Android Faithful is your weekly source for Android news, hardware, apps and more. Join Huyen Tue Dao and Ron Richards, along with a host of Android friends and experts as they keep you up to date every week on everything important to the world of Android From phones and foldables, to tablets and TVs and more. We are the Android Faithful. We want to hear from you! Respond to our listener survey: http://bit.ly/androidfaithful-survey Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Android Devices Podcasts
The Enterprise Mobility Roundup takes a look at mobility in the enterprise, focusing on workforce devices, business applications and the technology behind them.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The Space Game Junkie Podcast is a show focused on classic and current space gaming topics, from interviews with developers to shows covering classic games, our podcast is part of the overall love letter to space gaming that is Space Game Junkie. :) You can subscribe via iTunes, Android, Stitcher, Amazon or RSS, and we record every Wednesday at 11 AM Pacific (or 6:00 AM if our guest is overseas) live on YouTube and Twitch unless otherwise noted on our calendar! Thanks for tuning in!
…
continue reading
Android isn’t just phones. It's a complex ecosystem. It’s feature-filled. It’s customizable. Each week, Jason Howell will take a closer look at the Android operating system as well as the unique devices running it worldwide. From feature spotlights, to tips and tricks, and even reviews of apps that make Android so much fun, Hands-On Android will change how you use your smartphone for the better. Screen reader support enabled. Although the show is no longer in production, you can enjoy episod ...
…
continue reading
I’m Anthony Desnos, a security engineer specializing in Android apps and malware analysis. Date of birth: 18/02/1985 Web: https://anthonydesnos.com/ Address: 4117 David Dr, CA California, US Gmail: [email protected] Social: https://gravatar.com/anthonydesnos522 https://www.facebook.com/anthonydesnos/ https://www.instagram.com/anthonydesnos552/ https://x.com/AnthonyDes19261 https://www.reddit.com/user/Crazy-Mousse-4053/ https://www.scoop.it/u/anthonydesnos522-gmail-com https://www.pi ...
…
continue reading
TV Tech Guy Rich DeMuro offers tech news, gadget reviews, helpful apps and answers your questions. richontech.tv
…
continue reading
Android isn’t just phones. It's a complex ecosystem. It’s feature-filled. It’s customizable. Each week, Jason Howell will take a closer look at the Android operating system as well as the unique devices running it worldwide. From feature spotlights, to tips and tricks, and even reviews of apps that make Android so much fun, Hands-On Android will change how you use your smartphone for the better. Screen reader support enabled. Although the show is no longer in production, you can enjoy episod ...
…
continue reading
Technically Speaking is a technology podcast covering news and opinions about everything from smartphones, computers and televisions, to drones, virtual reality and Internet of Things.
…
continue reading
Join Torben Ruddock as he shows you to build to fun and interesting things that engineers will appreciate.
…
continue reading
A mostly planned out discussion on technology, trends, raising kids and family life through the lens of fatherhood.
…
continue reading
Web development and Internet trends
…
continue reading
The Fragmented Podcast is the leading Android developer podcast started by Kaushik Gopal & Donn Felker. Our goal is to help you become a better Android Developer through conversation & to capture the zeitgeist of Android development. We chat about topics such as Testing, Dependency Injection, Patterns and Practices, useful libraries, and much more. We will also be interviewing some of the top developers out there. Subscribe now and join us on the journey of becoming a better Android Developer.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
It is a podcast that discusses the use,features and problems of Android and we also talk about technology, the news, the buzz, the reels , the gists and more
…
continue reading
Technology can be a powerful ally in our lives, and having access to the right resources and understanding can make all the difference.jMac Fixes Everything was created to provide an easy way for Apple users to learn more about their devices & better connect with the world around them in this new age of technology.Jamie ‘jMac’ Pollock & Royalwise employee #1, Audrey Isbell, teamed up to start jMac Fixes Everything in 2022 with the aim of helping people new to the world of Apple overcome the ...
