Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Cyber Security Risks And Solutions Podcasts
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
This podcast series offers risk intelligence and analysis from RANE Network. RANE is a risk intelligence company that provides business professionals with access to critical insights, analysis, and support, enabling them to better anticipate, monitor, and respond to emerging risks and threats. In the RANE podcast series, risk management experts and thought leaders share best practices for managing business risk, geopolitical risk, physical and cyber security risks, compliance risk, and other ...
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Welcome to the PRMA Risk Ready podcast, the show for Risk Management Professionals in the High Net Worth Space.
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
1
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
The Small Business Cyber Security Guy
The UK's leading small business cybersecurity podcast helping SMEs protect against cyber threats without breaking the bank. Join cybersecurity veterans Noel Bradford (CIO at Boutique Security First MSP) and Mauven MacLeod (ex-UK Government Cyber Analyst) as they translate enterprise-level security expertise into practical, affordable solutions for UK small businesses. 🎯 WHAT YOU'LL LEARN: - Cyber Essentials certification guidance - Protecting against ransomware & phishing attacks - GDPR comp ...
…
continue reading
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
…
continue reading
Secured is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful So ...
…
continue reading
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™
Startuprad.io – Europe’s Startup & VC Podcast Network
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
…
continue reading
AI is revolutionizing cybersecurity—both as a weapon for attackers and a shield for defenders. The AI Security Edge dives deep into the evolving cyber battlefield, where AI-driven threats challenge traditional defenses, and cutting-edge AI solutions offer new ways to fight back. Hosted by cybersecurity expert Caroline Wong, this podcast explores real-world case studies, expert insights, and practical strategies for building cyber resilience in an AI-powered world. Whether you’re a security l ...
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
Cybersecurity. Privacy. Blockchain. Unfiltered. The Efani Features Podcast is your trusted guide to the evolving world of digital security. Hosted by Mark Kreitzman of Efani, each episode dives deep into the critical issues shaping our digital future - from SIM swap threats and mobile privacy to crypto security and blockchain innovation. Join leading experts, ethical hackers, founders, and privacy advocates as we unpack real-world threats, explore cutting-edge solutions, and share practical ...
…
continue reading
Bringing together leaders in the technology space to discuss the challenges they're facing and the solutions they're delivering.
…
continue reading
Today’s built environment we face ever increasing risk from cyber security. In this podcast we explore some of the challenges and or imports solutions Cover art photo provided by bharath g s on Unsplash: https://unsplash.com/@xen0m0rph
…
continue reading
YASH cyber security solutions are helping global corporations address a plethora of cyber risks proactively and reactively. We help our customers to grow their business securely, we understand your world.
…
continue reading
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Conversations in software engineering, cybersecurity, artificial intelligence engineering, and future technologies
…
continue reading
Nuix creates innovative software that empowers organizations to simply and quickly find the truth from any data in a digital world. We are a passionate and talented team, delighting our customers with software that transforms data into actionable intelligence. Using Nuix software, customers can overcome the challenges of litigation, investigation, risk, compliance, and security by asking the right questions and getting complete, timely answers. Our collaborative data analytics algorithms and ...
…
continue reading
1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
Welcome to Tech News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news of all things tech, including the latest developments in areas such as artificial intelligence, robotics, cybersecurity, gadgets, apps, and more. Whether you're a tech enthusiast, industry professional, or simply curious about the potential ...
…
continue reading
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
…
continue reading
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Send feedback and show ideas to [email protected]. Each discussion delves into the intersection of technology advancement, market dynamics, and the founder journey, offe ...
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
Beer is one of the oldest and most widely consumed alcoholic drinks in the world, and the third most popular drink overall after water and tea. Cybersecurity is required today for businesses to protect themselves from the persistent threat of malware and ransomware. Hosts Chris Jordan, CEO of Fluency Security, and Jeremy Murtishaw, CEO of Fortify 24x7 discuss cybersecurity, information technology, and hockey with their guests while enjoying some of their favorite beers. Grab your favorite be ...
…
continue reading
We are obsessed with success and know that it’s a journey, not a destination. We are fascinated with successful individuals in all business sectors, who are working on their goals or bettering themselves on a day 2 day basis.
…
continue reading
1
China Blames US Cyberattacks, iPhone 17 Sales Rise, Apple Delays Siri Revamp, Tesla Launches New App Features, and more...
