Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Protocols Podcasts

Series
Series
Episodes
Language:
English
All languages
English
Afrikaans
Cymraeg
Dansk
Deutsch
Eesti
Español
Esperanto
Français
Gaeilge
Gàidhlig
Hrvatski
Indonesia
Khmer
Latviešu
Lietuvių
Malay
Nederlands
Norsk
Oʻzbekcha
Pyccĸий
Shqip
Slovenčina
Slovenščina
Suomi
Svenska
Tatar
Tiếng Việt
Türkçe
català
italiano
magyar
polski
português
română
rumantsch
Íslenska
Čeština
Ελληνικά
Български
Српски
Українська
беларуская
Қазақша
Հայերեն
עברית
اردو
العربية
فارسی
हिन्दी
বাংলা
ไทย
ქართული
中文
日本語
한국어
show episodes
 
A Podcast for Marvel Crisis Protocol, a tabletop miniatures game from Atomic Mass Games. HPP covers newly revealed characters with in-depth reviews of all of their abilities in an easy to digest format. HPP also dives deep on tactics and ways you can improve your competitive play, all while focusing on welcoming players of all skill levels. MCP is meant to be FUN and that’s what HPP likes to bring! Enjoy!
  continue reading
 
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: List ...
  continue reading
 
Artwork

1
CISO Tradecraft®

CISO Tradecraft®

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership. © Copyright 2025, National Security Corporation. All Rights Reserved
  continue reading
 
Artwork

1
The Trident

U.S. Naval War College

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Trident is produced by the Center on Irregular Warfare and Armed Groups (CIWAG). Director, Dave Brown, Col. (Retired), speaks with a variety of professionals, academics, and other experts to explore threats and challenges, in the international security environment, that both directly and indirectly relate to the field of irregular warfare.
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
In an increasingly unpredictable world, knowledge and preparation are your best defense. Brought to you by the Preparedness Protocol Experts (P.P.E Team), this is an educational podcast delivering expert insights on Chemical, Biological, Radiological, and Nuclear (CBRN) threats, cutting-edge survival tactics, and comprehensive disaster preparedness strategies for today's complex risk landscape. Each episode features in-depth analysis of historical disasters, emerging threats, practical survi ...
  continue reading
 
Artwork

1
Wireless Environmental Monitor

freezer temperature monitoring

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
The Wireless Environmental Monitor by TempGenius offers a highly reliable and scalable solution for facilities that demand precision in environmental tracking. Designed for industries like healthcare, pharmaceuticals, laboratories, and food services, this wireless monitoring system delivers real-time data to help maintain compliance, safety, and operational efficiency. Equipped with advanced sensors, TempGenius monitors critical metrics including temperature, humidity, air pressure, CO₂ leve ...
  continue reading
 
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
  continue reading
 
Artwork

1
Only Malware in the Building

DISCARDED | N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
  continue reading
 
Artwork

1
The Pirate Pod

Arrington Capital

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The PiratePod is a Web3 focused podcast from Arrington Capital where we set sail into the uncharted waters of Web3 entrepreneurship and those building the at the forefront of crypto. Episodes will celebrate and interview the bold risk-takers and adventurers who dare to defy the norm. These modern-day pirates are founders who lust after the thrill of venturing into the unknown and thrive on the exhilarating web3 startup life itself. We will dive into new apps, defi, trading, infrastructure, c ...
  continue reading
 
Artwork

1
Bloom Fireside

Bloom Protocol

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
On Bloom Fireside we speak with the partners and individuals helping us build the Bloom protocol, and working to get it in the hands of everyday people who will use it and benefit from it. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
Artwork

1
John Solomon Reports

John Solomon

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Award-winning investigative journalist John Solomon, who helped unravel the bogus Russia collusion scandal, gives you his exclusive reporting and big newsmaker interviews. To get the unvarnished truth about what’s really going on in Washington, subscribe today to John Solomon Reports. To find out more go to https://justthenews.com
  continue reading
 
