Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Digital Security Insights Podcasts
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
Welcome to Cyber Insights, the podcast that bridges the worlds of networking and cybersecurity. From cutting-edge innovations in enterprise connectivity to the latest in digital defense, we break down the buzzwords and bring you actionable insights to secure and scale your systems. Whether you're an IT professional, business leader, or tech enthusiast, join us as we explore the critical intersection of networks and security, featuring expert conversations, industry trends, and real world str ...
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what’s new and what’s next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Welcome to "Cyber Security", the podcast that dives deep into the ever-evolving world of digital protection. Each episode explores the latest cyber threats, data breaches, hacking techniques, and the tools and strategies used to defend against them. Whether you're a tech enthusiast, IT professional, or just curious about how to stay safe online, this show offers expert insights, real-world case studies, and practical advice to help you navigate the complex digital landscape. Tune in and stay ...
…
continue reading
👋 Welcome to Bizionic Technology Pvt Ltd! We specialize in providing top-notch Hire Talent, Marketing, Technologies, Cloud Consulting Services, and Security Solutions. Don't forget to check out our podcast for valuable insights. Visit our website at https://www.bizionictech.com for more information. Let's innovate together! 💡 #BizionicTech #InnovateWithUs
…
continue reading
Welcome to the Do Big Podcast, your destination for digital tech insights, delivered by industry leaders and digital experts. Our podcast delves deep into the realm of digital technology and its transformative influence on businesses. Do Big Podcast shares knowledge and strategies that empower SMEs to flourish in the digital age. Visit our website for more details. https://www.tatatelebusiness.com/
…
continue reading
Unlocking Singapore is a dedicated podcast series by Locksmith Singapore that explores the world of home security, modern door solutions, and smart living. Each episode provides expert insights, real-life stories, and practical advice on keeping your home safe and accessible without compromise. From emergency lockouts to advanced digital door systems, our goal is to empower homeowners, businesses, and renters with knowledge they can trust. Whether you’re curious about the latest security tec ...
…
continue reading
An archive of each full weekday episode of the award-winning program presented by Stephen Grootes.
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
…
continue reading
Expert Insights and Stories on SAP and beyond. Transformation Every Day is the podcast for anyone passionate about Digital Transformation done right in the SAP universe. Join hosts Alexander Greb and Johannes Langguth, along with leading experts from SAP and beyond, as they dive deep into what successful digital transformation really takes. Get ready for candid conversations, inspiring experts insights, best practices and practical strategies to drive impactful change in your organization.
…
continue reading
Digital Politics with Karen Jagoda is a non-partisan podcast featuring thought leaders and industry pioneers with insights about innovative approaches to political campaigns, voter engagement, mobilization, fundraising, persuasion, and GOTV. Topics include the power of mobile devices, leveraging social networks, message testing and targeting, cross-media advertising, grassroots organizing, and big data.
…
continue reading
The Union is about the intersection between people, technology, and artificial intelligence. Get ready to be inspired and challenged as we ask questions, uncover insights, and share inspiring stories about digital ecosystems and automation.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
In a world where security breaches are not a matter of "if" but "when," "Command & Control: An IT Security Podcast" stands as a bastion of knowledge and expertise. Hosted by Aaron Banner, a distinguished retired Army Colonel and cyber security expert, this podcast is designed to equip businesses with the tools and knowledge they need to maintain a fortress of digital security. Aaron Banner brings to the table years of experience having protected national security at the highest levels, to br ...
…
continue reading
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
…
continue reading
Welcome to Smarter Online Safety: Protect, Empower, Transform—your go-to channel for digital security, AI productivity, and digital transformation. As cyber fraud, identity theft, and AI-driven risks grow, Jocelyn King, “The Queen of Online Safety,” is here to help you stay secure and thrive. A Top 10 Woman in Cybersecurity, speaker, and educator, she has been featured on Dr. Phil, prime-time news, international radio, and top podcasts. 💡 What You’ll Learn: ✔️ Protect yourself & your family ...