11:03
11:03
Play later
Play later
Lists
Like
Liked
11:03(0:10): China Accuses US of Cyberattacks on Critical Infrastructure Amid Rising Tensions (2:09): iPhone 17 Sales Surge by 14% in China, US; Hardware Upgrades Drive Demand (4:21): Apple's Siri Revamp Faces Delays, Internal Struggles Amidst AI Competition (6:37): Tesla's Latest App Update Boosts Vehicle Maintenance, Adds Real-Time Diagnostics and Enh…
…
continue reading
1
Turning Everyday IT Frustrations into Innovation with Mitch Cullins
33:33
33:33
Play later
Play later
Lists
Like
Liked
33:33Guest Introduction Mitch Cullins serves as Vice President of IT and Chief Information Officer at Trunktie, a company that is redefining how IT professionals organize and label network infrastructure. With more than 25 years of experience in information technology, Mitch’s career includes enterprise architecture, cybersecurity, and systems engineeri…
…
continue reading
1
Mitigating attacks against AI-enabled Apps, Replacing the CIA triad, Enterprise News - David Brauchler - ESW #429
1:38:26
1:38:26
Play later
Play later
Lists
Like
Liked
1:38:26Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost cause. And many developers inadvertently introduce serious threat vectors into their applications – risks they must later eliminate before they become ingrained across application stacks. NCC Group’s …
…
continue reading
1
#7 Consumer AI: How Everyday Tools Are Creating New Security Risks
39:43
39:43
Play later
Play later
Lists
Like
Liked
39:43AI has gone fully consumer, from voice recipes in the kitchen to bots that schedule your day. But when that same tech walks into the office, what happens to privacy, security and trust? In this episode, we explore the blurred line between consumer AI convenience and enterprise AI chaos. What starts as smart personalisation quickly becomes a complia…
…
continue reading
1
Opportunistic Networks: Fundamentals, Applications and Emerging Trends
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20Explores various facets of opportunistic networks (OppNets), which are dynamic, infrastructure-less wireless networks leveraging mobile device interactions for data transfer, often via a "store-carry-forward" mechanism. It details different routing protocols, categorizing them by approaches like replication-based (e.g., Epidemic, Spray and Wait), s…
…
continue reading
1
Open Source Security: Your Network More Secure With Open Source Tools
16:37
16:37
Play later
Play later
Lists
Like
Liked
16:37A comprehensive guide to enhancing network security using open-source tools. It begins by emphasizing the importance of strong password management and multi-factor authentication, before moving into detailed discussions of firewall configuration for network perimeter defense. The text then explores Host Intrusion Detection Systems (HIDS) for server…
…
continue reading
1
Reverse Engineering, AI, and the Economics of Malware with Danny Quist| DailyCyber 277 ~Watch Now ~
1:05:22
1:05:22
Play later
Play later
Lists
Like
Liked
1:05:22AI, Reverse Engineering & the Economics of Malware | Danny Quist | DailyCyber 277 ~ Watch Now ~ In this episode of DailyCyber, I sit down with Danny Quist, Chief Technology Officer at PolySwarm, to unpack the intersection of AI, reverse engineering, and cybersecurity economics. Danny brings nearly two decades of experience leading research and anal…
…
continue reading
Explores the multifaceted field of network science, detailing various network types such as social, biological, and technological systems like the Internet and telephone networks. It examines fundamental network properties including paths, connectivity, and the small-world effect, alongside different mathematical representations of networks. The so…
…
continue reading
1
Erotic Chats, UEFI, F5, Cisco, Doug Sings, Insiders, Lastpass, Sora, Aaran Leyland... - SWN #521
35:31
35:31
Play later
Play later
Lists
Like
Liked
35:31Erotic Chats, UEFI, F5, Cisco, Doug Sings, Insiders, Lastpass, Sora, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-521
…
continue reading
In this episode of Essential Geopolitics, RANE's Asia-Pacific Analyst Chase Blazek unpacks the results of Japan’s recent LDP leadership election and explores what the outcome means for the country going forward. Register here to receive a complimentary subscription to RiskBook, our curated email digest with the latest risk news and analysis, delive…
…
continue reading
1
Honor Launches Robot Phone, Meta Builds Solar Data Center, Apple AI Lead Moves to Meta, YouTube Outage Sparks Criticism, and more...
