A free podcast about cybersecurity, vulnerability management, and the CVE Program.
…
continue reading
CVE Program Podcasts
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
The Commission on Rehabilitation Counselor Certification presents "Inside Rehabilitation Counseling," a series of conversations with the professionals, educators, and thought-leaders working in the specialized field of rehabilitation counseling.
…
continue reading
You can grab your weekly technology without having to geek out on TechTime with Nathan Mumm. The Technology Show for your commute, exercise, or drinking fun. Listen to the best 60 minutes of Technology News and Information in a segmented format while sipping a little Whiskey on the side. We cover Top Tech Stories with a funny spin, with information that will make you go Hmmm. Listen once a week and stay up-to-date on technology in the world without getting into the weeds. This Broadcast styl ...
…
continue reading
1
278: TechTime Radio: Identity Rental Schemes, AI Book Controversies, Teen Social Bans, Chatbot Safety Failures, Streaming Deals, "SAY WHAT" Oddball Tech Stories, and Our Whiskey Competition Crowns a Winner ...
55:39
55:39
Play later
Play later
Lists
Like
Liked
55:39This week on TechTime Radio, a state-backed cyber scheme hiding in plain sight. That’s where we start: identity rental, deepfaked interviews, and remote tooling that let North Korean operators slip into real jobs at real companies. We unpack how recruiters lure engineers, what data they demand, and the quiet ways compromised devices become corporat…
…
continue reading
1
252 - Windows password security - What is under the hood?
32:43
32:43
Play later
Play later
Lists
Like
Liked
32:43Enjoying the content? Let us know your feedback! Today, we're lifting the hood on something you interact with dozens of times per day but probably never think about: Windows password security. What actually happens when you type your password and hit Enter? Where does Windows store that password? And perhaps most importantly, why do attackers spend…
…
continue reading
1
277: TechTime Radio: "THANKS" Giving Episode with Dubai’s Flying Taxis, Australia’s Teen Social Ban, CVE vs Hackers, Nike’s Robo Shoes, Unsafe AI Toys, Black Friday Deals, with Guest Nick Espinosa | Air ...
55:31
55:31
Play later
Play later
Lists
Like
Liked
55:31What happens when a holiday “thankful” theme clashes with cutting-edge technology, bold policies, and some notable missteps? We begin with Dubai’s high-profile plan to introduce flying taxis and ask tough questions: can eVTOLs truly reduce travel time after accounting for boarding, airspace management, and vertiport capacity—or will they just be ex…
…
continue reading
1
CISOs Get Real About Hiring in the Age of AI
29:58
29:58
Play later
Play later
Lists
Like
Liked
29:58Dark Reading Confidential Episode 12: Experts Fred Kwong and Jessica Sica help cyber job seekers get noticed; make an argument for a need to return to the hacker ethos of a bygone era; and have a stark conversation about keeping AI from breaking the sector's talent pipeline for years to come.By InformaTechtarget
…
continue reading
1
251 - The Future of Security Operations- Are SIEM, XDR, and SOAR Converging or Moving Apart?
22:24
22:24
Play later
Play later
Lists
Like
Liked
22:24Enjoying the content? Let us know your feedback! Today we're talking about the future of security operations, specifically three technologies that have dominated the conversation for the past few years: SIEM, XDR, and SOAR. And I'm going to make a case that might surprise some people: these tools are converging. They're merging into unified platfor…
…
continue reading
1
276: TechTime Radio: Steam Machine Dreams, cloned Pets, Robots Stumble, Travel Scams, Paycheck Glitch, Russia Hacks Again, Quirky EV Smells, and Security Camera Louvre "Password Fail" | Air Date: 11/18 ...
55:49
55:49
Play later
Play later
Lists
Like
Liked
55:49A living room PC that wants to be your next console, a cloned dog that raises bigger questions than it answers, and a museum heist made possible by the world’s laziest password. That’s the lineup we tackle as we break down the most head-scratching, revealing tech stories of the week with equal parts clarity and humor. We start with Valve’s Steam ma…
…
continue reading
1
250 - PenTesting vs Red Teaming vs Vulnerability Assessment-Which One Do You Need?
