Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
A Podcast for Marvel Crisis Protocol, a tabletop miniatures game from Atomic Mass Games. HPP covers newly revealed characters with in-depth reviews of all of their abilities in an easy to digest format. HPP also dives deep on tactics and ways you can improve your competitive play, all while focusing on welcoming players of all skill levels. MCP is meant to be FUN and that’s what HPP likes to bring! Enjoy!
  continue reading
 
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: List ...
  continue reading
 
Artwork

1
BarCode

Chris Glanden

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
  continue reading
 
Artwork

1
The Trident

U.S. Naval War College

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Trident is produced by the Center on Irregular Warfare and Armed Groups (CIWAG). Director, Dave Brown, Col. (Retired), speaks with a variety of professionals, academics, and other experts to explore threats and challenges, in the international security environment, that both directly and indirectly relate to the field of irregular warfare.
  continue reading
 
In an increasingly unpredictable world, knowledge and preparation are your best defense. Brought to you by the Preparedness Protocol Experts (P.P.E Team), this is an educational podcast delivering expert insights on Chemical, Biological, Radiological, and Nuclear (CBRN) threats, cutting-edge survival tactics, and comprehensive disaster preparedness strategies for today's complex risk landscape. Each episode features in-depth analysis of historical disasters, emerging threats, practical survi ...
  continue reading
 
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
  continue reading
 
Artwork

1
Wireless Environmental Monitor

freezer temperature monitoring

icon
Unsubscribe
icon
Unsubscribe
Daily+
 
The Wireless Environmental Monitor by TempGenius offers a highly reliable and scalable solution for facilities that demand precision in environmental tracking. Designed for industries like healthcare, pharmaceuticals, laboratories, and food services, this wireless monitoring system delivers real-time data to help maintain compliance, safety, and operational efficiency. Equipped with advanced sensors, TempGenius monitors critical metrics including temperature, humidity, air pressure, CO₂ leve ...
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
  continue reading
 
Artwork

1
The Pirate Pod

Arrington Capital

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The PiratePod is a Web3 focused podcast from Arrington Capital where we set sail into the uncharted waters of Web3 entrepreneurship and those building the at the forefront of crypto. Episodes will celebrate and interview the bold risk-takers and adventurers who dare to defy the norm. These modern-day pirates are founders who lust after the thrill of venturing into the unknown and thrive on the exhilarating web3 startup life itself. We will dive into new apps, defi, trading, infrastructure, c ...
  continue reading
 
Artwork

1
Only Malware in the Building

DISCARDED | N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
  continue reading
 
Artwork

1
The CGAI Podcast Network

The Canadian Global Affairs Institute

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
The CGAI Podcast Network is created and produced by the Canadian Global Affairs Institute. Join us each week to explore the energy, defense, and international affairs stories that matter to Canadians. Listen now to CGAI podcasts “The Global Exchange”, “Defence Deconstructed”, and “Energy Security Cubed”, and partner podcasts “Battle Rhythm" and “Conseils de sécurité”. Visit www.cgai.ca for more, or follow us on Facebook, Twitter, or LinkedIn. The Canadian Global Affairs Institute (CGAI) is a ...
  continue reading
 
Artwork

1
Bloom Fireside

Bloom Protocol

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
On Bloom Fireside we speak with the partners and individuals helping us build the Bloom protocol, and working to get it in the hands of everyday people who will use it and benefit from it. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Join four industry pros as they explore the latest breakthroughs in AI technology. Each episode delivers fresh insights, expert opinions, and in-depth discussions on the future of AI. Tune in on YouTube and in all your favorite audio-streaming platforms and stay ahead of the curve!
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
This podcast is dedicated to helping all humans find a prosperous life. The host Jim Johnson has been using his "Prosperity Protocol" for more than a decade to find balance and fulfillment in a chaotic ever changing world. Guests on the show will be focused on the 7 pillars of the "Prosperity Protocol", Work Fulfillment, Time & Financial Security, Community, Health & Performance, Leadership, Creativity & Curiosity, Spiritual Growth & Development. They will share life experience, practical ap ...
  continue reading
 
