow Partner in Australia. Here at Coforge, we feel we’ve got so much to share with the ServiceNow community, whether you’re an experienced developer or a new platform customer. We welcome you to relevant, insightful, and useful content to help you continue along your ServiceNow journey.
  continue reading
 
Let's be honest: Your company is already planning how AI will replace you. They're not evil. They're practical. AI is faster, cheaper, and doesn't need health insurance. The only question is whether you'll see it coming and adapt—or be blindsided like millions before you. I'm Carlo Thompson, Distinguished Engineer. I've spent two decades building the networks that now power AI. I understand this technology from the inside, and I'm here to translate it into survival strategies you can actuall ...
  continue reading
 
Artwork

1
The HR Uprising Podcast

Lucinda Carney

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Månedlig+
 
Welcome to the HR Uprising Podcast. This engaging podcast explores HR ‘hot’ topics and challenges through conversations with relevant experts and real-life HR; O.D. or L&D professionals. HR Uprising is about creating an inclusive forum that enables us to share and learn from experts and everyday professionals. Hosted by Actus CEO Lucinda Carney a Business Psychologist; Chartered Psychologist; Experienced HR Change Agent; Entrepreneur; Speaker and Coach. There are two types of show formats: T ...
  continue reading
 
Join us for wide-ranging interviews with water monitoring professionals, who share everything from nitty-gritty project details to big-picture perspective. These conversations between guests and our own groundwater and surface water experts offer fascinating insight into the world of water science and the incredible work being done to protect our precious water resources. Presented to you by In-Situ. We specialize in the manufacture and design of equipment and software used to solve water mo ...
  continue reading
 
Artwork

1
Trail of Bits

Trail of Bits

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ukentlig+
 
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
  continue reading
 
Artwork
 
Every real estate investing coach, influencer, and figure head will tell you they have the answers to financial freedom. The goal of REsimpli’s podcast is to remove the redundant discourse and discuss the realities of the REI space. Host Sharad Mehta speaks to a range of investors in different niches about their wins, losses, and best practices. Through open and honest discussions, our guests provide high level strategies for RE investors at every level. REsimpli is a leading all-in-one inve ...
  continue reading
 
"Expedient: The Podcast" is your gateway to the inner workings of technology and innovation, presented with unparalleled clarity and expertise. Each episode is an invitation to join the luminaries of Expedient along with special guests from the forefront of the tech industry. We delve into the latest advancements in cloud computing, the evolution of data centers, cybersecurity trends, and groundbreaking developments in AI and machine learning. This podcast strips away the complexity of the t ...
  continue reading
 
Artwork

1
Be a Smarter Homeowner

Beth Dodson and John Bodrozic

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Månedlig
 
Welcome to Be a Smarter Homeowner podcast, where hosts, Beth Dodson and John Bodrozic are dedicated to helping you save money and get organized while managing, maintaining, protecting, improving, and eventually buying or selling your largest financial asset and biggest expense, your home. Discover how easy it is to be a smarter homeowner. Having worked with homeowners for over 20 years, your co-hosts are two of the three co-founders of HomeZada, a digital home management software platform th ...
  continue reading
 
Artwork
 
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep ​network visibility to not only protect against sophisticated cyber- ...
  continue reading
 
Has your antivirus just screamed "Threat Found!" and left you asking, "Now what?!" As a UK small business owner or sole trader, a cyber-attack can feel like a direct threat to your business livelihood, your reputation, and everything you've worked hard for. Don't panic! My Antivirus Says "Threat Found!" – Now What? is your essential Malware Alert First Aid Kit, designed specifically for UK SMEs who need practical, immediate cyber security advice to protect what matters most. This podcast cut ...
  continue reading
 
Employing an outside company to handle all payroll-related duties is known as outsourcing payroll services in a business. The main reasons for using payroll management services are to cut costs and free up time when handling payroll-related financial operations. Employing a third party to handle payroll operations frees up a company from having to recruit and educate a sizable in-house payroll team, buy suitable payroll software, and keep up with complicated tax regulations. All business typ ...
  continue reading
 
