The future of cybersecurity isn’t about AI replacing humans — it’s about AI empowering humans. Security professionals armed with intelligent automation tools will be faster, more accurate, and more proactive than ever before. The combination of AI-driven analytics and human judgment will define the next era of digital protection.
…
continue reading
Ai In Cybersecurity Podcasts
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj research staff and journalists interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
…
continue reading
Scaling Laws explores (and occasionally answers) the questions that keep OpenAI’s policy team up at night, the ones that motivate legislators to host hearings on AI and draft new AI bills, and the ones that are top of mind for tech-savvy law and policy students. Co-hosts Alan Rozenshtein, Professor at Minnesota Law and Research Director at Lawfare, and Kevin Frazier, AI Innovation and Law Fellow at the University of Texas and Senior Editor at Lawfare, dive into the intersection of AI, innova ...
…
continue reading
In an age where cyber threats evolve with lightning speed, traditional defenses are no longer enough. AI in Cybersecurity: Protecting the Digital Future is your guide to understanding how artificial intelligence is revolutionizing the fight against digital crime. This comprehensive book delves into AI’s transformative role in cybersecurity, from identifying and mitigating sophisticated threats to mastering critical concepts like machine learning and anomaly detection.
…
continue reading
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
…
continue reading
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
The latest in AI and Marketing - Hear Tomorrow’s Tech Today AI in Marketing is a human-curated, AI-generated, Short-Form Podcast. This podcast is generated by Voice_Stream. With Voice_Stream give your brand a voice. Automatically convert your text documents into professional-quality podcasts with Voice_Stream. Start you free trial at https://www.getvoicestream.com/
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Welcome to Cyber Insights, the podcast that bridges the worlds of networking and cybersecurity. From cutting-edge innovations in enterprise connectivity to the latest in digital defense, we break down the buzzwords and bring you actionable insights to secure and scale your systems. Whether you're an IT professional, business leader, or tech enthusiast, join us as we explore the critical intersection of networks and security, featuring expert conversations, industry trends, and real world str ...
…
continue reading
Making artificial intelligence practical, productive & accessible to everyone. Practical AI is a show in which technology professionals, business people, students, enthusiasts, and expert guests engage in lively discussions about Artificial Intelligence and related topics (Machine Learning, Deep Learning, Neural Networks, GANs, MLOps, AIOps, LLMs & more). The focus is on productive implementations and real-world scenarios that are accessible to everyone. If you want to keep up with the lates ...
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
Tech Tomorrow is your front-row seat to the conversations redefining the future. Each episode explores one big question about data, AI, or emerging tech, giving leaders clear, focused answers they can trust. If you're navigating complex innovation, from AI-augmented delivery to sustainability, this show helps you cut through the noise, connect cross-disciplinary trends, and lead with confidence in a rapidly evolving landscape. Previously known as Data Today, this podcast has examined how out ...
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
Tech Transformation with Evan Kirstel: A podcast exploring the latest trends and innovations in the tech industry, and how businesses can leverage them for growth, diving into the world of B2B, discussing strategies, trends, and sharing insights from industry leaders! With over three decades in telecom and IT, I've mastered the art of transforming social media into a dynamic platform for audience engagement, community building, and establishing thought leadership. My approach isn't about per ...
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
Listen for today's top stories, with context, in just 15 minutes. Get informed from Bloomberg's 3,000 journalists and analysts.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast every Tuesday at 6:30 a.m. ET, and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity professional or an executive looking to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you stay informed and proactively prepare for today’s top cybersecurity threats, AI-driven atta ...
…
continue reading
In this episode, Tyler and Bob break down cybersecurity in a fun, human way—no tech jargon overload, just real tips and tricks to keep your business safe. From password tricks and phishing scams to the importance of backups and cloud security, they share easy-to-follow advice with plenty of humour and relatable insights. If you’ve ever ignored an update or used ”password123,” this one’s for you. Tune in, laugh a little, and learn how to become a cybersecurity rockstar!
…
continue reading
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
…
continue reading
Welcome to "AI or Not," the podcast where digital transformation meets real-world wisdom, hosted by Pamela Isom. With over 25 years of guiding the top echelons of corporate, public and private sectors through the ever-evolving digital landscape, Pamela, CEO and Founder of IsAdvice & Consulting LLC, is your expert navigator in the exploration of artificial intelligence, innovation, cyber, data, and ethical decision-making. This show demystifies the complexities of AI, digital disruption, and ...