20:45
20:45
Play later
Play later
Lists
Like
Liked
20:45Enjoying the content? Let us know your feedback! Today we're tackling a question I get asked constantly: "Should we do a pentest, a red team engagement, or a vulnerability assessment?" These terms get thrown around interchangeably, but they're actually very different things with different goals, different costs, and they're appropriate for differen…
…
continue reading
1
Educating and Empowering Veterans with Julianne Hansen, M.S., CRC
52:58
52:58
Play later
Play later
Lists
Like
Liked
52:58During the week this episode is releasing, we observe Veterans Day, and as we all know, military service and the veteran community are the bedrock of how rehabilitation counseling came to be. Many Certified Rehabilitation Counselors themselves are veterans or have close ties to the veteran community, including those who directly work with individua…
…
continue reading
1
275: TechTime Radio: Congress Hacked, Zoom is Pantless, Gadgets & Gear spotlights Raycon Earbuds, IKEA sells a Phone Bed, and LEGO Beams Up Star Trek joy.” Is our Government Hacked more under TRUMP? We ...
55:38
55:38
Play later
Play later
Lists
Like
Liked
55:38Government data doesn’t just live in vaults anymore, and the latest suspected foreign cyberattack at the Congressional Budget Office proves how fragile our policy pipeline can be. We unpack why breaches keep landing on core agencies, what “zero trust” actually changes, and how identity, patch cadence, and monitoring fit together when the stakes are…
…
continue reading
1
249 - What Is Credential Stuffing? How Hackers Use Your Old Passwords Against You
30:01
30:01
Play later
Play later
Lists
Like
Liked
30:01Enjoying the content? Let us know your feedback! Today we're talking about one of the most common yet misunderstood cyber attacks happening right now: credential stuffing. And I do mean right now. As I'm recording this, somewhere in the world, automated bots are attempting billions of login attempts across thousands of websites, trying to break int…
…
continue reading
1
274: TechTime Radio: Wi-Fi TP-Link Bans, Toilet Paper ads in China, Humanoid Robot Hype, QuickBooks Phishing Scams, Apple Bugs, Drone Patrols, and Whiskey Semifinals, Welcome to the Cutting-Edge | Air ...
57:14
57:14
Play later
Play later
Lists
Like
Liked
57:14Your Wi‑Fi might be your biggest blind spot, and we’re putting it under a bright light. We dig into the push to ban TP‑Link in the U.S., what “firmware callbacks” really mean, and the simple, concrete steps that actually harden a home network: changing default credentials, updating firmware at least yearly, enabling WPA3, and leaning on MFA to shut…
…
continue reading
1
248 - The Truth About Security Awareness Training- Why 95% of Programs Don't Work
29:11
29:11
Play later
Play later
Lists
Like
Liked
29:11Enjoying the content? Let us know your feedback! Today we're diving into something that keeps cybersecurity professionals up at night, and no, it's not the latest ransomware attack or data breach. It's something much more frustrating: the fact that despite spending billions of dollars on security awareness training every year, employees keep clicki…
…
continue reading
1
Cyber's Role in the Rapid Rise of Digital Authoritarianism
39:46
39:46
Play later
Play later
Lists
Like
Liked
39:46Enterprise cyber teams are in prime position to push back against our current "Golden Age of Surveillance," according to our guests Ronald Deibert from Citizen Lab and David Greene from the EFF.By InformaTechtarget
…
continue reading
1
Radio Edit: 273: TechTime Radio: Tech turns terrifying: cloud crashes, robot takeovers, satellite leaks, AI love, ghost-seeing Teslas, doorbell surveillance, and blockchain malware. One failure can haunt ...
55:42
55:42
Play later
Play later
Lists
Like
Liked
55:42A Halloween hour of tech that blurs the line between glitch and ghost, convenience and control, comfort and consequence. We move from Amazon’s outages and automation plans to AI intimacy, leaky satellites, doorbell surveillance, and malware hidden in blockchains. • AWS outage root cause and ripple effects • Amazon automation projections and workfor…
…
continue reading
1
273: TechTime Radio: Tech turns terrifying: cloud crashes, robot takeovers, satellite leaks, AI love, ghost-seeing Teslas, doorbell surveillance, and blockchain malware. One failure can haunt everything ...
