Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
Click Here

Recorded Future News

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Artwork

1
Caveat

N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Artwork

1
Hacker Valley Studio

Hacker Valley Media

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
  continue reading
 
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
  continue reading
 
Artwork

51
Cloud Realities

Capgemini

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Artwork

1
Silicon Curtain

Jonathan Fink

icon
Unsubscribe
icon
Unsubscribe
Daily
 
Become a Paid Subscriber: https://podcasters.spotify.com/pod/show/siliconcurtain/subscribe A podcast about propaganda, digital disinformation, politics, corruption, hybrid warfare, weaponised conspiracy theories, social echo chambers and digital dystopias. 1984, Authoritarian, Autocracy, Autocrat, Big Brother, Brainwashing, Cold war, Cold war propaganda, Communism, Conflict, Conspiracy theories, Control, Cults, Cyber warfare, Deception, Dictator, Dictatorship, Digital dystopia, Digital media ...
  continue reading
 
Artwork

1
Socializing Security

Socializing Security

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
  continue reading
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
Artwork

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
Unsubscribe
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Artwork
 
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
  continue reading
 
Artwork

1
Sergei & the Westminster Spy Ring

Carole Cadwalladr & Peter Jukes with Ruth Abrahams

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Journalists Carole Cadwalladr and Peter Jukes – with the help of Conservative party whistleblower Sergei Cristo – expose an alleged secret spy ring operating at the very heart of the British political system. This is the untold story of the most audacious Russian influence operation in British history. It involves honey traps, Russian agents and information warfare. Russian wealth and glamour collide with a wild west of new digital landscapes. And as Sergei tries and fails to raise the alarm ...
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
THEOS Cybernova

Theos CyberNova

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
  continue reading
 
The Digital Banking Podcast is powered by Tyfone. Tyfone is a dramastically better digital banking provider. Our appeal is unique, we collaborate closely with our customers and the banking ecosystem in an open approach coupled with a powerful user experience that helps “get things done”! On our podcast you will hear how digital banking plays a leading role for community minded financial institutions from the unique perspectives of our industry expert guests.
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Senior Intelligence Analysts Chris Morgan and Kim Bromley bring together over 30 years of experience in threat intelligence across government, military, and telecommunications. Along with their guests, they provide practical perspectives on t ...
  continue reading
 
Artwork

1
How Hacks Happen

Many Worlds Productions

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
  continue reading
 
Artwork

1
BarCode

Chris Glanden

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
  continue reading
 
Artwork

1
The Privacy Advisor Podcast

Jedidiah Bracy, IAPP Editorial Director

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
  continue reading
 
Artwork

1
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
  continue reading
 
Artwork

1
Shared Security Podcast

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Darren Pulsipher, Chief Solution Architect for Public Sector at Intel, investigates effective change leveraging people, process, and technology. Which digital trends are a flash in the pan—and which will form the foundations of lasting change? With in-depth discussion and expert interviews, Embracing Digital Transformation finds the signal in the noise of the digital revolution. People Workers are at the heart of many of today’s biggest digital transformation projects. Learn how to transform ...
  continue reading
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
Artwork

1
Unspoken Security

Unspoken Security

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
  continue reading
 
Loading …
show series
 
- Cybersecurity in South Africa: How The Cell C and SABS Attacks Could Have Been Prevented. - Hackers Breach Morocco’s Social Security Database in an Unprecedented Cyberattack. - Kaspersky Flags Surge in Cyber Threats Across Africa in The GITEX Africa April 2025 Conference. - Google Says "Fibre Optic Should Be Considered 'Critical Infrastructure' i…
  continue reading
 
In this hard hitting episode of Future Secured, Jason Murrell and Tom Finnigan sit down with Matt Wilcox, Founder and CEO of FIFTH DOMAIN, to unpack what it really takes to train and equip the cyber warriors of today. With a unique background, Matt brings a rare perspective to cyber training, focusing on human performance, immersive learning, and t…
  continue reading
 