…
continue reading
Join Lukas Biewald on Gradient Dissent, an AI-focused podcast brought to you by Weights & Biases. Dive into fascinating conversations with industry giants from NVIDIA, Meta, Google, Lyft, OpenAI, and more. Explore the cutting-edge of AI and learn the intricacies of bringing models into production.
…
continue reading
AI Journal Podcast. Your go-to source for the latest breakthroughs, trends, and insights in the world of Artificial Intelligence. Every episode brings you up-to-date with breaking news, in-depth analyses, and real-world applications of AI shaping industries and redefining the future. From advancements in machine learning to the ethics of AI, we cover it all—delivering the most relevant updates directly to your ears. Whether you’re an enthusiast, a professional, or simply curious about the te ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
James McQuiggan brings inspiring stories of cybersecurity practitioners "break-into-industry" stories across all dimensions of cybersecurity.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
The MSP Sales Podcast digs into the philosophy, strategy, sales training, and techniques that allow a managed service provider to meet their maximum sales potential. For managed service providers who want to scale, we’ll discuss the critical systems that must be in place for every MSP to succeed. We’ll be joined by industry specialists in the IT industry to offer their expert insights. Hosted by Brian Gillette, his own unique and proven empathy-driven sales philosophy has helped generate mil ...
…
continue reading
Welcome to the inside track of cybersecurity entrepreneurship. We bring you the best founders, operators, and investors building the future of cybersecurity.
…
continue reading
Tune in as we dissect recent AI news, explore cutting-edge innovations, and sit down with influential voices shaping the future of AI. Whether you're a seasoned expert or just dipping your toes into the AI waters, our podcast is your go-to resource for staying informed and inspired. #IntelAI @IntelAI
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
Discover the fintech podcast "Curiosity Code", featuring exclusive interviews on fintech innovation and financial technology. Hosted by Alex, founder of the digital agency Productera, with a background in B2B and SaaS companies, the podcast brings together founders, CEOs, visionaries, and fintech leaders driving financial innovation, AI, open banking, and digital transformation.Each episode offers success stories, challenges, and groundbreaking ideas about the future of blockchain, AI agents ...
…
continue reading
Musing On Society, Technology, and Cybersecurity | Hosted by Marco Ciappelli Let’s face it: the future is now. We live in a hybrid analog-digital society, and it’s time to stop ignoring the profound impact technology has on our lives. The line between the physical and virtual worlds? It’s no longer real — just a figment of our imagination. We’re constantly juggling convenience, privacy, freedom, security, and even the future of humanity in a precarious balancing act. There’s no better place ...
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Conversations at the crossroads of data, AI, governance, cybersecurity, and digital transformation. Join Kate Carruthers as she dives into the world of data, AI, governance, cybersecurity, and digital transformation. Each episode explores how technology is changing business, society, and everyday life. From protecting privacy to powering innovation, this podcast breaks down the trends and ideas shaping the future of our digital world - all in clear, engaging conversations you’ll actually enj ...
