Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

IoT Insiders Podcasts

show episodes
 
Artwork

1
IoT Unplugged

IoT insider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Tune into the Internet of Things. In this podcast IoT Insiders' editor digs into the world of IoT; an ever-changing swarth of industry experts with each episodes, IoT Unplugged promises to be an equally informative and intriguing auditory journey that will keep its listeners up to date with all the issues surrounding IoT today and tomorrow.
  continue reading
 
Artwork

1
IoT Leaders

Nick Earle, Executive Chairman, Eseye

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
IoT Leaders is a podcast from Eseye that shares real IoT stories from the field about digital transformation swings and misses, lessons learned, and innovation strategies that work.In each episode, you’ll hear our conversations with top digitization leaders on how IoT is changing the world for the better. Let IoT Leaders be your guide to IoT, digital transformation, and innovation. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Budget overruns. Bricked devices. Data breaches. Building connected products is hard. Join us every other Thursday for unfiltered conversations with executives about their AI journeys — the mistakes they made, the lessons they learned, and what they wish they’d known when they started. In each episode of Over the Air, our expert guests will make bold predictions, reveal unpopular opinions, and share stories you won’t hear anywhere else.
  continue reading
 
Tech Transformation with Evan Kirstel: A podcast exploring the latest trends and innovations in the tech industry, and how businesses can leverage them for growth, diving into the world of B2B, discussing strategies, trends, and sharing insights from industry leaders! With over three decades in telecom and IT, I've mastered the art of transforming social media into a dynamic platform for audience engagement, community building, and establishing thought leadership. My approach isn't about per ...
  continue reading
 
Artwork

1
Emerging Cyber Risk

Max Aulakh & Joel Yonts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
  continue reading
 
Artwork

1
The IoT Podcast

The IoT Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
IoT Talks and Tales The IoT Podcast is joined by the most influential leaders in IoT every Thursday to break down the current and up & coming IoT trends, unravel the misconceptions, doubts and forecast predictions on the ongoing journey for the Internet of Things. This podcast will have something for everyone, whether you’re an entrepreneur searching for fresh ideas or the lessons learned, an engineer always looking to be one step ahead with the latest solutions, or someone with a pure enthu ...
  continue reading
 
Artwork

1
Embedded Insiders

Embedded Computing Design

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Assistant Managing Editor, and Ken Briodagh, Editor-in-Chief of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology m ...
  continue reading
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Artwork

1
alphalist.CTO Podcast - For CTOs and Technical Leaders

Tobias Schlottke - alphalist CTO Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This podcast features interviews of CTOs and other technical leadership figures and topics range from technology (AI, blockchain, cyber, DevOps, Web Architecture, etc.) to management (e.g. scaling, structuring teams, mentoring, technical recruiting, product etc.). Guests from leading tech companies share their best practices and knowledge. The goal is to support other CTOs on their journey through tech and engineering, inspire and allow a sneak-peek into other successful companies to underst ...
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
At Accenture, we work at the frontier of the technology defining our lives today and tomorrow. Tune in to hear our people share opinions and perspectives on the technology trends impacting our world, their own experiences on the front line of innovation, and how Accenture is harnessing the potential of these technologies to create meaningful change.
  continue reading
 
The public transport industry is undergoing rapid change, from decarbonisation and sustainability goals to the fast-paced evolution of digital technology. Mobility Redefined is the podcast for senior managers, executives, and decision-makers who are leading this transformation. Hosted by Dr Kaan Yildizgöz, Executive Director at Modaxo, each episode brings expert insights on the challenges and opportunities facing the transport sector today. From digitalisation and workforce development to cu ...
  continue reading
 
Artwork

1
Smart People Podcast

Smart People Industries

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Smart People Podcast is a biweekly, interview-based podcast that features today's most well respected thought leaders engaging in authentic, insightful conversation for the benefit of the listener. The host, Chris Stemp, and his co-host/producer Jon Rojas, utilize their insatiable curiosity and relatable charm to provoke their guests into giving the interview of a lifetime. Every single guest has achieved a high level of recognition within their arena and in doing so has collected a wealth o ...
  continue reading
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
A monthly podcast for physical security professionals to hear from leading figures and influencers in the industry and gain valuable insight into the sector’s latest trends and initiatives, as well as the many challenges facing the profession and how they can be overcome. On the agenda will be everything from security technology, such as video surveillance and access control, through to risk management strategies and building a holistic security organisational culture – and plenty more!
  continue reading
 
Artwork
 
This is The Internet Report, a podcast uncovering what’s working and what’s breaking on the Internet—and why. Tune in to hear ThousandEyes’ Internet experts dig into some of the most interesting outage events from the past couple weeks, discussing what went awry—was it the Internet, or an application issue? Plus, learn about the latest trends in ISP outages, cloud network outages, collaboration network outages, and more.
  continue reading
 
The UPSTACK Podcast is an ever-evolving conversation on all things digital infrastructure, giving CTOs, CIOs, CISOs and other tech leaders "food for thought” as they push to stay ahead of the technology curve. Greg Moss, UPSTACK’s Partner and Managing Director, invites guests to talk candidly about the latest technology infrastructure topics. Co-hosted by SVP of Marketing, Alex Cole, this is sure to be a podcast worth listening to.
  continue reading
 
