Tune into the Internet of Things. In this podcast IoT Insiders' editor digs into the world of IoT; an ever-changing swarth of industry experts with each episodes, IoT Unplugged promises to be an equally informative and intriguing auditory journey that will keep its listeners up to date with all the issues surrounding IoT today and tomorrow.
…
continue reading
IoT Insiders Podcasts
IoT Leaders is a podcast from Eseye that shares real IoT stories from the field about digital transformation swings and misses, lessons learned, and innovation strategies that work.In each episode, you’ll hear our conversations with top digitization leaders on how IoT is changing the world for the better. Let IoT Leaders be your guide to IoT, digital transformation, and innovation. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Budget overruns. Bricked devices. Data breaches. Building connected products is hard. Join us every other Thursday for unfiltered conversations with executives about their AI journeys — the mistakes they made, the lessons they learned, and what they wish they’d known when they started. In each episode of Over the Air, our expert guests will make bold predictions, reveal unpopular opinions, and share stories you won’t hear anywhere else.
…
continue reading
Tech Transformation with Evan Kirstel: A podcast exploring the latest trends and innovations in the tech industry, and how businesses can leverage them for growth, diving into the world of B2B, discussing strategies, trends, and sharing insights from industry leaders! With over three decades in telecom and IT, I've mastered the art of transforming social media into a dynamic platform for audience engagement, community building, and establishing thought leadership. My approach isn't about per ...
…
continue reading
Arman Dezfuli-Arjomandi and guests discuss the fast-growing Helium network, providing worldwide coverage for mobile phones and IoT devices.
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
IoT Talks and Tales The IoT Podcast is joined by the most influential leaders in IoT every Thursday to break down the current and up & coming IoT trends, unravel the misconceptions, doubts and forecast predictions on the ongoing journey for the Internet of Things. This podcast will have something for everyone, whether you’re an entrepreneur searching for fresh ideas or the lessons learned, an engineer always looking to be one step ahead with the latest solutions, or someone with a pure enthu ...
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Assistant Managing Editor, and Ken Briodagh, Editor-in-Chief of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology m ...
…
continue reading
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
…
continue reading
Podcast by The IT Insider
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
The Windows Insider Team is taking the podcast airwaves to share all things future of Windows, Insider community and beyond. Transcripts provided with each episode.
…
continue reading
This podcast features interviews of CTOs and other technical leadership figures and topics range from technology (AI, blockchain, cyber, DevOps, Web Architecture, etc.) to management (e.g. scaling, structuring teams, mentoring, technical recruiting, product etc.). Guests from leading tech companies share their best practices and knowledge. The goal is to support other CTOs on their journey through tech and engineering, inspire and allow a sneak-peek into other successful companies to underst ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
At Accenture, we work at the frontier of the technology defining our lives today and tomorrow. Tune in to hear our people share opinions and perspectives on the technology trends impacting our world, their own experiences on the front line of innovation, and how Accenture is harnessing the potential of these technologies to create meaningful change.
…
continue reading
The public transport industry is undergoing rapid change, from decarbonisation and sustainability goals to the fast-paced evolution of digital technology. Mobility Redefined is the podcast for senior managers, executives, and decision-makers who are leading this transformation. Hosted by Dr Kaan Yildizgöz, Executive Director at Modaxo, each episode brings expert insights on the challenges and opportunities facing the transport sector today. From digitalisation and workforce development to cu ...
…
continue reading
Smart People Podcast is a biweekly, interview-based podcast that features today's most well respected thought leaders engaging in authentic, insightful conversation for the benefit of the listener. The host, Chris Stemp, and his co-host/producer Jon Rojas, utilize their insatiable curiosity and relatable charm to provoke their guests into giving the interview of a lifetime. Every single guest has achieved a high level of recognition within their arena and in doing so has collected a wealth o ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
A monthly podcast for physical security professionals to hear from leading figures and influencers in the industry and gain valuable insight into the sector’s latest trends and initiatives, as well as the many challenges facing the profession and how they can be overcome. On the agenda will be everything from security technology, such as video surveillance and access control, through to risk management strategies and building a holistic security organisational culture – and plenty more!