This podcast is dedicated to helping all humans find a prosperous life. The host Jim Johnson has been using his "Prosperity Protocol" for more than a decade to find balance and fulfillment in a chaotic ever changing world. Guests on the show will be focused on the 7 pillars of the "Prosperity Protocol", Work Fulfillment, Time & Financial Security, Community, Health & Performance, Leadership, Creativity & Curiosity, Spiritual Growth & Development. They will share life experience, practical ap ...
  continue reading
 
Security issues are increasingly on the front burner for many individuals, corporates and Security practitioners. Whether it be kidnapping, banditry, terrorism, armed robbery etc. We all seem to know someone who has been a victim even when we personally have not
  continue reading
 
Artwork
 
Bitcoin pioneer Charlie Shrem peels back the layers on the lives and backgrounds of the world's most impactful innovators. Centering around intimate narratives, Shrem uncovers a detailed, previously unspoken story of the genesis and evolution of bitcoin, cryptocurrency, artificial intelligence, and the web3 movements. Join Shrem as he journeys through the uncharted territories of tech revolutions, revealing the human side of the stories that shaped the digital world we live in today.
  continue reading
 
Artwork

1
JavaScript Jabber

Charles M Wood

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
  continue reading
 
Artwork

1
Almost Diplomatic

Almost Diplomatic

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Almost Diplomatic is a podcast discussing geopolitics, national security and nonsense over beers. Disclaimer: The comments and views discussed in the podcast are our own and do not represent those of any entity we volunteer with or are employed by.
  continue reading
 
DeFi Watch's Chris Blec engages in honest conversations with DeFi teams about the transparency & decentralization of their decentralized finance applications & protocols. Support this podcast: https://podcasters.spotify.com/pod/show/proof-of-decentralization/support
  continue reading
 
Artwork

1
Business Compass LLC Videocasts

Business Compass LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Artwork

1
TechDaily.ai

TechDaily.ai

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
TechDaily.ai is your go-to platform for daily podcasts on all things technology. From cutting-edge innovations and industry trends to practical insights and expert interviews, we bring you the latest in the tech world—one episode at a time. Stay informed, stay inspired!
  continue reading
 
Artwork

1
Resilient Cyber

Chris Hughes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
  continue reading
 
Artwork

1
The Index Podcast

Index Studios

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
What’s indexing this week in crypto, blockchain, and open-source AI? Find out on The Index, where we feature exclusive conversations that go beyond code. Each week, host and entrepreneur Alex Kehaya talks with founders, developers, and investors who are shaping the future of Web3. From startup advice to breakthrough strategies, our guests share their stories and take a deep dive into the decentralized future.
  continue reading
 
Artwork

1
Cryptography FM

Symbolic Software

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
  continue reading
 
Artwork

1
Health Unchained Podcast

Health Unchained Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Health Unchained dives into healthcare projects enabled by blockchain technology. Listen to healthcare leaders, executives, entrepreneurs, researchers, and medical professionals who share their insights and experience.
  continue reading
 
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
  continue reading
 
Artwork

1
"World of DaaS"

Word of DaaS with Auren Hoffman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
deep dive into Data-as-a-Service (DaaS) businesses. World of DaaS is a podcast for data enthusiasts, by data enthusiasts, where Auren Hoffman talks to business and technology leaders about all things data - building it, acquiring it, analyzing it, and everything in between.
  continue reading
 
### **Bitunix Referral Code ”d1c9qu” – Claim 5500 USDT Bonus and 10% Fee Discount** Bitunix referral code **”d1c9qu”** offers new users a powerful way to boost their trading experience right from the start. By using this code during registration, you can unlock **up to 5500 USDT in bonuses** and enjoy a **10% discount on all trading fees**. Bitunix is designed for traders who want a secure, efficient, and rewarding environment, making it a top choice for both beginners and professionals. ## ...
  continue reading
 
Artwork

1
Network Security

University of Twente

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
Artwork

1
Heavy Networking

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Ethan Banks & Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. On air since 20 ...
  continue reading
 