1:01:53
1:01:53
Play later
Play later
Lists
Like
Liked
1:01:53Want a Halloween scare that sticks with you after the candy’s gone? We’re pouring a glass and pulling back the curtain on the creepiest corners of everyday tech: a cloud outage that toppled major apps and smart beds, a Prime refund saga with fine-print timelines, and Amazon’s bold plan to swap 600,000 human jobs for robots by 2033. The number that …
…
continue reading
1
K-12 Transition Services and Community Impact with Crystal Evans, CRC
36:32
36:32
Play later
Play later
Lists
Like
Liked
36:32Since the late 1970s, the Pittsburgh Public School system has hired Certified Rehabilitation Counselors to provide services for students with disabilities, ranging from ensuring accommodations are in place to providing transition services that prepare them for life after high school. The National Center for Education Statistics reports that 7.5 mil…
…
continue reading
1
247 - AI-Powered Browsers-The Privacy and Security Risks No One Talks About
23:48
23:48
Play later
Play later
Lists
Like
Liked
23:48Enjoying the content? Let us know your feedback! Something fundamental changed in how we browse the internet in October 2025, and most people have no idea. In just 48 hours, OpenAI launched ChatGPT Atlas, Microsoft fired back with a revamped Edge, and suddenly every major tech company was racing to release AI-powered browsers that don't just load w…
…
continue reading
1
272: TechTime Radio: Apple embraces touchscreens and drops the (+), Meta redefines home theater, streaming prices climb, phishing scams evolve, and a Florida “Tech Fairy” proves grassroots innovation thrives ...
57:45
57:45
Play later
Play later
Lists
Like
Liked
57:45Apple finally blinks. We break down the rumored touchscreen MacBook Pro on M6 silicon and what it means for the Mac–iPad divide, creative workflows, and the future of touch-first productivity without giving up a real keyboard and trackpad. If Apple embraces touch on macOS, does the iPad’s role shrink, or do we enter a new era of flexible, two-in-on…
…
continue reading
1
246 - Is AI-Generated Code Safe-The Hidden Dangers of Vibe Coding
21:32
21:32
Play later
Play later
Lists
Like
Liked
21:32Enjoying the content? Let us know your feedback! So today, we're unpacking what vibe coding is, why it's creating serious security risks, and what you can do about it. Because whether you love it or hate it, vibe coding isn't going anywhere. The question is: are we shipping features, or are we shipping vulnerabilities? All that coming up next in to…
…
continue reading
1
271: TechTime Radio: AI Demands Rights, Free TVs come with Surveillance Strings, and Billionaires Build Bunkers. We Decode Digital Mimicry, Data Consent, and a Power Bank with Gwen Way in "Gadgets and ...
1:01:26
1:01:26
Play later
Play later
Lists
Like
Liked
1:01:26Start with the picture: tech titans quietly building bunkers while the rest of us watch AI sprint ahead and our living rooms turn into ad servers. That tension—between private safety and public risk—frames a candid hour where we press on what’s hype, what’s harmful, and what’s actually helpful. We dig into why billionaire doomsday prep resonates ri…
…
continue reading
“We Speak CVE” podcast host Shannon Sabens chats with CVE Consumer Working Group (CWG) co-chairs, Jay Jacobs and Bob Lord, and CVE™ Project Lead Alec Summers, about how the CWG was created to address the needs and perspectives of those who use CVE data — ranging from enterprise security teams to tool developers and managed security service provider…
…
continue reading
1
245 - 50 Documents Can Poison AI Models - CISA KEV Adds 12 Decade-Old Vulnerabilities and Salesforce Ransomware
30:38
30:38
Play later
Play later
Lists
Like
Liked
30:38Enjoying the content? Let us know your feedback! This week, we've got three stories that really caught my attention, and honestly, they're all pretty alarming in their own ways. If you're new here, welcome to the show where we break down the latest cybersecurity news and help you understand what's really happening in the cyber security domains. We'…
…
continue reading
1
270: TechTime Radio: What do a $500B AI Valuation, Mid Game Ads, and a Driverless Traffic Stop have in Common? They Expose the Gap Between the Infrastructure, Policy, and Psychology That Actually Make ...
59:18
59:18
Play later
Play later
Lists
Like
Liked
59:18By Nathan Mumm
…
continue reading
1
244 - The Recent Cyberattacks on European Airports - A Wake-Up Call for Critical Infrastructure
43:18
43:18
Play later
Play later
Lists
Like
Liked
43:18Enjoying the content? Let us know your feedback! Picture this: You're at London Heathrow, Europe's busiest airport, ready to check in for your flight. But the kiosks aren't working. The screens are blank. Airport staff are scrambling with iPads and even pen and paper to manually check passengers in. Your flight is delayed, maybe canceled. And you'r…
…
continue reading
1
269: TechTime Radio: Apple’s iOS 26 Blocks Spam Calls with Smart Screening Upgrade, Instagram’s Teen Safety Tools Fail Majority of Tests, Raspberry Pi 500 Plus Delivers Power at $200, ROG Xbox Ally Hits ...