Artwork

1
Lenovo Support +1(415)547-0376

Lenovo Support +1(415)547-0376

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daglig+
 
Lenovo Customer Care +1(415)547-0376 Support Phone Number Facing any problem while dealing with your Lenovo device? Want to know various services provided by Lenovo? Or Want to access Lenovo Support Service? Click here!! Lenovo Support In today’s world of cut and throw competition, any firm which is ruling the market will keep ruling till their customers were satisfied. And having a satisfied customer is only possible with two things, i.e., Good Quality Product and best Customer Support Serv ...
  continue reading
 
Artwork

1
AI Automation Minute

Dr Teri Fisher

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Månedlig
 
Welcome to AI Automation Minute – Your Shortcut to Smarter Workflows Step into the fast-paced world of AI and automation in healthcare with Dr. Teri Fisher in AI Automation Minute. Designed for busy professionals, each bite-sized daily episode delivers powerful insights, practical tools, and the latest trends to help you streamline your practice, save time, and enhance patient care— all in just one minute. Whether you're a cosmetic injector, doctor, nurse, dentist, or any healthcare provider ...
  continue reading
 
If you’re looking to improve your trading skills and make smarter decisions in the market, you’re in the right place! Funding Pips is offering a 20% discount on your first purchase when you use the exclusive coupon code “c9995e01”. Whether you’re just beginning your trading journey or looking for advanced strategies and tools, this limited-time offer will help you access top-tier resources at a fraction of the price. In the competitive world of trading, having the right tools, educational re ...
  continue reading
 
Loading …
show series
 
This week's Surveillance Report covers a federal court blocking Texas's age verification law, AI police cameras exposed to the internet, massive data breaches affecting millions of people, and more! Happy holidays! Support Techlore: https://techlore.tech/support Timestamps Sources 00:00 Welcome to Surveillance Report 00:45 Judge Blocks Texas Age Ve…
  continue reading
 
You survived the click—but now the click has evolved. In Part 2, the crew follows phishing and ransomware down the rabbit hole into double extortion, initial access brokers, cyber insurance drama, and the unsettling rise of agentic AI that can click, run scripts, and make bad decisions for you. The conversation spans ransomware economics, why payin…
  continue reading
 
SEASON 1: THE REALITY CHECK (Episodes 1-6) Understanding the Landscape EPISODE 3: "The Timeline - When Your Job Disappears (Month by Month)" "Everyone asks, 'Will AI take my job?' Wrong question. Ask 'When?' Here's the month-by-month breakdown." Core Premise: The AI revolution isn't coming—it's here. Seventy-six thousand four hundred forty people h…
  continue reading
 
SEASON 1: THE REALITY CHECK (Episodes 1-6) Understanding the Landscape EPISODE 1: "The 88% Risk - Your Job Is Already Gone, You Just Don't Know It Yet" "By the end of this episode, you'll know if you have 24 months or 10 years. Most of you? 24 months." Core Premise: The AI revolution isn't coming—it's here. Seventy-six thousand four hundred forty p…
  continue reading
 
SEASON 1: THE REALITY CHECK (Episodes 1-6) Understanding the Landscape EPISODE 4: "Data Scientists, Lawyers, and Accountants - Why 'Knowledge Workers' Are Screwed" "You spent $200K on a degree to do work that ChatGPT does in 3 seconds. How does that feel?" Core Premise: The AI revolution isn't coming—it's here. Seventy-six thousand four hundred for…
  continue reading
 
SEASON 1: THE REALITY CHECK (Episodes 1-6) Understanding the Landscape EPISODE 2: "The Great Divergence - Why Your College Degree Makes You MORE Vulnerable" "White-collar workers with degrees are getting automated faster than blue-collar workers without them. Here's why." The AI revolution isn't coming—it's here. 76,440 people have already lost the…
  continue reading
 
Active exploitation of Fortinet VPN bypass utility observed Google possibly allowing users to change default gmail address June Aflac attack resulted in data theft Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintai…
  continue reading
 
The crew makes suggestions for building a hacking lab today! We will tackle: What is recommended today to build a lab, given the latest advancements in tech Hardware hacking devices and gadgets that are a must-have Which operating systems should you learn Virtualization technology that works well for a lab build Using AI to help build your lab Visi…
  continue reading
 
The $82.7 billion deal to acquire Warner Bros., and the acquisition has already been described as sending Hollywood into “full-blown panic mode,” “possibly a death blow to theatrical filmmaking,” and maybe even “the end of Hollywood” itself. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
Coordinated scams target MENA region Pen Test Partners accused of 'blackmail' Hackers steal record $2.7B in crypto in 2025 Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join u…
  continue reading
 