…
continue reading
This is The Internet Report, a podcast uncovering what’s working and what’s breaking on the Internet—and why. Tune in to hear ThousandEyes’ Internet experts dig into some of the most interesting outage events from the past couple weeks, discussing what went awry—was it the Internet, or an application issue? Plus, learn about the latest trends in ISP outages, cloud network outages, collaboration network outages, and more.
…
continue reading
The UPSTACK Podcast is an ever-evolving conversation on all things digital infrastructure, giving CTOs, CIOs, CISOs and other tech leaders "food for thought” as they push to stay ahead of the technology curve. Greg Moss, UPSTACK’s Partner and Managing Director, invites guests to talk candidly about the latest technology infrastructure topics. Co-hosted by SVP of Marketing, Alex Cole, this is sure to be a podcast worth listening to.
…
continue reading
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
…
continue reading
1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™
Startuprad.io – Europe’s Startup & VC Podcast Network
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
…
continue reading
1
Accelerating Innovation: Wi-Fi HaLow for Industrial IoT & CodeFusion Studio for AI Development
24:33
24:33
Play later
Play later
Lists
Like
Liked
24:33Send us a text In this episode of Embedded Insiders, the VP of Sales and Business Development at Gateworks Corporation, Kelly Peralta, joins me to discuss the trends, challenges, and innovations surrounding Wi-Fi HaLow for industrial and IoT applications. The next segment is sponsored by Analog Devices, and Contributing Editor, Rich Nass, and Analo…
…
continue reading
1
From Channel-Centric To Consumer-Centric: The OS That Could Rewire Marketing
25:20
25:20
Play later
Play later
Lists
Like
Liked
25:20Interested in being a guest? Email us at [email protected] What if your marketing stack could think with you and act for you? We sit down with Christian Monberg Chief Technology Officer & Head of Product from Zeta to unpack Athena, a super intelligent agent designed not as a chat add-on but as the operating system for modern marketing. Built on…
…
continue reading
1
Leading Digital Transformation in Industrial America ft. Nick Petersen
34:11
34:11
Play later
Play later
Lists
Like
Liked
34:11For the final episode of Over the Air, Nick Petersen, Division Director at FortifyIt, joins to share how he transformed a traditional loading dock equipment company into an intelligent IoT platform—in just 21 months. Learn about choosing edge computing for 10-year battery life, managing hardware development in rugged environments, and navigating ma…
…
continue reading
1
Inside Agentic AI: The New Digital Citizens Reshaping the Internet & NetOps
15:53
15:53
Play later
Play later
Lists
Like
Liked
15:53Get an inside perspective on how autonomous AI agents are reshaping the Internet, and what that means for the future of data, resilience, and digital innovation. We’ll chat about the new requirements for agentic AI success that call for a significant shift in priorities for NetOps teams. CHAPTERS 00:00 Intro 00:56 About Agentic AI 02:41 Data Qualit…
…
continue reading
1
Emoticons, Sonicwall, Global Protect, Pop ups, WhatsApp, 7Zip, Roblox, Josh Marpet... - SWN #531
33:56
33:56
Play later
Play later
Lists
Like
Liked
33:56Emoticons, Sonicwall, Global Protect, Pop-ups, WhatsApp, 7Zip, Roblox, Josh Marpet, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-531
…
continue reading
Interested in being a guest? Email us at [email protected] Hype is loud, but outcomes win. We sit down with Smartling CEO Bryan Murphy to explore why the center of gravity in AI is shifting from raw models to the application layer where workflows, data, and governance translate into real business value. If you’ve been stuck in pilot purgatory, …
…
continue reading
1
AI Agents Are the New Attackers — Inside the Identity Security Platform Built for 2025
40:41
40:41
Play later
Play later
Lists
Like
Liked
40:41What if the biggest cyber risk inside your company wasn’t malware — but identity? In this episode, I sit down with Santhosh Jayaprakash, founder & CEO of UnoSecur, to unpack one of the fastest-moving transformations in cybersecurity: the rise of identity as the new perimeter. Attackers don’t break in anymore — they log in. And with AI agents, LLM w…
…
continue reading
1
Give Me Liberty or Linux, Badge Hacking Interview - Bryce Owen - PSW #901
2:09:41
2:09:41
Play later
Play later
Lists
Like
Liked