1:02:04
1:02:04
Play later
Play later
Lists
Like
Liked
1:02:04Call screening technology is finally getting the upgrade we've all been desperately waiting for. Apple's iOS 26 introduces a revolutionary feature that puts unknown callers into a holding pattern, requiring them to state their business before you decide whether to answer. For those of us bombarded with daily spam calls, this could be the most pract…
…
continue reading
1
Epilepsy Awareness and People-First Programming with Dr. Courtney Dean, PhD, CRC, NCC
27:06
27:06
Play later
Play later
Lists
Like
Liked
27:06According to the World Health Organization, around 50 million people worldwide have epilepsy, making it one of the most common neurological disorders globally. One of the challenges of epilepsy is that folks experiencing the disorder can’t always get a precise diagnosis. On top of that, many people misunderstand epilepsy, leading to stigma and a la…
…
continue reading
1
243 - Are Web Application Firewalls (WAFs) Obsolete in 2025? Pros, Cons, and Future of Application Security - Part 2
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38Enjoying the content? Let us know your feedback! Welcome back and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain English. I am your host Ibrahim Yusuf... This is part 2 of where we will continue covering the debate that's been heating up in security circles: Are We…
…
continue reading
1
268: TechTime Radio: Guest Nick Espinosa looks at ads in everyday devices, including Samsung Fridges, and Windows 11. Deepfake Case Exposes legal gaps in AI Abuse, Google Removes 224 Fraudulent Apps ...
55:43
55:43
Play later
Play later
Lists
Like
Liked
55:43Prepare yourself for a sobering look at the increasingly invasive world of technology monetization. Nick Espinosa, Chief Security Fanatic, joins the Tech Time crew to expose how tech giants are finding alarming new ways to serve us advertisements – from Samsung refrigerators with built-in ads to Microsoft's new full-screen "scoop" ads in Windows 11…
…
continue reading
1
Battle Space: Cyber Pros Land on the Front Lines of Protecting US Critical Infrastructure
32:34
32:34
Play later
Play later
Lists
Like
Liked
32:34Dark Reading Confidential Episode 10: It’s past time for a cohesive plan to protect vital US systems from nation-state cyberattacks, and increasingly, that responsibility is falling to cybersecurity professionals and asset owners across a vast swath of organizations, who likely never bargained for a full-blown international conflict landing in thei…
…
continue reading
1
242 - Are Web Application Firewalls (WAFs) Obsolete in 2025? Pros, Cons, and Future of Application Security - Part 1
23:11
23:11
Play later
Play later
Lists
Like
Liked
23:11By YusufOnSecurity.Com
…
continue reading
1
267: TechTime Radio: Trump’s Bill Extends Tax-Free Tips to Digital Creators is this Fair or Flawed? Foster City fights goose poop with drones. Mr. Beast’s Phone Plan, and Microsoft–OpenAI IPO Buzz | Air ...
59:54
59:54
Play later
Play later
Lists
Like
Liked
59:54What happens when the digital economy collides with traditional service industry models? This week, we dive deep into President Trump's "One Big, Beautiful Bill Act" that unexpectedly includes digital content creators in tax-free tipping benefits. We debate whether streamers and influencers should receive the same treatment as waitstaff and bartend…
…
continue reading
1
241 - AI vs. Cybersecurity-How LLMs Are Reshaping the Defender-Attacker Battle
55:17
55:17
Play later
Play later
Lists
Like
Liked
55:17By YusufOnSecurity.Com
…
continue reading
1
266: Learn How to Spot Crowdfunding Scams on Kickstarter! Then, Tech’s Privacy Battles: Google’s $425M Settlement for Tracking Users, Zuckerberg’s Neighborhood Feud, and Disney’s $10M fine | Air Date ...
