The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Threat Detection Podcasts
Podcast by Alex Wood & Robb Reck
…
continue reading
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
…
continue reading
Experience the Life of a Private Investigator in a way it has never been done before. I am not just a local P.I. , I found the world held mysteries and adventure waiting to be uncovered for clients piece of mind. Every week you will be brought into the cases from Murder, Under Cover, Missing Persons, Terrorism, Industrial Espionage and more. Whether repelling out of helicopters in Southern Lebanon or being the protector to the stars in Hollywood we have adventures that will fill a life time. ...
…
continue reading
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
…
continue reading
Cardiovascular matters is here to give you the best information available concerning the causes, symtoms, treatments and prevention of health related issues stemming from cardiovascular disease.
…
continue reading
Decoding Security is a podcast from Microsoft Australia about how to protect your business from the ever changing threat of cyber crime. On the show, you’ll hear from leaders in cybersecurity, as well as Microsoft experts, as we break down strategies to help keep your business secure. From identifying threats, to managing incidents — we’ll crack the code to help you stay resilient, agile and competitive.
…
continue reading
With great power, comes great scrutiny. Every Tuesday and Friday, journalist Kara Swisher and NYU Professor Scott Galloway offer sharp, unfiltered insights into the biggest stories in tech, business, and politics. They make bold predictions, pick winners and losers, and bicker and banter like no one else. From New York Magazine and the Vox Media Podcast Network.
…
continue reading
Host Dr. Dinah Nasike takes you on a journey through the complex and evolving world of biosecurity, featuring insightful conversations with leading professionals, field experts and innovators in the field. From emerging and re-emerging epidemics and early-warning systems research and innovation, to pathogen economies, bioterrorism and global norms. This podcast will take a deep dive into critical conversations happening around biosecurity and how countries, institutions, experts and politici ...
…
continue reading
Welcome to Pursuing Questions: Imprints of inquiry, possibilities for play, and provocations for living. This is a podcast, formerly known as The Playful Podcast, is for those cultivating an ethos towards mutual flourishing, healing, learning and living well throughout the human experience; and that is the vision for this space. Guided by 5 values and 3 intentions, what might be encounter? Intentions: Imprints of inquiry: I wish to capture traces of my journey, because I believe it is worthy ...
…
continue reading
The RIPE Labs Podcast delves into the ideas that matter to the people who operate the Internet. In each episode, we'll be talking to experts from all corners of the Internet community about how the work they do contributes to the good of the Internet and the challenges they face in making sure it keeps running. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Healthcare Surfaces Institute (HSI) presents Beyond the Surface, a compelling podcast exploring the foundational role of surfaces in healthcare environments and their impact on patient safety. Each episode delves into key topics like Healthcare Associated Infections (HAIs), surface contamination, innovative materials, the role of surfaces in healthcare environment and how and why they support or hinder effective cleaning and disinfection practices. Featuring healthcare professionals, inf ...
…
continue reading
StackChart Spotlight is a weekly series that focuses on a different category of tools for MSPs each episode. Come learn about what tools are the most popular, rank the best with MSPs, and what considerations to keep in mind when selecting the right tool for your organization.
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
…
continue reading
Cutting through the noise for Canadian VARs and MSPs
…
continue reading
"Not Entirely Unlike Tea": Mindset, Psychology, Creativity, Success ~ for Content Creators, and curious, imaginative, self-optimizing peeps. Love understanding psychology & neuroscience so you can maximize your mindset and optimize your success? If you crave insightful content that's creative, edgy, and explores the juiciest, most impactful topics - your magical unicorn podcast is here! Your hostess, Christine Collins, MS holds Masters degrees in Clinical Psychology and in Marketing, is a Ma ...
…
continue reading
When billions disappear through shell companies and elderly Americans lose their life savings to family members, who's tracking the money? From the Hill to the Trenches: The Search for Justice takes you inside the investigations that traditional media won't touch. Host Dorothy Hill, former Goldman Sachs executive and financial crime investigator with 25 years of Wall Street experience, reveals how sophisticated fraud schemes operate and why our systems keep failing victims. Each episode unco ...