Welcome to Crypto News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news about Bitcoin, Ethereum, blockchain technology, DeFi, NFTs, and more. Whether you're a crypto enthusiast, investor, or simply curious about the potential of digital currencies, this podcast is your go-to source for all things crypto. Tune ...
  continue reading
 
Award-winning investigative journalist John Solomon, who helped unravel the bogus Russia collusion scandal, gives you his exclusive reporting and big newsmaker interviews. To get the unvarnished truth about what’s really going on in Washington, subscribe today to John Solomon Reports. To find out more go to https://justthenews.com
  continue reading
 
Security issues are increasingly on the front burner for many individuals, corporates and Security practitioners. Whether it be kidnapping, banditry, terrorism, armed robbery etc. We all seem to know someone who has been a victim even when we personally have not
  continue reading
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Artwork

1
Almost Diplomatic

Almost Diplomatic

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Almost Diplomatic is a podcast discussing geopolitics, national security and nonsense over beers. Disclaimer: The comments and views discussed in the podcast are our own and do not represent those of any entity we volunteer with or are employed by.
  continue reading
 
### **Bitunix Referral Code ”d1c9qu” – Claim 5500 USDT Bonus and 10% Fee Discount** Bitunix referral code **”d1c9qu”** offers new users a powerful way to boost their trading experience right from the start. By using this code during registration, you can unlock **up to 5500 USDT in bonuses** and enjoy a **10% discount on all trading fees**. Bitunix is designed for traders who want a secure, efficient, and rewarding environment, making it a top choice for both beginners and professionals. ## ...
  continue reading
 
DeFi Watch's Chris Blec engages in honest conversations with DeFi teams about the transparency & decentralization of their decentralized finance applications & protocols. Support this podcast: https://podcasters.spotify.com/pod/show/proof-of-decentralization/support
  continue reading
 
Artwork

1
Resilient Cyber

Chris Hughes

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
  continue reading
 
Artwork

1
Heavy Networking

Packet Pushers

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Ethan Banks & Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. On air since 20 ...
  continue reading
 
Artwork

1
Cryptography FM

Symbolic Software

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
  continue reading
 
Artwork

1
The Index Podcast

Index Studios

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
What’s indexing this week in crypto, blockchain, and open-source AI? Find out on The Index, where we feature exclusive conversations that go beyond code. Each week, host and entrepreneur Alex Kehaya talks with founders, developers, and investors who are shaping the future of Web3. From startup advice to breakthrough strategies, our guests share their stories and take a deep dive into the decentralized future.
  continue reading
 
Artwork
 
Bitcoin pioneer Charlie Shrem peels back the layers on the lives and backgrounds of the world's most impactful innovators. Centering around intimate narratives, Shrem uncovers a detailed, previously unspoken story of the genesis and evolution of bitcoin, cryptocurrency, artificial intelligence, and the web3 movements. Join Shrem as he journeys through the uncharted territories of tech revolutions, revealing the human side of the stories that shaped the digital world we live in today.
  continue reading
 
The Decentralize with Cointelegraph podcast covers all things Web3 and cryptocurrency, from challenges facing the industry to breaking news and in-depth dives into the culture of BTC, Ethereum and Web3. Experience crypto news like never before with the Decentralize with Cointelegraph podcast.
  continue reading
 
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
  continue reading
 
Artwork

1
Network Security

University of Twente

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
Loading …
show series
 
Send us a text Cybersecurity professionals need a solid understanding of secure communication protocols, not just for exam success but for real-world implementation. This episode unpacks the essential protocols covered in CISSP Domain 4.1.3, providing clear explanations of how each works and when to use them. We begin with a timely discussion of th…
  continue reading
 
The House Administration Committee, led by Chairman Bryan Steil, has been investigating for two years, revealing issues like the absence of CVV codes for donations. The investigation has expanded, with President Trump's directive and involvement from the Justice Department and FBI. Steil also addresses a Milwaukee County judge's alleged obstruction…
  continue reading
 
Join John Solomon as he explores the dynamic relationship between Canada and the US, particularly focusing on energy negotiations and the potential for future partnerships. In an exclusive interview, Alberta Premier Danielle Smith discusses her province's energy-rich resources and the challenges they face with the federal government. Get insights f…
  continue reading
 
