Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
…
continue reading
2 Cyber Chicks is an inclusive cybersecurity podcast designed to educate and break the stereotypes of cybersecurity professionals. We will be discussing the “tough” topics that come along with being a woman in this field while providing life hacks on how to handle burnout, networking, and goal-setting. Our mission is to cast a net to an inclusive audience and provide a safe place for discussion. Guests will include leading professionals in the field, providing real-life insight and demystify ...
…
continue reading
A bi-monthly show focusing on cybersecurity, hacker news with a lighter side. Unmasked is a look behind the cyber professionals and will spotlight teammates, community advocators and businesses to give insight to how cybersecurity affects everyone. Brought to you by Assura. Where the superheroes of cybersecurity provide a clearer understanding of the threats we face in our digital world. With Host: Paul Blacker Web: https://www.assurainc.com/
…
continue reading
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
…
continue reading
Defuse / Diːˈfjuːz/ Verb: To Make A Situation Less Tense Or Dangerous. Join me in listening to this informative podcast that delves into the critical issues facing private and corporate clients. Each episode features global experts sharing their insights on preventing and resolving problematic behaviors and security issues that cause harm. The podcast covers a wide range of topics, including stalking, protective security, intelligence, psychological profiling, crisis management, risk managem ...
…
continue reading
Welcome to One Step Beyond Cyber, the ultimate IT and cybersecurity podcast that's sure to keep you on the edge of your seat! Whether you're a tech guru or a total newbie, our hosts Scott Kreisberg, and Tim Derrickson will make sure you're entertained and educated every step of the way. As technology advances, it can be challenging to keep up with the latest trends and developments. Don’t worry, our hosts are here to help! They will discuss real-world IT-related problems and solutions, as we ...
…
continue reading
The Cyber-Crime Survivors Advisory & Recovery Podcast is created to raise awareness about the ongoing theft of people’s lifesaving and wealth by evil cyber criminals. It is time to stop shaming victims and start sharing the truth about what is happening to our families and friends. CCSARP is a safe place for learning and growth that will empower cybercrime victims to become survivors. Another goal is if all people are aware of the evil theft of money from our loved one, we can shut down cybe ...
…
continue reading
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
Raising Tech is your guide to understanding the role technology plays in your community, where to invest to transform culture, and how to bring your team and residents along the journey. Tune in to explore the latest tech trends, dive into hot topics, and hear from industry experts, community leaders, and innovative vendors shaping the senior living tech landscape. Each episode is packed with practical insights and real-world stories to help you spark change and level up your community’s tec ...
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
Come join us on our journey!!! ... working towards an accessible and meaningful glimpse into the universe of Likutei Moharan with a group of growth-oriented people; Also available at: http://www.jewishheritagefoundation.org/audio_shiurim.html Please feel free to reach out from cyber space: mrubin214@gmail.com and let me know how you are enjoying the shiurim, or just to say hello. Would love to hear from you!!!
…
continue reading
What lies ahead? In this series Tom Parker asks experts what will happen over the next five years and how it will affect our lives. This content is paid for by advertisers and is produced in partnership with the Financial Times’ Commercial Department Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
This podcast features interviews of CTOs and other technical leadership figures and topics range from technology (AI, blockchain, cyber, DevOps, Web Architecture, etc.) to management (e.g. scaling, structuring teams, mentoring, technical recruiting, product etc.). Guests from leading tech companies share their best practices and knowledge. The goal is to support other CTOs on their journey through tech and engineering, inspire and allow a sneak-peek into other successful companies to underst ...
…
continue reading
The cyber security podcast from SE Labs. Understand cyber security and other security issues. Practical and insightful, our experts have experience in attacking and defending in the physical and digital worlds. Peek behind the curtain with Cyber Security DE:CODED.
…
continue reading
Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security.. Each episode features our host Christie Ogubere This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free Website: https: ...
…
continue reading
Creating connections and conversations about people, technology and the intersection of health and wellbeing. Recorded through the "cyber synaptic space." Catherine speaks to people who are considered experts in their fields. Important information for parents, teachers, professionals and anyone who wants to learn about cyberspace, digital parenting, security, data protection, counselling, health, wellbeing, personal growth and development. This is your acoustic & neuroplastic ride that will ...