11:21
11:21
Play later
Play later
Lists
Like
Liked
11:21(0:10): Honor Unveils 'Robot Phone' with AI Gimbal Camera, Promising Photography Revolution (2:11): Meta Invests $1.5 Billion in Solar-Powered AI Data Center in El Paso (4:41): Apple's AI Lead Jumps to Meta, Sparking Concerns Over Siri Update Delays and Talent Retention (7:04): YouTube Outage Affects Millions Globally, Criticized for Ads Display De…
…
continue reading
1
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
32:30
32:30
Play later
Play later
Lists
Like
Liked
32:30Explores various facets of network security and performance, providing practical guidance for hardening systems and optimizing network elements. It covers topics such as client and server security configurations, including detailed steps for Windows and Linux environments, and the benefits of virtualization for disaster recovery and elastic perform…
…
continue reading
1
Evo Nordics #647 - What Role Should Security Have
53:59
53:59
Play later
Play later
Lists
Like
Liked
53:59Today's episode is hosted by Chris Hackett and they are joined on the podcast by Sadetta Postareff, Principal Information Security Manager at atNorth, Heidi Holm, Chief Information Security Officer at Lindab Group, Gabriel Winnberg, Critical Flow Resilience Manager at IKEA, and Peter Saverman, Cyber Security Officer at Emulate Energy AB.The convers…
…
continue reading
1
AI, EDR, and Hacking Things - PSW #896
2:04:54
2:04:54
Play later
Play later
Lists
Like
Liked
2:04:54First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
…
continue reading
1
Microsoft Ends Windows 10, Coinbase Expands in India, Intel Unveils Crescent Island GPU, iPhone 18 Pro Enhances Photography, and more...
11:38
11:38
Play later
Play later
Lists
Like
Liked
11:38(0:10): Microsoft Announces Windows 10 End of Life: Urges Early Transition to Windows 11 by 2025 (2:15): Coinbase Invests in CoinDCX, Expanding Crypto Influence in India and Middle East (4:41): Intel Unveils Crescent Island AI GPU to Revolutionize Data Center Inference (6:46): iPhone 18 Pro to Revolutionize Smartphone Photography with Variable Aper…
…
continue reading
1
Mastering Tableau 2021: Implement advanced business intelligence techniques and analytics with Tableau
16:45
16:45
Play later
Play later
Lists
Like
Liked
16:45An extensive guide to Mastering Tableau, a prominent business intelligence tool, focusing on its advanced features for data analysis and visualization. It covers best practices for visual design, including formatting, color usage, and reducing clutter to create impactful data stories. Readers will learn about data preparation and handling using Tab…
…
continue reading
On this Month's episode of Smells Like Identity Hygiene, we chat with Field CTO at Xaliant, David MorimannoDon't miss out!#IdentityHygiene #TechTalk #CyberSecurityCurious about how much risk your organizations AD Environment is in? Request your free cyber risk assessment here (https://www.sphereco.com) or visit our website to learn how SPHERE (http…
…
continue reading
1
Oura Raises 900M, GM Hits $16B Loss, Goldman Sachs Expands with $665M Deal, Assassin's Creed Lead Leaves, and more...
12:25
12:25
Play later
Play later
Lists
Like
Liked
12:25(0:10): Oura Secures $900M Funding, Eyes $1B Sales with AI and Health Innovations (2:47): GM Faces $1.6 Billion Hit Amid Policy Shifts, But EV Sales Soar by 10% in 2025 (5:08): Goldman Sachs Acquires Industry Ventures in $665M Deal to Boost Private Market Presence (7:07): Assassin's Creed Creative Lead Departs Ubisoft Amidst Major Franchise Overhau…
…
continue reading
1
Automating Compliance and Risk with Agentic AI as CISOs (R)Evolve - Trevor Horwitz - BSW #417
54:20
54:20
Play later
Play later
Lists
Like
Liked
54:20Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
…
continue reading
1
MCSA Guide to Installation, Storage, and Compute with Microsoft Windows Server 2016, Exam 70-740 (Networking)
27:15
27:15
Play later
Play later
Lists
Like
Liked
27:15Detailing its installation, configuration, and management for various IT infrastructure needs. It covers fundamental concepts like server roles, disk management, networking protocols, and PowerShell cmdlets for administration. The text also thoroughly explores advanced topics such as virtualization with Hyper-V, including virtual disks, networks, a…
…
continue reading
1
From Reaction to Resilience: Evolving Incident Management with Michael Civitano
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02In this episode, Manish speaks with Michael Civitano, Senior Security Manager of Intelligence and GSOC at ServiceNow, about transforming incident management from reactive firefighting to proactive resilience. They unpack how modern GSOCs can streamline incident detection and response through simplified processes, empowered teams, and the strategic …
…
continue reading
1
Bikers, Apple, Storm-657, Astaroth, EES, Salesforce, Aaran Leyland, and more... - SWN #520
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37Bikers, Apple, Storm-657, Astaroth, EES, Salesforce, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-520
…
continue reading
1
Dutch Blocks Chinese Nexperia, Australia Bans Youth Social Media, UK Battles Cyber Surge, Apple Launches iPhone Air, and more...