…
continue reading
Mastering Cybersecurity is your narrated audio guide to the essential building blocks of digital protection. Each 10–15 minute episode turns complex security concepts into clear, practical lessons you can apply right away—no jargon, no fluff. From passwords and phishing to encryption and network defense, every topic is designed to strengthen your understanding and confidence online. Whether you’re new to cybersecurity or refreshing your knowledge, this series makes learning simple, smart, an ...
…
continue reading
Cyber Security for Small Businesses doesn't need to be complicated or expensive. Most of the time it comes down to planning, procedures and good Systems Administration. Learn the techniques that you can use to increase Cyber Resilience in your Small Business. The podcast covers auditing tools like the ACSC Essential 8, NIST and ISO 27001. It will look at ways that you can identify, protect, detect, respond and recovery to a cyber incident. You will learn about: Malware Denial of Service Man ...
…
continue reading
Welcome to Cyber Insights, the podcast that bridges the worlds of networking and cybersecurity. From cutting-edge innovations in enterprise connectivity to the latest in digital defense, we break down the buzzwords and bring you actionable insights to secure and scale your systems. Whether you're an IT professional, business leader, or tech enthusiast, join us as we explore the critical intersection of networks and security, featuring expert conversations, industry trends, and real world str ...
…
continue reading
Nelson Vergel founded the men’s health forum www.ExcelMale.com and www.DiscountedLabs.com, interviews experts and debunks myths about testosterone and other hormones that affect men’s health. ExcelMale.com is one of the largest and best moderated men’s health and TRT forums on the Internet, focused on increasing health, potency, and productivity in men considering or using TRT and other hormone therapies. With over 44,000 members that include educated men, physicians, pharmacists, dietitians ...
…
continue reading
How is technology changing our lives? Hosting interviews with innovators, execs, and more, Canada’s tech expert Mike Agerbo explores how everything from tech gadgets to internet culture are changing our world. For over 20 years, Mike Agerbo has made technology simple for audiences. He brings the latest gadgets to Global TV audiences with his weekly Noon Hour News Tech Talk segment and hosts the popular tech TV and YouTube show GetConnected. He also hosts The App Show, a radio show all about ...
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employe ...
…
continue reading
The Identity Trust Pulse brings you the latest fraud and identity insights from industry leading experts across the world, sharing their expertise on relevant topics to help your business fight fraud and prioritize positive customer experiences. Find the fraud and identity insights to navigate our world of expanding opportunities and evolving risks. See the bigger picture – and the smaller one too – with this engaging podcast. The Identity Trust Pulse is brought to you by LexisNexis® Risk So ...
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
Welcome to Tech News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news of all things tech, including the latest developments in areas such as artificial intelligence, robotics, cybersecurity, gadgets, apps, and more. Whether you're a tech enthusiast, industry professional, or simply curious about the potential ...
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Growth Stories is a podcast about the innovations and trends driving the stock market’s next big winners. IBD multimedia reporter Alexis Garcia interviews analysts, executives, authors and influencers to take investors behind the latest innovations and trends driving growth in leading companies and sectors.
…
continue reading
About Us The Innovation Institute for Fan Experience (IIFX) was founded in 2020. IIFX’s vision is to be the leading and most trusted global authority on providing exceptional, memory-making fan experiences for the sports and entertainment industry. The Institute focuses on the fan journey and creating the ideal fan experience for its member organizations, one that results in increased revenue, sustainable growth, operational efficiency, a diversified workforce, new and repeat attendance, and ...
…
continue reading
"Beyond The Crime: A Psychological Analysis" is a riveting podcast led by Dr. Lars Madsen Shay Addison, and Dr Rob Brockman. Together, they delve into the minds of criminals, dissecting real-life cases to provide listeners with a unique and insightful exploration of the psychological aspects behind crimes. With expert analysis, captivating storytelling, and thought-provoking discussions, this podcast offers a deeper understanding of criminal motivations and behaviours, as well as the evolvin ...