…
continue reading
This podcast series offers risk intelligence and analysis from RANE Network. RANE is a risk intelligence company that provides business professionals with access to critical insights, analysis, and support, enabling them to better anticipate, monitor, and respond to emerging risks and threats. In the RANE podcast series, risk management experts and thought leaders share best practices for managing business risk, geopolitical risk, physical and cyber security risks, compliance risk, and other ...
…
continue reading
We bring together the greatest minds for the use of technology in education to understand what has worked for them and what can enable your students and educators to fulfill the promise of learning through technology
…
continue reading
Cyber Security doesn't have to be a daunting task. Everyone has the right to be more secure and enjoy some privacy while surfing the web. That's where we come in. We will give you simple yet effective ways of staying safe and private online. And we'll do it in a language you'll understand. Learn how to be Cyber Smart because Privacy Matters.
…
continue reading
TOP SECRET Personal Attention, SpyCast Listeners Known to be the podcast real spies listen to -(STOP)- eavesdrop on conversations with high level sources from around the world -(STOP)- spychiefs molehunters defectors covert operators analysts cyberwarriors and researchers debriefed by SPY Historian Hammond -(STOP) stories secrets tradecraft and technology discussed -(STOP)- HUMINT SIGINT OSINT IMINT GEOINT and more -(STOP)- rumored to be professional education internal communication and publ ...
…
continue reading
The Future of Cybercrime is dedicated to helping security practitioners defend their organizations by distilling insights, best practices, and actionable tips from the world’s leading cyber crime experts. This show is brought you by KELA Cyber Threat Intelligence. For more information, visit www.kelacyber.com
…
continue reading
Bi-Weekly Cyber intellgence briefing, each episode includes update regrading some of the latest events happened in the cyber security world. This podcast is meant for people who wants to listen to a short (5 minute) overview about some of the latest events happened lately in the cyber world. The Podcast is not getting into technical details and anyone can understand.
…
continue reading
AstrologyNow is devoted to sharing the ancient science of Jyotish or Vedic astrology. By tuning into cosmic forces we may better understand ourselves at a soul level, connect to others with more divinity, and feel more prepared in navigating the world around us. This podcast provides weekly astrological updates, forecasts, and research while encouraging personal introspection and providing insight into global events. Christine has a Masters in Social Work and is certified in Vedic Astrology, ...
…
continue reading
A podcast series aimed at helping Australians deepen their understanding of the local cyber security industry.
…
continue reading
The GC+CISO Connection Show explores how we can better foster collaboration between organizations’ legal departments and security teams, with a focus on the General Counsel (GCs) and Chief Information Security Officers (CISOs). In an era where cyber threats are rapidly evolving, the partnership between legal and cybersecurity leaders is more crucial than ever. The goal of this Show is to enhance dialogue, understanding, and cooperation between these critical roles to bolster organizational c ...
…
continue reading
ABC News Daily is the podcast that helps you understand the issues affecting your world. Every episode, host Samantha Hawley walks through one story with the help of an ABC colleague or expert in under 15 minutes. When you want coverage you can trust, listen to ABC News Daily. Key topics of recent episodes include the US presidential election, Donald Trump, Kamala Harris, neo-Nazis, Albanese’s Copacobana home, Oasis, Ticketmaster, Live Nation, Sean ‘Diddy’ Combs, Chinese EVs, electric vehicl ...
…
continue reading
Join Marsh colleagues, risk professionals, C-suite executives, and others for conversations about the major risks businesses face today and how you can better understand and more effectively manage them.
…
continue reading
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
…
continue reading
YASH cyber security solutions are helping global corporations address a plethora of cyber risks proactively and reactively. We help our customers to grow their business securely, we understand your world.
…
continue reading
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
…
continue reading
imanmeet13 brings you "Cyber Safar" which is an audio version of his daily experience in Hacking & Digital World. It’s FREE to learn here! You don’t have to have a coding bone in yourself to understand technology. Every single successful person out there is a practitioner & has some or the other motivational routine as well. Stay Informative every single day with Cyber Safar when it comes to Technology, Hacking & Motivation. Got doubt? Contact me⤵️ Instagram = https://www.instagram.com/imanm ...
