Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Protocols Podcasts

show episodes
 
Artwork

1
The Azure Security Podcast

Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
  continue reading
 
Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!
  continue reading
 
Artwork
 
here i uh think and stuff about Grapheneos i forgot i have a Peertube site i run freedom.fossfarmers.company https://www.youtube.com/@notafbihoneypot8487 send me xmr 46toA11xGi15Zo3LnGdMjL9GJTPavic3EdderjyE7aU9KGFK38mZv1YSmjo8RoKPRohjRtubkiFxL3bVXABT7N2ZBdDocLD here is my link stack! https://glowinglist.linksta.cc/@notafbihoneypot.bsky.social my blog (still being worked on) blog.notafbihoneypot.com
  continue reading
 
Artwork

1
Blockcast

Blockhead

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Blockcast delivers unfiltered analysis of crypto's most compelling narratives. Each week, seasoned industry insider Takatoshi Shibayama sits down with founders, CEOs, and key players shaping the blockchain landscape to dissect emerging projects, market dynamics, and institutional moves. From trending protocols to strategic industry shifts, get an insider's take on the forces driving decentralized innovation and the decisions that matter. No fluff, no hype—just deep dives into what's really h ...
  continue reading
 
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
  continue reading
 
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
  continue reading
 
Artwork

1
The Trident

U.S. Naval War College

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Trident is produced by the Center on Irregular Warfare and Armed Groups (CIWAG). Director, Dave Brown, Col. (Retired), speaks with a variety of professionals, academics, and other experts to explore threats and challenges, in the international security environment, that both directly and indirectly relate to the field of irregular warfare.
  continue reading
 
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
  continue reading
 
Get exam-ready with the BareMetalCyber Audio Course, your on-demand guide to conquering the CompTIA Cloud+ (CV0-003). Each episode transforms complex topics like cloud design, deployment, security, and troubleshooting into clear, engaging lessons you can apply immediately. Produced by BareMetalCyber.com, where you’ll also find more prepcasts, books, and tools to fuel your certification success.
  continue reading
 
Artwork

1
Only Malware in the Building

DISCARDED | N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
  continue reading
 
Artwork

1
The Pirate Pod

Arrington Capital

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The PiratePod is a Web3 focused podcast from Arrington Capital where we set sail into the uncharted waters of Web3 entrepreneurship and those building the at the forefront of crypto. Episodes will celebrate and interview the bold risk-takers and adventurers who dare to defy the norm. These modern-day pirates are founders who lust after the thrill of venturing into the unknown and thrive on the exhilarating web3 startup life itself. We will dive into new apps, defi, trading, infrastructure, c ...
  continue reading
 
Artwork

1
Badge Cam Daily

Badge Cam Daily

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Badge Cam Daily: America's Premier Police Body Camera Analysis Podcast The only daily podcast dedicated to professional analysis of police body camera footage from across the United States. Badge Cam Daily delivers authoritative briefings on the most compelling law enforcement encounters, investigative techniques, and public safety incidents captured on body-worn cameras. What You'll Get: Daily 5-minute professional briefings on breaking body cam cases Expert analysis of police procedures, s ...
  continue reading
 
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
  continue reading
 
Artwork

1
Bloom Fireside

Bloom Protocol

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
On Bloom Fireside we speak with the partners and individuals helping us build the Bloom protocol, and working to get it in the hands of everyday people who will use it and benefit from it. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
Security issues are increasingly on the front burner for many individuals, corporates and Security practitioners. Whether it be kidnapping, banditry, terrorism, armed robbery etc. We all seem to know someone who has been a victim even when we personally have not
  continue reading
 
Artwork

1
Azure Friday

Scott Hanselman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Scott Hanselman every Friday as he engages one-on-one with the engineers who build the services that power Microsoft Azure as they demo capabilities, answer Scott's questions, and share their insights. Follow us at: friday.azure.com.
  continue reading
 