…
continue reading
Our podcast covers major data breaches, digital privacy issues, and the quirks of internet culture with a mix of humor and insight. Why Subscribe? Stay Informed: Get the latest updates on cybersecurity threats, ransomware attacks, and cyber insurance trends. Engaging Content: We break down complex topics with a lighthearted approach, making them easy to understand. Expert Insights: Learn from industry experts and our own experiences in the cybersecurity field. We dive deep into the latest in ...
…
continue reading
Cybersecurity. Privacy. Blockchain. Unfiltered. The Efani Features Podcast is your trusted guide to the evolving world of digital security. Hosted by Mark Kreitzman of Efani, each episode dives deep into the critical issues shaping our digital future - from SIM swap threats and mobile privacy to crypto security and blockchain innovation. Join leading experts, ethical hackers, founders, and privacy advocates as we unpack real-world threats, explore cutting-edge solutions, and share practical ...
…
continue reading
The EY India Insights podcast features conversations with experts on a wide range of topical subjects like ESG, technology, and economic and policy changes that are shaping the thought process of the C-Suite, and are likely to be the cornerstone of a transformative business.
…
continue reading
The Current Market Insights Podcast is brought to you by Harris Partners Real Estate. Understanding the property market can be a challenging thing, with highs and lows, twists and turns. The media and agents tend to spread the news they want you to hear, with the advice they want you to follow. Current Market Insights is an unbiased look into what is happening, what tips you can use to buy, sell, or rent, and that you wont find anywhere else.
…
continue reading
Welcome to Silent Mode Cafe, the podcast where we translate the digital realm into plain English. From data privacy and basic internet security to smart home gadgets and the latest AI developments, we serve up tech insights with a side of caffeine.
…
continue reading
Ledger is the gold standard of security in the crypto space. Our hardware wallets are essential for anyone wanting to take control of their digital value. At the heart of this ecosystem, Ledger connects you with everything in the digital assets space, providing access to services and freedom from compromise on security, ownership or user experience. On 'The Ledger Podcast', we have conversations with some of the most interesting thought leaders in crypto, cybersecurity and culture to discuss ...
…
continue reading
The Ciena Network Insights Podcast brings together thought leaders, subject matter experts, and tech influencers to discuss the innovations and trends shaping our digital world. Join us every month for engaging conversations on telecom networks, digital transformation, sustainability, and more.
…
continue reading
AI Agent Store podcast explores the explosive growth of AI agents - the breakthrough technology reshaping our digital landscape in 2025. As pioneers in the AI agent marketplace (AIAgentStore.ai), we bring you use case insights and key implementation strategies. Each episode breaks down a specific AI agent or development platform - from ready-to-use AI Agents to agentic development frameworks - exploring their capabilities, real-world applications, and how to leverage them effectively.
…
continue reading
Dive into how modern SOCs evolve with autonomous operations. Each episode brings practical insights from industry experts on improving detection, investigation, and response through data, analytics, and automation. What You’ll Gain Perspectives on SOC transformation Lessons from real-world security challenges Approaches to building efficiency and resilience at scale Netenrich invites security professionals to learn how they can optimize their security operations, remove silos, and gain incre ...
…
continue reading
The Executive Insights podcast, brought to you by AWS (Amazon Web Services), features peer-to-peer conversations between business executives on innovating for growth, building resiliency, and shaping the future of their organizations. Learn more at AWS Executive Insights and follow us on LinkedIn. For video versions of these and other conversations, subscribe to our YouTube playlist.
…
continue reading
Red Dot Mindset is the official podcast of Grey Matter Ops, your tactical guide to surviving — and thriving — in a world where hesitation can cost you everything. Hosted using advanced AI narration and written by a decorated U.S. Air Force Security Forces veteran, each episode blends military-grade strategy with real-world self-defense, situational awareness, and survival psychology. Whether you're facing a street-level threat, a digital stalker, or just the daily grind of modern life, we’ll ...
…
continue reading

