Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Security Protocols Podcasts
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading

1
DoD Secure-Working with National Industrial Security Program
jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC
Interviews and topics centering on security clearances and protecting classified information according to the National Industrial Security Clearance Operating Manual (NISPOM).
…
continue reading
Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
here i uh think and stuff about Grapheneos i forgot i have a Peertube site i run freedom.fossfarmers.company https://www.youtube.com/@notafbihoneypot8487 send me xmr 46toA11xGi15Zo3LnGdMjL9GJTPavic3EdderjyE7aU9KGFK38mZv1YSmjo8RoKPRohjRtubkiFxL3bVXABT7N2ZBdDocLD here is my link stack! https://glowinglist.linksta.cc/@notafbihoneypot.bsky.social my blog (still being worked on) blog.notafbihoneypot.com
…
continue reading
Blockcast delivers unfiltered analysis of crypto's most compelling narratives. Each week, seasoned industry insider Takatoshi Shibayama sits down with founders, CEOs, and key players shaping the blockchain landscape to dissect emerging projects, market dynamics, and institutional moves. From trending protocols to strategic industry shifts, get an insider's take on the forces driving decentralized innovation and the decisions that matter. No fluff, no hype—just deep dives into what's really h ...
…
continue reading
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
The Trident is produced by the Center on Irregular Warfare and Armed Groups (CIWAG). Director, Dave Brown, Col. (Retired), speaks with a variety of professionals, academics, and other experts to explore threats and challenges, in the international security environment, that both directly and indirectly relate to the field of irregular warfare.
…
continue reading
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
…
continue reading
Get exam-ready with the BareMetalCyber Audio Course, your on-demand guide to conquering the CompTIA Cloud+ (CV0-003). Each episode transforms complex topics like cloud design, deployment, security, and troubleshooting into clear, engaging lessons you can apply immediately. Produced by BareMetalCyber.com, where you’ll also find more prepcasts, books, and tools to fuel your certification success.
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
…
continue reading
The PiratePod is a Web3 focused podcast from Arrington Capital where we set sail into the uncharted waters of Web3 entrepreneurship and those building the at the forefront of crypto. Episodes will celebrate and interview the bold risk-takers and adventurers who dare to defy the norm. These modern-day pirates are founders who lust after the thrill of venturing into the unknown and thrive on the exhilarating web3 startup life itself. We will dive into new apps, defi, trading, infrastructure, c ...
…
continue reading
Badge Cam Daily: America's Premier Police Body Camera Analysis Podcast The only daily podcast dedicated to professional analysis of police body camera footage from across the United States. Badge Cam Daily delivers authoritative briefings on the most compelling law enforcement encounters, investigative techniques, and public safety incidents captured on body-worn cameras. What You'll Get: Daily 5-minute professional briefings on breaking body cam cases Expert analysis of police procedures, s ...
…
continue reading
Technical interviews about software topics.
…
continue reading
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
On Bloom Fireside we speak with the partners and individuals helping us build the Bloom protocol, and working to get it in the hands of everyday people who will use it and benefit from it. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Security issues are increasingly on the front burner for many individuals, corporates and Security practitioners. Whether it be kidnapping, banditry, terrorism, armed robbery etc. We all seem to know someone who has been a victim even when we personally have not
…
continue reading
This podcast features all things related to Information Security and Cyber Security
…
continue reading
The EdgeVerse Techcast goal is to increase awareness of resources available for customers developing with NXP Application Processors and Microcontrollers.
…
continue reading
Join Scott Hanselman every Friday as he engages one-on-one with the engineers who build the services that power Microsoft Azure as they demo capabilities, answer Scott's questions, and share their insights. Follow us at: friday.azure.com.
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
Bitcoin pioneer Charlie Shrem peels back the layers on the lives and backgrounds of the world's most impactful innovators. Centering around intimate narratives, Shrem uncovers a detailed, previously unspoken story of the genesis and evolution of bitcoin, cryptocurrency, artificial intelligence, and the web3 movements. Join Shrem as he journeys through the uncharted territories of tech revolutions, revealing the human side of the stories that shaped the digital world we live in today.
…
continue reading
DeFi Watch's Chris Blec engages in honest conversations with DeFi teams about the transparency & decentralization of their decentralized finance applications & protocols. Support this podcast: https://podcasters.spotify.com/pod/show/proof-of-decentralization/support
…
continue reading
Listen to articles handpicked by our editors, and stay updated on top technology news from TechCrunch.
…
continue reading
We bring you manufacturing news, insights, discuss opportunities, and cutting edge technologies. Our goal is to inform, educate, and inspire leaders and workers in manufacturing, automation, and related fields.
…
continue reading
Almost Diplomatic is a podcast discussing geopolitics, national security and nonsense over beers. Disclaimer: The comments and views discussed in the podcast are our own and do not represent those of any entity we volunteer with or are employed by.
…
continue reading
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
…
continue reading
In an increasingly unpredictable world, knowledge and preparation are your best defense. Brought to you by the Preparedness Protocol Experts (P.P.E Team), this is an educational podcast delivering expert insights on Chemical, Biological, Radiological, and Nuclear (CBRN) threats, cutting-edge survival tactics, and comprehensive disaster preparedness strategies for today's complex risk landscape. Each episode features in-depth analysis of historical disasters, emerging threats, practical survi ...
…
continue reading
Your Microsoft Cloud News from a couple of IT Pros
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
Asterdex is quickly becoming a preferred cryptocurrency exchange due to its user-friendly interface, low fees, and secure platform. Whether you're a beginner looking to take your first step into the world of crypto trading or an experienced trader looking for a more efficient platform, Asterdex offers a robust solution. The platform is known for its intuitive design, low fees, and a range of cryptocurrencies to trade. However, what really sets it apart is its referral program, offering new u ...
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
This is a podcast for the deeply online, where we chat about all things tech, crypto, and pop culture news. Brought to you by Boys Club, a NY-based media and creative studio, and hosted by Deana Burke and Natasha Hoskins. Have questions? So do we.
…
continue reading
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
…
continue reading
Biconomy is revolutionizing the world of decentralized finance (DeFi) by offering a platform that makes cryptocurrency trading more accessible, efficient, and cost-effective. By leveraging innovative blockchain solutions, Biconomy simplifies interactions with various blockchain networks, helping users trade seamlessly across different assets. Whether you're new to crypto or an experienced trader looking for an easier and more affordable platform, Biconomy delivers all of that and more. Now, ...
…
continue reading
Health Unchained dives into healthcare projects enabled by blockchain technology. Listen to healthcare leaders, executives, entrepreneurs, researchers, and medical professionals who share their insights and experience.
…
continue reading
Shadow Me Next! is a podcast where we take you behind the scenes of the medical world. I'm Ashley Love, a Physician Assistant, and I will be sharing my journey in medicine and exploring the lives of various healthcare professionals. Each episode, I'll interview doctors, NPs, PAs, nurses, and allied health workers, uncovering their unique stories, the joys and challenges they face, and what drives them in their careers. Whether you're a pre-med student or simply curious about the healthcare f ...
…
continue reading