Want to be the first to hear our episodes each week? Become a Patreon donor here. Merry Christmas and Happy Holidays! Links to this week’s stories: https://krebsonsecurity.com/2025/12/most-parked-domains-now-serving-malicious-content/ https://thehackernews.com/2025/12/russia-linked-hackers-use-microsoft-365.html?m=1 https://cybersecuritynews.com/am…
  continue reading
 
Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes…
  continue reading
 
ServiceNow to acquire cybersecurity startup Armis MacSync Stealer adopts quieter installation Nissan customer data stolen in Red Hat raid Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real envir…
  continue reading
 
It’s the holidays, your defenses are down, your inbox is lying to you, and yes—you’re gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won’t save you, and why the real job is surviving after the click. From phishing and sm…
  continue reading
 
Pirate group Anna’s Archive says it has scraped 86 million songs from Spotify. Also, OpenAI says prompt injections will always be a risk for AI browsers with agentic capabilities, like Atlas. But the firm is beefing up its cybersecurity with an 'LLM-based automated attacker.' Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
Love a hot take? 🔥 You’re in luck! We’re back with a special end-of-year treat: a rapid-fire round of cybersecurity hot takes guaranteed to start arguments in your group chats and hijack at least one Slack thread. 💬 The team weighs in on bold claims like “Passwords will finally die in 2026” and “AI will solve more cybersecurity problems than it cau…
  continue reading
 
Welcome to another episode of the To the Point Cybersecurity Podcast! This week, hosts Rachael Lyon and Jonathan Knepher are kicking off the holiday season with a fascinating conversation featuring David Saunders, Director of Forcepoint Security Lab and a seasoned cybersecurity professional with more than two decades of experience. The discussion d…
  continue reading
 
Alphabet is set to pay $4.75 billion in cash, plus debt, for the data center and clean energy developer. Also, the move is the latest attempt by the Trump administration to delay the construction of 6 gigawatts of offshore wind near a hotspot of data center development. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
  continue reading
 
Spotify music library scraped DDoS disrupts France's postal and banking services Fake delivery websites hit holiday shoppers Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join…
  continue reading
 
Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Jason Taule, CISO, Luminis Health, and Chris Ray, Field CTO, GigaOm Thanks to our show sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zer…
  continue reading
 
The bill will require large AI developers to publish information about their safety protocols and report safety incidents to the state within 72 hours. Also, the newest episode raises questions about whether Sequoia's new leadership -- managing partners Alfred Lin and Pat Grady, who took over last month -- can or will rein in Maguire's social media…
  continue reading
 
Once you sign a software contract, your leverage is gone. In this GovTech episode, Megan and Billie break down what public-sector teams must understand before finalizing a software agreement—especially when implementation timelines, payment terms, and post-go-live support are on the line. You’ll learn: Why you should define “go-live” and every majo…
  continue reading
 
Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There’s a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn’t infringe on any individual organization’s privacy. That’s why we hear the i…
  continue reading
 
President signs defense bill funding Cyber Command, Pentagon phone security Iranian APT Infy resurfaces with new malware Massive Android botnet Kimwolf launches DDoS attack Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement an…
  continue reading
 
Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://www.theregister.com/2025/12/09/hypervisor_ransomware_attacks_increasing https://www.bleepingcomputer.com/news/security/react2shell-flaw-exploited-to-breach-30-orgs-77k-ip-addresses-vulnerable https://www.infosecurity-magazine.com/…
  continue reading
 
The gaming startup will allow Netflix subscribers to create avatars that can extend across gaming titles. Also, Meta is working on an image and video model and new text-based model, which aids with coding. Learn more about your ad choices. Visit podcastchoices.com/adchoicesAv TechCrunch
  continue reading
 
In this Tech Talks episode, Mayer Brown partners Ana Bruder, Julian Dibbell, Gabriela Kennedy, Arsen Kourinian, and Oliver Yaros put four AI regimes head to head: the European Union's risk based Act, the United Kingdom's light touch approach, Asia's mixed models, and the United States' state by state patchwork. Their contracting playbook: lock down…
  continue reading
 