1
AI and data security in the age of digital convenience
21:49
21:49
Play later
Play later
Lists
Like
Liked
21:49In this episode of the EY India Insights Podcast, part of our Cybersecurity Awareness Month series, Mini Gupta, Partner, Cybersecurity Consulting, EY India, explores a critical topic — the balance between the convenience AI offers and the control individuals have over their personal data. Mini discusses how AI systems process a vast range of inform…
…
continue reading

1
Systematic Security: Protecting Sweden's Digital Frontline Amid Hybrid Threats.
14:56
14:56
Play later
Play later
Lists
Like
Liked
14:56Sweden's integration into NATO, coupled with sustained, sophisticated cyber operations from state actors like Russia, China, and Iran, has dramatically intensified the threat level against its Critical Infrastructure and Vital Societal Functions (VSF & CI). To combat this escalating threat, Swedish legislation, including the new Cybersecurity Act (…
…
continue reading

1
Age Verification Laws: A Privacy Disaster in the Making
20:30
20:30
Play later
Play later
Lists
Like
Liked
20:30In this episode, we discuss the surge of age verification laws spreading across the US, including the recent implementation in Ohio. These laws intend to shield children but come at a significant cost to privacy and cybersecurity. We’ll explore how third-party ID verification companies operate, the risks associated with these systems, and the broad…
…
continue reading

1
Age Verification Laws: A Privacy Disaster in the Making
20:30
20:30
Play later
Play later
Lists
Like
Liked
20:30In this episode, we discuss the surge of age verification laws spreading across the US, including the recent implementation in Ohio. These laws intend to shield children but come at a significant cost to privacy and cybersecurity. We'll explore how third-party ID verification companies operate, the risks associated with these systems, and the broad…
…
continue reading

1
3451: The Hidden Cost of Data: How NetApp Is Tackling the Sustainability Crisis in IT
22:26
22:26
Play later
Play later
Lists
Like
Liked
22:26What if the biggest sustainability challenge in tech isn’t hardware or cloud emissions, but the invisible mountain of unused data sitting in storage? That’s the question driving my conversation with Piero Gallucci, Vice President and General Manager for NetApp UK and Ireland, as we discuss how single-use data is quietly shaping the environmental an…
…
continue reading

1
Crypto Agility and the AI-Driven SOC: Securing the 2026 Enterprise
13:29
13:29
Play later
Play later
Lists
Like
Liked
13:29The foundation of digital security is collapsing as autonomous, AI-driven phishing and deepfakes escalate cyber threats, while the looming quantum threat forces organizations to prepare against the risk of nation-states executing "harvest now, decrypt later" (HNDL) attacks. This episode explores the critical strategic response required in 2026: org…
…
continue reading

1
CarbonCopies AI: No-Code Testing Agent Overview
3:45
3:45
Play later
Play later
Lists
Like
Liked
3:45Learn more about CarbonCopies on AI Agent Store: https://aiagentstore.ai/ai-agent/carboncopies-ai List of AI Agents from Podcast Season 2 (including upcoming episodes): https://aiagentstore.ai/collection/podcast-season-2-vlnpozxvkssy List of AI Agents from Podcast Season 1: https://aiagentstore.ai/collection/podcast-season-1-ucqthuywrwpd Find more …
…
continue reading

1
3450: Why Predictive AI Delivers Real ROI While Generative AI Struggles
31:35
31:35
Play later
Play later
Lists
Like
Liked
31:35What if the next big leap in business AI isn’t generative at all, but predictive? That’s the question at the heart of my conversation with Zohar Bronfman, CEO and co-founder of Pecan AI, a company helping business teams forecast outcomes with precision and turn historical data into future insights. Zohar explains why he believes predictive AI will …
…
continue reading

1
OpenAI Codex SDK: Autonomous Code Agents Framework
4:15
4:15
Play later
Play later
Lists
Like
Liked
4:15Learn more about OpenAI Codex SDK on AI Agent Store: https://aiagentstore.ai/ai-agent/openai-codex-sdk List of AI Agents from Podcast Season 2 (including upcoming episodes): https://aiagentstore.ai/collection/podcast-season-2-vlnpozxvkssy List of AI Agents from Podcast Season 1: https://aiagentstore.ai/collection/podcast-season-1-ucqthuywrwpd Find …
…
continue reading

1
Paraguayan Card Fraud: The First Data Currency Anomaly
6:53
6:53
Play later
Play later
Lists
Like
Liked
6:53The source material is an extensive report analyzing a major financial fraud incident that occurred in Uruguay between 2008 and 2014, rooted in a catastrophic software flaw within the First Data payment processing system for Maestro/Mastercard transactions. This defect created an immense arbitrage opportunity by incorrectly converting US Dollar pur…
…
continue reading