1
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
Cryptocurrency trading offers immense potential for profit, but it can also come with significant costs in the form of trading fees. If you are an active trader, you know how quickly these fees can accumulate and eat into your profits. Thankfully, Based One, a leading cryptocurrency exchange, is offering an exclusive opportunity to reduce your trading fees through its Referral Code “REBATE”. By entering this code during registration, new users can enjoy a 10% discount on trading fees, allowi ...
…
continue reading
Exploring cross-chain composability in a multi-chain world. Composable is a bi-weekly podcast hosted by Alysia and Ellie. Brought to you by Espresso Pods.
…
continue reading
Breaking Point – Tensions at Home and Abroad March 18, 2025 | Your Voice – Voices of America Podcast Good morning, America! Today’s episode of Your Voice delivers the stories shaping our world—from escalating conflicts overseas to major political shake-ups right here at home. Buckle up, because this one’s packed with breaking news, critical insights, and the bold discussions you’ve come to expect. 🔥 Middle East on Edge: Overnight Israeli airstrikes hit multiple targets in Gaza following rene ...
…
continue reading
Welcome to the Guide to Short-Term Rental (STR) Management, a resource tailored for professional property managers. Unlike casual hosting, this role demands business expertise, profitability focus, and consistent value delivery to property owners. Laying the Foundation Start by establishing a strong legal and financial structure. Secure essential insurance policies like General Liability and Errors & Omissions (Professional Liability). Understand licensing and zoning rules by region, address ...
…
continue reading