10:44
10:44
Play later
Play later
Lists
Like
Liked
10:44Dutch Government Blocks Chinese-Owned Nexperia Over National Security Concerns Amid Global Tensions Australia's Under-16 Social Media Ban Sparks Controversy Over Privacy, Enforcement, and Economic Impact UK Faces Unprecedented Cyber Attack Surge, Urges FTSE 350 to Bolster Defenses Amid Rising Threats Apple to Launch iPhone Air in China Amid Regulat…
…
continue reading
1
SEC-Compliant Mobile Archiving: How Efani + Smarsh Are Solving the Billion-Dollar Messaging Problem
19:26
19:26
Play later
Play later
Lists
Like
Liked
19:26Financial institutions are getting hit with billions in fines — not because of fraud, but because of non-compliant mobile communication. In this episode of the Efani Features Podcast, host Mark Kreitzman is joined by Mark Meyer, Partner Manager at Smarsh/TeleMessage, to break down a growing crisis: why SEC-regulated firms are struggling to archive …
…
continue reading
1
Inside the OWASP GenAI Security Project - Steve Wilson - ASW #352
1:07:32
1:07:32
Play later
Play later
Lists
Like
Liked
1:07:32Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
…
continue reading
1
From Silos to Solutions: Building Trust Through Transparent Cybersecurity Communications with Microsoft's Frank Shaw
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50Frank X. Shaw, Chief Communications Officer at Microsoft, joins Ann on this week's episode of Afternoon Cyber Tea to explore the critical role of communication in cybersecurity. They discuss how transparency and trust shape effective response to cyber incidents, the importance of breaking down silos across teams, and how AI is transforming communic…
…
continue reading
1
Mastering Power BI: Build Business Intelligence Applications Powered with DAX Calculations, Insightful Visualizations, Advanced BI Technique
37:00
37:00
Play later
Play later
Lists
Like
Liked
37:00An introduction to Power BI, outlining its use in business intelligence applications. It covers fundamental concepts like data modeling, DAX calculations, and various visualization types such as bar, line, waterfall, scatter, donut, treemap, and map charts. The text also explains how to connect and shape data from diverse sources using Power Query …
…
continue reading
1
Season 1 - Episode 17 (Pedro Kertzman & Dr. Jean Nestor Dahj)
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13Data science meets threat intelligence in this fascinating conversation with Dr. Jean Nestor Dahj, who reveals why the analytical mindset serves as the perfect foundation for effective cyber threat intelligence work. With over eight years in information security and a strong background in data science, Dr. Nestor-Dodge shares how his experience ana…
…
continue reading
1
Flow State Rituals for Founders: Deep Work, Distraction Hacks & AI Focus
47:44
47:44
Play later
Play later
Lists
Like
Liked
47:44In this episode, Steven Puri, CEO of The Sukha Company and former Hollywood VFX executive (Independence Day, Godzilla, Transformers Prime), shares the rituals, behavioral frameworks, and AI-powered systems he uses to help founders reach deep work in distraction-heavy environments. Steven’s journey from blockbuster sets to startup leadership reveals…
…
continue reading
1
Elon Musk's xAI Enters Gaming, EY and Microsoft Launch AI Training, China's Export Controls Spare Taiwan, Mappls Launches 3D Navigation, and more...
