Welcome to Picks And Bones music podcast where I interview independent artists from across the country. I go beyond the basic interview so you can know the artist as a person not just another cookie cutter story. While I'm open to all genres my base is Red Dirt, Americana and Country. I hope you enjoy getting to know these artists as much and I did.
…
continue reading
Erik Moore Podcasts
From Funko and WWE to Star Wars, Bandai, Marvel, LEGO, and more, grab the cart and hit the aisles with Dave and Erik as they talk toy news, collecting, culture, and more!
…
continue reading
Conversations with productivity experts, authors, and creatives on how to implement productivity strategies in both your professional and personal life. The goal as you listen is to help you gain perspective, practical knowledge, and productivity insights for living a whole life that goes Beyond The To-Do List.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Erik Peacock’s podcast that covers health and fitness for mind, body, and spirit Cover art photo provided by Victor Freitas on Unsplash: https://unsplash.com/@victorfreitas
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Accountant and Motivational Speaker, Nick Christian and Comedian Erik Terrell team up on Nick and Erik in the Monin' to empower the powerful!
…
continue reading
Introducing the WillPower podcast, hosted by a young author and accredited businessman, Will Holdren. Each week, he sits down with some of the top entrepreneurs in the industry to discuss their journey to success, the challenges they faced, and the insights they've gained along the way. From startups to Fortune 500 companies, Will delves into the stories of entrepreneurs who have made a significant impact in their field. Join him as he explores the mindset, strategies, and experiences of the ...
…
continue reading
Archived Audio from local shows
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Comedians go up with no prepared material, ask for audience suggestions, and create Stand-Up On The Spot. Hosted by Jeremiah Watkins. Watch the series on Youtube.
…
continue reading
Get the Scoop on the latest CDR policy developments with Eve Tamme and Sebastian Manhart. Punchy, unfiltered, to the point discussions on all hot developments in the sector. Listen in to go several levels deeper and beyond the analysis that you won't find anywhere else. Enjoy. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
websynradio : a radio program hosted by Dominique Balaÿ. WebSYNradio is an independent radio program whose broadcast is streamed 24/7. WebSYNradio brings together propositions from artists or intellectuals that are for the most part well-established on the international scene.http://synradio.fr/ Parmi les artistes participants : 0 (Joël Merah, Stéphane Garin, Sylvain Chauveau), Adam Nankervis, Alan Dunn, Alfredo Costa Monteiro, Amanda Belantara, Anna O et Alain Descarmes, Anna Raimondo, Anne ...
…
continue reading
Hosted by productivity strategist Mike Vardy, A Productive Conversation offers insightful discussions on how to craft a life that aligns with your intentions. Each episode dives into the art of time devotion, productiveness, and refining your approach to daily living. Mike invites guests who are thinkers, doers, and creators to share their strategies for working smarter and living more intentionally. From practical tips to deep dives on mindset shifts, this podcast will help you reframe your ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Exploring the forgotten and rejected story of Western thought
…
continue reading

1
Checking in on the State of Appsec in 2025 - Janet Worthington, Sandy Carielli - ASW #338
1:07:15
1:07:15
Play later
Play later
Lists
Like
Liked
1:07:15Appsec still deals with ancient vulns like SQL injection and XSS. And now LLMs are generating code along side humans. Sandy Carielli and Janet Worthington join us once again to discuss what all this new code means for appsec practices. On a positive note, the prevalence of those ancient vulns seems to be diminishing, but the rising use of LLMs is e…
…
continue reading

1
Identity, AI & Access: Highlights from Identiverse 2025 - Treb Ryan, Sagi Rodin, Amir Ofek, Artyom Poghosyan, Ajay Amlani, Ajay Gupta - ESW #414
1:49:38
1:49:38
Play later
Play later
Lists
Like
Liked
1:49:38Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
…
continue reading

1
Identity, AI & Access: Highlights from Identiverse 2025 - Sagi Rodin, Ajay Amlani, Treb Ryan, Ajay Gupta, Artyom Poghosyan, Amir Ofek - ESW #414
1:49:38
1:49:38
Play later
Play later
Lists
Like
Liked
1:49:38Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
…
continue reading
Welcome to AICNN (Adventures in Collecting News Network) where toy news matters! This is your AIC NEWS brief. Give us a few minutes, and we'll give you the goods. This week the AICNN anchors highlight what you need to know for the week of July 7th, 2025! Follow us @aic_podcast on Instagram, Facebook, X, and YouTube Start creating a podcast today wi…
…
continue reading