…
continue reading
As breaches abound and cybercriminals up the ante, it's more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory's director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
…
continue reading
1
Episode 29 - Selling Cybersecurity Without Fear In The AI Era (Guest: Dor Eisner)
32:30
32:30
Play later
Play later
Lists
Like
Liked
32:30In Episode 29 of The MSP Sales Podcast, Brian Gillette sits down with Dor Eisner (CEO & Co-Founder of Guardz) for a grounded, myth-busting conversation about selling cybersecurity in an AI-shaped world. Too many MSPs feel pressured to become “cyber experts” overnight while many clients think cybersecurity is either too technical or too expensive to…
…
continue reading
1
The Invisible Breach: How AI Is Quietly Creating New Security Blind Spots in Modern Tech
10:46
10:46
Play later
Play later
Lists
Like
Liked
10:46This story was originally published on HackerNoon at: https://hackernoon.com/the-invisible-breach-how-ai-is-quietly-creating-new-security-blind-spots-in-modern-tech. We're watching organizations introduce sophisticated machine learning systems to reduce risk, only to discover its creating entirely new categories of risk. Check more stories related …
…
continue reading
1
Scaling Laws: Caleb Withers on the Cybersecurity Frontier in the Age of AI
49:00
49:00
Play later
Play later
Lists
Like
Liked
49:00Caleb Withers, a researcher at the Center for a New American Security, joins Kevin Frazier, the AI Innovation and Law Fellow at the University of Texas School of Law and a Senior Editor at Lawfare, to discuss how frontier models shift the balance in favor of attackers in cyberspace. The two discuss how labs and governments can take steps to address…
…
continue reading
1
The Biggest Cybersecurity Challenges Facing Regulated and Mid-Market Sectors - with Cody Barrow of EclecticIQ
18:14
18:14
Play later
Play later
Lists
Like
Liked
18:14Today's guest is Cody Barrow, CEO at EclecticIQ. EclecticIQ is a global cybersecurity leader specializing in threat intelligence technology. Cody joins Emerj Editorial Director Matthew DeMello to discuss how AI-driven analytics and automation are revolutionizing threat detection and response in enterprise cybersecurity. Barrow also highlights pract…
…
continue reading
1
Taming the AI Gold Rush: A New Building Code for Trustworthy Intelligence
13:24
13:24
Play later
Play later
Lists
Like
Liked
13:24As the tech world races through an "AI gold rush," the gap between rapid innovation and safety standards has created massive risks for organizations deploying Generative AI. This episode breaks down the new OWASP AI Maturity Assessment (AIMA), a comprehensive blueprint that acts as a "building code" to ensure AI systems are secure, reliable, and al…
…
continue reading
1
Caleb Withers on the Cybersecurity Frontier in the Age of AI
48:17
48:17
Play later
Play later
Lists
Like
Liked
48:17Caleb Withers, a researcher at the Center for a New American Security, joins Kevin Frazier, the AI Innovation and Law Fellow at the University of Texas School of Law and a Senior Editor at Lawfare, to discuss how frontier models shift the balance in favor of attackers in cyberspace. The two discuss how labs and governments can take steps to address…
…
continue reading
1
Cybersecurity Defense Ecosystem Episode 7: AI in Cybersecurity: Offense vs. Defense
42:12
42:12
Play later
Play later
Lists
Like
Liked
42:12Send us a text Presenters: Julian Lee, Publisher, Community Builder, Speaker, Channel Ecosystem Developer with a focus on cybersecurity, AI and Digital Transformation Nim Nadarajah, C.CISO, Cyber Security, Compliance & Transformation Expert | Executive Board Member | Keynote Speaker Evgeniy Kharam, Publisher, Community Builder, Speaker, Channel Eco…
…
continue reading
1
73. Microsoft Engineer Reveals: How AI Can Read Your Entire Database (In Plain English) - with Faiz Gouri
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ Mario Zaki - https://www.mazteck.com/ Bryan Lachapelle - https://www.b4networks.ca/ Guest: Faiz Gouri -https://www.linkedin.com/in/faizgouri/ https://modelcontextprotocol.io/ Microsoft Senior Software Engineer Business owners, your data just became incredibly powerful—and potentially danger…
…
continue reading
1
DeepMind's Robotics Push, Nvidia's Record Earnings, and AI's Role in Marketing & Cybersecurity