Artwork

1
JavaScript Jabber

Charles M Wood

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
  continue reading
 
Artwork

1
The Charlie Shrem Show

UntoldStories

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Bitcoin pioneer Charlie Shrem peels back the layers on the lives and backgrounds of the world's most impactful innovators. Centering around intimate narratives, Shrem uncovers a detailed, previously unspoken story of the genesis and evolution of bitcoin, cryptocurrency, artificial intelligence, and the web3 movements. Join Shrem as he journeys through the uncharted territories of tech revolutions, revealing the human side of the stories that shaped the digital world we live in today.
  continue reading
 
DeFi Watch's Chris Blec engages in honest conversations with DeFi teams about the transparency & decentralization of their decentralized finance applications & protocols. Support this podcast: https://podcasters.spotify.com/pod/show/proof-of-decentralization/support
  continue reading
 
Artwork

1
Manufacturing Hub

Vlad Romanov & Dave Griffith

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We bring you manufacturing news, insights, discuss opportunities, and cutting edge technologies. Our goal is to inform, educate, and inspire leaders and workers in manufacturing, automation, and related fields.
  continue reading
 
Artwork

1
Almost Diplomatic

Almost Diplomatic

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Almost Diplomatic is a podcast discussing geopolitics, national security and nonsense over beers. Disclaimer: The comments and views discussed in the podcast are our own and do not represent those of any entity we volunteer with or are employed by.
  continue reading
 
Artwork

1
Cryptography FM

Symbolic Software

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
  continue reading
 
In an increasingly unpredictable world, knowledge and preparation are your best defense. Brought to you by the Preparedness Protocol Experts (P.P.E Team), this is an educational podcast delivering expert insights on Chemical, Biological, Radiological, and Nuclear (CBRN) threats, cutting-edge survival tactics, and comprehensive disaster preparedness strategies for today's complex risk landscape. Each episode features in-depth analysis of historical disasters, emerging threats, practical survi ...
  continue reading
 
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
  continue reading
 
Asterdex is quickly becoming a preferred cryptocurrency exchange due to its user-friendly interface, low fees, and secure platform. Whether you're a beginner looking to take your first step into the world of crypto trading or an experienced trader looking for a more efficient platform, Asterdex offers a robust solution. The platform is known for its intuitive design, low fees, and a range of cryptocurrencies to trade. However, what really sets it apart is its referral program, offering new u ...
  continue reading
 
Artwork

1
Network Security

University of Twente

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
Artwork

1
Boys Club

Boys Club

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This is a podcast for the deeply online, where we chat about all things tech, crypto, and pop culture news. Brought to you by Boys Club, a NY-based media and creative studio, and hosted by Deana Burke and Natasha Hoskins. Have questions? So do we.
  continue reading
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Biconomy is revolutionizing the world of decentralized finance (DeFi) by offering a platform that makes cryptocurrency trading more accessible, efficient, and cost-effective. By leveraging innovative blockchain solutions, Biconomy simplifies interactions with various blockchain networks, helping users trade seamlessly across different assets. Whether you're new to crypto or an experienced trader looking for an easier and more affordable platform, Biconomy delivers all of that and more. Now, ...
  continue reading
 
Artwork

1
Health Unchained Podcast

Health Unchained Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Health Unchained dives into healthcare projects enabled by blockchain technology. Listen to healthcare leaders, executives, entrepreneurs, researchers, and medical professionals who share their insights and experience.
  continue reading
 
Artwork
 
Shadow Me Next! is a podcast where we take you behind the scenes of the medical world. I'm Ashley Love, a Physician Assistant, and I will be sharing my journey in medicine and exploring the lives of various healthcare professionals. Each episode, I'll interview doctors, NPs, PAs, nurses, and allied health workers, uncovering their unique stories, the joys and challenges they face, and what drives them in their careers. Whether you're a pre-med student or simply curious about the healthcare f ...
  continue reading
 
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
  continue reading
 
Cryptocurrency trading offers immense potential for profit, but it can also come with significant costs in the form of trading fees. If you are an active trader, you know how quickly these fees can accumulate and eat into your profits. Thankfully, Based One, a leading cryptocurrency exchange, is offering an exclusive opportunity to reduce your trading fees through its Referral Code “REBATE”. By entering this code during registration, new users can enjoy a 10% discount on trading fees, allowi ...
  continue reading
 