In this episode, Star Link Communication explores how payroll management has evolved from traditional, error-prone manual systems to fully automated, web-based solutions. The focus is on the transformative role of Star Link’s Payroll Management Software, which simplifies salary processing while ensuring full compliance with Indian tax regulations a…
  continue reading
 
In this episode of Socializing Security, Brian goes SOLO for an episode and breaks down the complex world of cybersecurity, exploring how cyber warfare, espionage, and ransomware are reshaping the digital landscape. From real-world impacts of data breaches to the silent threat of cyber spies, we uncover why your personal security matters more than …
  continue reading
 
In this eye-opening episode of SecureTalk, host Justin Beals sits down with Nick Furneaux, renowned cryptocurrency investigator and author of the provocatively titled book "There's No Such Thing as Crypto Crime." Furneaux shares his extensive expertise on blockchain technology, cryptocurrency investigations, and the evolving landscape of digital fi…
  continue reading
 
In this episode, we explore the shift from traditional theft to a new era of digital car theft. Instead of smashing windows, today’s criminals launch automotive cyber-attacks that bypass immobilizers, unlock doors, and hijack control systems, all without leaving a trace. From CAN bus vulnerabilities to cloned key fobs, cybercriminals are finding ne…
  continue reading
 
In this episode of the Security Repo Podcast, we sit down with cybersecurity expert Gerard Johansen to dive deep into identity and access management (IAM) challenges in the enterprise space. We explore the explosion of data and identities, the ongoing debate over who "owns" IAM in organizations, and how threat actors are evolving their tactics to e…
  continue reading
 
Send us a text In this episode, host Joe sits down with Ricoh Danielson, a former Special Forces operator turned cybersecurity expert and CISO. Ricoh shares his incredible journey—from nine combat rotations overseas to law school, and eventually a career pivot into IT and digital forensics. Discover how military discipline, resilience, and adaptabi…
  continue reading
 
Dr Yuri Felshtinsky is a prominent author, historian, and journalist, and expert on Russia and the former Soviet Union. He has appeared in hundreds of print, TV, and radio interviews worldwide, and is widely known as co-author of the book “Blowing Up Russia” with Alexander Litvinenko, a former Lieutenant Colonel in the FSB who was poisoned with rad…
  continue reading
 
From September 16, 2020: What is the proper relationship between the CIA director and the president? How should directors handle arguably illegal orders? How important is the director's role as the nation's honest broker of information during times of crisis? To get at these questions, David Priess sat down with Chris Whipple, a documentary filmmak…
  continue reading
 
Edition No134 | 25-04-2025 - Lieutenant General Yaroslav Moskalik has been killed in a car bomb attack near Moscow. The most likely suspect for this highly targeted assassination is Ukraine. The elimination of Lieutenant General Yaroslav Moskalik follows that of another senior Russian military figure, Lieutenant General Igor Kirillov, in December. …
  continue reading
 
Georgijs Ivanovs started the Ukraine Matters channel in 2007, and it has garners 11.5 m views. He started the channel to explain the situation surrounding the war in Ukraine in simple terms. Like myself, he is not Ukrainian, nor is he a military expert. But he has been to Ukraine many times and seen it almost fully (except for Odesa region). He has…
  continue reading
 
Autonomous robots with embedded artificial intelligence are growing more common across industry sectors. So-called “embodied AI,” collects vast amounts of data through its sensors and changes how humans interact with technology. As embodied AI becomes more common and continues to drive innovation, it also creates new challenges for ethical uses of …
  continue reading
 
„China in 25“ – in maximal 25 Minuten sprechen Mikko Huotari, Bernhard Bartsch und Claudia Wessling über aktuelle Entwicklungen in China. In dieser Folge geht es um die Reisediplomatie von Partei- und Staatschef Xi Jinping, der sich bei Besuchen in Südostasien darum bemüht hat, Unterstützer im Handelskrieg mit den USA zu gewinnen. Wir sprechen auch…
  continue reading
 