1
Identity, AI & Access: Highlights from Identiverse 2025 - Sagi Rodin, Ajay Amlani, Treb Ryan, Ajay Gupta, Artyom Poghosyan, Amir Ofek - ESW #414
1:49:38
1:49:38
Play later
Play later
Lists
Like
Liked
1:49:38Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
…
continue reading

1
North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran - SWN #491
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran on this edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-491
…
continue reading

1
EU’s 2040 targets: will CDR hit the bullseye?
27:35
27:35
Play later
Play later
Lists
Like
Liked
27:35A day after the European Commission published its legislative proposal for the EU’s 2040 climate target, Eve Tamme and Sebastian Manhart sat down for a timely session to analyse the proposal. Although the expected 90% net reduction in greenhouse gas emissions by 2040 (compared to 1990 levels) is the headline target, several key elements in the prop…
…
continue reading

1
Exploring Meshtastic and LoRa Mesh Networks - Rob Allen - PSW #881
1:08:14
1:08:14
Play later
Play later
Lists
Like
Liked
1:08:14This week, we dive into the world of Meshtastic and LoRa—two technologies empowering secure, long-range, and infrastructure-free communication. We'll talk about the origins of Meshtastic, how LoRa radio works, and why mesh networking is revolutionizing off-grid messaging for adventurers, hackers, emergency responders, and privacy advocates alike. W…
…
continue reading

1
CR104 Quantumania part 2 with Catherine Vollgraff Heidweiller and James Goeders, Google Quantum AI
1:03:09
1:03:09
Play later
Play later
Lists
Like
Liked
1:03:09Quantum computing in 2025 is rapidly advancing toward commercialization, with breakthroughs in algorithms, scalable hardware, and cloud-based quantum services driving real-world applications across finance, healthcare, logistics, and cybersecurity This week, Dave, Esmee, and Rob dive into the cutting edge of quantum computing with Catherine Vollgra…
…
continue reading

1
The Value of Zero Trust - Rob Allen - BSW #402
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected …
…
continue reading

1
Ben Chelf Talks About Reimagining Reading and the Power of Presence
40:34
40:34
Play later
Play later
Lists
Like
Liked
40:34In this episode of A Productive Conversation, I sit down with Ben Chelf—co-founder and CEO of Sol, the company behind the innovative Sol Reader. This single-purpose device is designed to help people reclaim focused, meaningful reading time by stripping away digital distractions. We explore the relationship between attention, technology, and time—an…
…
continue reading

1
Sony, Scattered Spider, Hikvision, Cybercrime, Iran, BSODs, Cloudflare, Josh Marpet.. - SWN #490
31:11
31:11
Play later
Play later
Lists
Like
Liked
31:11Sony, Scattered Spider, Hikvision, Cybercrime, Iran, BSODs, Cloudflare, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-490
…
continue reading

1
Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
…
continue reading

1
SHOWDOWN: Reductions vs Removal Credits - with Renat Heuberger and Marta Krupinska
38:15
38:15
Play later
Play later
Lists
Like
Liked
38:15This gets to the core of the carbon market debate. Reductions, including avoidance credits, currently account for over 95% of credits in the VCM. Meanwhile, removal credits are rapidly gaining momentum, with $6.5B in purchases to date, outpacing the growth of all other credit types. In the Reductions corner, no less than Renat Heuberger, CEO at Ter…
…
continue reading

1
SOTS: Josh Wolf, Tahir Moore, Sara Weinshenk, Jesus Trejo & Jeremiah Watkins | Ep 76
1:12:27
1:12:27
Play later
Play later
Lists
Like
Liked
1:12:27Stand-Up On The Spot! Featuring completely improvised sets from Josh Wolf, Tahir Moore, Sara Weinshenk, Jesus Trejo & Jeremiah Watkins. No material. Comedians create Stand-Up On The Spot off audience suggestions. Everything is covered from Mushrooms to Trump vs Elon Musk, X-Men, & more! Jeremiah Watkins you know from Trailer Tales, Dr. Phil Live, h…
…
continue reading

1
Worlds Collide! The SDCC 2025 Crossover Episode with Between 2 Sentinels
1:43:18
1:43:18
Play later
Play later
Lists
Like
Liked
1:43:18What happens when two irresistible forces meet head on with two immovable objects? We have no idea, but this is what happens when two different toy shows become one to talk all about (and maybe speculate a bit) the upcoming San Diego Comic Con, SH Figuarts Cyclops, and so, so much more. Listen as the boys of AIC are joined by J-Shot and Matchu from…
…
continue reading

1
The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413
1:52:05
1:52:05
Play later
Play later
Lists
Like
Liked
1:52:05Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organ…
…
continue reading