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15In this episode, we explore the latest developments in AI and robotics. Google DeepMind has recruited Aaron Saunders, former CTO of Boston Dynamics, to enhance its robotics focus, aligning with CEO Demis Hassabis' vision for the Gemini AI system. Meanwhile, Nytro Marketing is hosting a LinkedIn Live event on December 11 to discuss AI's impact on B2…
…
continue reading
1
Andre Lynch: AI in Cybersecurity - Separating Hype from Reality
23:39
23:39
Play later
Play later
Lists
Like
Liked
23:39Are AI-powered cyberattacks really the existential threat vendors claim? Or are we being sold fear to fuel product sales? In this episode of The Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray and Ian Finlayson are joined by Andre Lynch, Senior Sales Engineer at ConnectWise, to cut through the AI marketing noise and reveal wh…
…
continue reading
1
How Quantum Computers Threaten Bitcoin and the Entire Internet: Simply Explained
17:43
17:43
Play later
Play later
Lists
Like
Liked
17:43This story was originally published on HackerNoon at: https://hackernoon.com/how-quantum-computers-threaten-bitcoin-and-the-entire-internet-simply-explained. Learn how Shor's Algorithm breaks RSA, ECC, and Bitcoin. Understand the 'Decrypt Later' threat and the urgent global race for Post-Quantum Cryptography (PQC). Check more stories related to cyb…
…
continue reading
1
From IVR To Orchestration: Building AI-First Customer Journeys
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Interested in being a guest? Email us at [email protected] If you could see customer issues before they happen, would you still measure success by hold time? We dive into how CX is transforming from a reactive cost center to a proactive, revenue-positive engine—and why the shift depends on a new orchestration layer that acts as the brain across…
…
continue reading
1
The AI Race Nobody Expected: Wearables, Lawsuits & Small Business Wins
6:05
6:05
Play later
Play later
Lists
Like
Liked
6:05Episode Summary In this episode, we break down the biggest shifts happening in the AI world. We explore Meta’s acquisition of Limitless and what it means for the future of AI wearables, why small businesses are quietly outpacing large corporations in AI adoption, and how the Philippines is building an ethical-first AI roadmap. We also dive into the…
…
continue reading
1
🌐 Cybersecurity Unmasked 🌐 EP 29: Strategic AI Adoption for Canadian SMEs
14:10
14:10
Play later
Play later
Lists
Like
Liked
14:10Canadian SMEs have an appetite for technology, 94% prioritize tech investment, but only 10% have fully integrated it. That massive gap is where profits leak away. In this episode of Cybersecurity Unmasked, we share the eight-step roadmap that helped one Toronto manufacturer turn a $28,000 investment into $220,000 in returns (697% ROI) within 12 mon…
…
continue reading
1
How AI Is Transforming Insurance Operations and Security with Rao Tadepalli
30:29
30:29
Play later
Play later
Lists
Like
Liked
30:29Guest Introduction Rao Tadepalli is the CEO and Founder of DigiTran, a digital transformation and AI advisory firm specializing in insurance and financial services. Previously the CIO of Slide Insurance, Rao has spent decades guiding insurers through modernization, core system evolution, cloud adoption, and AI driven process redesign. Today he help…
…
continue reading
1
Fix your dumb misconfigurations, AI isn't people, and the weekly news - Wendy Nather, Danny Jenkins - ESW #436
1:34:58
1:34:58
Play later
Play later
Lists
Like
Liked
1:34:58Interview with Danny Jenkins: How badly configured are your endpoints? Misconfigurations are one of the most overlooked areas in terms of security program quick wins. Everyone freaks out about vulnerabilities, patching, and exploits. Meanwhile, security tools are misconfigured. Thousands of unused software packages increase remediation effort and a…
…
continue reading
1
Lawfare Daily: The Trials of the Trump Administration, Dec. 5
1:37:47
1:37:47
Play later
Play later
Lists
Like
Liked
1:37:47In a live conversation on YouTube, Lawfare Executive Editor Natalie Orpett sat down with Lawfare Senior Editors Anna Bower, Michael Feinberg, Molly Roberts, Roger Parloff and Eric Columbus and Lawfare Contributing Editor James Pearce to discuss the arrest of a suspect in the attempted bombing on Jan. 6, 2021, a hearing in NPR’s lawsuit over the Tru…
…
continue reading
1
Palo Alto VPN attacks, NATO cyberdefense exercise, Chinese exploit React2Shell
8:19
8:19
Play later
Play later
Lists
Like
Liked
8:19New wave of VPN login attempts on Palo Alto portals NATO holds its largest-ever cyberdefense exercise Chinese hackers exploiting React2Shell bug Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Deepfakes aren't science fiction anymore; they'r…
