Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Data Protection And Privacy Podcasts

show episodes
 
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
  continue reading
 
Frank conversations with GCs, CPOs, Product and Policy Leaders around navigating the technology ecosystem, hosted by Andy Dale, General Counsel & Chief Privacy Officer at OpenAP and Pedro Pavón, Privacy & Data Policy at Meta. The Data Protection Breakfast Club is produced by L Suite, an executive peer community for CLOs & GCs to make better, faster decisions. Learn more @ https://www.lsuite.co/
  continue reading
 
How does GDPR, data privacy, and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance, hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader, or InfoSec security expert, this is the podcast to learn about what is happening in the UK, EU, US, and beyond.
  continue reading
 
This Audio Course is your complete audio-first companion to the CIPP/US certification. Across structured episodes, it breaks down U.S. privacy law from federal and state frameworks to workplace rules and international overlaps, all aligned with the official IAPP Body of Knowledge. You’ll get guided walkthroughs of statutes, enforcement themes, case law, and key regulatory agencies, plus study strategies, glossary deep dives, and exam skills to build lasting confidence. Designed for on-the-go ...
  continue reading
 
Artwork

1
Our Curious Amalgam

American Bar Association

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Our Curious Amalgam explores topics in antitrust, competition, consumer protection, data protection, and privacy law around the world with leading experts in those areas. It is an amalgam because it is a group of diverse topics all in one place. It is curious because it gets the experts and asks them in-depth questions.
  continue reading
 
Artwork

1
The Privacy Advisor Podcast

Jedidiah Bracy, IAPP Editorial Director

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
  continue reading
 
Artwork
 
Welcome to Curiosity Weekly from Discovery, hosted by Dr. Samantha Yammine. Once a week, we’ll bring you the latest and greatest in scientific discoveries and break down the details so that you don’t need a PhD to understand it. From neuroscience to climate tech to AI and genetics, no subject is off-limits. Join Sam as she interviews expert guests and investigates the research guiding some of the most exciting scientific breakthroughs affecting our world today. Hosted on Acast. See acast.com ...
  continue reading
 
Artwork

1
Privacy Please

Cameron Ivey

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to "Privacy Please," a podcast for anyone who wants to know more about data privacy and security. Join your hosts Cam and Gabe as they talk to experts, academics, authors, and activists to break down complex privacy topics in a way that's easy to understand. In today's connected world, our personal information is constantly being collected, analyzed, and sometimes exploited. We believe everyone has a right to understand how their data is being used and what they can do to protect the ...
  continue reading
 
Download This Show is your weekly guide to the world of media, culture, and technology. From social media to gadgets, streaming services to privacy issues. Each week Rae Johnston and guests take a fun, deep dive into how technology is reshaping our lives.
  continue reading
 
Artwork
 
Welcome to The FED Weekly, the go-to podcast for current and retired U.S. federal employees who need to stay informed on the issues that matter most. In a rapidly changing political landscape, we deliver concise, weekly updates on the legislative, executive, and agency-level actions that have a direct impact on your professional life and financial future.
  continue reading
 
Artwork

1
Serious Privacy

Dr. K Royal, Paul Breitbarth & Ralph O'Brien

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
For those who are interested in the hottest field in a technology world. Whether you are a professional who wants to learn more about privacy, data protection, or cyber law or someone who just finds this fascinating, we have topics for you from data management to cybersecurity to social justice and data ethics and AI. In-depth information on serious privacy topics. This podcast, hosted by Dr. K Royal, Paul Breitbarth and Ralph O'Brien, features open, unscripted discussions with global privac ...
  continue reading
 
There is tremendous value to simplification. To quote Steve Jobs, “Simple can be harder than complex: You have to work hard to get your thinking clean to make it simple. But it is worth it in the end because once you get there, you can move mountains." In this series, we explore how people and companies achieve simplification.
  continue reading
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Privacy in Practice, brought to you by VeraSafe, is the podcast for actionable insights and real-world strategies for privacy and compliance teams. Hosted by privacy pros Kellie Du Preez and Danie Strachan, each episode unpacks the practical side of compliance and data management, bringing together industry leaders and thought-provoking discussions. Whether you’re leading privacy efforts at your company or just beginning to explore this field, tune in for meaningful conversations that provid ...
  continue reading
 