…
continue reading
1
Is it intuition or neuroscience (or both?) when we smell stress, detect micro-expressions & threats
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43In this episode, we'll peek at what your brain picks up on that you don't consciously notice, and why "intuitive gut feelings" may be connected to neuroscience. We'll talk about micro-expressions, peripheral threat detection, and how you can smell emotions in others. We'll look at how intuition intersects with science as your brain processes thousa…
…
continue reading
1
Part II - Genomic Surveillance: A Biosecurity tool for deterrence, detection, and response to emerging threats
29:51
29:51
Play later
Play later
Lists
Like
Liked
29:51In this second and final part of Biosecurity: Changing the Game's discussion of genomic surveillance, Dr. Dinah Nasike and guests from Ginkgo Bioworks - Joshua Griffin Dunn who is the Senior Director, Computational Biology and Head of Design; and Mitchell Wolfe who is the Vice President for Global Engagement and Governance at Ginkgo - explore one o…
…
continue reading
1
Lazarus Heist Ties to Merger Scrutiny, Sony Unveils 200MP Sensor, Tesla Launches 30 Day FSD Trial, OpenAI Unveils Hermes Revolution, and more...
12:17
12:17
Play later
Play later
Lists
Like
Liked
12:17(0:10): Lazarus Group Suspected in $30.6M Upbit Crypto Heist Amid Dunamu-Naver Merger Scrutiny (2:05): Sony Unveils 200MP LYTIA 901 Sensor, Challenging Samsung's Mobile Camera Dominance (4:22): Tesla Unveils 30-Day Full Self-Driving Trial for Select North American Models (6:31): OpenAI Prepares Hermes: New Feature to Revolutionize ChatGPT with App …
…
continue reading
1
Why Scott Galloway Wants Us To Celebrate Masculinity, Not Diminish It | On With Kara Swisher
58:47
58:47
Play later
Play later
Lists
Like
Liked
58:47Pivot is off for the holiday, but we’ve got a special treat — an extra helping of Kara and Scott! Kara recently sat down with Scott to talk about his new book, "Notes on Being a Man," for an episode of On With Kara Swisher. In their conversation, Scott discusses how the Trump campaign won over young men with a regressive version of masculinity, why…
…
continue reading
1
OnePlus Launches 15R India, Italy Probes Meta AI Clampdown, Mars Rover Detects Mini Lightning, IQM Expands to Lead Quantum Europe, and more...
11:50
11:50
Play later
Play later
Lists
Like
Liked
11:50(0:10): OnePlus 15R Launches in India with Snapdragon 8 Gen 5, Plus New Tablet and Smartwatch Announcements (1:59): Italy Expands Meta Probe Over Alleged AI Chatbot Competition Clampdown on WhatsApp (4:07): NASA Rover Discovers Miniature Lightning on Mars, Opening New Scientific Frontiers (5:54): IQM Quantum Computers Invests €40M in Finnish Expans…
…
continue reading
1
Threat-Informed Defense: Using ATT&CK and Models to Plan Improvements
11:08
11:08
Play later
Play later
Lists
Like
Liked
11:08Threat informed defense means using knowledge about real attacks to guide security work, so defensive choices stay connected to how adversaries actually behave in the world. For a beginner, this idea matters because it turns cybersecurity from a pile of disconnected tools into a story about attackers, their steps, and the ways defenders can interru…
…
continue reading
1
Triage 101: What Happens When an Alert Fires.