…
continue reading
1
Europe Has A ‘Real Problem’, Trump Netflix-Warner Concern, Farage Woos UK Bankers
20:28
20:28
Play later
Play later
Lists
Like
Liked
20:28Your morning briefing, the business news you need in just 15 minutes. On today's podcast: (1) JPMorgan Chief Executive Officer Jamie Dimon called out slow bureaucracy in Europe in a warning that a “weak” continent poses a major economic risk to the US. (2) Keir Starmer will host Ukrainian President Volodymyr Zelenskiy in London on Monday as the UK …
…
continue reading
1
AI Boom: Nvidia's Surge, Coca-Cola's AI Marketing, and Reddit's Content Challenges
10:25
10:25
Play later
Play later
Lists
Like
Liked
10:25In this episode, we delve into the AI boom, drawing parallels with past industrial surges and examining its role in building future infrastructure. We highlight Nvidia's soaring profits and OpenAI's ambitious IPO plans, while discussing the narrow AI cohort driving US stock market gains. Critics warn of "AI-washing," but proponents liken this to hi…
…
continue reading
Episode 14 – Leadership in the AI Era with Ruby Agarwal (VP Cloud Platform & Operations @ Avaya) The game has permanently changed. AI isn’t coming for your job tomorrow; it’s already rewriting the operating system of every security and technology organization today. In this no-BS episode, Tony UV sits down with Ruby Agarwal to separate leadership t…
…
continue reading
1
3512: How D2L's Rob Telfer Sees Universities Adapting to an AI First World
29:30
29:30
Play later
Play later
Lists
Like
Liked
29:30What does learning look like when technology shifts faster than most university systems can adapt? That question shaped my conversation with Rob Telfer, who leads education strategy for D2L across Europe, the Middle East, and Africa. Rob returned to the show with a clear view of how AI is transforming higher education and why so many institutions a…
…
continue reading
1
The Minivan Empire: How a Solo CISO Built a Global Intelligence Network from a Honda Odyssey
32:40
32:40
Play later
Play later
Lists
Like
Liked
32:40Discover how a veteran security consultant rebuilt a media empire from scratch following a business collapse, all while operating full-time from a solar-powered Honda Odyssey with Starlink. We explore how the CyberAdX Network leverages extreme automation to deliver 25 million annual impressions and undercut legacy publishers by 50 to 100 times in c…
…
continue reading
1
Lawfare Archive: Lynzy Billing on Afghanistan's Zero Unit Night Raids
42:27
42:27
Play later
Play later
Lists
Like
Liked
42:27From January 24, 2023: In 2019, investigative journalist and photographer Lynzy Billing went to Afghanistan to investigate a very personal story: her own past. In the process, she discovered what she came to call a classified war, one with lines of accountability so obscured that no one had to answer publicly for operations that went wrong. Lawfare…
…
continue reading
1
Nothing Has Changed in Cybersecurity Since the 80s — And That's the Real Problem | A Conversation with Steve Mancini | Redefining Society and Technology with Marco Ciappelli
43:03
43:03
Play later
Play later
Lists
Like
Liked
43:03Dr. Steve Mancini: https://www.linkedin.com/in/dr-steve-m-b59a525/ Marco Ciappelli: https://www.marcociappelli.com/ Nothing Has Changed in Cybersecurity Since War Games — And That's Why We're in Trouble "Nothing has changed." That's not what you expect to hear from someone with four decades in cybersecurity. The industry thrives on selling the next…
…
continue reading
1
3511: BCG on Closing the Gap Between AI Experiments and Real Business Impact
25:15
25:15
Play later
Play later
Lists
Like
Liked
25:15*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn-id= "request-WEB:221c7553-c733-4456-a06c-c66c0626b35b-7" data-testid= "conversation-turn-16" data-scroll-anchor="true" data-turn= "assistant"> How do you guide a workforce through the fastest shift in technology most of us ha…
…
continue reading
1
CISO Insights: The Strategic Security Briefing
12:04
12:04
Play later
Play later
Lists
Like
Liked
12:04Broadcasting 3-4 episodes weekly, this show delivers critical analysis on data breaches, compliance frameworks, and threat intelligence to a loyal audience of enterprise security practitioners. The listener base is heavily concentrated in the US market (45%), with deep penetration in major tech hubs like California and defense sectors in Virginia. …
…
continue reading
1
