A regular conversation with those at the convergence of data privacy, data security, data regulation, records, and governance.
…
continue reading
Data Security Podcasts
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth, Bailey Harmon, and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Signal Jam is a podcast about regaining and maintaining privacy in the face of pervasive corporate and government surveillance. Co-hosts, Jay and Michael, discuss practical steps that anyone can take toward achieving that outcome— no matter how 'tech-savvy' they may be.
…
continue reading
Conversations at the crossroads of data, AI, governance, cybersecurity, and digital transformation. Join Kate Carruthers as she dives into the world of data, AI, governance, cybersecurity, and digital transformation. Each episode explores how technology is changing business, society, and everyday life. From protecting privacy to powering innovation, this podcast breaks down the trends and ideas shaping the future of our digital world - all in clear, engaging conversations you’ll actually enj ...
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
DM Radio is the world's longest-running show about data! Since 2008, we've interviewed the industry's brightest minds about AI, analytics, big data, cloud, data warehousing, digital transformation, Internet of Things (IoT), streaming and many other topics. Now broadcasting coast-to-coast, we're always looking for new voices. Send an email to [email protected]!
…
continue reading
Interesting, fascinating, provoking, insightful - or all of the above - GDPR decisions, rulings and other tidbits discussed by two very opinionated people.
…
continue reading
A podcast on the journey to discovery through data in information security by Bob Rudis & Jay Jacobs
…
continue reading
🎙️ Pods & Ears: Where Data Drives the Conversation In agriculture, opinions are everywhere—but data tells the real story. Pods & Ears, brought to you by Innovative Grain, digs into the numbers behind Soybeans and Corn to uncover what’s truly moving the market. Each episode breaks down the latest fundamental and technical data, along with insights from 1st, 2nd, and 3rd party sources. You’ll hear from industry voices, thought leaders, and data innovators who help turn complex information into ...
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
Welcome to The Data Flowcast: Mastering Apache Airflow ® for Data Engineering and AI— the podcast where we keep you up to date with insights and ideas propelling the Airflow community forward. Join us each week, as we explore the current state, future and potential of Airflow with leading thinkers in the community, and discover how best to leverage this workflow management system to meet the ever-evolving needs of data engineering and AI ecosystems. Podcast Webpage: https://www.astronomer.io ...
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
1
Healthcare NOW Radio Podcast Network - Discussions on healthcare including technology, innovation, policy, data security, telehealth and more. Visit HealthcareNOWRadio.com
Healthcare NOW Radio and Podcast Network - Radio and Podcasts for the Healthcare Industry
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
…
continue reading
The Rebel Tech podcast, hosted by Zach Whiting and David Dunmoyer, is a product of the Texas Public Policy Foundation that explores technology and innovation, and its implications on everything from culture, public policy discussions, business, to how we live our lives and interact with one another. The Rebel Tech podcast features prominent guests, ranging from lawmakers to entrepreneurs to thought leaders fighting on the side of humanity on the digital frontier.
…
continue reading
Techlore Surveillance Report is your weekly deep-dive into the privacy and security news that matters for your digital freedom. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode cuts through the noise to bring you carefully selected stories with the context, analysis, and historical perspective you need to truly understand what's happening to protect yourself (and others!) in the digital space. Topics covered include: • Privacy tool updates and v ...
…
continue reading
The PICCASO award winning Podcast, for those who are interested in the hottest field of human rights and laws on the digital frontier. Whether you are a professional who wants to learn more about privacy, data protection, or cyber law or someone who just finds this fascinating, we have topics for you from data management to cybersecurity, from social justice to data ethics and AI. In-depth information on serious privacy topics This podcast, hosted by Dr. K Royal, Paul Breitbarth and Ralph O' ...
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team. Join us live on YouTube, Monday's at 4:30PM ET
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
…
continue reading
The Power of Digital Policy is a podcast that teaches you and your organization how to balance the risks and opportunities that come with operating websites, social media, mobile applications, voice assistants, AI and other channels. Through a monthly focus on individual topics, such as accessibility, cookies, copyrights, social media faux pas, data breaches, and data privacy, you will learn how to develop guardrails to maximize digital opportunity and minimize risk. Whether you work for a s ...