Loading …
Episodes
Series
Episodes
Sort:
Newest
Newest
Oldest
Longest
Shortest
Language:
English
All languages
English
Afrikaans
Cymraeg
Dansk
Deutsch
Eesti
Español
Esperanto
Français
Gaeilge
Gàidhlig
Hrvatski
Indonesia
Khmer
Latviešu
Lietuvių
Malay
Nederlands
Norsk
Oʻzbekcha
Pyccĸий
Shqip
Slovenčina
Slovenščina
Suomi
Svenska
Tatar
Tiếng Việt
Türkçe
català
italiano
magyar
polski
português
română
rumantsch
Íslenska
Čeština
Ελληνικά
Български
Српски
Українська
беларуская
Қазақша
Հայերեն
עברית
اردو
العربية
فارسی
हिन्दी
বাংলা
ไทย
ქართული
中文
日本語
한국어
show series
 
Send us a text Cybersecurity professionals need a solid understanding of secure communication protocols, not just for exam success but for real-world implementation. This episode unpacks the essential protocols covered in CISSP Domain 4.1.3, providing clear explanations of how each works and when to use them. We begin with a timely discussion of th…
  continue reading
 
Evaluations are critical for assessing the quality, performance, and effectiveness of software during development. Common evaluation methods include code reviews and automated testing, and can help identify bugs, ensure compliance with requirements, and measure software reliability. However, evaluating LLMs presents unique challenges due to their c…
  continue reading
 
Evaluations are critical for assessing the quality, performance, and effectiveness of software during development. Common evaluation methods include code reviews and automated testing, and can help identify bugs, ensure compliance with requirements, and measure software reliability. However, evaluating LLMs presents unique challenges due to their c…
  continue reading
 
Evaluations are critical for assessing the quality, performance, and effectiveness of software during development. Common evaluation methods include code reviews and automated testing, and can help identify bugs, ensure compliance with requirements, and measure software reliability. However, evaluating LLMs presents unique challenges due to their c…
  continue reading
 
Max Marchione is the founder and President of Superpower, a digital healthcare platform that recently raised a $30 million Series A to make preventative and personalized medicine accessible to consumers. In this episode of World of DaaS, Max and Auren discuss: Billionaire-level health protocols and testing Why AI will replace expensive doctors Pept…
  continue reading
 
Congressman Andy Biggs from Arizona discusses the recent federal actions in California to arrest dangerous offenders and discuss the implications of funding radical groups by state taxpayers. Moreover, Congressman Biggs sheds light on the DIA's findings regarding the man-made origins of the COVID-19 virus and the subsequent cover-up. As protests er…
  continue reading
 
In this episode of techdaily.ai, we break down everything you need to know about Apple’s iOS 26—from its stunning new Liquid Glass design to the powerful new Apple Intelligence features built with privacy-first AI. Discover how your iPhone experience is about to transform with smarter tools, more expressive customization, seamless app interactions,…
  continue reading
 
Diwank explains why you should never let AI writes your tests, Apple redesigns all of their software platforms, AI has brought about the rise of judgement over technical skills, Peter Steinberger says Claude Code is now his computer, and the curious case of Memvid. View the newsletter Join the discussion Changelog++ members support our work, get cl…
  continue reading
 
In this episode of CISO Tradecraft, host G Mark Hardy sits down with Matt Hillary, the Chief Information Security Officer of Drata, to discuss governance, risk, and compliance (GRC) and trust management. They explore key topics such as the evolution of GRC, trust management, compliance automation, and the advent of AI in compliance processes. Matt …
  continue reading
 
Send us a text Dive deep into the critical world of security logging and monitoring as we explore Domain 7.2 of the CISSP certification. This episode unpacks the strategic considerations behind effective logging practices that balance comprehensive visibility with practical resource management. We begin with a thought-provoking look at Anthropic's …
  continue reading
 
Congresswoman Mariannette Miller-Meeks shares her insights on the rise of anti-Semitism in the United States and the political implications within the Democratic Party. She discusses the alarming trends in academia, the need for an anti-Semitism commission, and the ongoing challenges of espionage in our military and intelligence sectors. Shannon Da…
  continue reading
 
Congressman Scott Perry shares his insights on the current political landscape and the implications of recent actions taken by the Biden administration. He discusses the controversy surrounding Karine Jean-Pierre's departure from the Democratic Party, the legality of auto-pen signed documents by President Biden, and the ongoing issues with funding …
  continue reading
 