$14.6 Million in RWA Hacks This Year Reveals the Gap Between Tokenization Hype and Reality
10:18
10:18
Play later
Play later
Lists
Like
Liked
10:18This story was originally published on HackerNoon at: https://hackernoon.com/$146-million-in-rwa-hacks-this-year-reveals-the-gap-between-tokenization-hype-and-reality. RWA tokenization hit $35.68B in 2025, but $14.6M in hacks exposed security gaps. Can the industry scale to $2 trillion by 2028 amid regulatory fragmentation? Check more stories relat…
…
continue reading
1
3510: Orange Business and the Rise of Digital Innovation Across IMEA
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30Did you know that when many people hear "Orange," they still ask if it involves SIM cards? That was the perfect place to begin my conversation with Sahem Azzam, President for IMEA and Inner Asia at Orange Business. Once we cleared that up, it opened the door to a much richer story about what enterprise innovation looks like across one of the fastes…
…
continue reading
1
Lawfare Archive: How Congressional Staffers Helped Our Afghan Allies
38:00
38:00
Play later
Play later
Lists
Like
Liked
38:00From April 5, 2024: A new report from the POPVOX Foundation focuses on a little-known and hugely under-appreciated congressional effort: that of congressional staffers helping Afghan allies flee the country during the U.S. withdrawal from Afghanistan. Lawfare Executive Editor Natalie Orpett sat down with the report’s author, Anne Meeker. They talke…
…
continue reading
1
Daybreak Weekend: Fed Decision, Cybersecurity Conference, China Eco
39:05
39:05
Play later
Play later
Lists
Like
Liked
39:05Bloomberg Daybreak Weekend with Host Nathan Hager take a look at some of the stories we'll be tracking in the coming week. In the US – a look ahead to next week’s Fed decision and earnings from Oracle and Adobe. In the UK – a look ahead to the Blackhat cybersecurity conference. In Asia – a look ahead to China consumer and producer price data. See o…
…
continue reading
1
Toilet Cams, N. Korea, Brickstorm, MCP, React2Shell, Proxmox, Metaverse, Josh Marpet - SWN #535
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08Toilet Cams, North Korea, Brickstorm, MCP, India, React2Shell, Proxmox, Metaverse, Josh Marpet, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-535
…
continue reading
1
NIS2 Unlocked: The New Era of European Cyber Resilience
35:19
35:19
Play later
Play later
Lists
Like
Liked
35:19This episode explores the transformative impact of the NIS2 Directive, which mandates robust cybersecurity risk management and strict "24-72-30" incident reporting timelines for essential and important entities across the EU. We break down the critical distinctions in supervisory regimes and the expanded scope that now includes sectors ranging from…
…
continue reading
1
Lawfare Live: The EU Fines X 120 M Euros - What Comes Next?
35:50
35:50
Play later
Play later
Lists
Like
Liked
35:50On Dec. 5, the European Commission announced that they are fining X (formerlly Twitter) 120 million euros for impersonation scams with “verification,” broken advertising transpaency system, and blocking researchers from its platform. On a Lawfare Live, Lawfare Senior Editor Kate Klonick and Lawfare Contributing Editor Renee DiResta analyzed the dec…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/how-request-response-really-works. Learn how the request–response model really works under the hood. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #network, #request-response-model, #reque…
…
continue reading
1
Taking Control Of Software Supply Chains in the Open Source Era
7:02
7:02
Play later
Play later
Lists
Like
Liked
7:02This story was originally published on HackerNoon at: https://hackernoon.com/taking-control-of-software-supply-chains-in-the-open-source-era. Understanding how these recent npm attacks unfolded will help signal a way forward for a more secure software supply chain. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecuri…
…
continue reading
1
AI Insights: Safety, Jobs, Cybersecurity, and Enterprise Wins
5:44
5:44
Play later
Play later
Lists
Like
Liked
5:44Episode Summary In today’s episode, we explore the latest developments shaping the AI landscape. Elon Musk shares his formula to keep AI safe, emphasizing truth, beauty, and curiosity. IBM CEO Arvind Krishna debunks the myth that AI is killing jobs, highlighting workforce corrections and opportunities for upskilling. We then examine how AI is trans…
…
continue reading
1
Episode 160: Should You Alert Your SOC Before a Pentest?