Senator Ron Johnson reveals shocking insights about the federal health agencies' handling of COVID-19 vaccine safety information. Senator Johnson discusses the redacted documents, internal communications, and the implications of the FDA and CDC's decisions regarding myocarditis warnings. Additional interviews with Harvard Law Professor Emeritus Ala…
  continue reading
 
We sit down with Scott Hanselman at Microsoft Build 2025 to discuss open sourcing all the things, cool stuff Windows can do, where we want (and don’t want) AI to fit into our lives, building arcade cabinets, and so much more. Join the discussion Changelog++ members save 7 minutes on this episode because they made the ads disappear. Join today! Spon…
  continue reading
 
In this episode of #DefenceDeconstructed, recorded March 23rd, I sit down with Will Richardson, a PhD student in Political Science at Carleton University. He specializes in International Relations and Public Policy. His Doctoral thesis will examine the intersection of Five Eyes military cooperation, emerging technologies and defence procurement. To…
  continue reading
 
Preston Thorpe joins us from inside prison, where he awaits a hopeful release within the next 12 months. His journey has been anything but easy—marked by hardship and uncertainty. But over the past few years, Preston has undergone a profound transformation. He’s refactored not just his skills, but his identity. Today, he proudly calls himself a sof…
  continue reading
 
In this episode, I sit down with longtime industry leader and visionary Phil Venables to discuss the evolution of cybersecurity leadership, including Phil's own journey from CISO to Venture Capitalist. We chatted about: A recent interview Phil gave about CISOs transforming into business-critical digital risk leaders and some of the key themes and a…
  continue reading
 
Netris is tackling the issue of automating multi-tenancy in an AI data center. Netris has your answer to this challenge, and it’s a solution certified to work with NVIDIA. We’re going to get into the nuts and bolts of Netris network automation with Alex Saroyan, CEO and co-founder of Netris. Along the way, we will... Read more »…
  continue reading
 
Arrington Capital is expanding its leadership team, recently appointing Ravi Kaza as CIO Partner and Colton Conley to Partner. Having joined Arrington Capital’s investment team as a Principal in 2023, Colton has been successful in identifying early-stage web3 investments and has run point on some of the most exciting investments in the fund’s recen…
  continue reading
 
This week on Byte-Sized Insight, we’re heading to Capitol Hill, where US lawmakers are finally making moves on crypto regulation. From the Senate advancing the GENIUS Act — a major step toward federal stablecoin rules — to the reintroduction of the Blockchain Regulatory Certainty Act, which could protect developers from outdated licensing laws, cry…
  continue reading
 
(0:10): Growth Protocol Launches Layer-1 Blockchain to Revolutionize On-Chain Advertising with Avalanche Tech (2:21): Worldcoin Raises $135M for US Expansion Amid Global Regulatory Challenges (4:42): Rhuna Partners with Aptos to Revolutionize Event Management with Blockchain-Powered AI (7:06): Pakistan Launches Digital Asset Authority to Regulate $…
  continue reading
 
In this episode, Ellie and Alysia dive deep into intent-based bridges, specifically exploring Across Protocol and their proposed Across Prime upgrade. They examine how intent bridges work, their advantages over traditional bridges, and the capital efficiency improvements that Across Prime aims to deliver for solvers (i.e., the liquidity providers t…
  continue reading
 
Senator Marsha Blackburn from Tennessee, who has been at the forefront of the immigration debate, discusses her new legislation aimed at ending birthright tourism in the United States, a growing industry that facilitates the entry of foreign women to give birth in the U.S. Senator Blackburn explains the implications of this practice and the importa…
  continue reading
 
In this Episode, Will is joined by Rightmad (Ben) from Gamestore Guardians to talk about the newly revealed (and assumed) Brotherhood of Mutants characters. The guys start the show by giving some Hot Takes from the May Character Update. Then the crew looks at Avalanche to see if he could shake things up for the affiliation before trying to unpack t…
  continue reading
 
(0:10): SEC Charges Unicoin Executives for Defrauding Investors with Crypto Token, CEO Denies Allegations (2:10): Theta Capital Raises $175M for Crypto Fund as Institutional Interest Resurges Amid Market Recovery (4:52): ARK Invest Bets Big on TSMC and GitLab, Boosting Tech and Crypto Markets (7:40): Solana Mobile Unveils Seeker Smartphone with Rev…
  continue reading
 