Artwork
 
Breaking Point – Tensions at Home and Abroad March 18, 2025 | Your Voice – Voices of America Podcast Good morning, America! Today’s episode of Your Voice delivers the stories shaping our world—from escalating conflicts overseas to major political shake-ups right here at home. Buckle up, because this one’s packed with breaking news, critical insights, and the bold discussions you’ve come to expect. 🔥 Middle East on Edge: Overnight Israeli airstrikes hit multiple targets in Gaza following rene ...
  continue reading
 
Welcome to the Guide to Short-Term Rental (STR) Management, a resource tailored for professional property managers. Unlike casual hosting, this role demands business expertise, profitability focus, and consistent value delivery to property owners. Laying the Foundation Start by establishing a strong legal and financial structure. Secure essential insurance policies like General Liability and Errors & Omissions (Professional Liability). Understand licensing and zoning rules by region, address ...
  continue reading
 
Loading …
show series
 
Legacy Windows protocols still expose theft Fortra admits exploitation of GoAnywhere defect Taiwan claims surge in Chinese attack efforts Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old to…
  continue reading
 
F5 Networks, which provides cybersecurity defenses to most of the Fortune 500, said the DOJ allowed it to delay notifying the public on national security grounds. Semiconductor firm Arm is partnering with Meta to enhance the social media company's AI systems amid an unprecedented infrastructure buildout. Learn more about your ad choices. Visit podc…
  continue reading
 
Modern software platforms are increasingly composed of diverse microservices, third-party APIs, and cloud resources. The distributed nature of these systems makes it difficult for engineers to gain a clear view of how their systems behave, which can slow down troubleshooting and increase operational risk. groundcover is an observability platform th…
  continue reading
 
MANGO discloses data breach Threat group 'Jewelbug' infiltrates Russian IT network F5 discloses breach tied to nation-state threat actor Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old too…
  continue reading
 
This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠ , ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal ex…
  continue reading
 
OpenAI says it will soon roll back some of ChatGPT's safeguards, and even allow the chatbot to engage in erotica for adult users. Waymo already has ties to the UK, which began after the autonomous vehicle technology company acquired Latent Logic in 2019. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
“Quantum computing is taking the laws of nature — light, heat, entanglement — and turning them into a new kind of computer. When that happens, the way we think about Bitcoin’s security will have to change forever.” — Charlie Shrem This week on The Charlie Shrem Show, we go deep into the strangest frontier yet: the intersection of Bitcoin, cryptogra…
  continue reading
 
Walmart is partnering with OpenAI to let shoppers buy products directly through ChatGPT. The new integration will allow users to link their Walmart accounts, browse items ,and instantly check out — all within the chatbot. Designed for one-on-one meetings, the tool lets you insert available time slots directly into an email, automatically creating a…
  continue reading
 
SpaceX said farewell to its V2 on Monday night as it sent Starship’s current configuration on one last test flight, in a mission that the company says hit all its key goals, moving the program into its next phase. ecurity researchers have discovered that as many as half of all geostationary satellites in Earth’s orbit are carrying unencrypted sensi…
  continue reading
 
Florian Gilcher, co-founder of Ferrous Systems and the Rust Foundation, speaks with host Giovanni Asproni about the application of Rust in mission- and safety-critical systems. The discussion starts with a brief overview of such systems, and an introduction to Rust, emphasizing aspects that make it well-suited for critical environments. Florian and…
  continue reading
 
In this highly anticipated follow-up from "Episode 31", hosts Kyle Dando and Bridgette Stone dive deeper into one of their most downloaded topics—the Cyber Resilience Act (CRA). Joined by NXP's Cybersecurity Certification expert, Carlos Serratos, they uncover the intricacies of CRA, its impact on various industries, and how NXP is supporting custom…
  continue reading
 