14:07
14:07
Play later
Play later
Lists
Like
Liked
14:07Alert triage is the first pass an analyst makes on incoming security alerts. In those first few minutes, the analyst decides whether something needs fast action or patient investigation. The goal is not to solve every detail immediately, but to understand whether the situation is dangerous, harmless, or still unclear. For beginners, this moment can…
…
continue reading
1
Logs, Events, and Alerts: Turning Raw Data Into a Story
11:10
11:10
Play later
Play later
Lists
Like
Liked
11:10Logs are the raw notes that help turn messy digital activity into clear security stories. Every website, device, and application constantly writes these notes in the background, even when people barely notice them. Security teams use logs to understand what really happened when something breaks or looks suspicious, instead of guessing based on inco…
…
continue reading
1
Types of Security Controls: Preventive, Detective, Corrective, and More
10:28
10:28
Play later
Play later
Lists
Like
Liked
10:28Security controls are the many small and large actions, tools, and rules that organizations use to keep information, systems, and people safe from harm. When someone installs a lock, sets up a password, turns on monitoring, or writes a policy, they are putting a control in place to shape what can happen and how problems are handled. At first, the i…
…
continue reading
1
Defense in Depth: Layers That Work Together
11:12
11:12
Play later
Play later
Lists
Like
Liked
11:12Defense in depth is a simple idea that quietly shapes strong cybersecurity for real organizations. Instead of trusting one perfect barrier, defense in depth stacks several ordinary protections so mistakes stay small. A beginner might hear about firewalls, antivirus, passwords, and backups as separate topics, without seeing how they support each oth…
…
continue reading
Network segmentation sounds like a complex expert topic, but it starts very simply. If you understand that computers send messages over shared roads, segmentation shapes those roads. Earlier episodes described basic networks and architectures, the maps connecting devices and services together. This episode builds on that foundation and zooms in on …
…
continue reading
1
You Can’t Secure What You Can’t See: Asset Inventory Basics
9:01
9:01
Play later
Play later
Lists
Like
Liked
9:01Welcome to our exploration of why you cannot secure what you cannot see in cybersecurity. This episode focuses on asset inventory, the simple idea of knowing exactly what technology you depend on every day. Before anything else, you need to understand what security professionals mean when they say the word assets. In security, assets are anything v…
…
continue reading
Patch and update management is where earlier vulnerability concepts finally turn into concrete daily security actions. When you scan for weaknesses or read about new flaws, the story only becomes real when something actually changes on your systems. A patch is a small piece of software code that fixes a known flaw in an existing product, closing a …
…
continue reading
1
Vulnerabilities, CVEs, and CVSS Scores Explained.
12:54
12:54
Play later
Play later
Lists
Like
Liked
12:54Vulnerabilities sit at the center of almost every cybersecurity story people read about today. A vulnerability is a weakness in hardware, software, or a process that an attacker can misuse to cause harm. When organizations understand their vulnerabilities clearly, they can fix the most dangerous ones before someone takes advantage of them in the re…
…
continue reading
1
Threat Modeling 101: Thinking Like an Attacker
13:12
13:12
Play later
Play later
Lists
Like
Liked
13:12Threat modeling is a structured way to think about how systems might be attacked before any real harm occurs. Instead of picturing hacking as mysterious magic, threat modeling turns it into a calm, methodical review of what could go wrong and how serious each problem might be. For beginners, it provides a guided path to notice important details tha…
…
continue reading
1
Communities on the Frontline – Strengthening Epidemic Preparedness & Response
33:48
33:48
Play later
Play later
Lists
Like
Liked
33:48In this episode, Dr. Dinah Nasike sits down with Professor Judy Omumbo, a renowned public health expert and epidemiologist, to explore the vital role communities play in epidemic preparedness and response. From grassroots mobilization to trust-building and rapid response systems, Professor Omumbo offers insight into why communities are not just ben…
…
continue reading
1
Accel Google Open AI Startup Push, Manufacturing Faces 18B Ransomware Threat, Raspberry Pi Imager 2 Unveiled, Saudi Deploys First Industrial Quantum Computer, and more...
10:40
10:40
Play later
Play later
Lists
Like
Liked
10:40(0:10): Accel-Google Launch Global AI Startup Program, Open to Indian-Origin Founders; No Crypto Involvement (2:12): Manufacturing Faces $18 Billion Ransomware Threat in 2025: Experts Urge Layered Defense (4:30): Raspberry Pi Imager 2.0 Unveiled: Streamlined UI, Enhanced Customization, and Improved Accessibility Features (6:12): Saudi Arabia Launch…
…
continue reading
1
X's Foreign Trolls, Google's AI Wins, and MTG's Resignation
1:10:52
1:10:52
Play later
Play later
Lists
Like
Liked
1:10:52Kara and Scott discuss X’s new “About This Account” feature, which appears to show a wave of MAGA accounts posting from Russia, India, Nigeria, and beyond. They also unpack Marco Rubio denying reports that he privately called the Ukraine peace plan a Russian “wish list.” Plus, Google scores a major win with Gemini 3, Eli Lilly hits $1 trillion in m…
…
continue reading
Cyber attacks rarely happen as single isolated moments; they usually unfold in connected stages over time. When headlines talk about a breach, they often focus on the final impact, such as stolen data or encrypted files, and they skip the many earlier steps that made that result possible. A beginner who only sees the ending can feel confused, surpr…
…
continue reading
1
Apple Slashes iPhone Air Production, Guangdong Drives Low Altitude Revolution, Singapore Launches Provo to Verify Media, Elista Unveils Xplore 4K TVs India, and more...