For today's episode, Lawfare Foreign Policy Editor Daniel Byman interviewed Michael Sulmeyer, who was the top Defense official for all aspects of cyber policy in the Biden administration. Sulmeyer discusses the cyber threat landscape, different roles and missions, how Artificial Intelligence might be leveraged, and the key role of allies in cyberde…
  continue reading
 
Edition No133 | 24-04-2025 - The US is on the verge of exiting the so-called peace process. It’s become ever harder for him to hide the blatant alignment of his administration with Russia’s goal and objectives, Russian strategies and narratives. As we’ve said in, multiple recent episodes, it’s been all carrots for the Kremlin, and all sticks for Ze…
  continue reading
 
Welcome to our monthly conversation with Konstantin, who is one of the most respected voices on YouTube about what is happening Inside Russia. Konstantin Samoilov is a well-known YouTuber whose channel ‘Inside Russia’ comments insightfully on Russia’s decent into authoritarianism over the last few years. But now, like many others, he’s outside Russ…
  continue reading
 
Dr. Darren and Denis O'Shea discuss the impending end of support for Windows 10 and its implications for small and mid-sized companies. They explore the challenges of upgrading to Windows 11, the importance of modern IT infrastructure, and the role of managed service providers in navigating these changes. The discussion also touches on the impact o…
  continue reading
 
AI is reshaping the cybersecurity battlefield, and cyber adversaries are getting smarter. In this episode, Ron Eddings welcomes Andrey Suzdaltsev, Co-Founder and CEO of Brightside AI, for a look into the evolution of social engineering, AI’s role in personalized phishing, and how Brightside is turning the tables with automation and human-centric pr…
  continue reading
 
Dr. Darren interviews Thomas Jorgensen from Supermicro. With over 30 years of experience in acceleration technology, Thomas Jorgensen brings a wealth of knowledge to the table. He shares his insights on the evolution of computing, the shift towards AI and video as primary technology drivers, the importance of pre-trained AI models for businesses, a…
  continue reading
 
On today’s episode, Julia Rose Kraut, author of the book “Threat of Dissent: A History of Ideological Exclusion and Deportation in the United States,” joins Lawfare Managing Editor Tyler McBrien to talk about that book, originally published in 2020, and how it can help us make sense of the Trump administration’s recent immigration and deportation p…
  continue reading
 
Global tariffs introduced by the US government under the second Trump administration on April 2nd have rocked global markets. While they have been reduced to a blanket rate of 10 percent a week later, they have increased for China to 145 percent. In retaliation, the Chinese government raised tariffs on all US goods to 125 percent. Johannes Heller-J…
  continue reading
 
This week we are joined by Avani Desai, CEO of Schellman, who is talking about what we can expect now that Digital Operational Resilience Act (DORA) is in effect. Ben’s got the story of how a federal judge ruled that Google broke antitrust laws to maintain its dominance in online advertising, marking the second major legal blow in a year that could…
  continue reading
 
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week Joe's got some follow up about his chickens. Joe's story is on LLM-powered coding tools, and how they are inc…
  continue reading
 
In this episode of the Security Repo Podcast, Chris Kulakowski, a seasoned detection engineer from IBM, delves into the complexities of threat detection, from writing detection rules to collaborating with red teams for proactive security strategies. He shares insights on prioritizing security risks, the evolving role of AI in cybersecurity, and the…
  continue reading
 
Easter Pysanky: Silicon Curtain https://car4ukraine.com/campaigns/easter-pysanky-silicon-curtainCar for Ukraine has joined forces with a group of influencers, creators, and news observers during this special Easter season. In peaceful times, we might gift a basket of pysanky (hand-painted eggs), but now, we aim to deliver a basket of trucks to our …
  continue reading
 