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Covering everything from the future of organizational culture to accelerated cloud adoption, in this inaugural podcast series, Splunk thought leaders sit down with Principal Analyst Daniel Newman to discuss the unique intricacies organizations are navigating in an era of rapid digital transformation and how data remains the key solution to thriving in uncertain times.
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
Expert mode marketing technology, AI, and CX insights from top brands and Martech platforms fill every episode, focusing on what leaders need to know to build customer lifetime value and long-term business value. The Agile Brand with Greg Kihlström® features executives and thought leaders from top brands and tech platforms discussing the industry's trends, like AI adoption, first-party data strategies, artificial intelligence in the consumer journey, consumer data privacy, omnichannel custom ...
…
continue reading
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
…
continue reading
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime. Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
…
continue reading
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj research staff and journalists interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
The Water Data Podcast is a talk show on the science, systems, and stories of water hosted by Veena Srinivasan. Every other Tuesday, sit down and listen to researchers, innovators, government officials and business leaders working on the forefront of water systems. Veena Srinivasan is an award-winning socio-hydrologist as well as the founder and Executive Director of WELL Labs, a water systems research and innovation centre based in Bengaluru, India. The Water Data Podcast features discussio ...
…
continue reading
1
Rogue NuGet package steals data, Venezuela's PDVSA suffers attack, patched Fortinet flaws exploited
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45Rogue NuGet package steals data Venezuela's PDVSA suffers attack Patched Fortinet flaws exploited Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Picture a "new hire" who interviews well… except they're synthetic: AI video, AI voice, AI backstory. O…
…
continue reading
1
Revenue Cycle Optimized: Live Demo AR and Denials Automation in Action
38:10
38:10
Play later
Play later
Lists
Like
Liked
38:10Live Demo AR and Denials Automation in ActionListen in as AR and denials management automation comes to life in this live demo of Infinx ARDM. Christina Harkins walks through how AI-driven denial prevention, claim prioritization, and productivity analytics transform how revenue cycle teams work.Find all of our network podcasts on your favorite podc…
…
continue reading
1
Enterprise AI That Keeps Your Data Secure: Secure Strategies for Grain Elevators
22:34
22:34
Play later
Play later
Lists
Like
Liked
22:34Rob Huston breaks down why current grain markets and South American supply are pressuring margins and how grain elevators must operate smarter to compete.The episode explains five practical AI applications for market analysis, customer prioritization, forecasting, risk detection, and document search — and warns about the governance risks of using f…
…
continue reading
1
Why Granular Visibility and Data Control Determines AI Success in Financial Services - with Chris Joynt of Securiti
30:24
30:24
Play later
Play later
Lists
Like
Liked
30:24Today's guest is Chris Joynt, Director of Product Marketing at Securiti. Securiti is a leader in AI-powered data security, privacy, and governance across hybrid and multi-cloud environments. Chris joins Emerj Editorial Director Matthew DeMello to explore why trust in data remains the defining challenge for AI in financial services, and how institut…
…
continue reading
1
ODNI and UVA's National Security Data and Policy Institute
16:26
16:26
Play later
Play later
Lists
Like
Liked
16:26Charles Luftig, Deputy Director of National Intelligence for Policy and Capabilities, joined the Security Clearance Careers Podcast to discuss the National Security Data and Policy Institute (NSDPI). He shared insights on the origins of the institute, why UVA was a natural match for this partnership, and the interdisciplinary nature of the NSDPI’s …
…
continue reading
1
Data Integrity, AI Risk, Cyber Realities and tech leadership with Kate Carruthers
44:21
44:21
Play later
Play later
Lists
Like
Liked
44:21In this episode of the Technology & Security podcast, host Dr. Miah Hammond-Errey is joined by Kate Carruthers. Kate is currently the head of data analytics and AI at the Australian Institute of Company Directors. She shares her journey from defending Westfield against state and non-state cyber attacks to leading UNSW's enterprise data, AI, and cyb…