12:01
12:01
Play later
Play later
Lists
Like
Liked
12:01(0:10): Apple Slashes iPhone Air Production Amid Weak Sales, Rethinks Premium Strategy (2:04): China's eVTOL and Drone Revolution: Guangdong Leads Low-Altitude Aviation Push Amid Safety Challenges (4:30): Singapore to Launch 'Provo' Tool for Verifying Media Authenticity in 2026 (6:57): Elista Unveils Xplore Series: 4K Google TVs in India, Emphasizi…
…
continue reading
1
Building Zero Trust Tools: Inside ThreatLocker with Product Manager Yuriy Tsibere
36:28
36:28
Play later
Play later
Lists
Like
Liked
36:28In this episode of Simply Defensive, hosts Josh Mason and Wade Wells welcome Yuriy Tsibere, Product Manager at ThreatLocker, for a behind-the-scenes look at how security products actually get built. Yuriy's path to cybersecurity started in Ukraine, where he worked in telecom during sophisticated APT campaigns that lasted over a year. Now at ThreatL…
…
continue reading
1
How to Set Realistic Recovery Point Objective (RPO) Goals
35:08
35:08
Play later
Play later
Lists
Like
Liked
35:08Want to know how much data you're really willing to lose? We're breaking down recovery point objective RPO - the agreement about how much data loss you can accept, measured in time. Most organizations have RPOs that are pure fantasy, claiming they can only lose an hour of data when they're backing up once a day. Curtis and Prasanna discuss why RPO …
…
continue reading
1
The Explosion of Security Data & Modern Detection with Joshua Scott | DailyCyber 280 ~ Watch Now ~
1:01:10
1:01:10
Play later
Play later
Lists
Like
Liked
1:01:10The Explosion of Security Data & Modern Detection with Joshua Scott | DailyCyber 280 ~ Watch Now ~ In this episode of DailyCyber, I sit down with Joshua Scott, VP of Security at Hydrolix, a leader with nearly 30 years of hands-on experience across enterprise security, cloud architecture, GRC, risk, IR, compliance, detection engineering, and product…
…
continue reading
1
PRVIATE INVESTIGATOR EXPERIENCE: Episode 115 (IT IS ONLY WITH KNOWLEDGE THAT WE CAN KNOW WHAT THE THREAT IS AND WHEN TO FIGHT FOR OUR FREEDOM)
20:43
20:43
Play later
Play later
Lists
Like
Liked
20:43This post talks about the threat of Islamic violence and terrorism. This IS not an attack on all Arab or Muslim people, just on the radicals who believe that they can use violence to force their religion on others. I share some information from the start and how there were two factions one from Mecca and one from Medina. It is only with "Knowledge"…
…
continue reading
1
Meta Fines Hit Spain, Google Launches AI Safety Initiative, Blue Origin Unveils Mega Rocket, AI Reshapes Ad Spending, and more...