Congressman Tom Tiffany discusses the alarming new developments surrounding federal research funding linked to Chinese scientists and the potential agro bioterrorism threats they pose. He delves into the implications of China’s actions on U.S. agriculture, the need for legislative changes regarding visas and trade agreements, and the importance of …
  continue reading
 
The ever-provocative Steve Yegge joins us fresh off a vibe coding bender so productive, he wrote a book on the topic alongside award-winning author Gene Kim. Steve tells us why he believes the IDE is dead, why babysitting AI agents is more fun than coding, when vibe coding might take over the enterprise, how software devs should approach coding age…
  continue reading
 
The future of AI needs a new internet. Coinbase is laying the foundation. In this episode of The Index, host Alex Kehaya talks with Nemil Dalal, Head of Coinbase’s Developer Program, about how Coinbase is building crypto-native infrastructure to power the next generation of applications, starting with autonomous AI agents. Nemil shares his backgrou…
  continue reading
 
Network automation is today’s topic with sponsor Gluware. Gluware provides a network automation platform that targets both network engineers and automation builders. On today’s Heavy Networking, we discuss how Gluware supports these two constituencies. We also talk about a recent product announcement, Gluware Labs. Gluware Labs includes a free Comm…
  continue reading
 
I've gotten to know Joey Rosati (@rosaticorp) over the last 3 years working alonside hime in the VC trenches of Druid Ventures. Let me tell you, the VC world is a funny place and there are gems if you know where to find them. Joey is one of them. He knows that behind every successful business, it's all about people. In today's epic episode, Joey jo…
  continue reading
 
Senator Tommy Tuberville from Alabama, who is now running for Governor of the state, is on a mission to protect women's sports while running for governor of Alabama. He discusses the importance of returning power to the states, the implications of the new spending bill, and his commitment to ensuring fair competition in sports. South Carolina Attor…
  continue reading
 
In this Episode, Will is joined by Atomic Mass Games' own Will Shick! The guys cover a ton of topics in this one from Rivals Panels to the competitive scene to the May 2025 Update. The crew discusses what thoughts went into some of the changes that were made to characters like Carnage and Clea while also discussing the philosophy behind the process…
  continue reading
 
In this episode, Dan and I (Steve) dove deep into what turned out to be a surprisingly complex, yet incredibly insightful topic: gradually migrating a massive legacy JavaScript project over to TypeScript. We're talking about nearly 1,000 JS files, 70,000+ lines of code, and years of developer history—all transitioning carefully to a typed, modern f…
  continue reading
 
We’re on location at Microsoft Build 2025 with Amanda Silver, Corporate Vice President of Microsoft’s Developer Division. Amanda leads product, design, user research, and engineering systems for some of the tools you use every day. We discuss the latest AI announcements from Microsoft at Build 2025, how AI is reshaping development tools, what’s nex…
  continue reading
 
Send us a text The boundaries between digital vulnerabilities and physical warfare are dissolving before our eyes. Ukrainian forces have dramatically shifted military paradigms by marrying cybersecurity breaches with commercial drone attacks against strategic Russian targets like Tupolev aircraft manufacturers. This evolution demands security profe…
  continue reading
 
Post-quantum cryptography is no longer an abstract problem. It's a technology transformation that touches every layer of critical infrastructure, from policy to procurement, systems to supply chains. In this episode, Dr. Jeremy Bradley, Principal Technical Director at the UK’s NCSC and lead author of the government’s official PQC timeline guidance,…
  continue reading
 
A major challenge with creating distributed applications is achieving resilience, reliability, and fault tolerance. It can take considerable engineering time to address non-functional concerns like retries, state synchronization, and distributed coordination. Event-driven models aim to simplify these issues, but often introduce new difficulties in …
  continue reading
 
A major challenge with creating distributed applications is achieving resilience, reliability, and fault tolerance. It can take considerable engineering time to address non-functional concerns like retries, state synchronization, and distributed coordination. Event-driven models aim to simplify these issues, but often introduce new difficulties in …
  continue reading
 