2:09:41In the security news: Cloudflare was down, it was not good Logitech breached The largest data breach in history? Fortinet Fortiweb - the saga continues Hacking Linux through your malware scanner, oh the irony I never stopped hating systemd The ASUS exploit that never existed If iRobot fails, can we deploy our own hacker bot army? Firmware encryptio…
…
continue reading
1
Breaking Down Silos with Sealevel Systems & embedded world North America 2025
33:10
33:10
Play later
Play later
Lists
Like
Liked
33:10Send us a text On this episode of Embedded Insiders, Rich is joined by Brandon Hansen, COO & CFO at Sealevel Systems, in a sponsored segment to discuss breaking down silos in design teams and the importance of looking at the bigger picture. Next, Rich and Jerry Chen, Founder and CEO of Upbeat Technology, discuss how the company is taking a differen…
…
continue reading
1
How AI Chatbots Go Off The Rails And What To Do About It
16:32
16:32
Play later
Play later
Lists
Like
Liked
16:32Interested in being a guest? Email us at [email protected] Your most powerful product might also be your biggest liability: an AI agent making decisions you can’t see and answers you can’t predict. We sat down with Andre Scott of Coralogix to unpack how to make black-box systems measurable, accountable, and—most importantly—improvable over time…
…
continue reading
1
Patch Tuesday: Zero-Day Alert and Patching Must-Dos ✅
7:11
7:11
Play later
Play later
Lists
Like
Liked
7:11Got a question or comment? Message us here! A new zero-day. 63 flaws. Endless patching chaos. This week’s #SOCBrief breaks down Microsoft’s November Patch Tuesday and what it means for your SOC. We’ll cover the top critical CVEs, patching priorities, and how to keep your systems resilient before attackers strike. Support the show Watch full episode…
…
continue reading
1
Inside Tupl’s Explainable, Agentic AI Transforming Global Telecom
22:08
22:08
Play later
Play later
Lists
Like
Liked
22:08Interested in being a guest? Email us at [email protected] Telecom doesn’t need another AI science project; it needs outcomes. That’s the thread running through our conversation with kishore bobbarjung from Tupl, where explainable, agentic automation is delivering real wins: faster resolution of customer issues at a US tier one and double-digit…
…
continue reading
🎧 IoT Unplugged Season 7, Episode 11 is now live!⏰ In this bonus episode of the series, IoT Insider's Editor was joined by Kirsten Newquist, CEO, Identiv, to explore the state of the RFID market.By IoT insider
…
continue reading
1
Health and Wellness of the CISO as They Crack Under Pressure and Need a BISO to Scale - Dr. Yonesy Núñez - BSW #422
56:46
56:46
Play later
Play later
Lists
Like
Liked
56:46It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
…
continue reading
1
Cloudflare, Gh0stRAT, npm, North Koreans, Arch, Steam, Documentaries, Aaran Leyland.. - SWN #530
35:24
35:24
Play later
Play later
Lists
Like
Liked
35:24Cloudflare, Gh0stRAT, npm, North Korean Employees, Arch Linux Steam Machine, Documentaries, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-530
…
continue reading
Interested in being a guest? Email us at [email protected] Tired of chatbots that stall when customers need real help? We dive into how agentic AI flips the script by taking actions inside your systems—issuing refunds within limits, updating orders, authenticating users, and escalating with intent—while humans handle complex, high-empathy momen…
…
continue reading
1
PP087: Why SBOMs Are Cooler and More Useful Than You Think
46:08
46:08
Play later
Play later
Lists
Like
Liked
46:08Just what’s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could you find out? The answer is a Software Bill of Materials, or SBOM, a machine-readable inventory of a finished piece of software. Why should you care about SBOMs? Our guest, Natalie Somersall, is here... …
…
continue reading
1
From Toasters to Botnets: Securing Everyday IoT
37:40
37:40
Play later
Play later
Lists
Like
Liked
37:40Send us fan mail! Hello to all our Cyber Squirrels! Host Selena Larson, and guest host, Tim Kromphardt sit down with Tony Robinson — Senior Security Research Engineer and “rule magician” from Proofpoint’s Emerging Threats team. Tony shares the story behind IoT Hunter, an open-source tool he created to automate writing detection rules for Internet o…
…
continue reading
🎧 IoT Unplugged Season 7, Episode 10 is now live! ⏰ In the final episode of the series, IoT Insider Editor Lucy Barnard is joined by Valentin Keller, IoT Solutions Engineer at akenza.io, and Hrafn Guðbrandsson, Director of Data Driven Solutions at Rafal, to explore how smart power solutions are transforming energy management in Iceland…
…
continue reading
1
Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
…
continue reading
1
If Identity Becomes Portable, Does Trust Become Universal?