Send us a text A shocking incident in Spain recently left 60% of the country's power grid dark in less than five seconds. Was it a cyber attack? The jury's still out, but this real-world event perfectly illustrates why understanding access controls and security mechanisms is critical for today's cybersecurity professionals. Sean Gerber, despite bat…
  continue reading
 
Quantum threats are no longer theoretical, and waiting could cost you. In this episode of Shielded: The Last Line of Cyber Defense, Johannes Lintzen is joined by Mamta Gupta, a quantum physicist turned cybersecurity strategist at Lattice Semiconductor. Together, they break down how crypto agility, hardware-based trust anchors, and PQC readiness are…
  continue reading
 
Dive into the intricate world of internet layers and discover how they form the backbone of global connectivity. This podcast episode explores the fundamental layers of the internet, from DNS and IP addresses to TCP and routing, shedding light on the protocols and processes that enable seamless communication across the globe. Join us as we unravel …
  continue reading
 
Python is the dominant language for AI and data science applications, but it lacks the performance and low-level control needed to fully leverage GPU hardware. As a result, developers often rely on NVIDIA’s CUDA framework, which adds complexity and fragments the development stack. Mojo is a new programming language designed to combine the simplicit…
  continue reading
 
Python is the dominant language for AI and data science applications, but it lacks the performance and low-level control needed to fully leverage GPU hardware. As a result, developers often rely on NVIDIA’s CUDA framework, which adds complexity and fragments the development stack. Mojo is a new programming language designed to combine the simplicit…
  continue reading
 
Python is the dominant language for AI and data science applications, but it lacks the performance and low-level control needed to fully leverage GPU hardware. As a result, developers often rely on NVIDIA’s CUDA framework, which adds complexity and fragments the development stack. Mojo is a new programming language designed to combine the simplicit…
  continue reading
 
This week, our three hosts ⁠⁠Dave Bittner⁠⁠, ⁠⁠Joe Carrigan⁠⁠, and ⁠⁠Maria Varmazis⁠⁠ (also host of the ⁠⁠T-Minus⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Listener Jim notes that money launderers and couriers mentioned in recent episodes are often scam…
  continue reading
 
House Judiciary Committee Chairman Jim Jordan discusses the implications of a recent memo from the Biden administration that targets everyday Americans for their beliefs and actions, and the efforts to expose these actions. Jordan highlights the progress made in uncovering the censorship machinery and emphasizes the need for legislative fixes to pr…
  continue reading
 
On this episode of the Energy Security Cubed Podcast, Kelly and Joe discuss the role of the International Energy Agency, the Energy Information Administration, and the Organization of Petroleum Exporting Countries, and the energy security concerns following a loss of trust in the independence of global energy analysis as political concerns seep in.…
  continue reading
 
In this episode, I discuss the Model Context Protocol (MCP) with the OWASP GenAI Co-Lead for Agentic Application Security, Vineeth Sai Narajala. We will discuss MCP's potential and pitfalls, its role in the emerging Agentic AI ecosystem, and how security practitioners should consider secure MCP enablement. We discussed: MCP 101, what it is and why …
  continue reading
 
Will McGugan, the CEO and founder of Textualize, speaks with host Gregory M. Kapfhammer about how to use packages such as Rich and Textual to build text-based user interfaces (TUIs) and command-line interfaces (CLIs) in Python. Along with discussing the design idioms that enable developers to create TUIs in Python, they consider practical strategie…
  continue reading
 
Apple’s $20B search deal with Google is under fire — and Eddy Cue says we might not even need iPhones in 10 years. Meanwhile, Duolingo and Shopify are pushing hard into AI-first workplaces. What does this mean for the future of jobs, tech, and trust? In this episode of 4 Guys Talking About AI, we unpack the high-stakes courtroom drama where Apple’s…
  continue reading
 
CTO and co-founder of Apollo, Matt DeBergalis, joins us on this episode to talk about how GraphQL has continued to evolve over time, and how Apollo is focused on making it more accessible for developers and AI agents than ever before. For those less familiar with Apollo and GraphQL, Matt shares the history of both, including lessons he learned from…
  continue reading
 