…
continue reading
1
Understanding and Preparing for Cyber Risks
1:10:53
1:10:53
Spill senere
Spill senere
Lister
Lik
Likt
1:10:53
Arete is a global cyber risk company whose mission is to transform the way organizations prepare for, respond to, and prevent cybercrime. This episode will provide listeners with expert insights from two leaders in the cybersecurity industry, and equip organizations to better prepare for cybercrimes before they happen. As October is recognized as N…
…
continue reading
1
CCT 183: Understanding OSI and TCP/IP Models for the CISSP (Domain 4)
10:31
10:31
Spill senere
Spill senere
Lister
Lik
Likt
10:31
Send us a text Unlock the secrets of the OSI and TCP/IP models with Sean Gerber as your guide on the CISSP Cyber Training Podcast. Ever wondered how the presentation layer manages to format and translate data seamlessly for the application layer? Or how the network layer deftly routes packets across networks? Prepare to gain a comprehensive underst…
…
continue reading
1
The GC+CISO Connection: Understanding the GC's Role in Protecting the Organization Against Cyber Risk
34:27
34:27
Spill senere
Spill senere
Lister
Lik
Likt
34:27
Welcome to the GC+CISO Connection Show with host Shawn Tuma. In this very first episode of the Show, Shawn talks with Dena DeNooyer Stroh, General Counsel and Ethics Officer at North Texas Tollway Authority, to learn her perspectives on the legal department's role in cybersecurity, collaboration between the GC and the IT and InfoSec Teams, and tips…
…
continue reading
1
SN 997: Credential Exchange Protocol - DJI Sues DoD, Quantum Vs. RSA, Lost MS Logs
2:18:35
2:18:35
Spill senere
Spill senere
Lister
Lik
Likt
2:18:35
Did Chinese researchers really break RSA encryption? What did they do? What next-level terror extortion is being powered by the NPD breach data? The EU to hold software companies liable for software security? Microsoft lost weeks of security logs. How hard did the try to fix the problem? The Chinese drone company DJI has sued the DoJ over its ban o…
…
continue reading
Did Chinese researchers really break RSA encryption? What did they do? What next-level terror extortion is being powered by the NPD breach data? The EU to hold software companies liable for software security? Microsoft lost weeks of security logs. How hard did the try to fix the problem? The Chinese drone company DJI has sued the DoJ over its ban o…
…
continue reading
1
Can Elon Musk buy Trump the presidency?
14:30
14:30
Spill senere
Spill senere
Lister
Lik
Likt
14:30
With the polls in the US neck and neck just a few weeks out from the election, money talks. Elon Musk, the richest man in the world, is throwing it around for Donald Trump, even offering million-dollar cheques to voters who sign a petition set up by a Trump-friendly campaign group. Today, Vittoria Elliot from WIRED on why Musk is so desperate for T…
…
continue reading
1
Cyber Concerns Ahead of the U.S. Election
14:32
14:32
Spill senere
Spill senere
Lister
Lik
Likt
14:32
In this episode of Essential Geopolitics, RANE Cyber Analyst Ali Plucinski highlights major cyber risks companies should be aware of as the U.S. general election approaches. RANE is a global risk intelligence company that delivers risk and security professionals access to critical insights, analysis and support to ensure business continuity and res…
…
continue reading
1
The Cyber Behavioral Profiler with Cameron Malin
1:08:30
1:08:30
Spill senere
Spill senere
Lister
Lik
Likt
1:08:30
Summary Cameron Malin (LinkedIn) joins Andrew (X; LinkedIn) to discuss cyber and behavioral profiling. Cameron was the creator and founder of the FBI’s Cyber Behavioral Analysis Center. What You’ll Learn Intelligence The historical origins of behavioral profiling Applying behavioral profiling to counterintelligence and cyber threats Nature vs. Nurt…
…
continue reading
1
Inside the Drone War Arms Race in Ukraine
1:03:30
1:03:30
Spill senere
Spill senere
Lister
Lik
Likt
1:03:30