Oura's chief commercial officer doesn't seem particularly worried about capturing every demographic. Instead, she's focused on keeping Oura’s core users happy while organically attracting new segments. And young women are becoming part of that core market. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
Dynamic languages like Ruby, Python, and JavaScript determine the types of variables at runtime rather than at compile time. This flexibility allows for rapid development and concise code, but it also makes it harder to catch certain classes of bugs before execution. Type checkers for dynamic languages add structure and safety without compromising …
  continue reading
 
Please enjoy this encore of Word Notes. A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/abstraction-layer⁠ Audio reference link: “⁠What Is Abstraction in Computer Science,⁠” by Codexpanse, YouTube, 29 October 2018.…
  continue reading
 
Millions of records exposed in Salesforce data leak SimonMed breach grows from hundreds to over a million Dutch government freezes Chinese-owned chipmaker Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from u…
  continue reading
 
California Governor Gavin Newsom signed a landmark bill on Monday that regulates AI companion chatbots, making it the first state in the nation to require AI chatbot operators to implement safety protocols for AI companions The law is designed to protect children and vulnerable users from some of the harms associated with AI companion chatbot use. …
  continue reading
 
What if losing your “secure” job became the moment you claimed real freedom? That’s the turning point we explore with PA Fedna Morensi as she traces a winding path from athletic training and dance dreams to orthopedic surgery and a locum lifestyle that funds her time, not her burnout. We dig into the human side of medicine—identity, resilience, and…
  continue reading
 
On Friday, the technology giant announced a new feature that will automatically disable browser notifications for the websites you haven’t interacted with recently, disrupting their ability to pop up alerts and updates that you may no longer be interested in. the President declared Friday that he will impose a 100% tariff on all imports from China,…
  continue reading
 
Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old tools and manual processes? Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasing audit evidence, an…
  continue reading
 
In this episode, Sebastien is joined by Jelena Djuric, co-founder of Noble, a generic asset issuance chain built for the Cosmos ecosystem. Jelena shares her journey into crypto, which began with an interest in political science, leading her to discover Bitcoin's potential. She describes the origins of Noble, created to solve a critical need within …
  continue reading
 
Link to episode page This week’s Cyber Security Headlines - Week in Review is hosted by Rich Stroffolino with guests Mike Lockhart, CISO Eagleview, and Dustin Sachs, chief technologist at CyberRisk collaborative, and author of Behavioral Insights in Cybersecurity Thanks to our show sponsor, ThreatLocker Cybercriminals don’t knock — they sneak in th…
  continue reading
 
Political shifts might have set back the energy transition, but large investors are betting that renewables are at the future of energy. In other news, the CMA has designated Google as having "strategic market status" in the search and search advertising markets, which means the company has such "a substantial and entrenched" position that it requi…
  continue reading
 
Microsoft CEO Satya Nadella offered a glimpse of the "first of many" massive Nvidia AI systems it is rolling out, starting now. a16z’s Anish Acharya calls India office reports “entirely fake news!” Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
  continue reading
 
Azure outage blocks access to Microsoft 365 services and admin portals Major U.S. law firm suffers cyberattack Hacktivists aiming for critical infrastructure get pwned Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That’s what ThreatLock…
  continue reading
 
In town for Token2049, Fredrick Gregaard, CEO of the Cardano Foundation, joined host Takatoshi Shibayama in the studio to discuss the evolution of the crypto space, highlighting the importance of technology maturity and adoption challenges. He emphasized the need for digital identity management and the role of quantum security and AI in blockchain …
  continue reading
 
Discover ACA Dynamic Sessions, a versatile, container-based, low-latency compute platform that allows you to execute LLM-generated code securely and with low cold-start latency. Chapters 00:00 - Introduction 00:44 - Background 02:03 - Introduction to Dynamic Sessions 04:15 - Demo: using LangChain with Dynamic Sessions 07:30 - Demo: using Dynamic Se…
  continue reading
 
In this episode Michael, Sarah and Mark talk with guest Ryen Macababbad, Principal Security Program Manager at Microsoft about her current work on standardizing security terminology and taxonomy across Microsoft. Also, how getting terminology right is important to security, especially for those with neurodiverse conditions, such as autism. We also …
  continue reading
 