Glen Grant worked as a defence and reform expert in Ukraine working for the Ukrainian Institute for the Future. He is also a Senior Fellow in the UK Institute for Statecraft on Building Integrity Initiative countering Russian influence. Glen graduated from the Royal Military Academy Sandhurst, the Junior Staff Course Warminster and the Joint Staff …
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and John as they discuss: BreachForums Down: Dark Storm Team Takes Credit A Potential New Vulnerability in SAP NetWeaver Exploit User Targets Salesforce Data ReliaQuest Research: Understanding Chinese Espionage Strategies Kim Bromley: Senior Cyber …
  continue reading
 
This week, Scott sat down with his Lawfare colleagues Anna Bower, Tyler McBrien, and Kevin Frazier to talk through the week’s big national security news, including: “Aliens vs. Predators.” Despite forceful legal pushback—including by the U.S. Supreme Court—the Trump administration is working hard to continue its campaign to remove foreign aliens it…
  continue reading
 
When over 100,000 Bitcoin went missing in 2016, no one suspected the culprits: a quiet, mild-mannered developer and his ostentatious entrepreneur/rapper wife with a wacky social media presence. Meet Razzlekhan and Dutch, the most unlikely thieves in the history of crime. Resources: Razzlekhan and husband guilty of $4.5bn Bitcoin launder Bitcoin Plu…
  continue reading
 
On today's episode, Mikhail Zygar, a renowned Russian journalist living in exile in the U.S., the author of multiple books on Vladimir Putin, and the author of The Last Pioneer substack, joined Lawfare Associate Editor Olivia Manes to discuss his experience as the founder of one of the last independent Russian media channels, TV Rain. They talked a…
  continue reading
 
In this episode of Reimagining Cyber, Tyler Moffitt, Senior Security Analyst at OpenText Cybersecurity, explores the evolution of fast flux — a once obscure spamming tactic that has now become a serious national security concern. Learn how this evasive DNS technique enables ransomware groups and nation-state actors to stay resilient, hide their inf…
  continue reading
 
Jake Broe is a United States Air Force veteran who served for six years as a Nuclear and Missile Operations Officer. But you may know him better as one of the most prominent voices on YouTube throughout the war, someone with absolute moral clarity about who the victim of the war is – spoilers, it’s Ukraine – and who brings direct military experienc…
  continue reading
 
In this eye-opening episode of SecureTalk, host Justin Beals welcomes Bryant Tow, Chief Security Officer at LeapFrog Services, to discuss why technology alone can't solve cybersecurity challenges. Bryant reveals how the "Ring of Security" concept shows that up to half of your attack surface lies outside of technology—in governance, policies, people…
  continue reading
 
Send us a text Join Joe as he reconnects with Matthew Alderman, Chief Product Officer at CyberSaint, in this insightful episode of the podcast! With over 250 episodes under his belt, Joe dives deep with Matthew, a cybersecurity veteran, podcast host, and advisor, to explore: CyberSaint’s Game-Changing Approach: How CyberSaint uses historical loss d…
  continue reading
 
Telemarketing compliance isn’t exactly the hottest topic in tech circles… but maybe it should be. In this episode, Milou and Brian sit down with Kevin Mayfield, Manager of Marketing Compliance at CompliancePoint, to dig into the often-overlooked world of do-not-call laws, TCPA risks, and the real impact of telemarketing rules on tech companies (yes…
  continue reading
 
Chris Hughes, author of “Marketcrafters” and co-founder of the Economic Security Project, joins Kevin Frazier, AI Innovation and Law Fellow at Texas Law and Contributing Editor at Lawfare, to discuss his book and its implications at a time of immense economic uncertainty and political upheaval. The duo explore several important historical case stud…
  continue reading
 
Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 Nove…
  continue reading
 
In this episode of the AI in Business Podcast, Brett Kiley, Executive Director of Customer Experience and Client Solutions at CVS Health, joins us for a compelling discussion on the evolving landscape of customer interactions. With over two decades of experience, Brett shares how CVS navigates the challenges of personalization, efficiency, and seam…
  continue reading
 
Loading …
Listen to this show while you explore
Play