10:52
10:52
Play later
Play later
Lists
Like
Liked
10:52(0:10): Madrid Court Orders Meta to Pay €481 Million to Spanish Media for Data Violations (1:30): Google Launches AI Safety Initiative in India to Protect Vulnerable Users with Innovative Tools (3:35): Blue Origin Unveils New Glenn 9x4: A Super-Heavy Rocket for Mega-Constellations and Lunar Missions (5:59): Creator Economy Ad Spend Soars to $29.5B,…
…
continue reading
1
Meta Monopoly Verdict, Trump Signs the Epstein Bill, and Nvidia's Q3 Earnings
1:16:59
1:16:59
Play later
Play later
Lists
Like
Liked
1:16:59Kara and Scott discuss Nvidia’s latest earnings report, Meta’s major antitrust victory, and President Trump signing the bill to release the Epstein files. Then, Elon Musk makes a White House appearance, Trump defends Saudi Prince Mohammed Bin Salman, and the deadline for Warner Bros. Discovery bids arrives. Watch this episode on the Pivot YouTube…
…
continue reading
1
Summers Resigns Over Epstein Controversy, Microsoft Launches Agent 365, TikTok Tests AI Content Filter, Kraken Secures 800MFunding IPO Talk, and more...
9:22
9:22
Play later
Play later
Lists
Like
Liked
9:22(0:10): Larry Summers Resigns from OpenAI Board Amid Epstein Controversy and Scrutiny (1:54): Microsoft Launches Agent 365 to Revolutionize AI Management and Boost Productivity (3:48): TikTok Tests AI Content Control Slider, Launches $2M Literacy Fund Amid Industry Shifts (5:25): Kraken Secures $800M in Funding, Eyes Global Expansion and Potential …
…
continue reading
1
Cloudflare Outage Dampens Internet Reliability, Bezos Backing Prometheus AI, AI Alliance Sparks Valuation Debate, Google Unveils Gemini 3, and more...
10:46
10:46
Play later
Play later
Lists
Like
Liked
10:46(0:10): Cloudflare Outage Disrupts Online Services, Sparks Debate on Internet Reliability and Decentralization (1:53): Jeff Bezos Backs Prometheus: New AI Startup Targets Engineering and Manufacturing with $6.2 Billion Funding (3:38): Microsoft, Nvidia, and Anthropic Forge $15B AI Alliance Amid Valuation Concerns and Geopolitical Tensions (5:34): G…
…
continue reading
1
How to Build Trust in an AI SOC for Regulated Environments
42:15
42:15
Play later
Play later
Lists
Like
Liked
42:15How do you establish trust in an AI SOC, especially in a regulated environment? Grant Oviatt, Head of SOC at Prophet Security and a former SOC leader at Mandiant and Red Canary, tackles this head-on as a self-proclaimed "AI skeptic". Grant shared that after 15 years of being "scared to death" by high-false-positive AI, modern LLMs have changed the …
…
continue reading
1
Andre Lynch: AI in Cybersecurity - Separating Hype from Reality
23:39
23:39
Play later
Play later
Lists
Like
Liked
23:39Are AI-powered cyberattacks really the existential threat vendors claim? Or are we being sold fear to fuel product sales? In this episode of The Cyber Insights Podcast (powered by Edge7 Networks), hosts Ronan Murray and Ian Finlayson are joined by Andre Lynch, Senior Sales Engineer at ConnectWise, to cut through the AI marketing noise and reveal wh…
…
continue reading
1
Bezos's AI Start-up, Thiel's Nvidia Sell-off, and Trump-MTG Breakup
1:03:58
1:03:58
Play later
Play later
Lists
Like
Liked
1:03:58Kara and Scott are back from their whirlwind tour! They discuss Trump reversing course on the release of the Epstein files, and his breakup with Marjorie Taylor Greene. Then, Peter Thiel joins the tech stock sell-off by dumping his stake in Nvidia, and new reports raise questions about OpenAI's financials. Plus, Jeff Bezos launches a new AI startup…
…
continue reading
Many people first meeting cybersecurity feel lost in a storm of disconnected tools, rules, and scary headlines about breaches. Without a shared map of attacker behavior, every new term or alert can feel random and hard to compare meaningfully. The MITER ATTACK matrix gives that shared map by organizing real attacker behaviors into a picture that pe…
…
continue reading
1
PRIVATE INVESTIGATOR EXPERIENCE: Episode 114
19:57
19:57
Play later
Play later
Lists
Like
Liked