(0:10): JPMorgan CEO Embraces Bitcoin, Signals Institutional Shift Amid Surging Crypto Demand (2:15): Riot Platforms Boosts Credit Facility to $200M with Coinbase, Expands Bitcoin Mining Capacity (4:41): Kraken Launches Regulated Crypto Derivatives Trading Across Europe After Cyprus Acquisition (6:53): Microsoft and Musk's AI Unveils Propel AI Toke…
  continue reading
 
Congressman Rudy Yakym discusses the implications of President Trump's recent visit to Capitol Hill, and highlights a transformative bill aimed at overhauling American governance and spending, which encapsulates decades of conservative ideas. Congressman August Pfluger from Texas discusses the historic legislative efforts currently taking place in …
  continue reading
 
We are happy to have Kayra Otaner as a special guest on the Absolute AppSec podcast. Kayra (kayraotaner on LinkedIn and X/twitter), the current Director of DevSecOps at Roche, brings over 15 years of cybersecurity leadership experience from New York and Wall Street. He's led DevSecOps and DevOps teams across a variety of organizations, including AD…
  continue reading
 
On this episode of #TheGlobalExchange, Colin Robertson sits down with Gordon Holden and Paul Evans to discuss the relationships and tensions between Canada and China, and how the new Carney government will play into this.//Participants' bios- Paul Evans is Professor Emeritus at the School of Public Policy and Global Affairs at the University of Bri…
  continue reading
 
Send us a text What happens when a former Air Force weapons loader transforms into a cybersecurity expert? Clint Stevens from Physics joins us to share his remarkable journey through military intelligence, special operations support, and cyber warfare before founding his own security consultancy. This conversation peels back the layers of cybersecu…
  continue reading
 
PostgreSQL is an open-source database known for its robustness, extensibility, and compliance with SQL standards. Its ability to handle complex queries and maintain high data integrity has made it a top choice for both start-ups and large enterprises. Heikki Linnakangas is a leading developer for the PostgreSQL project, and he’s a co-founder at Neo…
  continue reading
 
PostgreSQL is an open-source database known for its robustness, extensibility, and compliance with SQL standards. Its ability to handle complex queries and maintain high data integrity has made it a top choice for both start-ups and large enterprises. Heikki Linnakangas is a leading developer for the PostgreSQL project, and he’s a co-founder at Neo…
  continue reading
 
(0:10): JPMorgan Embraces Bitcoin: CEO Jamie Dimon Reverses Stance, Sparks Crypto Market Surge (2:31): Jack Dorsey Backs Renaming 'Satoshis' to Simplify Bitcoin Adoption (4:47): Ripple Partners with UAE's Zand Bank and Mamo to Boost Middle East Payment Services (7:11): Circle Considers Sale to Coinbase or Ripple Amid $5 Billion IPO Ambitions (9:09)…
  continue reading
 
Please enjoy this encore of Word Notes. Ineffectual confirmation of a user's identity or authentication in session management. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure⁠ Audio reference link: “⁠Mr. Robot Hack - Password Cracking - Episode 1⁠.” YouTube Video. YouTube, September 21, 20…
  continue reading
 
The Wireless Environmental Monitor by TempGenius offers a highly reliable and scalable solution for facilities that demand precision in environmental tracking. Designed for industries like healthcare, pharmaceuticals, laboratories, and food services, this wireless monitoring system delivers real-time data to help maintain compliance, safety, and op…
  continue reading
 
In this episode of the CDW Canada Tech Talks podcast, host KJ Burke discusses the findings of the 2025 CDW Canada Cybersecurity Study with cybersecurity experts Ivo Wiens and Ben Boi-Doku. They explore the evolving landscape of cybersecurity threats, the importance of continuous security testing and the challenges faced by small and medium business…
  continue reading
 
Microsoft finally opens the source of WSL, Paolo Scanferla describes an inherent trade-off in TypeScript’s type system, Alberto Fortin is taking a step back from heavy LLM use while coding, a pseudonymous hacker spent two weeks coding from their Android phone, and NLWeb might become the HTML of the open agentic web. View the newsletter Join the dis…
  continue reading
 
Loading …
Listen to this show while you explore
Play