Artwork
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
The Data Diva Talks Privacy Podcast The Debbie Reynolds “The Data Diva” Talks Privacy Podcast features thought-provoking discussions with global leaders on the most pressing data privacy challenges facing businesses today. Each episode explores emerging technologies, international laws and regulations, data ethics, individual rights, and the future of privacy in a rapidly evolving digital world. With listeners in more than 130 countries and 2,900 cities, the podcast delivers valuable insight ...
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
AI and the Law

39 Essex Chambers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In this series, 39 Essex Chambers’ barristers, Katherine Apps KC and David Mitchell interview each other and guests exploring the legal issues raised by artificial intelligence including what sort of legal regulation is needed, how AI will impact on the legal profession, discrimination challenges, data protection, intellectual property and ownership, contracting issues and the impact on legal education in the future. Guest include: Baroness Shami Chakrobarti CBE, former shadow Attorney Gener ...
  continue reading
 
Artwork

1
Bite Size Security

Mike Fitzpatrick

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. The Cyber Risk Podcast for Business Leaders, hosted by Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute and CEO of NCX Group, delivers weekly, no-nonsense insights tailored to CEOs, CFOs, and decision-makers. From data breaches to practical cybersecurity and data privacy strategies, we offer steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk in ...
  continue reading
 
Artwork

1
Grumpy GDPR

Rie & Miloš

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Interesting, fascinating, provoking, insightful - or all of the above - GDPR decisions, rulings and other tidbits discussed by two very opinionated people.
  continue reading
 
Artwork

1
Info Matters

Information and Privacy Commissioner of Ontario

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Conversations about people, privacy, and access to information. Hosted by Patricia Kosseim, Information and Privacy Commissioner of Ontario.
  continue reading
 
Artwork

1
Privacy Sigma Riders

Cisco Trust Center

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Privacy Sigma Riders is essential listening for anyone interested in cybersecurity, data protection and privacy. Hosted by Cisco Chief Privacy Officer Michelle Dennedy and team, guest experts and innovators explore increasing the value of data with novel approaches to data privacy.
  continue reading
 
Artwork

1
Data Revolution

Kate Carruthers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to a podcast that dives deep into the fascinating crossroads of data, AI, privacy, and cybersecurity. Hosted by data and AI expert Kate Carruthers, this series explores the cutting-edge frontiers of our digital world, where data is forging an entirely new economy. Tune in to stay ahead of the curve and uncover the opportunities, challenges, and innovations shaping our future.
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
  continue reading
 
Cybersecurity. Privacy. Blockchain. Unfiltered. The Efani Features Podcast is your trusted guide to the evolving world of digital security. Hosted by Mark Kreitzman of Efani, each episode dives deep into the critical issues shaping our digital future - from SIM swap threats and mobile privacy to crypto security and blockchain innovation. Join leading experts, ethical hackers, founders, and privacy advocates as we unpack real-world threats, explore cutting-edge solutions, and share practical ...
  continue reading
 
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
  continue reading
 
What if the worst thing that ever happened to you plays out every day, countless times, on anonymous computer screens all over the world. Everyday tens of millions of images of child sexual abuse are circulating on global online platforms. And the proliferation of these images is getting worse as AI technology and deep fakes create an ever-expanding epidemic of online child sex exploitation. The children depicted in those criminal images are REAL. Many are now adults held hostage by these di ...
  continue reading
 
Cybercriminals are evolving—are you keeping up? Don’t Be A Sitting Duck is the podcast for business leaders and professionals who want to stay one step ahead of the latest cyber threats. In each bite-sized episode, we dive into real-world cyber breaches, phishing scams, and ransomware attacks, sharing actionable advice to help you protect your business. Looking for more insights and resources? Visit sittingduck.com.au to explore educational content designed to help you navigate today’s compl ...
  continue reading
 