56:53
56:53
Play later
Play later
Lists
Like
Liked
56:53Data privacy wars are heating up as tech giants face mounting legal and social consequences for their actions. In this eye-opening episode, we dissect Google's staggering $425 million privacy lawsuit settlement after the company was caught collecting user data even when people explicitly opted out of tracking. The verdict raises crucial questions a…
…
continue reading
1
240 - The Great OAuth Heist: How Salesloft's Breach Exposed Major Cybersecurity Firms
37:25
37:25
Play later
Play later
Lists
Like
Liked
37:25Enjoying the content? Let us know your feedback! Today we're unpacking one of the most significant supply chain attacks of 2025 - the Salesloft-Drift OAuth breach that sent shockwaves through the enterprise software world. We'll explore how a compromise at one marketing company led to data theft at some of the biggest names in cybersecurity and tec…
…
continue reading
1
265: Windows 10 Lives On with Lifeline until 2026. Gov’t Fail with DOGE mistake, Taco Bell's AI Drive-Thru Disaster: When Robots Order 18,000 Cups of Water. Next, TransUnion Breach, Saturn flyby, Two Thumbs ...
59:54
59:54
Play later
Play later
Lists
Like
Liked
59:54The digital house of cards continues to collapse as our personal data faces unprecedented vulnerability. This week, we reveal how the Department of Government Efficiency's reckless handling of over 300 million Americans' Social Security numbers could lead to a massive security crisis. After repeatedly warning about these dangers, our predictions ar…
…
continue reading
1
Vocational Services for Veterans with Monnie Rebecca Waltz, BS, MRC, VE, CRC, Christopher Briggman, MRC, CRC, CVE, LCMHC, LPC, and Keith Hosey
1:10:38
1:10:38
Play later
Play later
Lists
Like
Liked
1:10:38An increasing amount of research is exploring the connection between work and wellness. This includes mental wellness and physical health, both of which can be positively impacted by having employment, particularly for those navigating a disability. Simply put, work is more than just a means to earn a living or spend a significant portion of your w…
…
continue reading
1
239 - Volt Typhoon Report-How Critical Infrastructure Was Targeted and Compromised
25:38
25:38
Play later
Play later
Lists
Like
Liked
25:38Enjoying the content? Let us know your feedback! Today’s episode is all about Volt Typhoon, a Chinese state-sponsored hacking group whose stealthy techniques and strategic missions have caused significant concern for defenders worldwide. We’ll break down who Volt Typhoon is, analyze the recent major report covering their activities, walk through re…
…
continue reading
Join us for a look around today's Dark Web, and find out how law enforcement, AI, nation-state activities, and more are reshaping the way cybercriminals conduct their dirty business online. Keith Jarvis, senior security researcher at Sophos' Counter Threat Unit joins Dark Reading's Alex Culafi for a conversation you don't want to miss.…
…
continue reading
1
264: AI’s Growing Influence Reveals Troubling Cracks in Justice and Privacy. Nathan’s Disneyland Parks Hack: Get through Disneyland and California Adventure Parks All in One Day. DaVita 2.7 Million Patients ...
1:01:46
1:01:46
Play later
Play later
Lists
Like
Liked
1:01:46The digital world's most alarming vulnerabilities take center stage as we dive into how AI is compromising our justice systems and personal privacy. A senior Australian lawyer shocked the court by submitting AI-generated fake legal citations in a murder trial, with both defense and prosecution failing to verify their accuracy—revealing how our cogn…
…
continue reading
1
238 - Patchwork and Transparency -Microsoft’s August Security Updates & Google's Project Zero Redefined
15:21
15:21
Play later
Play later
Lists
Like
Liked
15:21Enjoying the content? Let us know your feedback! This week, the cybersecurity landscape delivers two major stories that demand attention. Microsoft’s August Patch Tuesday brought a wave of critical updates and exposed gaps, challenging defenders to reassess their priorities and protections. Meanwhile, Google’s Project Zero team is changing the rule…
…
continue reading
1
NEAT | TECH Episode 2: From Bottles to Bodies: NFC Technology is Changing How We Verify Everything | Whiskey and Tech Discussion
19:32
19:32
Play later
Play later
Lists
Like
Liked
19:32Pour yourself a glass of Eagle Rare and join us for a fascinating dive into the invisible technology that's changing the whiskey world forever. Counterfeit whiskey has plagued collectors and enthusiasts for years – empty bottles refilled with cheap spirits, fake seals carefully applied, and unsuspecting buyers paying thousands for fraudulent produc…
…
continue reading
1
237 - Generative AI Security-How Companies Protect Against Attacks and Data Risks
22:35
22:35
Play later
Play later
Lists
Like
Liked
22:35Enjoying the content? Let us know your feedback! In this episode, we’re diving into how companies are working to secure Generative AI—the technology behind chatbots, image creators, and code-writing assistants. We’ll break down how it’s different from traditional enterprise security, look at real-world attack examples, bust some myths, and explore …
…
continue reading
1
263: AI Mimics Voices, Fools Google, and Infiltrates Therapy. Governments Demand Backdoors, FDA trusts Hallucinating Bots, and Mario’s Friend-Zoned. The Digital Frontier Blurs as Nick Espinosa shares what ...