1
The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413
1:52:05
1:52:05
Play later
Play later
Lists
Like
Liked
1:52:05Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organ…
…
continue reading

1
The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413
1:52:05
1:52:05
Play later
Play later
Lists
Like
Liked
1:52:05Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organ…
…
continue reading

1
Inside the Mind of a VC: Rick Segal Returns to Talk Founder Fit, Fundraising & Real Alignment
34:59
34:59
Play later
Play later
Lists
Like
Liked
34:59Back by popular demand, Rick Segal—venture capitalist, entrepreneur, and trusted advisor to countless startups—returns to The Willpower Podcast for a deeper dive into the evolving role of VCs in a founder’s journey. In this candid and insightful conversation, Rick unpacks what founders often misunderstand about venture capital, how great VCs add re…
…
continue reading

1
Global Growth Secrets: How Dr. Shan Nair Helped Tesla & FaceTime Expand Internationally
30:11
30:11
Play later
Play later
Lists
Like
Liked
30:11In this episode, I sit down with Dr. Shan Nair, the visionary founder of Nucleus, a company that’s revolutionized how businesses scale across borders. From helping Tesla navigate international expansion to supporting the growth of FaceTime globally, Dr. Nair shares his unmatched insights into global compliance, operational strategy, and the future …
…
continue reading

1
Broadcom, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and more... - SWN #489
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28Broadcom is coming for you, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-489
…
continue reading

1
Green Claims Directive: what is happening? - with Elisabeth Harding
29:04
29:04
Play later
Play later
Lists
Like
Liked
29:04One of the world's first regulations to fight corporate greenwashing is on the final stretch. Or is it? The final trilogue, the negotiations between the three EU institutions, was pushed back to June 23rd but was ultimately cancelled. A push by the German government and the conservative EPP group in Parliament has led the policy process off the rai…
…
continue reading

1
Is Vuln Management Dead? - HD Moore - PSW #880
2:16:08
2:16:08
Play later
Play later
Lists
Like
Liked
2:16:08This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integrati…
…
continue reading

1
Mamie Kanfer Stewart on Meeting Smarter: How to Stop Wasting Time at Work (Shortcast)
10:48
10:48
Play later
Play later
Lists
Like
Liked
10:48In this Shortcast edition, Mamie Kanfer Stewart, co-author of Momentum: Creating Effective, Engaging and Enjoyable Meetings, explains why meetings are one of the biggest productivity drains—and how to fix them. From clarifying desired outcomes to optimizing who’s in the room, Mamie shares practical, people-focused strategies to make meetings more e…
…
continue reading

1
CRSP06 Bonus Telecom special: Big Frontiers of the Telecoms Industry, Vivek Badrinath, GSMA
49:41
49:41
Play later
Play later
Lists
Like
Liked
49:41The telecom industry is undergoing a fundamental transformation. This shift is creating new business opportunities and services but also brings significant challenges in transformation and modernization. In this special bonus episode, building on our Reimagining Telecoms mini-series, we dive into the current opportunities shaping today’s dynamic te…
…
continue reading
Pièce inédite de Pascal Deleuze pour webSYNradio : mon tout premier bruit. Lamentation pour un deuil impossible, cette pièce pour trompette en multipistes est aussi bien la trompe des légions romaines que la voix du kaddish de Maurice Ravel.Pascal Deleuze : trompette, voix. Guillaume Contré : enregistrement, montage, mixage. http://synradio.fr/pasc…
…
continue reading

1
Thriving Through Volatility: Insights for CISOs - Jeff Pollard, Pejman (Pej) Roshan, Deepen Desai - BSW #401
1:05:24
1:05:24
Play later
Play later
Lists
Like
Liked
1:05:24In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
…
continue reading

1
Jenny Wood Talks About Wild Courage and Fearless Self-Advocacy
43:45
43:45
Play later
Play later
Lists
Like
Liked
43:45In this episode of A Productive Conversation, I'm joined by Jenny Wood — author of the book Wild Courage: Go After What You Want and Get It. Jenny and I dive deep into the nine supposedly “negative” traits she reclaims as powerful tools for getting what you want in work and life. From her 18-year journey at Google, rising from entry-level to execut…
…
continue reading

1
Aligning the VCM with Government Policy - with Alexia Kelly
29:15
29:15
Play later
Play later
Lists
Like
Liked
29:15Should the VCM shape or follow government policy? The Voluntary Carbon Market is at a crossroads as governments ramp up climate ambition and explore carbon markets. What would a genuine alignment between VCM and government policy look like? What are the risks and opportunities? How can the VCM support both national and global net-zero goals? To hel…
…
continue reading

1
The Rise of Malware: Salt Typhoon and Spark Kitty - SWN #488
35:37
35:37
Play later
Play later
Lists
Like
Liked
35:37In this episode of Security Weekly News, Doug White discusses various cybersecurity threats, including the Salt Typhoon and Spark Kitty malware, the implications of Microsoft's decision to drop support for old hardware drivers, and the potential increase in cyber threats from Iran. The conversation also covers the alarming 16 billion password leak …
…
continue reading

1
How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336
1:01:18
1:01:18
Play later
Play later
Lists
Like
Liked
1:01:18Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
…
continue reading

1
Rethinking Identity: IAM, PAM & Passwordless Trends from Identiverse - David Lee, Amit Masand, Chip Hughes, Ashley Stevenson, John Pritchard, Matt Caulfield - ESW #412
1:38:23
1:38:23
Play later
Play later
Lists
Like
Liked
1:38:23In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
…
continue reading

1
Rethinking Identity: IAM, PAM & Passwordless Trends from Identiverse - David Lee, Amit Masand, Chip Hughes, Ashley Stevenson, John Pritchard, Matt Caulfield - ESW #412
1:38:23
1:38:23
Play later
Play later
Lists
Like
Liked
1:38:23In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
…
continue reading
Welcome to AICNN (Adventures in Collecting News Network) where toy news matters! This is your AIC NEWS brief. Give us a few minutes, and we'll give you the goods. This week the AICNN anchors highlight what you need to know for the week of June 23rd, 2025! Follow us @aic_podcast on Instagram, Facebook, X, and YouTube Start creating a podcast today w…
…
continue reading

1
Rethinking Identity: IAM, PAM & Passwordless Trends from Identiverse - Chip Hughes, Ashley Stevenson, John Pritchard, Amit Masand, Matt Caulfield, David Lee - ESW #412
1:38:23
1:38:23
Play later
Play later
Lists
Like
Liked
1:38:23In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
…
continue reading

1
Mike Vardy on The Productivity Diet: Feeding What Fuels You
42:11
42:11
Play later
Play later
Lists
Like
Liked
42:11I’m excited to welcome back Mike Vardy to the show. Mike is a productivity strategist, longtime friend of the podcast, and the author of The Productivity Diet: A Practical Guide to Nurturing Your Productive Potential. In this conversation, we dive into how the language, systems, and inputs you choose each day can either nourish or deplete your abil…
…
continue reading

1
The world's first durable CDR transaction under the Paris Agreement - with Veronika Elgart
26:58
26:58
Play later
Play later
Lists
Like
Liked
26:58The Paris Agreement's carbon markets could be worth up to $250 billion annually and reduce or remove gigatons of CO2. But how do we operationalise it? How can countries start trading durable removals under the Paris Agreement’s Article 6.2 mechanism? Norway and Switzerland have just agreed on the first durable removals transaction under this framew…
…
continue reading

1
Donut Holes, clickfix, rapperbots, bad devs, war, Doug Rants about Backups, and More. - SWN #487
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37Donut Holes, clickfix, rapperbots, bad devs, war, Doug Rants about Backups, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-487
…
continue reading
Say no more.By Earl Fontainelle
…
continue reading
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
…
continue reading

1
Donald Miller on Productivity: How to Focus, Finish, and Find Meaning (Shortcast)
10:03
10:03
Play later
Play later
Lists
Like
Liked
10:03In this Shortcast edition, Donald Miller, author of Building a StoryBrand, shares how applying storytelling principles can bring clarity, purpose, and momentum to your personal and professional life. Drawing from narrative theory, Donald explains how to see your life as a story—complete with a clear goal, supporting characters, and an inciting inci…
…
continue reading

1
CR103: Cloud on the rocks [AAA]: Transformation into a product-driven enterprise
1:02:03
1:02:03
Play later
Play later
Lists
Like
Liked
1:02:03[AAA] In 'Access All Areas' shows we go behind the scenes with the crew and their friends as they dive into complex challenges that organizations face—sometimes getting a little messy along the way. This week, we address the ‘big rocks’ that can obstruct or delay successful outcomes in organizational transformations. Dave, Esmee, and Rob are joined…
…
continue reading

1
CISO Cyber Insurance Empowerment - Morey Haber, Peter Hedberg, Stephan Jou - BSW #400
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41In this episode of Business Security Weekly, Mandy Logan, along with guests Peter Hedberg, Summer Craze Fowler, and Ben Carr, delve into the complexities of cyber insurance and the empowerment of Chief Information Security Officers (CISOs). The discussion covers the evolving landscape of cyber insurance, the critical role of underwriting, and the i…
…
continue reading