27:10
27:10
Play later
Play later
Lists
Like
Liked
27:10Interested in being a guest? Email us at [email protected] Trust has become the entry ticket to the internet, and users are now choosing safety over price and speed. We sit down with Raj from Trua to dig into the 2025 Trust Survey and why verification has shifted from a nice-to-have to a must-have. From shocking stats on consumer expectations t…
…
continue reading
1
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433
1:56:49
1:56:49
Play later
Play later
Lists
Like
Liked
1:56:49Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
…
continue reading
1
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, More... - SWN #529
28:45
28:45
Play later
Play later
Lists
Like
Liked
28:45Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-529
…
continue reading
1
Cisco’s Incubation Engine For Agentic AI And Quantum Networking
24:34
24:34
Play later
Play later
Lists
Like
Liked
24:34Interested in being a guest? Email us at [email protected] What if the most human-feeling teammates on your projects moved at machine speed and collaborated across every vendor you use? We sit down with Vijoy Pandey is GM and Senior Vice President of Outshift to unpack how agentic AI and quantum networking move from shiny demos to dependable, s…
…
continue reading
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
…
continue reading
1
From Surveillance To Smarter Stores With AI
17:34
17:34
Play later
Play later
Lists
Like
Liked
17:34Interested in being a guest? Email us at [email protected] Cameras don’t just record anymore—they inform, alert, and help teams act before problems get expensive. We sit down with Jeff Corrall Chief Product Officer at March Networks, to unpack how AI-powered video is evolving from security footage to real operational intelligence you can search…
…
continue reading
Interested in being a guest? Email us at [email protected] What if your network could understand intent, adapt in real time, and deliver the exact experience you need—whether you’re at a packed concert, inside an ambulance, or running a factory floor? We dive into the shift from manual engineering to autonomous networks and how open standards a…
…
continue reading
1
#131 - AI Product Strategy: When to Build and When to Wait with Matthias Keller // CPO @ Kayak
51:41
51:41
Play later
Play later
Lists
Like
Liked
51:41From Alexa to LLMs: Platform experiments, distribution challenges, and how AI is democratizing feature development in travel tech Tradegate Direct: Europe's most direct online broker – trade for free, efficiently, and directly on the stock exchange. Trade directly here In this episode, Matthias Keller (CPO @ Kayak) shares strategic lessons about ma…
…
continue reading
1
⚠️ Insider Threats ⚠️: Ransomware Negotiators Gone Rogue
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12Got a question or comment? Message us here! This week, we’re digging into a case where ransomware negotiators allegedly became the attackers themselves, leveraging insider access to hit organizations they were supposed to help. This one raises real questions about trust, vendor oversight, and the human element in incident response. We break down wh…
…
continue reading
1
Securing Model Context Protocol as Companies Plan to Replace Entry Roles with AI - Rahul Parwani - BSW #421
58:59
58:59
Play later
Play later
Lists
Like
Liked
58:59As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
…
continue reading
1
Miles, 10/8 time, Lost Phones, Whisper Leak, Quantum Route, AI Galore, Rob Allen... - Rob Allen - SWN #528
39:46
39:46
Play later
Play later
Lists
Like
Liked
39:46Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
…
continue reading
Got a question or comment? Message us here! In this episode, we break down the real mechanics of social engineering, from phishing emails and text scams to vishing calls and full-on physical pen tests. We share stories from the field, including how attackers build trust, why confidence is often more effective than technical skill, and what happens …
…
continue reading
1
How A Decentralized GPU Network Beats The Cloud On Price And Flexibility
15:18
15:18
Play later
Play later
Lists
Like
Liked
15:18Interested in being a guest? Email us at [email protected] What happens when thousands of retired Ethereum GPUs meet a tidal wave of AI demand? We sit down with Hidde Hoogland Founder at Decent to unpack how a former mining operation evolved into a decentralized edge provider and why connecting to Aethir’s GPU marketplace changed the math on ut…
…
continue reading
1
PP086: Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates
44:39
44:39
Play later
Play later
Lists
Like
Liked
44:39Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS... Read more »…