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55(0:10): Elon Musk's xAI Ventures into Gaming: Revolutionizing AI with Advanced 'World Models' (1:53): EY & Microsoft Launch Global AI Training to Empower 40,000+ Indian Professionals with Essential Skills (3:20): China's Rare Earth Export Controls Unlikely to Impact Taiwan's Chip Industry (4:43): Mappls Launches 3D Navigation and Real-Time Alerts, …
…
continue reading
1
New book from Dr. Anand Singh, why CISOs buy, and the latest news - Anand Singh - ESW #428
1:43:44
1:43:44
Play later
Play later
Lists
Like
Liked
1:43:44Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss wh…
…
continue reading
1
Mastering Azure Kubernetes Service (AKS): Rapidly Build and Scale Your Containerized Applications with Microsoft Azure Kubernetes Service
24:50
24:50
Play later
Play later
Lists
Like
Liked
24:50A practical resource for developing, deploying, and scaling containerized applications. It covers fundamental concepts like containerization versus virtual machines, Kubernetes architecture, and various Azure container services, alongside advanced topics such as serverless Kubernetes, Windows containers, and integrating with Azure DevOps for contin…
…
continue reading
1
Empowering Disability Inclusion Through Technology and Teamwork with John Winfrey
30:14
30:14
Play later
Play later
Lists
Like
Liked
30:14Guest Introduction John Winfrey serves as Director of IT at Ardmore Enterprises, a nonprofit organization in Lanham, Maryland, that empowers individuals with intellectual and developmental disabilities. Ardmore provides residential housing, community services, and employment programs that promote independence and inclusion. John brings over 30 year…
…
continue reading
1
Malware Analysis Using Artificial Intelligence and Deep Learning
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38Discuss artificial intelligence and deep learning techniques applied to malware analysis and detection, as well as other cybersecurity challenges. They cover various neural network architectures like MLPs, CNNs, RNNs, LSTMs, and GANs, and their effectiveness in tasks such as classifying malware families, identifying malicious URLs, and detecting an…
…
continue reading
1
CISO Roles, Talent Crisis & AI Tools with Michael Reichstein | DailyCyber 276 ~ Watch Now ~
1:03:31
1:03:31
Play later
Play later
Lists
Like
Liked
1:03:31CISO Roles, Talent Crisis & AI Tools | DailyCyber 276 with Michael Reichstein ~ Watch Now ~ In this episode of DailyCyber, I’m joined by Michael Reichstein, a global cybersecurity executive with more than 20 years of experience leading security programs across multiple continents. His journey spans military service, enterprise GRC integration, and …
…
continue reading
A comprehensive guide to the security architecture of mobile telecommunications systems, particularly focusing on Long Term Evolution (LTE). It details the evolution of cellular security from analogue systems to 2G (GSM), 3G (UMTS), and the Evolved Packet System (EPS), highlighting common vulnerabilities and subsequent design improvements. The text…
…
continue reading
1
Ballistic Hot Dogs, Clayrat, Twonet, Lockbit, Resumes, Discord, Aaran Leyland and... - SWN #519
31:50
31:50
Play later
Play later
Lists
Like
Liked
31:50Ballistic Hot Dogs, Sonicwall, Clayrat, Twonet, Lockbit, Breachforums, Resumes, Discord, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-519
…
continue reading
1
India Mobile Congress Showcases Future Tech, Cisco Launches New AI Router, Nvidia Reaches $47T Market Cap, NYC Sues Social Media, and more...
12:38
12:38
Play later
Play later
Lists
Like
Liked
12:38(0:10): India Mobile Congress 2025: Showcasing 5G, 6G Innovations and India's Global Tech Ambitions (2:54): Cisco Unveils 8223 Routing System: Revolutionizing AI Workloads with 51.2 Tbps, Energy-Efficient Design (5:03): Nvidia Hits Record $4.7 Trillion Market Cap Amid AI Chip Export Approval and Strategic Expansion (7:26): NYC Sues Social Media Gia…
…
continue reading
1
Trends from RANE’s Fourth Quarter Forecast
26:32
26:32
Play later
Play later
Lists
Like
Liked
26:32RANE recently published our Fourth Quarter Geopolitical and Threat Intelligence Forecasts which cover key trends we're following in the final months of 2025, including U.S. trade policy, the war in Ukraine and conflicts in the Middle East. In this episode of Essential Geopolitics, RANE’s Directors of Analysis Adriano Bosoni and Sam Lichtenstein sha…
…
continue reading
1
Evo Nordics #646 - Successes & Failures Of Digital Transformation
51:29
51:29
Play later
Play later
Lists
Like
Liked
51:29Today's episode is hosted by Georgia Benton and they are joined on the podcast by Necip Bamyaci, Strategic Portfolio Manager at Siemens Energy, Somayeh Aghanavesi, Platform Program Manager at Alstom Transport AB, and Adriano Scotto, Senior Project Development Manager at Electrolux AB.The conversation explores the realities of digital transformation…
…
continue reading
1
Using Empathy to Strengthen Cyber Resilience in Healthcare with Dr Sergio Sanchez
40:15
40:15
Play later
Play later
Lists
Like
Liked
40:15Guest Introduction Sergio Sanchez serves as Chief Information Officer at Coleman Health Services, a nonprofit behavioral health organization based in Ohio that supports more than 30,000 clients annually across multiple counties. With a background as a general surgeon in Mexico before moving into IT leadership, Sergio brings a rare dual perspective …
…
continue reading
1
LTE Cellular Narrowband Internet of Things (NB-IoT): Practical Projects for the Cloud and Data Visualization
17:13
17:13
Play later
Play later
Lists
Like
Liked
17:13A practical guide to Narrowband Internet of Things (NB-IoT), detailing its underlying cellular communication technologies like 4G and 5G LTE, and its applications in Machine Type Communication (MTC). The text covers Arduino-based projects for developers, showcasing the use of an NB-IoT hardware board with a microcontroller (MCU) and Quectel BG96 mo…
…
continue reading
1
Expedition 33 Hits 5 Million, Hollywood and Bollywood Push AI Laws, Fandy Streams Birth Live, Google Invests in AI City, and more...