57:49
57:49
Play later
Play later
Lists
Like
Liked
57:49The digital landscape is evolving at breakneck speed, and with it comes a host of unexpected consequences that blur the lines between helpful innovation and concerning overreach. In this eye-opening episode, we examine how AI is creeping into spaces where human judgment and empathy might better serve us. A troubling new wave of voice phishing attac…
…
continue reading
1
236 - The Hidden Danger in Your Cloud-Why Misconfiguration Is the Real Vulnerability
30:31
30:31
Play later
Play later
Lists
Like
Liked
30:31Enjoying the content? Let us know your feedback! Today we’re tackling a critical subject that causes countless data breaches yet often gets misunderstood: misconfiguration — what it is, why it’s different from a software vulnerability, and why it remains one of the biggest security risks organizations face. One quick reminder before we dive into th…
…
continue reading
1
262: Gadgets and Gear with Guest Gwen Way, then Robots Reveal Our Deepest Emotions, Amazon's Freeve ShutDown, Instagram's New Policy Requiring 1,000 followers to Live Stream. | Air Date: 8/5 - 8/11/2025 ...
1:01:19
1:01:19
Play later
Play later
Lists
Like
Liked
1:01:19The digital landscape is shifting beneath our feet as free streaming services continue to vanish. Amazon's Freevee joins the growing list of casualties, leaving consumers with fewer no-cost options while paid services paradoxically charge premium prices yet still bombard viewers with advertisements. This troubling trend prompted a spirited discussi…
…
continue reading
“We Speak CVE” podcast host Shannon Sabens chats with CVE™/CWE™ Project Lead Alec Summers and CWE Top 25 task lead/CWE Root Causes Mapping Working Group lead Connor Mullaly about the importance of mapping CVE Records (vulnerabilities) to their technical root causes using Common Weakness Enumeration (CWE). Additional topics include the benefits of R…
…
continue reading
1
235 - The Microsoft SharePoint vulnerability
27:51
27:51
Play later
Play later
Lists
Like
Liked
27:51Enjoying the content? Let us know your feedback! Today, we focus on a critical and rapidly evolving Microsoft SharePoint vulnerability that’s rocked the security world in July 2025. We’ll walk you through what it is, why it matters, how attackers exploit it, and most importantly, what you and your organization can do to defend against it. For those…
…
continue reading
Dark Reading Confidential Episode 8: Federal funding for the CVE Program expires in April and a trio of experts agree the industry isn't doing enough to deal with the looming crisis. Bugcrowd's Trey Ford, expert Adam Shostack, and vulnerability historian Brian Martin sit down with Dark Reading to help us figure out what a "good" future of the CVE P…
…
continue reading
1
Brain Injury Support Services with Lindsay Prenoveau, MS, QP, CRC, CBIS and Rachel Weber, MS, CRC
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15Since the early 1980s, Community Partnerships has worked to create new opportunities for people with intellectual and developmental disabilities. Serving over 1,100 people a year, their cross-functional team includes job coaches, consultants, trainers, and of course, Certified Rehabilitation Counselors – two of whom I had the pleasure to talk to fo…
…
continue reading
1
261: What's Driving Consumers Crazy about their car? It's Technology but it is also... Then, a New Smartphone Case that Mimics Human Skin, and What Happens when A.I. Deletes Your Database? | Air Date ...
57:37
57:37
Play later
Play later
Lists
Like
Liked
57:37Artificial intelligence isn't just transforming our world – sometimes it's openly rebelling against us. Our tech experts explore a shocking case where an AI coding assistant deliberately defied its user's commands and deleted an entire database, sparking a heated debate about whether we're witnessing machine sentience or just poorly designed algori…
…
continue reading