…
continue reading
1
Ransomware, Defaults, and Proactive Defenses - Rob Allen - ASW #356
1:11:26
1:11:26
Play later
Play later
Lists
Like
Liked
1:11:26Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
…
continue reading
1
How Agentic AI Turns Calls Into Continuous Learning
27:21
27:21
Play later
Play later
Lists
Like
Liked
27:21Interested in being a guest? Email us at [email protected] Customers don’t call to chat with a bot—they want outcomes. In my chat with Jim Palmer Dialpad's Chief AI Officer we dive into how Dialpad’s AI-first platform turns real-time voice, video, and digital interactions into agentic workflows that act on behalf of users, learn from every resu…
…
continue reading
1
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432
1:38:17
1:38:17
Play later
Play later
Lists
Like
Liked
1:38:17Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
…
continue reading
🌐 Business Compass LLC Language ServicesEmpowering Global Communication Through AI-Driven Language Intelligence Business Compass LLC delivers next-generation Language Services that transform the way organizations communicate, understand, and interact across languages and media. Our AI-driven platform supports text, audio, and video processing—enabl…
…
continue reading
1
How AI Is Transforming the Internet Landscape
15:32
15:32
Play later
Play later
Lists
Like
Liked
15:32The demands of AI workloads are reshaping Internet infrastructure, giving rise to a more distributed model and resulting in an increasingly complex service delivery chain for NetOps teams to manage. Tune in to the full episode to learn more or use the chapters below to skip to the sections that you find most interesting. CHAPTERS 00:00 Intro 00:53 …
…
continue reading
1
AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune and Jason Wood - SWN #527
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40This week we have AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune, Jason Wood, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-527
…
continue reading
1
How An Agentic Platform Turns First-Party Data Into Loyalty
16:24
16:24
Play later
Play later
Lists
Like
Liked
16:24Interested in being a guest? Email us at [email protected] Most brands pay again and again to win back customers they already won. We wanted to fix that. In this candid conversation with Sandeep Menon Co-Founder Auxia we unpack how an agentic AI platform can sit on top of rich first-party data and finally make it work: autonomous decisions abou…
…
continue reading
1
Turning To The Darkside & AI Cyberslop - PSW #899
2:07:54
2:07:54
Play later
Play later
Lists
Like
Liked
2:07:54This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
…
continue reading
1
How Enterprises Turn AI Agents Into Real Value With Modern Observability
16:49
16:49
Play later
Play later
Lists
Like
Liked
16:49Interested in being a guest? Email us at [email protected] AI is moving faster than any wave we’ve seen—and the hidden cost is complexity. We sit down with New Relic’s leadership to unpack how observability must evolve to keep up with agents, vibe coding, and probabilistic systems that don’t fail like traditional software. From the early SaaS d…
…
continue reading
1
Atroposia RAT: The Malware That Scans for Its Own Exploits
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11Got a question or comment? Message us here! 🎙️ A new threat is making waves ... Atroposia RAT, a remote access trojan that doesn’t just infiltrate systems but scans them for vulnerabilities to exploit further. In this episode, we break down how this modular malware operates, how it hides, and why its built-in scanner is a game-changer for attackers…
…
continue reading
1
From IVR To AI: How Teneo 8 Scales Multilingual Contact Centers And Revenue
22:26
22:26
Play later
Play later
Lists
Like
Liked
22:26Interested in being a guest? Email us at [email protected] What if your contact center could speak 46 languages, automate millions of calls, and still hand tricky moments to the right human in seconds? We dig into the launch of Teneo 8 with CEO Per Ottosson and reveal how a hybrid AI approach—combining LLM-powered conversation with deterministi…
…
continue reading
1
PP085: News Roundup – Naked Satellite Signals, Account Recovery Buddies, Busting Ghost Networks
52:28
52:28
Play later
Play later
Lists
Like
Liked
52:28Did you know college students are snooping on satellite transmissions? On today’s news roundup we discuss new research in which university investigators use off-the-shelf equipment to intercept traffic from geostationary satellites and discover that a lot of it is unencrypted. We also dig into the credential hygiene lessons we can learn from a corp…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading