Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Enterprise Mobile Weekly Podcasts

show episodes
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
In each episode I talk about a mobile topic that is of interest to enterprises of all sizes. I cover devices (smartphones, tablets, wearables), software, design, development, security, infrastructure and strategy. Show is hosted by @maneshlad, Manesh Lad is a seasoned IT professional with expertise in development, architecture, training, project management with a focus on enterprise mobility.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
“Let’s Talk Loyalty” is an industry podcast for loyalty marketing professionals. If you work in loyalty marketing, join us every week to learn the latest ideas and marketing insights from loyalty specialists around the world. Check out our website on: http://www.letstalkloyalty.com/
  continue reading
 
Artwork

1
How I AI

Claire Vo

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
How I AI, hosted by Claire Vo, is for anyone wondering how to actually use these magical new tools to improve the quality and efficiency of their work. In each episode, guests will share a specific, practical, and impactful way they’ve learned to use AI in their work or life. Expect 30-minute episodes, live screen sharing, and tips/tricks/workflows you can copy immediately. If you want to demystify AI and learn the skills you need to thrive in this new world, this podcast is for you.
  continue reading
 
Freshly squeezed ideas to make your organization successful on its enterprise mobility journey. New episodes are posted every week covering a variety of topics related to mobility in the enterprise -- subscribe to make sure you don't miss an episode! This podcast is produced by Apperian, the mobile app management company.
  continue reading
 
Artwork

1
landscape mode

Ike DeLorenzo, Justin Megahan

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hosts Ike DeLorenzo and Justin Megahan cover the technology, drama, and corporate positioning of the mobile industry -- and the ongoing state of enterprise and consumer mobility.
  continue reading
 
Artwork

1
SMACtalk

Brian Fanzo and Daniel Newman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
SMACtalk hosted by Brian Fanzo and Daniel Newman is a weekly live podcast where the hosts discuss a wide range of topics ranging from technology, digital transformation and future of work. The show is often recorded live at enterprise technology events and includes thought leaders in social media, mobility, analytics and cloud.
  continue reading
 
Every week Wayne Scott from brings together a team of technology journalists from www.ITProPortal.com to discuss, share analysis and argue about the biggest Tech News stories of the past week. From enterprise and business technology, to tech start ups, consumer gadgets, office IT and mobile you can get informed here. Plus join us live at some of the many technology shows around the world like CeBit, IFA, Infosec, The Gadget Show and much more !
  continue reading
 
Artwork
 
Welcome to DataNext Podcast, every week our CEO Zeeshan Baig talks about latest Tools and Technologies, shares his experience, Best practices on Cloud computing, Big data, DevOps, Security. Tips on work-life balance, Professional Career and much much more. Subscribe and stay up to date with what's Next in Enterprise IT.
  continue reading
 
Artwork

1
Digital Nibbles Podcast

Digital Nibbles Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Why Digital Nibbles? We’re providing listeners with bites (or is that bytes?) of technology info. We’ll be diving into cloud computing and data center topics our audience is curious about like big data, dev ops, mobile enterprise apps, and storage. We're live every other week - join us at our Website to ask questions and participate in the discussion!
  continue reading
 
Artwork

1
Futurum Tech Webcast

The Futurum Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Futurum Tech Webcast Leading tech analysts from The Futurum Group share weekly deep dives on the latest tech news, new products and services, mergers, earnings, regulations, and more. The Futurum Tech Webcast will keep you current on what's happening in the tech space — from startups to industry leaders, emerging tech, and what's ahead for industries across the globe, along with interviews with tech industry leaders and experts. Subscribe now and stay connected to this exciting journey into ...
  continue reading
 
SocialZoomFactor is a podcast created for you, the business and marketing leader in startups to enterprise organizations. If you want to learn how to integrate social media, content marketing, experiential branding, digital marketing and the latest technology to zoom results in business and life you won't be disappointed in the energy and information Pam Moore delivers 5 days a week. Each episode brings you actionable tactics and strategies you can implement today for real business results. ...
  continue reading
 
Artwork
 
Bringing you the latest news, views and experiences in Technology, Talent and Transformational change hosted by CTO, Author and leading Tech For Good advocate Prof. Sally Eaves @sallyeaves. With weekly episodes and an inspiring diversity of guests from some of the most pioneering organisations, projects and people of our time, this is Your engaging space to learn from C-Suite to Student, CIO to Academic and Enterprise to SME. Our shows focus on the latest innovations in emergent technology i ...
  continue reading
 
Loading …
show series
 
In today’s pre-Thanksgiving episode, I walk you through how I vibe coded my very own “Thanksgiving party hub” using Lovable—and how I transformed it from AI-generated slop into something warm, personal, and genuinely useful. I show you exactly how I upleveled the typography, visuals, and structure using Google Fonts and Midjourney style references,…
  continue reading
 
It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
  continue reading
 
It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
  continue reading
 
Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
  continue reading
 
Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
  continue reading
 
This episode is available in audio format on our Let's Talk Loyalty podcast and in video format on www.Loyalty.TV. Today's interview features insights from MSET, a UAE based digital solution company that is helping brands build smarter and more meaningful loyalty experiences, with an amazing client list in FMCG (fast-moving consumer goods) and tele…
  continue reading
 