19:57This post is my concerns about the drift of our country to socialism with the election of mayors in two major cities New York and Seattle. As a investigator I watch and look at the trends that could affect every one of us in our communities. Our country has moved slowly behind the scenes and now openly out of the shadows into an open attack on our …
…
continue reading
1
Cyber Insurance Explained: What Blue Teams Need to Know Before an Incident
32:54
32:54
Play later
Play later
Lists
Like
Liked
32:54From teaching AP art history to brokering cyber insurance deals. 🎓➡️🛡️ In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Andy Runyan from Yukon to break down everything blue teamers need to know about cyber insurance — before an incident happens. Andy shares his unconventional journey from fourth-generation educator and b…
…
continue reading
1
When IT Meets OT, Can Endpoint Security Hold The Line
23:35
23:35
Play later
Play later
Lists
Like
Liked
23:35How do you protect factory floors, utilities, and critical infrastructure when IT and OT finally run on the same nervous system? That is the challenge at the heart of my latest conversation with John Walsh, Field CTO at IGEL Technology, recorded live at the IGEL Now and Next event in Frankfurt. Back in March in Miami, John and I talked about zero t…
…
continue reading
1
Recovery Time Objective vs Reality: Closing the Gap
32:58
32:58
Play later
Play later
Lists
Like
Liked
32:58Most IT teams can't meet their recovery time objective—and they don't even know it. In this episode of The Backup Wrap-up, Curtis and Prasanna explain why your RTO is probably fantasy, who should actually be setting it (hint: not you), and what recovery time actual really means. We cover the critical difference between objectives and reality, why t…
…
continue reading
1
Tech Stock Troubles, Epstein Fallout, and SF Mayor Daniel Lurie
1:11:38
1:11:38
Play later
Play later
Lists
Like
Liked
1:11:38The Pivot Tour has landed in Kara's beloved San Francisco! Kara and Scott chat with Mayor Daniel Lurie about the city’s revitalization — and Trump’s threat to send in troops. Then, tech stocks take a tumble, and the fallout from the Epstein emails grows. Plus, Scott gets a surprise visit from someone in his past! Watch this episode on the Pivot Y…
…
continue reading
1
Is your phone a black hole that swallows your attention? this might help!
15:24
15:24
Play later
Play later
Lists
Like
Liked
15:24In this episode, we'll peek at why scrolling isn't a "willpower" problem, but an exploitation of your brain's reward systems (kinda like slot machines!). We'll cover the neuroscience behind the prefrontal cortex "battling" dopamine loops, and how stress makes it worse. We'll also talk about practical strategies that actually WORK with your brain's …
…
continue reading
1
Google Sues China Ring Shields New Scam Bill, EU Probes Google Demand Demotions, Disney+ Reinvents Streaming Now, Tesla to Add Apple CarPlay, and more...
9:53
9:53
Play later
Play later
Lists
Like
Liked
9:53(0:10): Google Sues China-Based Cybercrime Ring, Backs New Anti-Scam Legislation (1:57): EU Investigates Google for Alleged Unfair Demotion of News Publishers Amid DMA Scrutiny (3:52): Disney+ Revolutionizes Streaming with AI and User-Generated Content Amidst Legal and Brand Challenges (5:41): Tesla Shifts Gears: Plans to Incorporate Apple CarPlay …
…
continue reading
1
Epstein Emails, Kennedy for Congress, and Guest Gov. JB Pritzker
1:09:23
1:09:23
Play later
Play later
Lists
Like
Liked
1:09:23Kara and Scott are live from Chicago! First up, they’re joined by Governor JB Pritzker to discuss immigration operations, the redistricting war, and whether he’ll run for president. Then, both Democrats and Republicans release new material from Jeffrey Epstein, JFK’s grandson Jack Schlossberg enters the race for Congress, and Kim Kardashian's Skims…
…
continue reading
1
Shutdown Ending, Trump's Pardons, and Guest Curtis Sliwa
1:11:04
1:11:04
Play later
Play later
Lists
Like
Liked
1:11:04The Pivot Tour rolls on! Kara and Scott are live from Brooklyn with special guest Curtis Sliwa, founder of the Guardian Angels and former NYC mayoral candidate, to talk about his campaign, his cats, and more. Then, the government shutdown appears to be coming to an end, and Trump issues another round of pardons. Plus, the Supreme Court rejects a ca…
…
continue reading