Artwork

1
Making Data Better

Lockstep Consulting Pty Ltd

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Making Data Better is a podcast about data quality and the impact it has on how we protect, manage, and use the digital data critical to our lives. Through conversation and examination, George Peabody and Stephen Wilson look at data's role in risk management, at use cases like identification, lending, age verification, healthcare, and more personal concerns. Privacy and data ownership are topics, as are our data failures.
  continue reading
 
Artwork

1
Profusion Data Podcast

Profusion Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Direct from Profusion HQ, join our hosts, Henrik Nordmark (Director of Science, Data and Innovation) and David Reinstein (Academic Consultant), as they talk to data leaders from popular household brands to uncover just how companies are really using their data. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
  continue reading
 
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
  continue reading
 
Loading …
show series
 
In this episode, we dig into two gripping and high-stakes stories in cybersecurity. First, Qantas is one of nearly 40 global firms being extorted over stolen data from Salesforce, now leaking millions of customer records. Then, in Australia, a health services firm becomes the first to face a major civil penalty—$5.8 million—for a data breach that e…
  continue reading
 
In the latest episode of the Data Revolution podcast, host Kate Carruthers delves into what’s new in the transformative landscape of AI as we approach the end of 2025. With a focus on the pivotal changes and some AI innovations, this episode offers a glimpse into the future of technology and some implications for business and society. Key Highlight…
  continue reading
 
This episode begins by exploring the cryptographic ideal of unconditional security, which is only truly achieved by the theoretical One-Time Pad (OTP), a cipher that is mathematically unbreakable. The impracticality of the OTP lies in the difficulty of creating, distributing, and securely managing a perfectly random, one-time key as long as the mes…
  continue reading
 
This episode delves into the deep ambiguity and complexity of cyber conflict, using the Stuxnet malware attack as a pivotal case study that highlighted the vulnerability of critical infrastructure. Stuxnet demonstrated the risk of integrity attacks, where the goal is not to steal data, but to manipulate physical processes, such as causing nuclear c…
  continue reading
 
This episode tackles the complex problem of software supply chain security, where trust must be established across a long chain of potentially vulnerable steps, from development to deployment. The core challenge is the lack of transparency about what actually happens to code between the programmer's keyboard and the end user's system. The proposed …
  continue reading
 
This episode asserts that unreliability is fundamental insecurity and that the best security posture isn't about preventing every attack, but building a foundation of resilience to survive compromise. This foundational work starts with strong cryptography, which is often brittle; for instance, the security of a cryptographic system relies on unpred…
  continue reading
 
This episode focuses on defensive cryptography, moving beyond mere confidentiality to explore the essential safeguards needed for data integrity, key management, and robust system architecture. The session begins by highlighting that encryption alone is insufficient for security; weak historical practices like simple password encryption failed beca…
  continue reading
 
This episode dissects the "designer's mind," focusing on why secure cryptographic algorithms often fail in the real world due to subtle implementation blunders and design flaws, rather than mathematical weaknesses. Cryptography relies on hard math problems, like factoring and discrete logarithms, which are computationally infeasible to reverse with…
  continue reading
 
This episode takes a deep dive into the Public Key Infrastructure (PKI), the mathematical bedrock of digital trust, starting with asymmetric cryptography which uses public and private key pairs to solve the problem of securely sharing a secret key. Because asymmetric algorithms like RSA are computationally slow, they are paired with much faster sym…
  continue reading
 
This episode traces the history of cryptography through three major shifts, highlighting the constant arms race between code-makers and code-breakers. The first shift was from simple manual substitution ciphers to mechanized secrecy, perfectly embodied by the Enigma machine. Enigma achieved its massive complexity through rotating scramblers and a r…
  continue reading
 