…
continue reading
1
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359
59:02
59:02
Play later
Play later
Lists
Like
Liked
59:02For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-2…
…
continue reading
1
5. Data Security. "Ctrl + Alt + Secure". Pulling your security together.
20:56
20:56
Play later
Play later
Lists
Like
Liked
20:56Welcome!...to 'Getting to Grips with Data Security' our podcast for anyone interested in learning more about how to 'beat the hackers' using the best types of information security controls. This new 5 part series covers all aspects of data security for businesses where we discuss: Ep 1: Strategy; Ep 2: Cloud Controls; Ep 3: People Risk; Ep 4: Using…
…
continue reading
1
Rebuilding Security for the Data-Driven Future
53:42
53:42
Play later
Play later
Lists
Like
Liked
53:42Join this DM Radio episode with Sean Knapp of Ascend and Jack Smith of Syncari, as we explore how security must evolve in an AI-driven, real-time world. Discover why legacy TCP/IP approaches fall short as organizations push intelligence to the edge and leverage billions of sensors. Learn about the growing global maturity of cybersecurity and how in…
…
continue reading
1
Rewiring Systems to Scale AI From Demos to Deliverables - Nina Edwards of Prudential Insurance
28:06
28:06
Play later
Play later
Lists
Like
Liked
28:06Today's guest is Nina Edwards, Vice President of Emerging Technology and Innovation at Prudential Insurance. With decades of experience driving strategy, innovation, and AI-enabled growth at leading financial and consulting firms, Nina brings deep expertise in applied intelligence and emerging technology. Nina joins Emerj Editorial Director Matth…
…
continue reading
1
On the Zero Day of Christmas - Cisco Devices Under Attack
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35Cybersecurity Today: Cisco Zero Day Exploited & Maritime Cyber Attack Unfolds In this episode of Cybersecurity Today, host David Shipley discusses a series of critical cybersecurity incidents, including the exploitation of a zero-day flaw in Cisco email security infrastructure by a China-linked group, a Hollywood-style attack on an Italian ferry in…
…
continue reading
1
#786: Thrad CEO Andrea Tortella on advertising in your conversational AI
32:27
32:27
Play later
Play later
Lists
Like
Liked
32:27What if the most valuable part of your next conversation with an AI wasn't the answer it gave, but the ad it served? Agility requires more than just adopting new platforms; it demands a complete re-imagination of how brands provide value within them. It challenges us to move from interruption to integration, ensuring our presence is not only seen b…
…
continue reading
1
The Law That Protects Your Online Speech Is Under Attack
41:31
41:31
Play later
Play later
Lists
Like
Liked
41:31This week's Surveillance Report covers the internet's free speech protections under attack as a US Senator moves to repeal Section 230. Plus: ransomware attacks escalate with React2Shell exploitation, India orders government access to encrypted messaging, AI "superintelligence" fear is being used to justify actual corporate manipulation happening r…
…
continue reading
1
Hot Take Predictions for Next Year – 2025-12-15
1:02:11
1:02:11
Play later
Play later
Lists
Like
Liked
1:02:11Join us LIVE on Mondays, 4:30pm EST. A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team. https://www.youtube.com/@BlackHillsInformationSecurity Chat with us on Discord! - https://discord.gg/bhis 🔴live-chat 🔗 Register for FREE webcasts, summits, and workshops - ht…
…
continue reading
1
2025 in Review: NLP, Upskilling & Intelligent Orchestration
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02Join this episode of DMRadio to look back at 2025, a year defined by natural language automation, rapid upskilling, and intelligent orchestration across the enterprise. Host Eric Kavanagh interviews Binny Gill of Kognitos, John Munsell of Ingrain AI, and Peter Sprygada of Itential about how NLP-driven interfaces and coordinated automation changed t…
…
continue reading
1
FTC orders crypto to pay, New exploit of React2Shell, Ukraine fraud ring take down
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27FTC orders crypto to pay New exploit of React2Shell Ukraine-based fraud ring taken down Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. In deepfake scams, the tells aren't glitchy video anymore – it's behavior: "Do this right now," or "keep it secre…
…
continue reading
1
When AI Pretends to Be Your CEO: How Companies Stay Secure
1:00:42
1:00:42
Play later
Play later
Lists
Like
Liked
1:00:42If your business relies on video calls, messaging apps, or mobile devices, you are at risk for a new kind of attack. In this episode of IT Visionaries, host Chris Brandt sits down with Christine Gadsby, Chief Security Officer at BlackBerry, to explore how AI, deepfakes, and weakened telecom infrastructure are reshaping the modern threat landscape. …
…
continue reading
1
Accelerating Speed to Value through Agentic Systems and Intelligent Automation in Life Sciences - with Robert Wenier of AstraZeneca
35:16
35:16
Play later
Play later
Lists
Like
Liked
35:16Today's guest is Robert Wenier, Global Head of Cloud and Infrastructure at AstraZeneca. Robert leads enterprise cloud, infrastructure, and platform strategy across a highly regulated, data-intensive global organization. Robert joins Emerj CEO and Head of Research Daniel Faggella to discuss how enterprise data and AI architectures are shifting from …
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, p…
…
continue reading
The Grumpy GDPR show is back on the road! 🚌 Today: missed stops, wrong turns and someone definitely ending up under the wheels. Buckle up! 🔗 Go to shownotesBy Rie & Miloš
…
continue reading
1
FBI Most Wanted. Ruja Ignatova. Story of OneCoin.