1
Legacy Windows protocols expose theft, Fortra admits GoAnywhere defect, Taiwan claims surge in Chinese attacks
7:43
7:43
Play later
Play later
Lists
Like
Liked
7:43Legacy Windows protocols still expose theft Fortra admits exploitation of GoAnywhere defect Taiwan claims surge in Chinese attack efforts Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old to…
…
continue reading

1
Cyber giant F5 Networks says government hackers had ‘long-term’ access to its systems; also, Meta partners up with Arm to scale AI efforts
6:20
6:20
Play later
Play later
Lists
Like
Liked
6:20F5 Networks, which provides cybersecurity defenses to most of the Fortune 500, said the DOJ allowed it to delay notifying the public on national security grounds. Semiconductor firm Arm is partnering with Meta to enhance the social media company's AI systems amid an unprecedented infrastructure buildout. Learn more about your ad choices. Visit podc…
…
continue reading

1
Engineering in the Age of Agents with Yechezkel Rabinovich
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05Modern software platforms are increasingly composed of diverse microservices, third-party APIs, and cloud resources. The distributed nature of these systems makes it difficult for engineers to gain a clear view of how their systems behave, which can slow down troubleshooting and increase operational risk. groundcover is an observability platform th…
…
continue reading

1
MANGO discloses data breach, Jewelbug infiltrates Russian IT network, nation-state behind F5 attack?
8:50
8:50
Play later
Play later
Lists
Like
Liked
8:50MANGO discloses data breach Threat group 'Jewelbug' infiltrates Russian IT network F5 discloses breach tied to nation-state threat actor Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old too…
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal ex…
…
continue reading

1
ChatGPT will soon allow erotica for adult users; also, Waymo plans to launch a robotaxi service in London in 2026
8:57
8:57
Play later
Play later
Lists
Like
Liked
8:57OpenAI says it will soon roll back some of ChatGPT's safeguards, and even allow the chatbot to engage in erotica for adult users. Waymo already has ties to the UK, which began after the autonomous vehicle technology company acquired Latent Logic in 2019. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading

1
Why Bitcoin’s Biggest Threat- and Opportunity Might- Come from Quantum Physics
19:50
19:50
Play later
Play later
Lists
Like
Liked
19:50“Quantum computing is taking the laws of nature — light, heat, entanglement — and turning them into a new kind of computer. When that happens, the way we think about Bitcoin’s security will have to change forever.” — Charlie Shrem This week on The Charlie Shrem Show, we go deep into the strangest frontier yet: the intersection of Bitcoin, cryptogra…
…
continue reading

1
You’ll soon be able to shop Walmart from ChatGPT, also, Google’s Gemini can now help you schedule Google Calendar meetings
5:14
5:14
Play later
Play later
Lists
Like
Liked
5:14Walmart is partnering with OpenAI to let shoppers buy products directly through ChatGPT. The new integration will allow users to link their Walmart accounts, browse items ,and instantly check out — all within the chatbot. Designed for one-on-one meetings, the tool lets you insert available time slots directly into an email, automatically creating a…
…
continue reading