This episode explores the core principles of cryptography, emphasizing that true security is rooted not just in strong math but in meticulous engineering and key management. The efficiency of modern encryption largely relies on symmetric ciphers like AES and 3DES, which use the same secret key for both encryption and decryption. A critical challeng…
  continue reading
 
This episode dives into the Protocol Paradox, which states that the security of systems built on the mathematical bedrock of cryptography is constantly undermined by flaws in the implementation and surrounding processes. Cryptographic algorithms are theoretically strong because they rely on computationally hard math problems, but successful attacks…
  continue reading
 
This episode explores the significant gap between the theoretical security of cryptography, based on complex mathematics like modular arithmetic and computationally hard problems, and the messy reality of real-world digital security. Cryptographic algorithms are tested against theoretical attacks, aiming to make it mathematically impossible to reve…
  continue reading
 
On 4 Sept., the Court of Justice of the European Union gave its highly anticipated decision in the EDPS v. SRB case. In its landmark ruling, the CJEU clarified the definition of personal data under the EU General Data Protection Regulation, and, in essence, the scope of EU data protection law. For Ulrich Baumgartner, a partner at Baumgartner Bauman…
  continue reading
 
There are over 170 million pieces of space junk orbiting Earth right now, and that number is only growing as space orbit becomes more accessible. How are we going to deal with this astronomical littering problem, while keeping up with our satellite-hungry tech needs? Also, an increase in light and radio pollution is making it harder for astronomers…
  continue reading
 
During his keynote at SecTor 2025, HD Moore, founder and CEO of runZero and widely recognized for creating Metasploit, invites the cybersecurity community to rethink the foundational “rules” we continue to follow—often without question. In conversation with Sean Martin and Marco Ciappelli for ITSPmagazine’s on-location event coverage, Moore breaks …
  continue reading
 
Send us a text More than 5,000 CIPA lawsuits have been filed — and privacy teams are racing to prevent the next wave. In this webinar, Matthew Pearson, one of the leading CIPA legal experts, explains how this 1967 wiretapping law is being used against modern websites and apps. You’ll learn: 🔍 How CIPA lawsuits start and what makes them credible ⚙️ …
  continue reading
 
Hardware security modules (HSMs) sit at the core of digital trust, protecting transactions, PKI systems, and authentication. As quantum computing approaches, traditional HSMs face limits that can’t be solved by patching old hardware. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Bruno Couillard, CEO …
  continue reading
 
Jonathan Armstrong remains on assignment. Today, Tom Fox visits with fellow Texan Jim LaRoe, CEO of Symphion, to discuss data privacy, data protection, and compliance related to printer security in one of the most interesting podcasts Tom has done in some time. Jim provides insight into how 20-30% of network endpoints are printers, and alarmingly, …
  continue reading
 
Steven Puri, co-founder/CEO of Sukha, shares the flow state for startup founders playbook: body doubling, the coffee-shop effect, chronotype time-blocking, demo-first standups, and outcome-based leadership. You’ll learn how to beat the 22-minute context switching tax, design deep-work rituals for remote teams, and build a best-idea-wins culture tha…
  continue reading
 
In this issue of the Future of Cyber newsletter, Sean Martin digs into a topic that’s quietly reshaping how software gets built—and how it breaks: the rise of AI-powered coding tools like ChatGPT, Claude, and GitHub Copilot. These tools promise speed, efficiency, and reduced boilerplate—but what are the hidden trade-offs? What happens when the tool…
  continue reading
 
Cyber Flash Point on the following topics: how ransomware kills in real life and latest cyber crime news, Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show 🔥New Special Offers! 🔥 Remove Your Private Data Online …
  continue reading
 
Send us a text On this week of Serious Privacy, Paul Breitbarth, Ralph O’Brien of Reinbo Consulting, talk about the UK's plans to introduce a mandatory digital identity card. This is not the first time a proposal for mandatory ID has come up in the UK, and Ralph has thoughts about it. Paul on the other hand is a little surprised about the uproar, s…
  continue reading
 