34:23
34:23
Play later
Play later
Lists
Like
Liked
34:23Question? Text our Studio direct. This is the True Cyber Crime Story of Ruja Ignatova A/K/A The Crypto Queen, on the FBI’s Top 10 MOST WANTED. She is wanted and remains at large. It's alleged to be the single largest Crypto currency Ponzi scheme in history. Three main players, Ruja Ignatova (The Crypto Queen), her brother Konstantin and Sebastian G…
…
continue reading
Send us a text On this week of Serious Privacy, Paul Breitbarth, Ralph O’Brien, and Dr. K Royal connect with Val Ilchenko, Eric Sendelbach, and Ian Runyon of TrustArc to discuss the launch of the Arc. Join us as we discuss the factors that went into developing the Arc, challenges for privacy and data protection professionals, and how AI is baked in…
…
continue reading
1
AI Security Interview Questions - AI Security Training and Certification - 2026
16:42
16:42
Play later
Play later
Lists
Like
Liked
16:42Enroll now in the Certified AI Security Professional (CAISP) course by Practical DevSecOps! This highly recommended certification is designed for the engineers , focusing intensely on the hands-on skills required to neutralize AI threats before attackers strike. The CAISP curriculum moves beyond theoretical knowledge, teaching you how to secure AI …
…
continue reading
1
Governing AI for Fraud, Compliance, and Automation at Scale - with Naveen Kumar of TD Bank
22:06
22:06
Play later
Play later
Lists
Like
Liked
22:06Today's guest is Naveen Kumar, Head of Insider Risk, Analytics, and Detection at TD Bank. With deep expertise in financial crime and risk analytics, he offers a frontline view into how regulated institutions manage AI securely at scale. Naveen joins Emerj Editorial Director Matthew DeMello to discuss the foundations required for responsible AI adop…
…
continue reading
1
React2Shell Vulnerability, Black Force Phishing Kit, Microsoft OAuth Attacks, and PornHub Data Breach
14:46
14:46
Play later
Play later
Lists
Like
Liked
14:46In this episode of Cybersecurity Today, host Jim Love discusses a range of pressing cybersecurity threats. The show covers the escalating React2Shell vulnerability, which has led to widespread automated exploitation campaigns involving crypto miners and back doors. Additionally, Jim reports on the Black Force phishing kit, which bypasses multifacto…
…
continue reading
1
#785: Avaya CTO David Funck on building persistent memory of the customer with AI
26:01
26:01
Play later
Play later
Lists
Like
Liked
26:01What if every AI interaction with a customer built upon the last, instead of starting from scratch every single time, or at least having it feel that way? Agility requires not just reacting quickly to customer needs, but learning continuously from every interaction to anticipate the next one. This means our technology, especially our AI, can't oper…
…
continue reading
1
Risky Business #819 -- Venezuela (credibly?!) blames USA for wiper attack
54:05
54:05
Play later
Play later
Lists
Like
Liked
54:05In the final show of 2025, Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: React2Shell attacks continue, surprising no one The unholy combination of OAuth consent phishing, social engineering and Azure CLI Venezuela’s state oil firm gets ransomware’d, blames US… but what if it really is a US cyber op?! Russian junk-h…
…
continue reading
1
Microsoft Bug Bounty, CISA hiring surge, US goes offensive in cyber ops, OWASP Top 10
42:22
42:22
Play later
Play later
Lists
Like
Liked
42:22Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates in cybersecurity, including Microsoft's overhaul of its bug bounty program, CISA's hiring strategy amidst workforce challenges, the US's shift towards a more aggressive cyber strategy, and insights from the updated OWASP Top 10 vulnerabilities. The…
…
continue reading
1
Developing Open Source Skills for Maintaining Projects - Kat Cosgrove - ASW #361
1:03:55
1:03:55
Play later
Play later
Lists
Like
Liked
1:03:55Open source projects benefit from support that takes many shapes. Kat Cosgrove shares her experience across the Kubernetes project and the different ways people can make meaningful contributions to it. One of the underlying themes is that code is written for other people. That means PRs need to be understandable, discussions need to be enlightening…
…
continue reading