1
SpaceX wraps action-packed Starship V2 era, Satellites exposed unencrypted data, and Grindr’s owners may take it private
6:46
6:46
Play later
Play later
Lists
Like
Liked
6:46SpaceX said farewell to its V2 on Monday night as it sent Starship’s current configuration on one last test flight, in a mission that the company says hit all its key goals, moving the program into its next phase. ecurity researchers have discovered that as many as half of all geostationary satellites in Earth’s orbit are carrying unencrypted sensi…
…
continue reading

1
SE Radio 690: Florian Gilcher on Rust for Safety-Critical Systems
1:03:44
1:03:44
Play later
Play later
Lists
Like
Liked
1:03:44Florian Gilcher, co-founder of Ferrous Systems and the Rust Foundation, speaks with host Giovanni Asproni about the application of Rust in mission- and safety-critical systems. The discussion starts with a brief overview of such systems, and an introduction to Rust, emphasizing aspects that make it well-suited for critical environments. Florian and…
…
continue reading

1
Unpacking the Cyber Resilience Act with NXP Experts Part 2
12:16
12:16
Play later
Play later
Lists
Like
Liked
12:16In this highly anticipated follow-up from "Episode 31", hosts Kyle Dando and Bridgette Stone dive deeper into one of their most downloaded topics—the Cyber Resilience Act (CRA). Joined by NXP's Cybersecurity Certification expert, Carlos Serratos, they uncover the intricacies of CRA, its impact on various industries, and how NXP is supporting custom…
…
continue reading

1
Oura is winning young women and losing gym rats, and it’s fine with that
9:06
9:06
Play later
Play later
Lists
Like
Liked
9:06Oura's chief commercial officer doesn't seem particularly worried about capturing every demographic. Instead, she's focused on keeping Oura’s core users happy while organically attracting new segments. And young women are becoming part of that core market. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading

1
Static Analysis for Ruby with Jake Zimmerman
47:13
47:13
Play later
Play later
Lists
Like
Liked
47:13Dynamic languages like Ruby, Python, and JavaScript determine the types of variables at runtime rather than at compile time. This flexibility allows for rapid development and concise code, but it also makes it harder to catch certain classes of bugs before execution. Type checkers for dynamic languages add structure and safety without compromising …
…
continue reading
Please enjoy this encore of Word Notes. A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer Audio reference link: “What Is Abstraction in Computer Science,” by Codexpanse, YouTube, 29 October 2018.…
…
continue reading

1
Salesforce data leak, SimonMed breach, Chipmaker vs. Dutch government
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Millions of records exposed in Salesforce data leak SimonMed breach grows from hundreds to over a million Dutch government freezes Chinese-owned chipmaker Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from u…
…
continue reading
By Jason Edwards
…
continue reading

1
California becomes first state to regulate AI companion chatbots; plus, Salesforce announces Agentforce 360 as enterprise AI competition heats up
8:55
8:55
Play later
Play later
Lists
Like
Liked
8:55California Governor Gavin Newsom signed a landmark bill on Monday that regulates AI companion chatbots, making it the first state in the nation to require AI chatbot operators to implement safety protocols for AI companions The law is designed to protect children and vulnerable users from some of the harms associated with AI companion chatbot use. …
…
continue reading

1
46 - So You Think Job Security Exists? A Locums PA Says, "Hold My Severance." | Fedna Morency, PA-C
27:29
27:29
Play later
Play later
Lists
Like
Liked
27:29What if losing your “secure” job became the moment you claimed real freedom? That’s the turning point we explore with PA Fedna Morensi as she traces a winding path from athletic training and dance dreams to orthopedic surgery and a locum lifestyle that funds her time, not her burnout. We dig into the human side of medicine—identity, resilience, and…
…
continue reading

1
Google Chrome silences those pesky notifications; also, Trump fires back at China’s rare earth mineral restrictions by threatening 100% tariffs
5:11
5:11
Play later
Play later
Lists
Like
Liked
5:11On Friday, the technology giant announced a new feature that will automatically disable browser notifications for the websites you haven’t interacted with recently, disrupting their ability to pop up alerts and updates that you may no longer be interested in. the President declared Friday that he will impose a 100% tariff on all imports from China,…
…
continue reading