A major challenge with creating distributed applications is achieving resilience, reliability, and fault tolerance. It can take considerable engineering time to address non-functional concerns like retries, state synchronization, and distributed coordination. Event-driven models aim to simplify these issues, but often introduce new difficulties in …
  continue reading
 
This week, our hosts⁠⁠⁠ ⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠, and ⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠T-Minus⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from a listener on class action settlements: they’re a class action attorney …
  continue reading
 
Congressman Greg Murphy, a practicing surgeon and representative from North Carolina, discusses his newly introduced EDUCATE Act aimed at eliminating DEI practices from medical schools, arguing that these ideologies compromise patient care and medical excellence. He also addresses the implications of direct-to-consumer drug advertising and the need…
  continue reading
 
Will McGugan, the CEO and founder of Textualize, speaks with host Gregory M. Kapfhammer about how to use packages such as Rich and Textual to build text-based user interfaces (TUIs) and command-line interfaces (CLIs) in Python. Along with discussing the design idioms that enable developers to create TUIs in Python, they consider practical strategie…
  continue reading
 
In this episode, SE Radio host Sriram Panyam explores HTMX with its creator, Carson Gross, who is also creator of Hyperscript, the mind behind the Grug Brained Developer, a professor of software engineering at Montana State University, and co-author of Hypermedia Systems. HTMX is a modern JavaScript library that allows developers to access AJAX, We…
  continue reading
 
AI agents are evolving fast—becoming autonomous, multimodal, and deeply embedded across industries. In this episode, we dive deep into the rise of next-gen AI agents, with a spotlight on OpenAI’s upcoming GPT-5 and the newly previewed “Operator” system, capable of executing user-defined tasks with minimal oversight. We explore how these powerful to…
  continue reading
 
Nick Guttilla and Emily Astranova, from Mandiant Consulting's Offensive Security team, join host Luke McNamara for an episode on voice-based phishing, or "vishing." Nick and Emily cover their respective blogs and experiences, diving into how they employ vishing techniques to social engineer organizations--both organically and using AI-powered voice…
  continue reading
 
Get ready, Witcher fans — a whole new saga is coming! In this episode of TechDaily.ai, we break down everything confirmed about CD Projekt Red’s next Witcher trilogy. 🧝‍♀️ Ciri takes the lead as the new protagonist 🎮 Unreal Engine 5 brings jaw-dropping visuals — 60fps with ray tracing on PS5 🌍 Explore Kovir, a stunning new region packed with detail…
  continue reading
 
West Virginia Governor Patrick Morrissey discusses the state's bold initiatives against Chinese investments and the importance of transparency in the child welfare system. Governor Morrissey shares his vision for a safer and more accountable West Virginia, including efforts to protect women's sports and enhance child welfare reforms. Then, Retired …
  continue reading
 
Agentic AI is seen as a key frontier in artificial intelligence, enabling systems to autonomously act, adapt in real-time, and solve complex, multi-step problems based on objectives and context. Unlike traditional rule-based or generative AI, which are limited to predefined or reactive tasks, agentic AI processes vast information, models uncertaint…
  continue reading
 
Agentic AI is seen as a key frontier in artificial intelligence, enabling systems to autonomously act, adapt in real-time, and solve complex, multi-step problems based on objectives and context. Unlike traditional rule-based or generative AI, which are limited to predefined or reactive tasks, agentic AI processes vast information, models uncertaint…
  continue reading
 
Agentic AI is seen as a key frontier in artificial intelligence, enabling systems to autonomously act, adapt in real-time, and solve complex, multi-step problems based on objectives and context. Unlike traditional rule-based or generative AI, which are limited to predefined or reactive tasks, agentic AI processes vast information, models uncertaint…
  continue reading
 
Jager McConnell is the CEO of Crunchbase, a leading business intelligence platform for startup and investment data, serving over 80 million users. In this episode of World of DaaS, Jager and Auren discuss: The polarized venture funding landscape Why 'religion' beats 'truth' in data companies Finding defensible moats in the AI era Predicting acquisi…
  continue reading
 
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠Selena Larson⁠⁠, ⁠⁠Proofpoint⁠⁠ intelligence analyst and host of their podcast ⁠⁠DISCARDED⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is jo…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play