Are you sure every login in your company is legit? Cybersecurity leader Matt Topper exposes the hidden chaos of account sprawl—where forgotten logins and shadow SaaS tools quietly drain budgets and open doors for hackers. Learn how simple, free steps can tighten security and save thousands.By Extra Something Media
  continue reading
 
State attorneys general are playing an increasingly important role in investigating and challenging antitrust violations that affect their constituents. In this episode, co-hosts James Hunsberger and Alicia Downey find out what the National Association of Attorneys General's Multistate Antitrust Task Force has been up to under the leadership of Tas…
  continue reading
 
In this September 2025 wrap-up, hosts Jörn “Joe” Menninger and Chris Fahrenbach break down the signals that actually matter for B2B operators: where capital is flowing, how deep tech is commercializing, and what shifting regulatory winds mean for product, go-to-market, and hiring. Expect fast, factual coverage of German startups, Swiss and Austrian…
  continue reading
 
This episode of The FED Weekly covers significant developments for federal employees and retirees from September 28 to October 4, 2025. A government shutdown defined the week after the Senate failed to pass a funding bill, with health care subsidies at the center of the dispute. The episode also details the massive culmination of the Trump administ…
  continue reading
 
In the world of cybersecurity, there are big lies that have been perpetuated about compliance, fixability and communication--and it's time to burn it all down and start over. Many experts see one main cybersecurity truth, especially about AI, SIEM, EDR and related business technology. By examining the intersection of AI, cybersecurity, and complian…
  continue reading
 
Send us a text We unpack how Apple’s Memory Integrity Enforcement changes the rules of mobile security by rebuilding memory architecture, not just adding guardrails. We weigh who should upgrade now, what this means for Android, and why people remain the biggest risk. • memory corruption explained with apartment analogy • why NOP sleds and heap spra…
  continue reading
 
⬥GUEST⬥ Pieter VanIperen, CISO and CIO of AlphaSense | On Linkedin: https://www.linkedin.com/in/pietervaniperen/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ Real-World Principles for Real-…
  continue reading
 
Jamey Davidson, Partner at international law firm O’Hagan Meyer concentrates on top ways to reduce risk in cyber breach litigation, defending businesses in cyber breach class-action law suits and how to build defenses to reduce cyber breach liability. We discuss: Cyber Attack Lawsuits: How to Avoid the Litigation How Cyber Breach Litigation Works W…
  continue reading
 
Ruby Zefo has long been a leader in the fields of privacy, data protection and cybersecurity. She was the first chief privacy officer at Uber, where she served from 2018, helping lead the company’s efforts to protect and enable user data. She has done so while Uber continues to innovate its technology amid a dramatic increase in digital laws around…
  continue reading
 
You step up to a box full of prizes, and knowing that there is a chance you may not win anything, you give it your real-life money anyway. No, this isn't a game at the casino, it's a video game that children as young as four are playing in their spare time. Last year, Australia introduced classification to prevent things like this from happening, s…
  continue reading
 
Fraud Expert Ayelet Biger joins us. Find her at her site: https://scamranger.ai/ Chapters 00:00 Introduction and Overview 02:49 Shining a Light on the Victim's Perspective 10:00 Creating a Seamless User Experience 12:23 The Role of Behavioral Biometrics in Fraud Detection 15:16 Distinguishing Between Legitimate Users and Cyber Criminals 20:06 The E…
  continue reading
 
Jonathan Armstrong remains on assignment. Today, Tom visits with Adam Goslin, founder of Total Compliance Tracking, to discuss his journey from IT development and management to becoming a leader in the security and compliance sector. Adam shares his professional background, the challenges he faced with achieving PCI compliance, and the insights tha…
  continue reading
 
Berlin’s AI unicorn skyrocketed from $350M to $2.3B in valuation in just months. Meanwhile, fintech giant N26 faces its most severe governance crisis yet, as its co-founder CEO steps down after regulatory pressure. And Europe’s climate tech sector is booming with mega-funding rounds, including a record €825M hydrogen allocation. This is your Septem…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play