The FTC alleged Instacart misled consumers with unlawful tactics, causing them to pay higher fees while also denying refunds. Also, Apple says it can now collect any money a developer owes the tech giant at any time. Learn more about your ad choices. Visit podcastchoices.com/adchoicesAv TechCrunch
  continue reading
 
Recent Windows updates break RemoteApp connections France arrests threat actors for installing malware on Italian ferry Senate Intel chair urges safeguard against open-source software threats Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Security …
  continue reading
 
This week's Surveillance Report covers the internet's free speech protections under attack as a US Senator moves to repeal Section 230. Plus: ransomware attacks escalate with React2Shell exploitation, India orders government access to encrypted messaging, AI "superintelligence" fear is being used to justify actual corporate manipulation happening r…
  continue reading
 
This week in the security news: Linux process injection Threat actors need training too A Linux device "capable of practically anything" The Internet of webcams Hacking cheap devices Automating exploitation with local AI models Lame C2 Smallest SSH backdoor Your RDP is on the Internet These are not the high severity bugs you were looking for Low ha…
  continue reading
 
The lawsuit is just the latest in a string of copyright-related legal complaints aimed at the AI industry. Also, in an economy where everyone's feeling squeezed, AI-driven price testing of kitchen essentials was bound to attract attention. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
Isaacman will run the space agency at a time when Trump is trying to both downsize it and task it with returning astronauts to the Moon. Also, DeSantis has spent 27 years at Amazon, including eight years as an SVP for AWS, the cloud provider that powers about one-third of the internet. And, Learn more about your ad choices. Visit podcastchoices.com…
  continue reading
 
Welcome to "Fraud Frontlines," a special limited series within the DataTalk™ podcast, hosted by Kathleen Peters and dedicated to exploring the latest trends and strategies in fraud prevention. In this episode, Kathleen Peters is joined by Bhawna Singh, Chief Technology Officer, Customer Identity at Okta, to discuss the transformative impact of agen…
  continue reading
 
FTC orders crypto to pay New exploit of React2Shell Ukraine-based fraud ring taken down Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. In deepfake scams, the tells aren't glitchy video anymore – it's behavior: "Do this right now," or "keep it secre…
  continue reading
 
Skana Robotics built a decision-making algorithm that helps unmanned vessels react and adapt to data from other vessels. Also, Amazon reportedly in talks to invest $10B in OpenAI as circular deals stay popular Learn more about your ad choices. Visit podcastchoices.com/adchoicesAv TechCrunch
  continue reading
 
Coursera and Udemy, two of the biggest names in online learning, are combining platforms next year. Mozilla has appointed Anthony Enzor-DeMeo as its CEO, as the Firefox developer scrambles to adapt in a rapidly changing browser market. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
On November 19, the European Commission unveiled two major omnibus packages as part of its European Data Union Strategy. One package proposes several changes to the EU General Data Protection Regulation, while the other proposes significant changes to the recently minted EU AI Act, including a proposed delay to the regulation of so-called high-risk…
  continue reading
 
Business Security Weekly is well aware of the cybersecurity hiring challenges. From hiring CISOs to finding the right skills to developing your employees, we cover it weekly in the leadership and communications segment. But this week, our guest interview digs into the global cybersecurity hiring trends. Jim McCoy, CEO at Atlas, joins Business Secur…
  continue reading
 
Rogue NuGet package steals data Venezuela's PDVSA suffers attack Patched Fortinet flaws exploited Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Picture a "new hire" who interviews well… except they're synthetic: AI video, AI voice, AI backstory. O…
  continue reading
 
⬥EPISODE NOTES⬥ Modern application development depends on open source packages moving at extraordinary speed. Paul McCarty, Offensive Security Specialist focused on software supply chain threats, explains why that speed has quietly reshaped risk across development pipelines, developer laptops, and CI environments. JavaScript dominates modern softwa…
  continue reading
 
Welcome back to the Point Cybersecurity Podcast! On this week's episode, Rachael Lyon and Jonathan Knepher are joined by a very special guest, Matt Lea, the creator of Cloud War Games. Matt Lea shares his unique journey in cybersecurity, beginning with hacking video games as a sixth grader and evolving into a career helping startups and cloud profe…
  continue reading
 
Loading …

Hurtigreferanseguide

Copyright 2025 | Personvern | Vilkår for bruk | | opphavsrett
Lytt til dette showet mens du utforsker
Spill