1
Analysis of Deep Fake Scams and Evolving Cybersecurity Threats
6:31
6:31
Play later
Play later
Lists
Like
Liked
6:31The source provides an audio transcript of a discussion focused on the prevalence and complexity of deepfake cryptocurrency scams, particularly those impersonating figures like Elon Musk. The conversation details a speaker's personal experience being relentlessly targeted by scammers, initially a woman from Nigeria who then transformed into various…
…
continue reading

1
The Best Bits of The Money Show: Power Elite Book: AI, Gold & Bubbles
47:14
47:14
Play later
Play later
Lists
Like
Liked
47:14Stephen Grootes spoke to Ongama Mtimka about C. Wright Mills’ The Power Elite and how its themes of concentrated political, economic, and military power remain relevant today. He also interviewed Warren Ingram on investment strategies during market bubbles, and later discussed the AI boom and gold rush with Vincent Anthonyrajah and David Shapiro. F…
…
continue reading
Send us a text We break down urgent patches, a remote‑execution risk on tens of thousands of firewalls, and an AI browser flaw that leaks context. We also flag weaker federal support, a major airline breach, and leave you with a simple checklist to reduce risk now. • Oracle E‑Business CVE and why fast patching matters • Cisco firewall remote code e…
…
continue reading

1
3449: How Urban SDK Is Using AI to Help Local Governments Save Lives
30:08
30:08
Play later
Play later
Lists
Like
Liked
30:08What happens when artificial intelligence meets the everyday heroes of local government? That’s the question driving my conversation with Justin Dennis, co-founder and COO of Urban SDK, a geospatial AI company helping more than 250 North American cities make faster, safer, and smarter decisions. Justin shares how a Smart Cities Challenge from the U…
…
continue reading

1
Think Your Home Network Is Safe? Think Again — How to Truly Secure Your Wi-Fi
14:38
14:38
Play later
Play later
Lists
Like
Liked
14:38Welcome to The Smarter Online Safety Show with your host Jocelyn King — here to help you get smarter and safer online! 💻🔒 In this National Cybersecurity Awareness Month special, Jocelyn breaks down one of the most overlooked risks in online safety — your home network. You already lock your doors and windows to protect your physical home, but what a…
…
continue reading

1
GURI Dos Historias, Una Brecha. Por Alberto Daniel Hill.
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44La Plataforma GURI (Gestión Unificada de Registros e Información) es descrita en las fuentes como el sistema nervioso central para la educación primaria en Uruguay y es administrada bajo la Dirección General de Educación Inicial y Primaria (DGEIP/CEIP). Sus funciones principales son multifacéticas, abarcando roles esenciales de gestión de datos, ap…
…
continue reading

1
Crisis de Datos en URUGUAY: El Hackeo GURI, por Alberto Daniel Hill
6:24
6:24
Play later
Play later
Lists
Like
Liked
6:24Crisis de Datos en URUGUAY: El Hackeo GURI, por Alberto Daniel Hill Alberto Daniel Hill es identificado en los documentos como un experto en seguridad que contribuyó a las narrativas críticas y de análisis técnico en redes sociales (publicaciones en X), particularmente en relación con el incidente de ciberseguridad que afectó al Banco Hipotecario d…
…
continue reading

1
Un pantallazo: el hackeo al sistema GURI de la ANEP
5:26
5:26
Play later
Play later
Lists
Like
Liked
5:26Alberto Daniel Hill es identificado en los documentos como un experto en seguridad que contribuyó a las narrativas críticas y de análisis técnico en redes sociales (publicaciones en X), particularmente en relación con el incidente de ciberseguridad que afectó al Banco Hipotecario del Uruguay (BHU). Este incidente ocurrió de forma concurrente con el…
…
continue reading

1
En profundidad: El hackeo al sistema GURI de la ANEP
21:49
21:49
Play later
Play later
Lists
Like
Liked
21:49Alberto Daniel Hill es identificado en los documentos como un experto en seguridad que contribuyó a las narrativas críticas y de análisis técnico en redes sociales (publicaciones en X), particularmente en relación con el incidente de ciberseguridad que afectó al Banco Hipotecario del Uruguay (BHU). Este incidente ocurrió de forma concurrente con el…
…
continue reading

1
PIC boss under fire & why the Rand is gaining strength – The Money Show Explainer
39:05
39:05
Play later
Play later
Lists
Like
Liked
39:05Stephen Grootes speaks to Carol Paton, Editor-at-Large at Fin24, about why tensions are rising inside the Public Investment Corporation, where internal divisions and clashes over investment strategy have put the asset manager’s investment head in the spotlight, raising fresh questions about governance at the custodian of more than R2.5 trillion in …
…
continue reading

1
Episode 90: Telstra International Introduces an Autonomous Network Future
20:33
20:33
Play later
Play later
Lists
Like
Liked
20:33Telstra International has unveiled its highly Autonomous Network vision, part of the company's ambitious five-year plan to drive connectivity and innovation across Asia-Pacific. Head of Telstra International Networks, Wayne Lotter joins Blue Planet's Vice President for Global Products & Delivery, Kailem Anderson to discuss Telstra International's A…
…
continue reading

1
Fyva AI: Equity Research Copilot Agent Profile
3:52
3:52
Play later
Play later
Lists
Like
Liked
3:52Learn more about Fyva AI on AI Agent Store: https://aiagentstore.ai/ai-agent/fyva-ai List of AI Agents from Podcast Season 2 (including upcoming episodes): https://aiagentstore.ai/collection/podcast-season-2-vlnpozxvkssy List of AI Agents from Podcast Season 1: https://aiagentstore.ai/collection/podcast-season-1-ucqthuywrwpd Find more AI Agents: AI…
…
continue reading

1
Cybersecurity Episode 02: Navigating innovation and data privacy for children in the age of AI
14:08
14:08
Play later
Play later
Lists
Like
Liked
14:08In the latest episode of the of EY India Insights’ Cybersecurity Awareness Month series, Lalit Kalra, Partner, Cybersecurity and National Leader-Data Privacy, EY India throws light on the crucial intersection of artificial intelligence (AI), the Digital Personal Data Protection (DPDP) Act and the ethical considerations surrounding data privacy for …
…
continue reading

1
The Anti-Podcast: An Analysis of Cybermidnight Club’s Unique Value in the Cybersecurity Media Landscape
6:02
6:02
Play later
Play later
Lists
Like
Liked
6:021. Introduction: Deconstructing a New Media Ecosystem The Cybermidnight Club is not a conventional podcast; it is a unique, personality-driven media ecosystem meticulously constructed around its host, Alberto Daniel Hill. This report’s core thesis is that the podcast’s value and uniqueness derive from its radical authenticity and a “live-first,” co…
…
continue reading
Las fuentes proporcionadas consisten en un análisis estratégico experto y un informe resumido sobre una serie de incidentes sistémicos de ciberseguridad que afectaron al sector público de Uruguay a fines de 2025. Ambos documentos se centran en gran medida en el incidente que afectó a la ANEP Plataforma GURI, un sistema de gestión educativa que supu…
…
continue reading
The provided sources consist of an expert strategic analysis and a summary report concerning a series of systemic cybersecurity incidents that affected Uruguay's public sector in late 2025. Both documents focus heavily on the incident impacting the ANEP Plataforma GURI, an educational management system alleged to have suffered the exfiltration of n…
…
continue reading

1
If you are a client of BANCO HIPOTECARIO DEL URUGUAY and you badly want answers, these are the answers you are looking for.
15:54
15:54
Play later
Play later
Lists
Like
Liked
15:54If you are a client of BANCO HIPOTECARIO DEL URUGUAY and you badly want answers, these are the answers you are looking for. #Uruguay #Cybersecurity #BHU #Cyberattack #TraditionalMedia #MediaSilence #InstitutionalOpacity #CERTuy #CounterNarrative
…
continue reading

1
3448: Inside Kore.ai’s Mission to Make Agentic AI Accessible for Everyone
30:19
30:19
Play later
Play later
Lists
Like
Liked
30:19Agentic AI is only interesting when it leaves the lab and takes responsibility for real outcomes. In this episode, I reconnect with Raj Koneru, Founder and CEO of Kore.ai, to talk about what that shift looks like inside large enterprises. Raj has been building conversational systems long before chatbots became dinner table conversation, and he is c…
…
continue reading
Displaced aggression is a robust psychological phenomenon defined as the redirection of intense rage or hostility from its original source of provocation onto a substitute, often innocent, target. This behavior is generally not random but is driven by underlying psychological needs and mechanisms.Here is a detailed description of displaced aggressi…
…
continue reading