-The U.S.' top auto safety agency said it had identified more than 50 reports of FSD running red lights, crossing yellow lines, or making illegal turns. -Apple speaks out about how the Texas age assurance law was written, saying it affects the privacy of users. -SoundCloud is evolving into a more social platform with new features like playlists bas…
  continue reading
 
ICC 2025 was a clear level up for the Ignition community. In this conversation Vlad and Dave share on the ground insights from a week of packed sessions, vendor showcases, and ProveIt demonstrations that brought working integrations to life. They unpack why the move to a larger venue created more chances for deep technical conversations, how the co…
  continue reading
 
In this episode of JavaScript Jabber, I sit down with AWS’s Clare Liguori and Erik Hanchett to talk about Kiro, a brand-new AI-powered IDE that’s reimagining the way developers build software. We dive into how Kiro takes “AI-assisted coding” to a new level through spec-driven development — a process that focuses on defining requirements and collabo…
  continue reading
 
Welcome to Episode 412 of the Microsoft Cloud IT Pro Podcast. In this episode, we explore three announcements from Microsoft that are reshaping how security teams work with Sentinel. From a reimagined data architecture to AI integration and new visualization capabilities, Microsoft is doubling down on making security operations more intelligent, ef…
  continue reading
 
Hardware security modules (HSMs) sit at the core of digital trust, protecting transactions, PKI systems, and authentication. As quantum computing approaches, traditional HSMs face limits that can’t be solved by patching old hardware. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Bruno Couillard, CEO …
  continue reading
 
The rise of language-model coding assistants has led to the creation of the vibe coding paradigm. In this mode of software development, AI agents take a plain language prompt and generate entire applications, which dramatically lowers the barriers to entry and democratizes access to software creation. However, many enterprise environments have larg…
  continue reading
 
Google DeepMind’s AI agent finds and fixes vulnerabilities California law lets consumers universally opt out of data sharing China-Nexus actors weaponize 'Nezha' open source tool Huge thanks to our sponsor, ThreatLocker Cybercriminals don’t knock — they sneak in through the cracks other tools miss. That’s why organizations are turning to ThreatLock…
  continue reading
 
This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠ , ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits t…
  continue reading
 
Amey Desai, the Chief Technology Officer at Nexla, speaks with host Sriram Panyam about the Model Context Protocol (MCP) and its role in enabling agentic AI systems. The conversation begins with the fundamental challenge that led to MCP's creation: the proliferation of "spaghetti code" and custom integrations as developers tried to connect LLMs to …
  continue reading
 
Japanese investing conglomerate SoftBank Group is buying a robotics company as the financial behemoth says physical AI is its next frontier. SoftBank announced on Wednesday that it has acquired Zurich, Switzerland-based ABB Group’s robotics business unit for more than five billion dollars. The deal is subject to regulatory approval; SoftBank predic…
  continue reading
 
Are you wrestling with enterprise network complexity? Advanced features like traffic engineering, ultra-fast failover, and network slicing often mean piling on complex protocols. This podcast episode dives deep into Segment Routing over IPv6 (SRv6), a technology that promises to deliver these advanced capabilities while radically simplifying your n…
  continue reading
 
U.S. Immigration and Customs Enforcement paid eight hundred twenty five thousand dollars earlier this year to a company that manufactures vehicles equipped with various technologies for law enforcement, including fake cellphone towers known as “cell-site simulators,” which can be used to spy on nearby phones. Also, hackers working for the North Kor…
  continue reading
 
Send us a text How to Achieve Unmatched Credibility as a Facility Security Officer (FSO) Click link below to get FSO and NISPOM professional development opportunities Link to professional development In this video, Jeff Bennett, founder of Red Bike Publishing and NS Palm Central, shares his extensive experience and insights into professional develo…
  continue reading
 
Send us a text Achieving Unfair Advantage: Professional Development as an FSO Click link below to get your NISPOM and professional library. Link to NISPOM In this video, Jeff Bennett, founder of Red Bike Publishing, discusses how to build credibility and gain an advantage in professional development as a Facility Security Officer (FSO). Jeff shares…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play