1
Velociraptor pushes LockBit, Spain dismantles crime group, SonicWall SSL VPN breach
8:40
8:40
Play later
Play later
Lists
Like
Liked
8:40Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old tools and manual processes? Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasing audit evidence, an…
…
continue reading

1
I am back, time to get a hardware wallet.
1:11:02
1:11:02
Play later
Play later
Lists
Like
Liked
1:11:02https://t.co/xLZPMSFTRhBy me, the man
…
continue reading

1
Noble: Solving Crypto's Liquidity Problem, One Chain at a Time - Jelena Djuric
41:26
41:26
Play later
Play later
Lists
Like
Liked
41:26In this episode, Sebastien is joined by Jelena Djuric, co-founder of Noble, a generic asset issuance chain built for the Cosmos ecosystem. Jelena shares her journey into crypto, which began with an interest in political science, leading her to discover Bitcoin's potential. She describes the origins of Noble, created to solve a critical need within …
…
continue reading

1
Week in Review: Crowdsourced ransomware campaign, Windows 10 woes, California opts out
38:50
38:50
Play later
Play later
Lists
Like
Liked
38:50Link to episode page This week’s Cyber Security Headlines - Week in Review is hosted by Rich Stroffolino with guests Mike Lockhart, CISO Eagleview, and Dustin Sachs, chief technologist at CyberRisk collaborative, and author of Behavioral Insights in Cybersecurity Thanks to our show sponsor, ThreatLocker Cybercriminals don’t knock — they sneak in th…
…
continue reading

1
Investors are betting $21 billion that the energy transition isn’t going away; also, UK slapped Google Search with special market status, making way for stricter regulations
8:01
8:01
Play later
Play later
Lists
Like
Liked
8:01Political shifts might have set back the energy transition, but large investors are betting that renewables are at the future of energy. In other news, the CMA has designated Google as having "strategic market status" in the search and search advertising markets, which means the company has such "a substantial and entrenched" position that it requi…
…
continue reading

1
Biconomy Invite Code “HAUU0B6PD” – Get $5000 Bonus + 25% Off on Trading Fees
2:36
2:36
Play later
Play later
Lists
Like
Liked
2:36Biconomy Invite Code “HAUU0B6PD” – Get $5000 Bonus + 25% Off on Trading FeesBy helpdesk8g
…
continue reading

1
While OpenAI races to build AI data centers, Nadella reminds us that Microsoft already has them; also, Andreessen Horowitz denies report of India office, calls it ‘fake news’
5:14
5:14
Play later
Play later
Lists
Like
Liked
5:14Microsoft CEO Satya Nadella offered a glimpse of the "first of many" massive Nvidia AI systems it is rolling out, starting now. a16z’s Anish Acharya calls India office reports “entirely fake news!” Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading

1
Microsoft Azure outage, law firm cyberattack, Russian hacktivists pwned
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34Azure outage blocks access to Microsoft 365 services and admin portals Major U.S. law firm suffers cyberattack Hacktivists aiming for critical infrastructure get pwned Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That’s what ThreatLock…
…
continue reading

1
Trends, Tokenization & Treasuries: Cardano's Frederik Gregaard Talks Enterprise Adoption
37:59
37:59
Play later
Play later
Lists
Like
Liked
37:59In town for Token2049, Fredrick Gregaard, CEO of the Cardano Foundation, joined host Takatoshi Shibayama in the studio to discuss the evolution of the crypto space, highlighting the importance of technology maturity and adoption challenges. He emphasized the need for digital identity management and the role of quantum security and AI in blockchain …
…
continue reading
Discover ACA Dynamic Sessions, a versatile, container-based, low-latency compute platform that allows you to execute LLM-generated code securely and with low cold-start latency. Chapters 00:00 - Introduction 00:44 - Background 02:03 - Introduction to Dynamic Sessions 04:15 - Demo: using LangChain with Dynamic Sessions 07:30 - Demo: using Dynamic Se…
…
continue reading