Tim McAleer is a producer at Ken Burns’s Florentine Films who is responsible for the technology and processes that power their documentary production. Rather than using AI to generate creative content, Tim has built custom AI-powered tools that automate the most tedious parts of documentary filmmaking: organizing and extracting metadata from tens o…
  continue reading
 
Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
  continue reading
 
Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
  continue reading
 
Analysts Don Kellogg and Roger Entner discuss the growing expectations of Verizon layoffs, what a potential restructuring could mean for carrier retail, and why 2026 may be a make-or-break year for the wireless industry. 00:00 Episode intro 00:25 Verizon layoffs overview 02:07 Why Q4 matters 04:13 Carrier cost-cutting and retail evolution 06:17 Lay…
  continue reading
 
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-529
  continue reading
 
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
  continue reading
 
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
  continue reading
 
This episode is available in audio format on our Let's Talk Loyalty podcast and in video format on www.Loyalty.TV. In its 3rd year, the Australian Loyalty Insights Report reveals three main themes. This report is brought to the loyalty industry by The Australian Loyalty Association and the Association's CEO, Sarah Richardson unveils the insights to…
  continue reading
 
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
  continue reading
 
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
  continue reading
 
Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
  continue reading
 
Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
  continue reading
 
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
  continue reading
 
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
  continue reading
 
In this episode of Let’s Talk Loyalty & Loyalty TV we sit down with Kristoffer Windall Juhl , Managing Director and CEO of Tekla, to explore how a digitally-first, Scandinavian brand has built an unwaveringly loyal customer base. From the meticulous care put into Tekla’s products to creating immersive retail experiences, Kristoffer shares insights …
  continue reading
 
Matt Britton is the founder and CEO of Suzy, a consumer insights platform that has raised over $100 million in venture capital and works with top brands like Coca-Cola, Google, Procter & Gamble, and Nike. Matt is also the bestselling author of YouthNation, a blueprint for understanding the seismic shifts shaping our future economy, and Generation A…
  continue reading
 
Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
  continue reading
 
Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the cha…
  continue reading
 
Analysts Don Kellogg and Roger Entner discuss Dish’s Q3 earnings, its sale of spectrum to SpaceX, and T-Mobile’s new Text-to-911 offer that's free to all. 00:00 Episode intro 00:26 Dish Q3 earnings overview 01:22 AWS-3 sold to SpaceX 03:03 How will Elon use the spectrum? 04:00 T-Mobile offers free emergency 911 texting 04:56 Dead zones are dying 06…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
This episode is available in audio format on our Let's Talk Loyalty podcast and in video format on www.Loyalty.TV. Tune into Let’s Talk Loyalty and Loyalty TV to hear from Sid Krishna, Vice President of Carnival Cruise Line, on how Carnival is elevating the customer experience as a key party of earning customer loyalty through fleet innovations, ex…
  continue reading
 
This episode is for complete beginners. I walk you through how to build your very first coding project using AI tools—even if you’ve never written a line of code. Together, we’ll create a personal project hub that automatically generates documentation and lets you build interactive prototypes. I’ll show you the process step by step—from setting up …
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
This episode of Let's Talk Loyalty & Loyalty TV is in Spanish Hoy en Let’s Talk Loyalty en español converso con Max Everett, Director de Lealtad en Enterprise Mobility. Desmenuzamos Enterprise Plus, la estrategia de lealtad de la marca, su relación con Emerald Club y Emerald Aisle, y cómo juntos crean valor real para el viajero. Hablamos del rol de…
  continue reading
 
Tim Trueman and Alexa Cerf from Faire’s data team demonstrate how AI tools are revolutionizing data analysis workflows. They show how data teams, product managers, and engineers can use tools like Cursor, ChatGPT, and custom agents to investigate business metrics, analyze experiment results, and extract insights from user surveys—all while dramatic…
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
Analysts Don Kellogg and Roger Entner discuss Q3 earnings from Verizon, Comcast, and Charter, and what these trends signal for the industry heading into 2026. 00:00 Episode intro 00:25 Verizon earnings overview 02:25 Cable stops raising prices on fewer customers 04:53 How should Verizon use its network? 07:31 Youth-centric plans to attract customer…
  continue reading
 
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
  continue reading
 
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
  continue reading
 
In this impromptu Halloween special, Marco Casalaina (VP of Products for Core AI at Microsoft) demonstrates how he uses GitHub Spark to quickly build a mobile app that generates kid-friendly fortunes for trick-or-treaters. — Where to find Marco Casalaina: LinkedIn: https://www.linkedin.com/in/marcocasalaina/ X: https://x.com/amrcn_werewolf?lang=en …
  continue reading
 
This episode is available in audio format on our Let's Talk Loyalty podcast and in video format on www.Loyalty.TV. Paula Thomas here - proud Founder and CEO of Let's Talk Loyalty and Loyalty TV.... with my final ever episode for you as a host of our show. It's been an incredible experience to interview so many incredible guests and loyalty leaders …
  continue reading
 
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play