32:24
32:24
Play later
Play later
Lists
Like
Liked
32:24In this episode, we're discussing the pros and mostly the cons of notifying your SOC/MSSP before your penetration test. Spencer and Brad delve into the details of why it matters and share their experience from hundreds of penetration tests. Get your 2025 External Pentest done before time runs out! https://www.securit360.com/external-penetration-tes…
…
continue reading
1
Predator spyware, Russia blocks FaceTime, US cyber strategy coming
7:06
7:06
Play later
Play later
Lists
Like
Liked
7:06Predator spyware spotted across several countries Russia blocks FaceTime Draft US cyber strategy set for January release Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, so you…
…
continue reading
1
German Coalition On Edge, Jane Street’s Savvy AI Bets, Jamie Oliver's Second Helping
16:44
16:44
Play later
Play later
Lists
Like
Liked
16:44Your morning briefing, the business news you need in just 15 minutes. On today's podcast: (1) Chancellor Friedrich Merz’s ruling coalition with the Social Democrats faces a key vote in parliament on Friday that could precipitate its demise only seven months into its four-year term. (2) President Vladimir Putin arrived in New Delhi for his first sta…
…
continue reading
1
SAP AI-Driven Data Migration, ChatGPT Enhancements, and China's Scientific Rise
8:58
8:58
Play later
Play later
Lists
Like
Liked
8:58In this episode, we explore an AI-powered framework that's transforming the migration of data from SAP ECC to S/4HANA, automating data validation and reconciliation to reduce errors and enhance data integrity. As SAP plans to end ECC support by 2027, this innovation is crucial for enterprises modernizing their ERP systems. We also discuss OpenAI's …
…
continue reading
1
What Happens When Critical Infrastructure Is One Click From Disaster
13:44
13:44
Play later
Play later
Lists
Like
Liked
13:44Interested in being a guest? Email us at [email protected] What if you could see the internet the way attackers do—before the headlines, before the breach, before the phish hits your inbox? We sit down with Aidan Holland, senior security researcher at Censys, to unpack how daily global scans reveal the live shape of the web: assets you didn’t k…
…
continue reading
1
3509: What AWS re:Invent Revealed About the Acceleration of Agentic AI
25:40
25:40
Play later
Play later
Lists
Like
Liked
25:40Did you ever walk into a conference session thinking you were ready for the week, only to realise the announcements were coming so fast that you almost needed an agent of your own to keep up? That was the mood across Las Vegas, and it was the backdrop for my conversation with Madhu Parthasarathy, the general manager for Agent Core at AWS. He has sp…
…
continue reading
1
Holiday Hack Challenge, AI, Internet of Trash - Ed Skoudis - PSW #903
2:10:41
2:10:41
Play later
Play later
Lists
Like
Liked
2:10:41This week we welcome Ed Skoudis to talk about the holiday hack challenge (https://sans.org/HolidayHack). In the security news: Oh Asus Dashcam botnets Weird CVEs being issued CodeRED, but not the worm Free IP checking Internet space junk and IoT Decade old Linux kernel vulnerabilities Breaking out of Claude code Malicious LLMs Hacker on a plan gets…
…
continue reading
1
Responsible Disclosure and Bug Bounty Programs: Webinar
24:38
24:38
Play later
Play later
Lists
Like
Liked
24:38Adam Logue, Independent Security Researcher and Synack Red Teamer, discusses his experiences with responsible disclosure and bug bounty programs, and provides a fascinating technical deep dive into a vulnerability he found in Microsoft 365 Copilot during a client-facing engagement. Timestamps: 00:49 - Adam's background with responsible disclosure a…
…
continue reading
Send us a text Perhaps you’re familiar with the quote, “The greatest trick the Devil ever pulled was convincing the world he didn’t exist.” While its use in the movie The Usual Suspects might resonate with most, the original attribution goes to French poet Charles Baudelaire. The quote came to mind in preparing for my conversation with Tim Chase, P…
…
continue reading
1
You’ve Learned to Break Wi-Fi. Now Learn to Lock It Down.
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31This story was originally published on HackerNoon at: https://hackernoon.com/youve-learned-to-break-wi-fi-now-learn-to-lock-it-down. A practical guide to Wi-Fi hardening using strong passwords, entropy, OpSec and key router safeguards for a safer, more resilient network. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyber…
…
continue reading
1
Lawfare Daily: The End of New START? With John Drennan and Matthew Sharp
58:45
58:45
Play later
Play later
Lists
Like
Liked
58:45New START, the last bilateral nuclear arms control treaty between the United States and Russia, will expire in February 2026 if Washington and Moscow do not reach an understanding on its extension—as they have signaled they are interested to do. What would the end of New START mean for U.S.-Russia relations and the arms control architecture that ha…
…
continue reading