Dmitri Alperovitch talks with Andrey Liscovich (UkraineDefenseFund.org) about the latest updates in the evolution of drone warfare on the battlefields in Ukraine. They discuss:- How Ground Unmanned Vehicles (GUVs) are being used in battle- 3rd Generation FPV drones- Quadcopter bombers- Mass-market EW systems- Fiber optics C2- EW recon units- Use of…
…
continue reading
1
The New Guy May be a North Korean Threat Actor
6:56
6:56
Spill senere
Spill senere
Lister
Lik
Likt
6:56
A couple months ago security education company KnowBe4 accidentally hired a North Korean threat actor who tried to install malware on their machine. Turns out this may not be as uncommon as you'd think. Recently a network of North Korean threat actors applying for jobs, and US citizens helping them, has been uncovered. Sources: https://pastebin.com…
…
continue reading
1
Why Israel won’t stop despite killing Sinwar
14:34
14:34
Spill senere
Spill senere
Lister
Lik
Likt
14:34
The assassination of the Hamas leader, Yahya Sinwar in Gaza, the architect of the October 7 attack, might have been an opportunity for a ceasefire. Instead, Israeli airstrikes have intensified in the north and there is no sign Hamas will agree to the return of hostages. Today, international relations expert Rajan Menon on what Benjamin Netanyahu ho…
…
continue reading
1
CCT 186: Security Audits and Assessments - From Real-World Applications to CISSP Exam Prep (Domain 6.5)
37:33
37:33
Spill senere
Spill senere
Lister
Lik
Likt
37:33
Send us a text Unlock the secrets to enhancing your organization's security posture by mastering the art of security audits. Tune in to discover how security audits play a pivotal role in both the CISSP exam and real-world scenarios. Through personal anecdotes and expert insights, we explore how conducting effective audits with departments like fin…
…
continue reading
1
From Building The Worlds Most Powerful Malware To Building The Worlds Most Secure Phone
54:42
54:42
Spill senere
Spill senere
Lister
Lik
Likt
54:42
Send us a text A cybersecurity journey like no other awaits as we welcome a guest with a formidable background, shaped by their experiences in the Israeli military's elite 8200th unit. This exceptional career path led them from the rigors of military service to the academic halls of the Technion—Israel's very own MIT. We uncover how their military …
…
continue reading
1
How unpaid tolls could land you in prison
14:46
14:46
Spill senere
Spill senere
Lister
Lik
Likt
14:46
The cost of toll roads for drivers and even rideshare passengers are hard to avoid and the price attached to each beep of the reader increases every year. Transurban is the firm that dominates the industry on the east coast and in some states they can even use the criminal justice system to chase toll debts and fines. The cost of toll roads is proh…
…
continue reading
1
DevSecOps for Automotive – PlaxidityX Ep 2
7:11
7:11
Spill senere
Spill senere
Lister
Lik
Likt
7:11
Automotive cyber security is becoming a critical concern as software-defined vehicles (SDVs) increasingly dominate the market. In this episode, we explore how DevSecOps ensures that cyber security is integrated at every stage of the automotive software development process. By adopting a security-by-design approach, automakers can accelerate product…
…
continue reading
1
Mars Debilitated in Cancer: Global Predictions + Horoscopes for Each Sign
37:25
37:25
Spill senere
Spill senere
Lister
Lik
Likt
37:25
Hi everyone! In this segment we cover the transit of Mars in Cancer. The fiery and passionate planet of Mars is debilitated in the sign of Cancer - causing Mars to feel quite uncomfortable and unable to operate properly. This can cause some big disturbances in the world and potentially in our personal lives! What happens when the planet of war and …
…
continue reading
1
October Elections in Georgia and Moldova
16:44
16:44
Spill senere
Spill senere
Lister
Lik
Likt
16:44