1
Displaced aggression is a robust psychological phenomenon defined as the redirection of intense rage or hostility from its original source of provocation onto a substitute, often innocent, target
15:22
15:22
Play later
Play later
Lists
Like
Liked
15:22https://cybermidnight.club/deconstructing-the-attack-a-psychological-analysis-for-understanding-and-healing-2/ Displaced aggression is a robust psychological phenomenon defined as the redirection of intense rage or hostility from its original source of provocation onto a substitute, often innocent, target. This behavior is generally not random but …
…
continue reading

1
PIC backs R1.35bn in mining startups; Dis-Chem CEO Rui Morais on strategy and future growth
1:14:16
1:14:16
Play later
Play later
Lists
Like
Liked
1:14:16Stephen Grootes speaks to Heidi Sternberg, Sector Specialist: Mining at the Public Investment Corporation, about Africa’s largest asset manager’s decision to invest R1.35 billion in early-stage mining ventures. The move aims to boost South Africa’s mining sector by backing projects from post-scoping to bankable feasibility stage, through private eq…
…
continue reading

1
The Calculated Cruelty of CyberGurl10: Displaced Aggression and the Weaponization of High-Trust Digital Space
37:18
37:18
Play later
Play later
Lists
Like
Liked
37:18These sources collectively provide a detailed psychological and legal analysis of a relational conflict where an individual, CyberGurl10, publicly attacked her fiancé, Alberto, in an online forum, contrasting this with her private disputes against her lawyer and ex-husband. The analysis concludes that the public confrontation with Alberto was uniqu…
…
continue reading
1. Introducción: Dos Crisis, Dos Relatos y una Verdad en Disputa La reciente ola de ciberataques en Uruguay ha puesto de manifiesto no solo las vulnerabilidades técnicas de su infraestructura crítica, sino una profunda crisis de confianza en las instituciones estatales. El incidente del Banco Hipotecario del Uruguay (BHU) de septiembre de 2025 es e…
…
continue reading

1
Cyber-Sovereignty Under Siege - Uruguay and BANCO HIPOTECARIO DEL URUGUAY
8:32
8:32
Play later
Play later
Lists
Like
Liked
8:32The latest update, which provides context and status as of October 9, 2025, significantly reinforces the core tenets of Alberto Hill’s counter-narrative, primarily by highlighting the systemic nature of the governance failures and confirming the persistence of institutional minimization. https://cybermidnight.club/the-latest-update-which-provides-c…
…
continue reading

1
CIPA Lawsuits: Everything Privacy Leaders Should Know
1:04:23
1:04:23
Play later
Play later
Lists
Like
Liked
1:04:23Send us a text More than 5,000 CIPA lawsuits have been filed — and privacy teams are racing to prevent the next wave. In this webinar, Matthew Pearson, one of the leading CIPA legal experts, explains how this 1967 wiretapping law is being used against modern websites and apps. You’ll learn: 🔍 How CIPA lawsuits start and what makes them credible ⚙️ …
…
continue reading

1
Weaponizing Trust: Why a Public X Space Attack Was More Destructive Than Fighting a Lawyer and an Abusive Ex
11:59
11:59
Play later
Play later
Lists
Like
Liked
11:59HIIS THE ANSWER TO THE FOLLOWING MESSAGE OF CYBERGURL1'0 ON TWITTTER AFTER PUBLISHING AN ARTICLE BASED ON THE EVENT RELATED""And Im one with ager issues. Told there also that it was only way for me to reach you when you have blocked me and ghosted me for days. Only reason was me to come ask you to call me and you said you wont. And you didn’t. I ev…
…
continue reading

1
Deconstructing the Attack: A Psychological Analysis for Understanding and Healing
7:07
7:07
Play later
Play later
Lists
Like
Liked
7:07Deconstructing the Attack: A Psychological Analysis for Understanding and HealingIntroduction: A Framework for Understanding What HappenedThis document provides a clear and objective framework for understanding the public attack you recently experienced. Being subjected to a confrontation that is not only disproportionate but also uniquely damaging…
…
continue reading

1
Displaced Aggression and Relational Betrayal
27:40
27:40
Play later
Play later
Lists
Like
Liked
27:40Deconstructing the Attack: A Psychological Analysis for Understanding and HealingIntroduction: A Framework for Understanding What HappenedThis document provides a clear and objective framework for understanding the public attack you recently experienced. Being subjected to a confrontation that is not only disproportionate but also uniquely damaging…
…
continue reading