1
Episode 119: Pedantic Security Wording and Taxonomies
39:59
39:59
Play later
Play later
Lists
Like
Liked
39:59In this episode Michael, Sarah and Mark talk with guest Ryen Macababbad, Principal Security Program Manager at Microsoft about her current work on standardizing security terminology and taxonomy across Microsoft. Also, how getting terminology right is important to security, especially for those with neurodiverse conditions, such as autism. We also …
…
continue reading

1
Tesla’s FSD software under investigation; Apple prepares to comply with Texas law; and SoundCloud gets more social
8:21
8:21
Play later
Play later
Lists
Like
Liked
8:21-The U.S.' top auto safety agency said it had identified more than 50 reports of FSD running red lights, crossing yellow lines, or making illegal turns. -Apple speaks out about how the Texas age assurance law was written, saying it affects the privacy of users. -SoundCloud is evolving into a more social platform with new features like playlists bas…
…
continue reading

1
Ep. 231 - Travis Cox on Ignition 8.3 | ICC 2025 Highlights and the Future of Industrial Software
51:00
51:00
Play later
Play later
Lists
Like
Liked
51:00ICC 2025 was a clear level up for the Ignition community. In this conversation Vlad and Dave share on the ground insights from a week of packed sessions, vendor showcases, and ProveIt demonstrations that brought working integrations to life. They unpack why the move to a larger venue created more chances for deep technical conversations, how the co…
…
continue reading

1
Spec-Driven Development and the Future of AI IDEs with AWS’s Kiro - JSJ 693
43:55
43:55
Play later
Play later
Lists
Like
Liked
43:55In this episode of JavaScript Jabber, I sit down with AWS’s Clare Liguori and Erik Hanchett to talk about Kiro, a brand-new AI-powered IDE that’s reimagining the way developers build software. We dive into how Kiro takes “AI-assisted coding” to a new level through spec-driven development — a process that focuses on defining requirements and collabo…
…
continue reading

1
Episode 412 – Microsoft Sentinel Gets a Data Lake
32:16
32:16
Play later
Play later
Lists
Like
Liked
32:16Welcome to Episode 412 of the Microsoft Cloud IT Pro Podcast. In this episode, we explore three announcements from Microsoft that are reshaping how security teams work with Sentinel. From a reimagined data architecture to AI integration and new visualization capabilities, Microsoft is doubling down on making security operations more intelligent, ef…
…
continue reading

1
No-Regrets Migration: Why PKI Should Be Your First Move
32:33
32:33
Play later
Play later
Lists
Like
Liked
32:33Hardware security modules (HSMs) sit at the core of digital trust, protecting transactions, PKI systems, and authentication. As quantum computing approaches, traditional HSMs face limits that can’t be solved by patching old hardware. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Bruno Couillard, CEO …
…
continue reading

1
Here’s the tech powering ICE’s deportation crackdown
13:36
13:36
Play later
Play later
Lists
Like
Liked
13:36From phone spyware and facial recognition to phone unlocking technology and databases and more, this tech powers Trump's deportation machine. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading

1
Scaling AI in Enterprise Codebases with Guy Gur-Ari
52:05
52:05
Play later
Play later
Lists
Like
Liked
52:05The rise of language-model coding assistants has led to the creation of the vibe coding paradigm. In this mode of software development, AI agents take a plain language prompt and generate entire applications, which dramatically lowers the barriers to entry and democratizes access to software creation. However, many enterprise environments have larg…
…
continue reading

1
DeepMind fixes vulnerabilities, California offers data opt-out, China-Nexus targets open-source tool
7:46
7:46
Play later
Play later
Lists
Like
Liked
7:46Google DeepMind’s AI agent finds and fixes vulnerabilities California law lets consumers universally opt out of data sharing China-Nexus actors weaponize 'Nezha' open source tool Huge thanks to our sponsor, ThreatLocker Cybercriminals don’t knock — they sneak in through the cracks other tools miss. That’s why organizations are turning to ThreatLock…
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits t…
…
continue reading