Host Max Havey digs into the world of agentic AI-enabled threats and cyber espionage with guests Neil Thacker, Global Privacy and Data Protection Officer at Netskope, and Ray Canzanese, Head of Netskope Threat Labs. Together they discuss a recent report from Anthropic about the first-ever reported agentic AI-orchestrated cyber espionage campaign, e…
…
continue reading
Please enjoy this encore of Word Notes. A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually. CyberWire Glossary link: https://thecyberwire.com/glossary/microsegmentation Audio reference link: “Micro-Segmentation Masterpieces,” PJ Kirner, Illumio CTO and Co-Founder, …
…
continue reading
1
US taps private firms in cyber offensive, Microsoft updates cause queuing failures, phishing campaign delivers Phantom Stealer
7:46
7:46
Play later
Play later
Lists
Like
Liked
7:46US turns to private firms in cyber offensive Microsoft updates cause queuing failures Phishing campaign delivers Phantom stealer Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Attackers don't need malware anymore; they need trust. Tip: set a simple…
…
continue reading
1
Transparency for AI Systems, Regulations, and Humans in Agricultural Manufacturing - with Kun He of Bayer
35:24
35:24
Play later
Play later
Lists
Like
Liked
35:24Today's guest is Kun He, Lead Scientific Advisor at Bayer Crop Science. He joins Emerj Editorial Director Matthew DeMello to discuss how AI is transforming human talent and workforce development in agricultural manufacturing, balancing data-driven efficiency with the irreplaceable role of human gut instinct. Kun also explores practical takeaways, s…
…
continue reading
1
Department of Know: MITRE's weaknesses list, DoD goes postquantum, Coupang fallout
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Andy Ellis, Principal, Duha, and Johna Till Johnson, CEO and Founder, Nemertes Research Thanks to our show sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. AI is rewriting the…
…
continue reading
1
Shadow AI, boardroom blind spots, and the insurance wake-up call
28:58
28:58
Play later
Play later
Lists
Like
Liked
28:58As AI adoption races ahead of regulation, companies are facing a new and largely uncharted risk landscape. In this episode of The Power of Digital Policy, Kristina Podnar is joined by Russ Fradin, CEO of Larridin, and Michael Levine, Partner at Hunton Andrews Kurth, to unpack the realities of shadow AI, emerging legal exposure, and the quiet but si…
…
continue reading
I’ve had some truly amazing interviews this past year. For your listening enjoyment, I’ve curated a set of clips from some of the best shows, creating a sampler platter of stellar audio content from some amazing guests! If you’ve never listened to my podcast, this will give you a taste of what you’re missing! If you’re a regular listener, this will…
…
continue reading
1
The Secret History of Women at the CIA – A Conversation with Liza Mundy
23:01
23:01
Play later
Play later
Lists
Like
Liked
23:01Women have been integral to the intelligence community since its earliest days, yet for decades their contributions remained obscured—hidden not only by secrecy but also by policy and silence. In her recent book, The Sisterhood: The Secret History of Women at the CIA, author Liza Mundy brings these untold stories to light. She traces the journeys o…
…
continue reading
1
Gaming to Cybersecurity: How AI Agents Fight Alert Overload
35:19
35:19
Play later
Play later
Lists
Like
Liked
35:19What if you could hire an army of AI security analysts that work 24/7 investigating alerts so your human team can focus on what actually matters? Edward Wu, founder and CEO of DropZone AI, joins The Audit crew to reveal how large language models are transforming security operations—and why the future of cyber defense looks more like a drone war tha…
…
continue reading
1
MongoDB records exposed, Apple WebKit patches, Coupang culprit identified
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:5416TB MongoDB database exposes nearly 4.3 billion professional records Apple posts updates after discovery of WebKit flaws Coupang data breach traced to ex-employee Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Deepfakes aren't science fiction anym…
…
continue reading
1