In this episode of Essential Geopolitics, RANE’s Eurasia Analyst Matthew Orr provides an overview of Georgia and Moldova’s upcoming elections and explains what the results will mean for the threat landscape in Europe. RANE is a global risk intelligence company that delivers risk and security professionals access to critical insights, analysis and s…
…
continue reading
1
69. Ome- Turning Up the Heat on Smart Stove Safety
17:40
17:40
Spill senere
Spill senere
Lister
Lik
Likt
17:40
In this episode of Raising Tech, Matt Reiners chats with Akshita Iyer, founder and CEO of Ome, about her inspiring journey to create a smart knob that can turn any stove into a safer, smart appliance. After a personal experience, Akshita developed a device that retrofits gas and electric stoves to automatically shut off or adjust burners. The knob …
…
continue reading
1
What to Expect from Indonesia’s New Prime Minister
32:22
32:22
Spill senere
Spill senere
Lister
Lik
Likt
32:22
Indonesia held its presidential election back in February and the inauguration fast approaching on Oct. 20th. In this episode of Essential Geopolitics, RANE’s Asia-Pacific Analyst Nate Fischler explains what President Elect Prabowo Subianto’s inauguration will mean for the country going forward. RANE is a global risk intelligence company that deliv…
…
continue reading
1
Why Albanese’s coastal home is a problem
15:25
15:25
Spill senere
Spill senere
Lister
Lik
Likt
15:25
This week we learned that the Prime Minister Anthony Albanese will soon be a new home owner. He’s bought a multi-million-dollar house, featuring sweeping ocean views, on the New South Wales central coast. Some people think it’s a move from the PM that’s especially tone deaf, given the depths of the housing crisis, while others see the story as a co…
…
continue reading
1
CCT 185: Mastering Access Control Models - Discretionary to Hybrid for the CISSP (Domain 5.4)
11:22
11:22
Spill senere
Spill senere
Lister
Lik
Likt
11:22
Send us a text Unlock the secrets to mastering access control models essential for conquering the CISSP exam and advancing your cybersecurity expertise. Imagine having a comprehensive understanding of how discretionary, mandatory, role-based, risk-based, rule-based, attribute-based, and hybrid models function in various scenarios. This episode feat…
…
continue reading
Send Bidemi a Text Message! Support The Bid Picture Podcast In this episode, host Bidemi Ologunde read an article published on his Substack, IntelEdge360. Support the showAv CHIP STORY Media & Rainmaker Podcasts
…
continue reading
1
Balancing Security with Usability in Cybersecurity
41:41
41:41
Spill senere
Spill senere
Lister
Lik
Likt
41:41
In this episode of Threat Vector, host David Moulton talks with guest speaker Brian Wrozek, Forrester Principal Analyst in Security & Risk, about the complexities of aligning security strategies across global teams. Brian draws on his extensive experience in cybersecurity, operational technology (OT) risk, and threat intelligence to discuss how org…
…
continue reading
1
CR079: Droning on with Dario Valenza, Carbonix
46:15
46:15
Spill senere
Spill senere
Lister
Lik
Likt
46:15
Today drones are a common sight from use in industrial and military settings to incredible swarming light shows. They are often used for aerial data capture at scale, providing intelligence over wide and inhospitable areas. This week, Dave, Esmee and Rob talk to Dario Valenza, founder of Carbonix, about the state of the art of drones, their role in…
…
continue reading
1
#109 - Cloud Cost Optimisation feat. Claire Fautsch // CTO @ Joblift
39:08
39:08
Spill senere
Spill senere
Lister
Lik
Likt
39:08
From 100k to 30k: How Joblift slashed their monthly cloud bill Save Money on Cloud Costs with Claire Fautsch (CTO @ Joblift). Find out how the team at Joblift slashed monthly cloud costs from €100K to €30K without compromising performance.Listen to find out:📊 How to build dashboards 📈 How to align cloud costs with business KPIs🤝 How to get the enti…
…
continue reading
1
EPISODE 50: Tips On How To Be A Top-Class Cybersecurity Student And Get Your First Cybersecurity Job!