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
  continue reading
 
Artwork

1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™

Startuprad.io – Europe’s Startup & VC Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
  continue reading
 
Loading …
show series
 
Send us a text In this episode of Embedded Insiders, the VP of Sales and Business Development at Gateworks Corporation, Kelly Peralta, joins me to discuss the trends, challenges, and innovations surrounding Wi-Fi HaLow for industrial and IoT applications. The next segment is sponsored by Analog Devices, and Contributing Editor, Rich Nass, and Analo…
  continue reading
 
Interested in being a guest? Email us at [email protected] What if your marketing stack could think with you and act for you? We sit down with Christian Monberg Chief Technology Officer & Head of Product from Zeta to unpack Athena, a super intelligent agent designed not as a chat add-on but as the operating system for modern marketing. Built on…
  continue reading
 
For the final episode of Over the Air, Nick Petersen, Division Director at FortifyIt, joins to share how he transformed a traditional loading dock equipment company into an intelligent IoT platform—in just 21 months. Learn about choosing edge computing for 10-year battery life, managing hardware development in rugged environments, and navigating ma…
  continue reading
 
Get an inside perspective on how autonomous AI agents are reshaping the Internet, and what that means for the future of data, resilience, and digital innovation. We’ll chat about the new requirements for agentic AI success that call for a significant shift in priorities for NetOps teams. CHAPTERS 00:00 Intro 00:56 About Agentic AI 02:41 Data Qualit…
  continue reading
 
Interested in being a guest? Email us at [email protected] Hype is loud, but outcomes win. We sit down with Smartling CEO Bryan Murphy to explore why the center of gravity in AI is shifting from raw models to the application layer where workflows, data, and governance translate into real business value. If you’ve been stuck in pilot purgatory, …
  continue reading
 
What if the biggest cyber risk inside your company wasn’t malware — but identity? In this episode, I sit down with Santhosh Jayaprakash, founder & CEO of UnoSecur, to unpack one of the fastest-moving transformations in cybersecurity: the rise of identity as the new perimeter. Attackers don’t break in anymore — they log in. And with AI agents, LLM w…
  continue reading
 
In the security news: Cloudflare was down, it was not good Logitech breached The largest data breach in history? Fortinet Fortiweb - the saga continues Hacking Linux through your malware scanner, oh the irony I never stopped hating systemd The ASUS exploit that never existed If iRobot fails, can we deploy our own hacker bot army? Firmware encryptio…
  continue reading
 
Send us a text On this episode of Embedded Insiders, Rich is joined by Brandon Hansen, COO & CFO at Sealevel Systems, in a sponsored segment to discuss breaking down silos in design teams and the importance of looking at the bigger picture. Next, Rich and Jerry Chen, Founder and CEO of Upbeat Technology, discuss how the company is taking a differen…
  continue reading
 
Interested in being a guest? Email us at [email protected] Your most powerful product might also be your biggest liability: an AI agent making decisions you can’t see and answers you can’t predict. We sat down with Andre Scott of Coralogix to unpack how to make black-box systems measurable, accountable, and—most importantly—improvable over time…
  continue reading
 
Got a question or comment? Message us here! A new zero-day. 63 flaws. Endless patching chaos. This week’s #SOCBrief breaks down Microsoft’s November Patch Tuesday and what it means for your SOC. We’ll cover the top critical CVEs, patching priorities, and how to keep your systems resilient before attackers strike. Support the show Watch full episode…
  continue reading
 
Interested in being a guest? Email us at [email protected] Telecom doesn’t need another AI science project; it needs outcomes. That’s the thread running through our conversation with kishore bobbarjung from Tupl, where explainable, agentic automation is delivering real wins: faster resolution of customer issues at a US tier one and double-digit…
  continue reading
 
It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
  continue reading
 
Interested in being a guest? Email us at [email protected] Tired of chatbots that stall when customers need real help? We dive into how agentic AI flips the script by taking actions inside your systems—issuing refunds within limits, updating orders, authenticating users, and escalating with intent—while humans handle complex, high-empathy momen…
  continue reading
 
Just what’s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could you find out? The answer is a Software Bill of Materials, or SBOM, a machine-readable inventory of a finished piece of software. Why should you care about SBOMs? Our guest, Natalie Somersall, is here... …
  continue reading
 
Send us fan mail! Hello to all our Cyber Squirrels! Host Selena Larson, and guest host, Tim Kromphardt sit down with Tony Robinson — Senior Security Research Engineer and “rule magician” from Proofpoint’s Emerging Threats team. Tony shares the story behind IoT Hunter, an open-source tool he created to automate writing detection rules for Internet o…
  continue reading
 
🎧 IoT Unplugged Season 7, Episode 10 is now live! ⏰ In the final episode of the series, IoT Insider Editor Lucy Barnard is joined by Valentin Keller, IoT Solutions Engineer at akenza.io, and Hrafn Guðbrandsson, Director of Data Driven Solutions at Rafal, to explore how smart power solutions are transforming energy management in Iceland…
  continue reading
 
Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
  continue reading
 
Interested in being a guest? Email us at [email protected] Trust has become the entry ticket to the internet, and users are now choosing safety over price and speed. We sit down with Raj from Trua to dig into the 2025 Trust Survey and why verification has shifted from a nice-to-have to a must-have. From shocking stats on consumer expectations t…
  continue reading
 
Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
  continue reading
 
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-529
  continue reading
 
Interested in being a guest? Email us at [email protected] What if the most human-feeling teammates on your projects moved at machine speed and collaborated across every vendor you use? We sit down with Vijoy Pandey is GM and Senior Vice President of Outshift to unpack how agentic AI and quantum networking move from shiny demos to dependable, s…
  continue reading
 
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
  continue reading
 
Interested in being a guest? Email us at [email protected] Cameras don’t just record anymore—they inform, alert, and help teams act before problems get expensive. We sit down with Jeff Corrall Chief Product Officer at March Networks, to unpack how AI-powered video is evolving from security footage to real operational intelligence you can search…
  continue reading
 
Interested in being a guest? Email us at [email protected] What if your network could understand intent, adapt in real time, and deliver the exact experience you need—whether you’re at a packed concert, inside an ambulance, or running a factory floor? We dive into the shift from manual engineering to autonomous networks and how open standards a…
  continue reading
 
From Alexa to LLMs: Platform experiments, distribution challenges, and how AI is democratizing feature development in travel tech Tradegate Direct: Europe's most direct online broker – trade for free, efficiently, and directly on the stock exchange. Trade directly here In this episode, Matthias Keller (CPO @ Kayak) shares strategic lessons about ma…
  continue reading
 
Got a question or comment? Message us here! This week, we’re digging into a case where ransomware negotiators allegedly became the attackers themselves, leveraging insider access to hit organizations they were supposed to help. This one raises real questions about trust, vendor oversight, and the human element in incident response. We break down wh…
  continue reading
 
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
  continue reading
 
Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
  continue reading
 
Got a question or comment? Message us here! In this episode, we break down the real mechanics of social engineering, from phishing emails and text scams to vishing calls and full-on physical pen tests. We share stories from the field, including how attackers build trust, why confidence is often more effective than technical skill, and what happens …
  continue reading
 
Interested in being a guest? Email us at [email protected] What happens when thousands of retired Ethereum GPUs meet a tidal wave of AI demand? We sit down with Hidde Hoogland Founder at Decent to unpack how a former mining operation evolved into a decentralized edge provider and why connecting to Aethir’s GPU marketplace changed the math on ut…
  continue reading
 
Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS... Read more »…
  continue reading
 
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
  continue reading
 
Interested in being a guest? Email us at [email protected] Customers don’t call to chat with a bot—they want outcomes. In my chat with Jim Palmer Dialpad's Chief AI Officer we dive into how Dialpad’s AI-first platform turns real-time voice, video, and digital interactions into agentic workflows that act on behalf of users, learn from every resu…
  continue reading
 
Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
  continue reading
 
🌐 Business Compass LLC Language ServicesEmpowering Global Communication Through AI-Driven Language Intelligence Business Compass LLC delivers next-generation Language Services that transform the way organizations communicate, understand, and interact across languages and media. Our AI-driven platform supports text, audio, and video processing—enabl…
  continue reading
 
The demands of AI workloads are reshaping Internet infrastructure, giving rise to a more distributed model and resulting in an increasingly complex service delivery chain for NetOps teams to manage. Tune in to the full episode to learn more or use the chapters below to skip to the sections that you find most interesting. CHAPTERS 00:00 Intro 00:53 …
  continue reading
 
Interested in being a guest? Email us at [email protected] Most brands pay again and again to win back customers they already won. We wanted to fix that. In this candid conversation with Sandeep Menon Co-Founder Auxia we unpack how an agentic AI platform can sit on top of rich first-party data and finally make it work: autonomous decisions abou…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
Interested in being a guest? Email us at [email protected] AI is moving faster than any wave we’ve seen—and the hidden cost is complexity. We sit down with New Relic’s leadership to unpack how observability must evolve to keep up with agents, vibe coding, and probabilistic systems that don’t fail like traditional software. From the early SaaS d…
  continue reading
 
Got a question or comment? Message us here! 🎙️ A new threat is making waves ... Atroposia RAT, a remote access trojan that doesn’t just infiltrate systems but scans them for vulnerabilities to exploit further. In this episode, we break down how this modular malware operates, how it hides, and why its built-in scanner is a game-changer for attackers…
  continue reading
 
Interested in being a guest? Email us at [email protected] What if your contact center could speak 46 languages, automate millions of calls, and still hand tricky moments to the right human in seconds? We dig into the launch of Teneo 8 with CEO Per Ottosson and reveal how a hybrid AI approach—combining LLM-powered conversation with deterministi…
  continue reading
 
Did you know college students are snooping on satellite transmissions? On today’s news roundup we discuss new research in which university investigators use off-the-shelf equipment to intercept traffic from geostationary satellites and discover that a lot of it is unencrypted. We also dig into the credential hygiene lessons we can learn from a corp…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play