Technical interviews about software topics.
…
continue reading
Cybersecurity Engineer Podcasts
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Technical interviews about software topics.
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
The cybersecurity podcast about application security and those who practice it. Hosted by tech industry veterans, each episode focuses on a specific area of cybersecurity, with the hosts and their guests sharing their practitioners’ experiences and opinions, sprinkled liberally with a solid dose of humor and anecdotes.
…
continue reading
Cybercrimeology is a podcast about cybercrime, its research and its researchers. We talk to top researchers from around the world to learn about different forms of cybercrime and their research. We learn about cybercrime theory, organized crime online, Darknet drug markets, cybercrime awareness and crime prevention, technology-facilitated intimate partner violence and much more. The podcast has been running since November of 2019 and there is still so much to learn. I am happy to have you al ...
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
Musing On Society, Technology, and Cybersecurity | Hosted by Marco Ciappelli Let’s face it: the future is now. We live in a hybrid analog-digital society, and it’s time to stop ignoring the profound impact technology has on our lives. The line between the physical and virtual worlds? It’s no longer real — just a figment of our imagination. We’re constantly juggling convenience, privacy, freedom, security, and even the future of humanity in a precarious balancing act. There’s no better place ...
…
continue reading
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime. Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
"What the Hack?" is the award-winning true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
Cyber resilience is fast emerging as the driving force behind critical business continuity in our digital era. Faced with brownouts, blackouts, and the ‘when not if’ nature of cyberattacks, how do businesses harness this resilience for stronger cybersecurity and networking? Listen in to The Resilience Factor as our hosts — renowned social engineer Jenny Radcliffe and Zscaler’s own Kate Baker — explore how organizations and employees can fail forward to adapt with confidence. Through trend-ba ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Welcome to the Black Girls Do Engineer Podcast — where culture, creativity, and STEM collide. Black Girls Do Engineer (BGDE) is a national EdTech nonprofit transforming the STEM landscape for girls of color. Founded in Houston, Texas—with expanding regional hubs in Brooklyn and Detroit—we are on a bold mission to empower 1 million Black girls ages 6–21 to thrive in science, technology, engineering, and math. This podcast takes you inside the world of STEM like never before. Every episode is ...
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
…
continue reading
How people connect and learn has evolved in the 50+ years since ACPE was formed. But our mission and ethos haven’t: (1) increasing collaboration and professional development opportunities and (2) fostering long-lasting relationships among our members. We’re eager to keep diversifying ways to connect, learn, and have fun together. The Plugged In podcast is a place for us to amplify the voices of our colleagues and celebrate the work we do in education technology. Join hosts Marc Elliott and R ...
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
In a world overloaded with information, great leaders separate the signal, the most critical insights that drive success, from the noise of distractions and uncertainty. Signal to Noise by Riviera Partners is the podcast for tech executives, innovators, talent leaders, and investors who need to make meaningful moves, whether in moments of crisis, clarity, or opportunity. In each episode, we sit down with respected leaders to unpack the defining decisions of their careers. Our guests share po ...
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
This podcast features intimate conversations with engineers who are in the forefront of building or teaching technology. Join us as we learn how our guests got started in tech, the type and level of education they've obtained, their work history, and personal stories about their journey. We publish the show on Apple, Spotify, YouTube, and the Web biweekly on Wednesdays at 12pm US Eastern Time. Subscribe and STAY TUNED!
…
continue reading
Making artificial intelligence practical, productive & accessible to everyone. Practical AI is a show in which technology professionals, business people, students, enthusiasts, and expert guests engage in lively discussions about Artificial Intelligence and related topics (Machine Learning, Deep Learning, Neural Networks, GANs, MLOps, AIOps, LLMs & more). The focus is on productive implementations and real-world scenarios that are accessible to everyone. If you want to keep up with the lates ...
…
continue reading
Stories from the world of hacking, cybersecurity, and rogue AI. Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million dow ...
…
continue reading
Introducing "Techsphere"—a podcast series that breaks down the latest trends, innovations, and challenges in the world of technology. Each episode takes you on a deep dive into different aspects of the tech landscape, from data privacy and AI to blockchain, cybersecurity, and the future of work. Whether you're a tech enthusiast or just curious about how today's innovations shape our world, this series will keep you informed, inspired, and ahead of the curve. Tune in and explore the tech that ...
…
continue reading
Featured here are original and timely podcasts from ARC analysts and guest speakers on topics such as Digitization, New Business Models, Internet of Things, Industry 4.0, and Smart Manufacturing. We dive into technologies such as additive manufacturing, machine learning, asset performance management, device connectivity, IIoT architecture, cybersecurity, augmented reality, and more related to digitalization and transformation of industries. For More Information Visit us at: https://www.arcwe ...
…
continue reading
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
Empowering Your IT Career Journey – From the first step to success! With a passion for technology and a mission to uplift others, I’m here to guide you through the dynamic IT industry. Whether you're just starting or looking to advance, you’ve found a community dedicated to your growth. Advice & Insights: From Help Desk to Director of Network Operations in 3 years, I share strategies to fast-track your career. Expert Conversations: Gain exclusive insights from industry leaders. Let’s make IT ...
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
The DailyCyber Podcast and New Live Stream every Tuesday evening at 5:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of ...
…
continue reading
The DevLab Podcast (by hackajob) is your backstage pass into the world of today’s leading tech professionals. We talk to developers, engineers, product managers, CTOs, and more from some of the most innovative companies in the UK and US. If you’re building a career in tech, this is where you’ll find the stories, skills, and strategies that matter. Each episode brings you real journeys, technical know-how, and actionable insights to help you grow your craft and your career.
…
continue reading
UMBC Mic'd Up Podcast welcomes faculty, students, alumni, and industry thought leaders to share their insights and UMBC experiences.
…
continue reading
Eddie Miro brings years of social engineering experience to bear on an educational and entertaining program around all things social engineering.
…
continue reading
Welcome to Clearly Cyber from PRPR, a podcast that examines how to communicate effectively in the cyber security industry.
…
continue reading
The power of Data is undeniable. And unharnessed - it's nothing but chaos. Making data your ally. Using it to lead with confidence and clarity. Host Jess Carter is solving problems in real-time to reveal what's possible. Helping communities and people thrive. This is Data Driven Leadership, a show brought to you by Resultant.
…
continue reading
Tech Takes podcast knows what matters to you. Thought-provoking interviews with industry leaders, government officials, academia and influencers on hot topics relevant to the engineering and applied science profession and the technologies that shape the world around us.
…
continue reading
Explores the multifaceted world of interacting with and optimizing large language models (LLMs) and generative AI for both text and image creation. It covers fundamental prompt engineering principles, such as giving clear instructions, specifying output formats, and providing examples, alongside advanced techniques like text style unbundling and ta…
…
continue reading
1
Cybersecurity Today: Apple Security Updates, AI Search Engine Scams, Torrent Malware, and Stanford's AI Penetration Testing
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48In this episode of Cybersecurity Today, host David Shipley discusses significant developments in the cybersecurity landscape. Apple releases security updates to address two actively exploited WebKit vulnerabilities. Scammers manipulate AI-powered search tools to recommend fake support numbers, reflecting a growing security risk. Bitdefender uncover…
…
continue reading
1
Aviation Cybersecurity with Serge Christiaans
49:55
49:55
Play later
Play later
Lists
Like
Liked
49:55Aviation cybersecurity is becoming an urgent priority as modern aircraft increasingly rely on complex digital systems for navigation, communication, and engine performance. These systems were once isolated but are now interconnected and vulnerable to cyber threats ranging from GPS spoofing to ransomware attacks on airline infrastructure. As nation-…
…
continue reading
1
3540: Hill Climbers, Where Tech, Fitness, and Human Connection Meet
28:25
28:25
Play later
Play later
Lists
Like
Liked
28:25What happens when a podcast stops being something you listen to and becomes something you physically show up for? In this episode of Tech Talks Daily, I wanted to explore a different kind of tech story, one rooted in community, endurance, and real human connection. I was joined by Sam Huntington, a Business Development Officer at Wells Fargo, who h…
…
continue reading
1
Stop Taking Bad Advice. An Open Letter To The World
4:02
4:02
Play later
Play later
Lists
Like
Liked
4:02Question? Text our Studio direct. We’ve trained people to fear nation-state hackers…while getting breached by rushed clicks and skipped updates. Cybercrime doesn’t win because it’s smart. It wins because people are tired. We’ve been trained to panic about rare, cinematic attacks… while leaving the front door unlocked every single day. The boring tr…
…
continue reading
1
Shadows Within: A Spy Unmasks How Insider Risk Affects Cyber Security
56:51
56:51
Play later
Play later
Lists
Like
Liked
56:51Question? Text our Studio direct. Former Spy and intelligence officer, Shawnee Delaney, join us. She is the founder and CEO of Vaillance Group (https://www.vaillancegroup.com) and spent nearly a decade with the Defense Intelligence Agency (DIA) as a decorated Clandestine Services Officer conducting Human Intelligence (HUMINT) operations all over th…
…
continue reading
1
React Key Concepts: An in-depth guide to React's core features
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02A practical resource for web developers looking to deepen their understanding of React. Authored by Maximilian Schwarzmüller, a prominent online instructor, the book covers a wide array of topics crucial for building modern user interfaces, including components, JSX, state management, event handling, styling, routing with React Router, and advanced…
…
continue reading
1
3539: ShelterZoom CEO on Keeping Care Moving When Systems Go Down
23:54
23:54
Play later
Play later
Lists
Like
Liked
23:54What happens to patient care when hospital systems suddenly go dark and clinicians are forced back to pen and paper in the middle of a crisis? In this episode of the Tech Talks Daily Podcast, I speak with Chao Cheng-Shorland, Co-founder and CEO of ShelterZoom, about a problem that many healthcare leaders still underestimate until it is too late. As…
…
continue reading
1
Five Patterns From 152 Episodes That Reshaped How I Think About Security, Technology, and Work Heading into 2026 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9
13:26
13:26
Play later
Play later
Lists
Like
Liked
13:26Across 152 conversations this year, a set of recurring patterns kept surfacing, regardless of whether the discussion focused on application security, software supply chain risk, AI systems, or creative work. The industries varied. The roles varied. The challenges did not. One theme rises above the rest: visibility remains the foundation of everythi…
…
continue reading
1
Ransomware Negotiations EXPOSED: Inside Cyber Hostage Deals with Kurtis Minder
1:02:27
1:02:27
Play later
Play later
Lists
Like
Liked
1:02:27Question? Text our Studio direct. Kurtis Minder, seasoned ransomware negotiator, shares insights into the complex world of cybercrime negotiations. He discusses the psychological aspects of negotiating with cybercriminals, the role of AI in both offense and defense, and the importance of understanding the motivations behind cybercrime. The conversa…
…
continue reading
1
Welcome Back — We Never Left, We Were Building
14:24
14:24
Play later
Play later
Lists
Like
Liked
14:24Send us a text The Black Girls Do Engineer Podcast is back. In this welcome-back episode, founder and CEO Kara Branch shares what really happened during the quiet season—why the mic went silent, how the mission never stopped, and what it took to build BGDE with intention, clarity, and peace. This conversation is about growth without burnout, leader…
…
continue reading
1
Systematically Improving Cybersecurity Training
49:19
49:19
Play later
Play later
Lists
Like
Liked
49:19Notes: Julia Prümmer describes her transition from legal psychology into cybersecurity research and how psychological methods shape her approach to cybersecurity training. The discussion explores the role of systematic reviews in mapping what a research field actually knows, rather than relying on highly visible or frequently cited studies. Finding…
…
continue reading
1
3538: How Storyblok Sees Content Strategy Changing in an AI First Internet
33:18
33:18
Play later
Play later
Lists
Like
Liked
33:18Is your website still the front door to your business, or has AI already quietly changed where customers first meet your brand? In this episode of the Tech Talks Daily Podcast, I sit down with Dominik Angerer, Co-founder and CEO of Storyblok, to unpack how content, search, and discovery are shifting in an AI-first world. As search behavior moves aw…
…
continue reading
1
After the Blast: How One CEO Fought Back 💥 | A True Crime
1:21:20
1:21:20
Play later
Play later
Lists
Like
Liked
1:21:20Question? Text our Studio direct. Robert Cioffi, CEO of a small company discusses the highly emotional impact that a major ransomware attack had on his, his customers and the community.The Emotional Toll of Cyber Attack was horrific to witness and made national news. Learn how to get prepared in this True Cyber Crime Story. Season 8 is officially h…
…
continue reading
1
From Survivor to CEO: How Aneta Sproles Transformed Adversity Into a Mission of Wealth and Wellness
56:43
56:43
Play later
Play later
Lists
Like
Liked
56:43Grab your favorite cup of coffee and tune in as we chat with Aneta Sproles a powerhouse entrepreneur, author, and advocate on a mission to turn pain into purpose! As the CEO of Aneta Empire Global Holdings, shes built brands like Millionaire Swag Clothing and Anetas Wealth & Wellness, all while inspiring others through her bestselling book Sleeping…
…
continue reading
1
C++20 Quick Syntax Reference: A Pocket Guide to the Language, APIs, and Library
19:58
19:58
Play later
Play later
Lists
Like
Liked
19:58A quick syntax reference for C++20, offering a comprehensive overview of the language's core features and functionalities. It covers fundamental programming concepts such as variables, data types, operators, and control flow (loops and conditionals). The text also explores object-oriented programming principles including classes, constructors, inhe…
…
continue reading
1
Inside the Dark Web: Exploring Cybercrime with Expert David Décary-Hétu
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02In this episode, the host shares a pre-recorded favorite interview with David Decary-Hetu, a criminologist at the University of Montreal. They discuss the dark web, its technology, and its role in cybercrime. Decary-Hetu explains how the dark web operates, its users, and the dynamics between researchers and law enforcement in tackling cyber threats…
…
continue reading
1
The Data-Driven Leader's Guide to Navigating Change in 2026
35:31
35:31
Play later
Play later
Lists
Like
Liked
35:312025 was a breakthrough year for AI adoption, with new tools enabling seamless integration between business and technical teams. Organizations leveraged AI to improve operations, enhance decision-making, and unlock growth opportunities, though not without challenges. In this episode, Jess Carter sits down with Michael Schwarz, Senior Vice President…
…
continue reading
1
3537: Why Aztec Labs is Building the Endgame for Blockchain Privacy
29:03
29:03
Play later
Play later
Lists
Like
Liked
29:03What happens when the push for smarter crypto wallets runs headfirst into the reality that everything on a public blockchain can be seen by anyone? In this episode of Tech Talks Daily, I wanted to take listeners who may not live and breathe Web3 every day and introduce them to a problem that is becoming harder to ignore. As Ethereum evolves and sma…
…
continue reading
1
Ransomware Is NOT the Greatest Threat | Here Is What's Coming
49:55
49:55
Play later
Play later
Lists
Like
Liked
49:55Question? Text our Studio direct. New Episode🔥The Cybercrime Junkies show discusses the evolution of ransomware, highlighting how it has shifted from simple file locking to direct extortion. We explore the latest ransomware trends and the significant ransomware impact on critical sectors like hospitals and supply chains. This ransomware attack stra…
…
continue reading
1
Episode 232: The Very Private Digital New Year Episode
35:47
35:47
Play later
Play later
Lists
Like
Liked
35:47Learn more about your ad choices. Visit megaphone.fm/adchoicesBy DeleteMe
…
continue reading
1
Building Web Apps with Python and Flask: Learn to Develop and Deploy Responsive RESTful Web Applications Using Flask Framework
20:15
20:15
Play later
Play later
Lists
Like
Liked
20:15A practical guide for developing and deploying responsive, RESTful web applications using the Flask framework. The book covers fundamental concepts of web application development, starting with Python for CGI and the Web Server Gateway Interface (WSGI), before moving into the Flask framework and its dependencies like Werkzeug, Jinja2, and Click. It…
…
continue reading
1
3536: When AI Knows Us Too Well and What It Means for Human Choice
35:31
35:31
Play later
Play later
Lists
Like
Liked
35:31What happens when the systems designed to make life easier quietly begin shaping how we think, decide, and choose? In this episode of the Tech Talks Daily Podcast, I sit down with Jacob Ward, a journalist who has spent more than two decades examining the unseen effects of technology on human behavior. From reporting roles at NBC News, Al Jazeera, C…
…
continue reading
1
ISO & CMMC – Lessons Learned During Audits
54:06
54:06
Play later
Play later
Lists
Like
Liked
54:06Welcome back to The CyberCall. Our guest, Joy Beland from Summit7, helps lead security and compliance at the largest MSP serving the Defense Industrial Base. Joy joins us to share what it actually took to prepare as a service provider, what broke, what changed, and what lessons MSPs can learn if they expect CMMC — or ISO 27001 — to become part of t…
…
continue reading
1
Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk
52:29
52:29
Play later
Play later
Lists
Like
Liked
52:29Question? Text our Studio direct. Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro…
…
continue reading
1
The Audit 2025: Deepfakes, Quantum & AI That Changed Everything
22:57
22:57
Play later
Play later
Lists
Like
Liked
22:57In this special year-end episode, Joshua Schmidt revisits the most mind-bending moments from The Audit's 2025 season. From Justin Marciano and Paul Vann demonstrating live deepfakes in real-time (yes, they actually did it on camera) to Bill Harris explaining how Google's quantum experiments suggest parallel universes, to Alex Bratton's urgent warni…
…
continue reading
1
Building Machine Learning Systems Using Python: Practice to Train Predictive Models and Analyze Machine Learning Results with Real Use-Cases
23:17
23:17
Play later
Play later
Lists
Like
Liked
23:17A comprehensive educational resource for understanding foundational machine learning concepts. The text introduces readers to the principles and applications of machine learning, categorizing different learning approaches such as supervised, unsupervised, and reinforcement learning. It then explores various algorithms, including linear and logistic…
…
continue reading
1
MongoDB - MongoBleed Vulnerability Exploit Reported On Christmas Day
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01Cybersecurity Today: MongoDB Vulnerability 'Mongo Bleed' Exploited, Rainbow Six Siege Hacked, Trust Wallet Compromise, and GrubHub Crypto Scams In this episode of Cybersecurity Today, David Shipley covers significant cybersecurity incidents that occurred over the holiday period. The major topics include the 'Mongo Bleed' vulnerability in MongoDB th…
…
continue reading
1
3535: HR at a Crossroads: Performance, Culture, and Technology
28:05
28:05
Play later
Play later
Lists
Like
Liked
28:05How is HR changing when AI, economic pressure, and rising employee expectations all collide at once? In this episode of Tech Talks Daily, I'm joined by Simon Noble, CEO of Cezanne HR, to unpack how the role of HR is evolving from a traditional support function into something far more closely tied to business performance. Simon shares why HR is incr…
…
continue reading
1
How to Measure Cyber Risk Today: Guidelines for Leaders
1:04:04
1:04:04
Play later
Play later
Lists
Like
Liked
1:04:04Question? Text our Studio direct. What can we learn from some of the largest breaches in the news? That is what we will cover today in one of the most practical inside looks at the cutting edge of cyber security today. Understanding Cyber Risk Today: Top Security Guidelines Every CISO Needs to Know Ryan Leirvik who joins us in the studio. Ryan is t…
…
continue reading
1
Engineer. Mother. Founder. Meet Kara Branch.
21:54
21:54
Play later
Play later
Lists
Like
Liked
21:54Send us a text Engineer. Mother. Founder. In this opening episode, meet Kara Branch, the founder and CEO behind Black Girls Do Engineer—and the heart behind the movement. What started as a simple question from her daughter became a lifelong mission: to make sure girls who are curious, brilliant, and full of potential are never overlooked or under-r…
…
continue reading
1
Building Enterprise Blockchain Solutions on AWS: A Developer's Guide to Build, Deploy, and Managed Apps Using Ethereum, Hyperledger Fabric
18:21
18:21
Play later
Play later
Lists
Like
Liked
18:21Focuses on creating, deploying, and managing blockchain applications on Amazon Web Services (AWS). The text explores foundational blockchain concepts, contrasting them with traditional centralized systems and highlighting benefits like immutability and decentralization. It provides practical instruction on utilizing AWS Managed Blockchain, AWS Bloc…
…
continue reading
This is an interview with former hacker Brian Black. Brian is now on the right side of the battle and bringing his skills to to the fight against hackers. He finds the weaknesses in corporate security so that it can be patched. This was one of my favourite interviews this year. Listening to what Brian has learned and understanding how we can use th…
…
continue reading
1
3534: Agentic AI at Scale: What 120 Million Monthly Conversations Really Mean
28:14
28:14
Play later
Play later
Lists
Like
Liked
28:14What does it really mean when AI moves from answering questions to making decisions that affect real people, real money, and real outcomes? In this episode of Tech Talks Daily, I'm joined by Joe Kim, CEO of Druid AI, for a grounded conversation about why agentic AI is becoming the focus for enterprises that have moved beyond experimentation. After …
…
continue reading
1
Famous Hacker Reveals TRUE Ethical Hacking Stories
50:47
50:47
Play later
Play later
Lists
Like
Liked
50:47Question? Text our Studio direct. 🚨New Episode 🚨We’re joined in-studio by Bryan Seely— World Famous Hacker who Reveals True Ethical Hacking Storie. Bryan is a cybersecurity expert, and media commentator featured on CNBC, Fox News, CNN, and WSJ. He’s also the author of Cyber Fraud: The Web of Lies! We discuss: true ethical hacking stories, data brok…
…
continue reading
1
Building Decentralized Blockchain Applications: Learn How to Use Blockchain as the Foundation for Next-Gen Apps
24:11
24:11
Play later
Play later
Lists
Like
Liked
24:11A comprehensive guide to understanding and developing applications using blockchain technology. The book covers fundamental blockchain concepts, including its history, core components, and various consensus mechanisms like Proof of Work and Proof of Stake. It further explores key platforms like Bitcoin and Ethereum, detailing their architecture, tr…
…
continue reading
1
3533: Smart Cities, AI, and Sovereignty, Gorilla Technology's CTO Explains What Works and What Fails
32:46
32:46
Play later
Play later
Lists
Like
Liked
32:46The world is building data centers, identity rails, and AI policy stacks at a speed that makes 2026 feel closer than it is. In this conversation, Rajesh Natarajan, Global Chief Technology Officer at Gorilla Technology Group, explains what it takes to engineer platforms that remain reliable, secure, and sovereign-ready for decades, especially when i…
…
continue reading
1
LIVE: They’re Stealing You with AI 😳 | AI Risks to Identity & How to Fight Back
1:28:28
1:28:28
Play later
Play later
Lists
Like
Liked
1:28:28Question? Text our Studio direct. If you manage care about protecting yourself, your loved ones—and your organization-- this episode offers actionable takeaways you can use today. This is part of our official Cyber Crime Junkies podcast series—subscribe wherever you listen! ✅ **Don’t forget to like, subscribe, and hit the bell 🔔.** 💬 Comment your “…
…
continue reading