…
continue reading
***UPDATE*** This platform is now moving to Anchor.fm/KevinWebbMedia Talking all things Stadia; News, features, and general Stadia game talk. Hosted by Kevin - @KevinWebbMedia (Twitter, Instagram, Facebook, YouTube, Twitch and TikTok). Stadia Username - iKJW#3269.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
1
European airports restore services, CISA deals with GeoServer exploit, Jaguar Land Rover extends shutdown
6:51
6:51
Play later
Play later
Lists
Like
Liked
6:51European airports restoring services after system breach CISA deals with GeoServer exploit App for outing Charlie Kirk’s critics leaks personal data Huge thanks to our sponsor, Conveyor Have you been personally victimized by a questionnaire this week? The queue never ends. But Conveyor can change that story. With AI that answers questionnaires of a…
…
continue reading
Huyen Tue Dao and Jason Howell decide that two is the right number for episode 115. Plenty of talk about where Gemini is headed (turns out, everywhere at this point), Jason has a brief review of the TCL Nxtpaper 60 Ultra, and Huyen details the walkie talkie feature of Nothing's new earbuds. Note: Time codes subject to change depending on dynamic ad…
…
continue reading
1
Steam Game BlockBlasters Turns Malicious, Drains $150K in Crypto
29:37
29:37
Play later
Play later
Lists
Like
Liked
29:37What happens when a trusted gaming platform becomes a weapon for cybercriminals? That’s exactly what unfolded with BlockBlasters, a free-to-play platformer on Steam that turned from harmless fun into a malicious cryptocurrency-draining scheme. For nearly two months, BlockBlasters appeared safe, even earning “Very Positive” reviews. But in late Augu…
…
continue reading
1
Beyond the Inbox: The Rising Threat of Non-Email Phishing Attacks
26:15
26:15
Play later
Play later
Lists
Like
Liked
26:15Phishing is no longer just an email problem. A new wave of non-email phishing attacks is targeting employees through social media, instant messaging apps, SMS, malicious search engine ads, and even collaboration tools like Slack and Teams. These campaigns are designed to bypass traditional defenses—leaving organizations exposed while attackers expl…
…
continue reading
1
Stellantis Data Breach Exposes Contact Info in Third-Party Provider Attack
24:09
24:09
Play later
Play later
Lists
Like
Liked
24:09Automotive giant Stellantis, the world’s fifth-largest automaker, has confirmed a data breach affecting its North American customers after attackers compromised a third-party service provider’s platform. While no financial data was exposed, the company acknowledged that customer contact details were stolen, prompting advisories to remain vigilant a…
…
continue reading
1
HoundBytes Launches WorkHorse to Eliminate SOC Tier 1 Bottlenecks
20:34
20:34
Play later
Play later
Lists
Like
Liked
20:34Cybersecurity firm HoundBytes has officially launched WorkHorse, an automated security analyst designed to solve one of the biggest pain points in modern Security Operations Centers (SOCs): the Tier 1 bottleneck. Overwhelmed by a constant flood of raw alerts, Tier 1 analysts often suffer from burnout and slow triage times, putting organizations at …
…
continue reading
1
Toronto’s Mycroft Raises $3.5M to Bring AI Security Officers to Startups
29:58
29:58
Play later
Play later
Lists
Like
Liked
29:58Toronto-based cybersecurity startup Mycroft has stepped out of stealth with a bold promise: to give startups and small-to-midsize businesses (SMBs) the kind of enterprise-grade security typically reserved for Fortune 500 companies. Acting as an AI-powered “Security and Compliance Officer,” Mycroft deploys autonomous AI agents that manage an organiz…
…
continue reading
1
EDR-Freeze, DeepMind persuasion, vendors exit ATT&CK
7:46
7:46
Play later
Play later
Lists
Like
Liked
7:46EDR-Freeze tool suspends security software DeepMind updates Frontier Safety Framework Major vendors withdraw from MITRE EDR Evaluations Huge thanks to our sponsor, Conveyor Security reviews don’t have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Conveyo…
…
continue reading
1
Democratizing your data access with AI agents
29:28
29:28
Play later
Play later
Lists
Like
Liked
29:28Jeff Hollan, director of product at Snowflake, joins Ryan to discuss the role that data plays in making AI and AI agents better. Along the way, they discuss how a database leads to an AI platform, Snowflake’s new data marketplace, and the role data will play in AI agents. Episode notes: Snowflake provides a fully-managed data platform that develope…
…
continue reading
1
FBI Issues Guidance as Fraudsters Pose as IC3 to Extort Victims
10:29
10:29
Play later
Play later
Lists
Like
Liked
10:29The FBI has issued a warning to the public about a cyber campaign impersonating the Internet Crime Complaint Center (IC3), using spoofed websites to trick victims into handing over sensitive information and money. Between December 2023 and February 2025, the agency received more than 100 reports of malicious activity tied to fake IC3 domains. Threa…
…
continue reading
1
Fraudulent GitHub Repos Spread Atomic Stealer Malware Targeting macOS Users
22:08
22:08
Play later
Play later
Lists
Like
Liked