42:24
42:24
Spill senere
Spill senere
Lister
Lik
Likt
42:24
Dreaming of a career in Cybersecurity? Currently a Student and wondering how to succeed? In this episode, we are joined by Dr. Thalita Vergilio. Thalita is a passionate technologist and cybersecurity expert dedicated to demystifying complex concepts. This episode is for those dreaming of a thrilling career in cybersecurity as Thalita gives her road…
…
continue reading
1
Interview with Alan Delahunty, his role as Vice President/Commercial Lines Agent
32:22
32:22
Spill senere
Spill senere
Lister
Lik
Likt
32:22
Unlock the secrets to navigating the ever-evolving world of cybersecurity and commercial insurance with expert insights from Alan Delahunty of McGriff Insurance. Discover how the complexity of cyber threats is reshaping insurance policies and learn why multi-factor authentication and other security measures are now industry standards. We promise yo…
…
continue reading
1
Why neo-Nazis rallied in a country town
15:28
15:28
Spill senere
Spill senere
Lister
Lik
Likt
15:28
When masked neo-Nazis turned up in a small New South Wales town to hold a rally on the weekend it shocked the locals. The men, part of a white supremacist group, were not from the area. So, why were they there? Today, extremism researcher Kaz Ross discusses how we should respond to the growing white supremacist movement in Australia. Kaz Ross expla…
…
continue reading
1
SN 996: BIMI (up Scotty) - NPD Goes Broke, Firefox Under Attack, .io
2:32:24
2:32:24
Spill senere
Spill senere
Lister
Lik
Likt
2:32:24
uBlock Origin to the rescue National Public Data files for bankruptcy Will the .IO top level domain be disappearing? Patch Tuesday Firefox under attack Miscellany Sci-Fi The Sequence uBlock Origin Eero Routers Pep Link Router BIMI (up Scotty) Show Notes - https://www.grc.com/sn/SN-996-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscr…
…
continue reading
1
SN 996: BIMI (up Scotty) - NPD Goes Broke, Firefox Under Attack, .io
2:32:24
2:32:24
Spill senere
Spill senere
Lister
Lik
Likt
2:32:24
uBlock Origin to the rescue National Public Data files for bankruptcy Will the .IO top level domain be disappearing? Patch Tuesday Firefox under attack Miscellany Sci-Fi The Sequence uBlock Origin Eero Routers Pep Link Router BIMI (up Scotty) Show Notes - https://www.grc.com/sn/SN-996-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscr…
…
continue reading
The Lebanese capital Beirut is a divided city, where life continues as normal for some, while not so far away Israeli air strikes are reducing buildings to rubble. The sound of Israeli drones is constant as its forces hunt members of Hezbollah. The militant group has been firing missiles into Israel since Hamas terrorists crossed from Gaza into Isr…
…
continue reading
1
The FBI Hostage Negotiator - with Chris Voss
1:12:07
1:12:07
Spill senere
Spill senere
Lister
Lik
Likt
1:12:07
Summary Chris Voss (X; LinkedIn) joins Andrew (X; LinkedIn) to discuss the art of negotiation. Chris formerly served as the FBI lead international hostage negotiator. What You’ll Learn Intelligence The very basics of negotiation, including the phrase “Never split the difference” The art of Tactical Empathy Case studies from Chris’ career, including…
…
continue reading
1
Episode 15 -Windows event log analysis with Hayabusa. The Sigma-based log analysis tool
23:20
23:20
Spill senere
Spill senere
Lister
Lik
Likt
23:20
Send us a text Key Takeaways: Introduction to Hayabusa: Hayabusa is an open-source Windows Event Log Analysis Tool used for processing EVTX logs to detect suspicious activities in Windows environments. Critical Alerts Detection: The tool is capable of detecting a variety of suspicious activities, including WannaCry ransomware and unauthorized Activ…
…
continue reading
1
Collaboration critical to resolve climate-related systemic risks
31:48
31:48
Spill senere
Spill senere
Lister
Lik
Likt
31:48
The wide-ranging impacts of climate change underscore the importance for businesses and authorities to focus on adaptation and take actions to build resilience. With climate change transforming the way we live and impacting the way we do business, the urgency to address these risks has never been greater. In this episode of Risk in Context, Marsh’s…
…
continue reading
1
Episode 2 - Empowering Yourself, Understanding the Grieving Process, and a Deep Dive on Loneliness
1:05:23
1:05:23
Spill senere
Spill senere
Lister
Lik
Likt
1:05:23
Episode 2 - Empowering Yourself, Understanding the Grieving Process, and a Deep Dive on Loneliness If you are feeling suicidal or wanting to harm yourself, call or text 988 Brian and Mike are back to discuss the importance of freeing yourself of the pain you may carry around with you after being scammed. We also talk about the grieving process and …
…
continue reading
The Internet Archive is a website vital in the preservation of digital information, and recently it was attacked on two separate occasions. Here's what went down. Sources: https://pastebin.com/nbhNFAv5Av Chloe Thonus
…
continue reading
1
Meet the Trump and Harris voters in Australia
15:13
15:13
Spill senere
Spill senere
Lister
Lik
Likt
15:13
In just three weeks, Americans will choose whether they want Donald Trump or Kamala Harris in the White House and the contest is incredibly close. More than a hundred thousand eligible voters are living here in Australia, although not all will cast a ballot. Today, we meet an Australian-based Harris voter and a Trump voter, to talk about what’s dri…
…
continue reading