Cybersecurity Today: Apple Security Updates, AI Search Engine Scams, Torrent Malware, and Stanford's AI Penetration Testing
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48In this episode of Cybersecurity Today, host David Shipley discusses significant developments in the cybersecurity landscape. Apple releases security updates to address two actively exploited WebKit vulnerabilities. Scammers manipulate AI-powered search tools to recommend fake support numbers, reflecting a growing security risk. Bitdefender uncover…
…
continue reading
1
#784: Monday.com Global Creative Director Robbie Ferrara on clarifying the benefits of AI
27:41
27:41
Play later
Play later
Lists
Like
Liked
27:41What if the biggest risk in deploying AI isn't the technology itself, but how your team is able to understand its most significant benefits? Agility requires more than just adapting your technology stack; it demands a flexible brand narrative and a creative approach that can evolve with customer sentiment and cultural shifts. This is particularly t…
…
continue reading
1
Unscripted the AMCP Podcast: Marty Acevedo, Parkinson's
19:35
19:35
Play later
Play later
Lists
Like
Liked
19:35On this episode Fred Goldstein invites Marty Acevedo, MS, RD, Patient Advocate and President & Board Chair of the Parkinson’s Association of San Diego. Marty shares her personal journey with Parkinson’s disease—from a delayed diagnosis to managing symptoms, treatment decisions, and the impact on daily life. She discusses the importance of individua…
…
continue reading
1
The Healthtech Marketing Show: AI Quick Take: What’s All The Fuss About Gemini?
29:07
29:07
Play later
Play later
Lists
Like
Liked
29:07AI Quick-Take: What’s All The Fuss About Gemini?On this episode host Adam Turinas discusses the buzz around Gemini 3, Google’s LLM. He digs into Google’s big announcement and tries to get past the hype to what it really means for healthtech marketers.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and li…
…
continue reading
1
This Just In Radio: HLTH 2025 with Rowland Illing, MD and Jonathan Bush
27:39
27:39
Play later
Play later
Lists
Like
Liked
27:39On this episode Justin records live at HLTH25 in Las Vegas.This week on the final HLTH25 episode, Justin talks to Rowland Illing, MD, Global Chief Medical Officer and Director at Healthcare and Life Sciences at Amazon Web Services (AWS), and Jonathan Bush, Founder & Chief Executive Officer at Zus Health.…
…
continue reading
1
Defensive Security Podcast Episode 332
1:02:13
1:02:13
Play later
Play later
Lists
Like
Liked
1:02:13Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://www.darkreading.com/cyberattacks-data-breaches/advanced-security-phishing-tactics https://www.theregister.com/2025/11/28/posthog_shaihulud/?td=keepreading / https://posthog.com/blog/nov-24-shai-hulud-attack-post-mortem https://www…
…
continue reading
1
The Hidden Danger of Storing Secrets Online | Interview with Jake Knott from Watchtower
38:16
38:16
Play later
Play later
Lists
Like
Liked
38:16In this episode of Cybersecurity Today, host Jim Love discusses the shocking discovery of over 80,000 leaked credentials and secrets in online code formatting tools with Jake Knott, a principal security researcher from Watchtower. They delve into the vulnerabilities exposed by these tools, the inadvertent leaking of sensitive information, and how a…
…
continue reading
1
Healthcare de Jure: Clay Ritchey, CEO, Verato
29:28
29:28
Play later
Play later
Lists
Like
Liked
29:28Host Matt Fisher talks to Clay Ritchey, CEO of Verato, about powering and defining the patient and customer experience; establishing individual identity through comprehensive data; meeting rising expectations on experience; driving positive interaction between healthcare organizations and patients.To stream our Station live 24/7 visit www.Healthcar…
…
continue reading
1
VBC Insights: Reimagining Cardiovascular Service Lines to Drive Growth and Value
28:05
28:05
Play later
Play later
Lists
Like
Liked
28:05Episode 142 - Reimagining Cardiovascular Service Lines to Drive Growth and ValueCardiovascular service lines are in the midst of a major transformation, reshaping how physicians and health systems deliver care. Sites of service are shifting, patients present with greater complexity, and prevention is taking on a more prominent role across the conti…
…
continue reading