1
SE Radio 689: Amey Desai on the Model Context Protocol
58:36
58:36
Play later
Play later
Lists
Like
Liked
58:36Amey Desai, the Chief Technology Officer at Nexla, speaks with host Sriram Panyam about the Model Context Protocol (MCP) and its role in enabling agentic AI systems. The conversation begins with the fundamental challenge that led to MCP's creation: the proliferation of "spaghetti code" and custom integrations as developers tried to connect LLMs to …
…
continue reading

1
SoftBank bulks up its robotics portfolio with ABB Group’s robotics unit; also, Square launches AI voice ordering and an integrated Bitcoin solution for merchants
6:50
6:50
Play later
Play later
Lists
Like
Liked
6:50Japanese investing conglomerate SoftBank Group is buying a robotics company as the financial behemoth says physical AI is its next frontier. SoftBank announced on Wednesday that it has acquired Zurich, Switzerland-based ABB Group’s robotics business unit for more than five billion dollars. The deal is subject to regulatory approval; SoftBank predic…
…
continue reading

1
Based One Referral Code “REBATE” – Get Flat 10% Off on Trading Fees
2:11
2:11
Play later
Play later
Lists
Like
Liked
2:11Based One Referral Code “REBATE” – Get Flat 10% Off on Trading FeesBy legal2
…
continue reading

1
SRv6 Explained: How Less Becomes More in Your Network
12:28
12:28
Play later
Play later
Lists
Like
Liked
12:28Are you wrestling with enterprise network complexity? Advanced features like traffic engineering, ultra-fast failover, and network slicing often mean piling on complex protocols. This podcast episode dives deep into Segment Routing over IPv6 (SRv6), a technology that promises to deliver these advanced capabilities while radically simplifying your n…
…
continue reading

1
ICE bought vehicles equipped with fake cell towers to spy on phones; also, North Korean hackers stole over $2 billion in crypto
8:37
8:37
Play later
Play later
Lists
Like
Liked
8:37U.S. Immigration and Customs Enforcement paid eight hundred twenty five thousand dollars earlier this year to a company that manufactures vehicles equipped with various technologies for law enforcement, including fake cellphone towers known as “cell-site simulators,” which can be used to spy on nearby phones. Also, hackers working for the North Kor…
…
continue reading

1
North Korean attackers steal crypto. Who's sending UK phones to China? Avnet confirms data breach
7:35
7:35
Play later
Play later
Lists
Like
Liked
7:35
…
continue reading

1
Deloitte goes all in on AI — despite having to issue a hefty refund for use of AI; plus Taylor Swift fans accuse singer of using AI in her Google scavenger hunt videos
6:40
6:40
Play later
Play later
Lists
Like
Liked
6:40By TechCrunch
…
continue reading

1
Gain an Absolutely Unfair Advantage of FSO Skills with Professional Development
17:02
17:02
Play later
Play later
Lists
Like
Liked
17:02Send us a text How to Achieve Unmatched Credibility as a Facility Security Officer (FSO) Click link below to get FSO and NISPOM professional development opportunities Link to professional development In this video, Jeff Bennett, founder of Red Bike Publishing and NS Palm Central, shares his extensive experience and insights into professional develo…
…
continue reading

1
Gain an Absolutely Unfair Advantage of FSO Skills With Your Copy of NISPOM
14:41
14:41
Play later
Play later
Lists
Like
Liked
14:41Send us a text Achieving Unfair Advantage: Professional Development as an FSO Click link below to get your NISPOM and professional library. Link to NISPOM In this video, Jeff Bennett, founder of Red Bike Publishing, discusses how to build credibility and gain an advantage in professional development as a Facility Security Officer (FSO). Jeff shares…
…
continue reading