1
Patch or Perish: Navigating the Windows 10 EOL Minefield
13:12
13:12
Play later
Play later
Lists
Like
Liked
13:12The impending end-of-life (EOL) for operating systems like Windows 10 creates an immediate and permanent security vulnerability, essentially transforming these unpatched systems into prime targets for sophisticated cyber threats and ransomware attacks. This failure to maintain supported software leads to massive financial liabilities, including pot…
…
continue reading

1
From Firefighting to Strategizing IT Security with Giles Thornton
16:06
16:06
Play later
Play later
Lists
Like
Liked
16:06In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Giles Thornton, Head of Information Security at The Premier League, to explore why security teams feel like they’re constantly firefighting and how to break free. Giles shares insights into security perfectionism and complian…
…
continue reading
Learn more about Klaaryo on AI Agent Store: https://aiagentstore.ai/ai-agent/klaaryo List of AI Agents from Podcast Season 2 (including upcoming episodes): https://aiagentstore.ai/collection/podcast-season-2-vlnpozxvkssy List of AI Agents from Podcast Season 1: https://aiagentstore.ai/collection/podcast-season-1-ucqthuywrwpd Find more AI Agents: AI…
…
continue reading

1
CR111: From mission-driven to tech-driven with Ben Sparke, Microsoft
46:45
46:45
Play later
Play later
Lists
Like
Liked
46:45The evolving role of technology in modern defense environments, highlighting innovations in communications, automation, and open-source frameworks. Drawing from personal experience, the conversation emphasizes how real-world conflicts are reshaping how tech is deployed, adopted, and understood across military operations. This week, Dave, Esmee, and…
…
continue reading

1
Flow State for Startup Founders: Deep Work That Actually Ships
51:12
51:12
Play later
Play later
Lists
Like
Liked
51:12Steven Puri, co-founder/CEO of Sukha, shares the flow state for startup founders playbook: body doubling, the coffee-shop effect, chronotype time-blocking, demo-first standups, and outcome-based leadership. You’ll learn how to beat the 22-minute context switching tax, design deep-work rituals for remote teams, and build a best-idea-wins culture tha…
…
continue reading

1
3447: How DXC Is Using AI to Outsmart Cybercriminals
28:36
28:36
Play later
Play later
Lists
Like
Liked
28:36In this episode, Mike Baker, Vice President and Global CISO at DXC Technology, says the cyber industry has been focusing on the wrong side of AI. He believes too many companies use it only to block threats instead of studying how criminals use it to scale phishing, bypass defenses, and deploy adaptive malware. Attackers are learning faster than eve…
…
continue reading

1
Mining Indaba opens as users tune out; peak social media fatigue hits digital engagement
1:15:31
1:15:31
Play later
Play later
Lists
Like
Liked
1:15:31Stephen Grootes speaks to Bernard Swanepoel, Chair of the Joburg Indaba and former mining executive, about key takeaways from Day One - from how global geopolitics are reshaping South Africa’s mining landscape and the renewed importance of PGMs and gold, to what’s on the agenda tomorrow, including coal’s evolving role, reviving diamond mining, upda…
…
continue reading

1
Cl0p's Latest Heist: Exploiting Oracle's Critical Vulnerability
35:08
35:08
Play later
Play later
Lists
Like
Liked
35:08Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst John and Threat Detection Engineer Marken as they discuss: Clop's Exploitation of Oracle E-Business Suite (1:09) Scattered Lapsus$ Hunters Return With Salesforce Leaks (5:27) Shutdown Threatens US Intel Sharing and Cyber Defense (10:02) Ransomware and Cy…
…
continue reading

1
🛡️ Pen Test Potential: How Organizations Are Missing Out on Fortifying the SOC 🛡️
20:08
20:08
Play later
Play later
Lists
Like
Liked
20:08Got a question or comment? Message us here! What’s the real difference between a penetration test and a red team engagement, and how can each benefit your SOC? In this episode, Andrew is joined by Tanner, to unpack how pentests uncover vulnerabilities, how red teams stress-test defenders, and why every organization should be leveraging these exerci…
…
continue reading