11:57
11:57
Play later
Play later
Lists
Like
Liked
11:57(0:10): Expedition 33 Celebrates 5 Million Sales with Major Free Update and New Playable Environment (2:29): Hollywood and Bollywood Unite for Stricter AI Copyright Laws in India (4:52): Twitch Streamer Fandy Live-Streams Birth to 30,000 Viewers, Sparks Privacy Debate (6:40): Google's $10 Billion Investment to Transform Visakhapatnam into India's '…
…
continue reading
1
IoT Hacks Galore - Kieran Human - PSW #895
2:09:14
2:09:14
Play later
Play later
Lists
Like
Liked
2:09:14This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
…
continue reading
1
Spotify Adds ChatGPT, California Restricts Streaming Ads, Dell Raises Revenue Forecast, OpenAI Blocks Rogue Users, and more...
10:06
10:06
Play later
Play later
Lists
Like
Liked
10:06(0:10): Spotify Unveils ChatGPT Integration for Tailored Music Recommendations Across 145 Countries (2:02): California Enacts Law to Tame Loud Streaming Ads, Setting National Precedent (3:46): Dell Boosts Revenue Forecast Amid Surging AI Infrastructure Demand, Sees Stock Near 52-Week High (6:19): OpenAI Bans Accounts for Misuse by Chinese, Russian …
…
continue reading
1
No-Regrets Migration: Why PKI Should Be Your First Move
32:33
32:33
Play later
Play later
Lists
Like
Liked
32:33Hardware security modules (HSMs) sit at the core of digital trust, protecting transactions, PKI systems, and authentication. As quantum computing approaches, traditional HSMs face limits that can’t be solved by patching old hardware. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Bruno Couillard, CEO …
…
continue reading
1
LLVM Techniques, Tips, and Best Practices Clang and Middle-End Libraries: Design powerful and reliable compilers using the latest libraries
24:57
24:57
Play later
Play later
Lists
Like
Liked
24:57A comprehensive guide to the LLVM compiler infrastructure. It covers various aspects of LLVM, including its build system, testing utilities like LIT, and the domain-specific language TableGen. The text explores frontend development with Clang, explaining its architecture, preprocessing, Abstract Syntax Tree (AST) handling, and custom toolchain crea…
…
continue reading
1
Flow State for Startup Founders: Deep Work That Actually Ships
51:12
51:12
Play later
Play later
Lists
Like
Liked
51:12Steven Puri, co-founder/CEO of Sukha, shares the flow state for startup founders playbook: body doubling, the coffee-shop effect, chronotype time-blocking, demo-first standups, and outcome-based leadership. You’ll learn how to beat the 22-minute context switching tax, design deep-work rituals for remote teams, and build a best-idea-wins culture tha…
…
continue reading
1
API Security: An Emerging Concern in Zero Trust Implementations
17:41
17:41
Play later
Play later
Lists
Like
Liked
17:41Application programing interfaces, more commonly known as APIs, are the engines behind the majority of internet traffic. The pervasive and public nature of APIs have increased the attack surface of the systems and applications they are used in. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), McKinley Sconie…
…
continue reading
1
API Security: An Emerging Concern in Zero Trust Implementations
17:41
17:41
Play later
Play later
Lists
Like
Liked
17:41Application programing interfaces, more commonly known as APIs, are the engines behind the majority of internet traffic. The pervasive and public nature of APIs have increased the attack surface of the systems and applications they are used in. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), McKinley Sconie…
…
continue reading