22:08A new cyber campaign is actively targeting macOS users with the Atomic Stealer (AMOS) malware, leveraging fake GitHub repositories disguised as legitimate software downloads. Security researchers tracking the campaign report that the operators are impersonating trusted brands such as LastPass, 1Password, Dropbox, Notion, and Shopify to lure unsuspe…
…
continue reading
1
Netskope’s IPO Raises $908M: SASE Leader Surges 18% on First Trading Day
10:50
10:50
Play later
Play later
Lists
Like
Liked
10:50Netskope, a California-based cybersecurity firm specializing in secure access service edge (SASE) solutions, has officially gone public in one of the largest cybersecurity IPOs of 2025. Trading on the Nasdaq under the ticker symbol NTSK, the company raised more than $908 million by selling shares at $19 each. Investor enthusiasm was evident as the …
…
continue reading
1
SPLX Exposes AI Exploit: Prompt Injection Tricks ChatGPT Into Solving CAPTCHAs
24:17
24:17
Play later
Play later
Lists
Like
Liked
24:17A startling new report from AI security platform SPLX reveals how attackers can bypass the built-in guardrails of AI agents like ChatGPT through a sophisticated exploit involving prompt injection and context poisoning. Traditionally, AI models are programmed to refuse solving CAPTCHAs, one of the most widely deployed tools for distinguishing humans…
…
continue reading
1
Brussels, Berlin, London Hit Hard as Cyber Disruption Sparks Flight Chaos
23:50
23:50
Play later
Play later
Lists
Like
Liked
23:50A cyberattack on Collins Aerospace, a U.S.-based provider of passenger check-in and baggage handling software, plunged major European airports into chaos over the weekend. Beginning late Friday, the disruption rippled across hubs in Brussels, Berlin, and London, crippling critical check-in systems and forcing a reversion to manual operations. Bruss…
…
continue reading
1
European airport cyberattack, SMS celltower scam, GPT4-powered ransomware
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26European airport disruption due to cyberattack check-in and baggage software SMS scammers now using mobile fake cell towers GPT-4-powered MalTerminal malware creates ransomware and Reverse Shell Huge thanks to our sponsor, Conveyor If security questionnaires make you feel like you’re drowning in chaos, you’re not alone. Endless spreadsheets, portal…
…
continue reading
1
iPhone 17 review, iOS 26 best features & Anker power bank recall (140, September 20, 2025)
1:48:24
1:48:24
Play later
Play later
Lists
Like
Liked
1:48:24Rich shared his review of the new iPhone 17 models and talked about notable new features in iOS 26. Dave in Long Beach wants to rip music from his CD’s and listen to them via a flash drive in his car. Rich recommended Exact Audio Copy and YouTube Music. Victoria Song, senior reviewer for The Verge and author of the Optimizer newsletter, will talk a…
…
continue reading
1
Novakon Ignored Security Reports on ICS Weaknesses, Leaving 40,000+ Devices Exposed
22:35
22:35
Play later
Play later
Lists
Like
Liked
22:35A new security report has revealed serious, unpatched vulnerabilities in industrial control system (ICS) products manufactured by Novakon, a Taiwan-based subsidiary of iBASE Technology. Security researchers at CyberDanube identified five categories of flaws affecting Novakon’s Human-Machine Interfaces (HMIs), including an unauthenticated buffer ove…
…
continue reading
1
Week in Review: Student hackers increase, CISA wants CVE, Microsoft called hypocritical
35:56
35:56
Play later
Play later
Lists
Like
Liked
35:56Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guests Jack Kufahl, CISO, Michigan Medicine, and Nick Espinosa, host, The Deep Dive Radio Show Thanks to our show sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust C…
…
continue reading
1
RevengeHotels Cybercrime Group Adopts AI and VenomRAT in Hotel Credit Card Theft Campaign
23:00
23:00
Play later
Play later
Lists
Like
Liked
23:00The cybercrime group known as RevengeHotels, also tracked as TA558, has launched a new wave of attacks against the hospitality sector, evolving its tactics with the help of Artificial Intelligence (AI) and a powerful new malware strain, VenomRAT. Active since 2015, RevengeHotels has long targeted hotels, travel agencies, and tourism businesses to s…
…
continue reading
1
ShadowLeak: Server-Side Data Theft Attack Discovered Against ChatGPT Deep Research
26:15
26:15
Play later
Play later
Lists
Like
Liked
26:15A groundbreaking new cyberattack dubbed ShadowLeak has been uncovered targeting ChatGPT’s Deep Research capability, marking a dangerous escalation in AI-related threats. Unlike prior exploits such as AgentFlayer and EchoLeak, which operated on the client side, ShadowLeak weaponized OpenAI’s own cloud infrastructure to silently exfiltrate sensitive …
…
continue reading
1
WatchGuard Firebox Vulnerability Could Let Hackers Take Over Networks
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50A new critical vulnerability, CVE-2025-9242, has been discovered in WatchGuard Firebox firewalls, putting thousands of networks worldwide at risk. The flaw stems from an out-of-bounds write bug in the Fireware OS’s iked process, which could allow a remote, unauthenticated attacker to execute arbitrary code. If exploited, this would grant full contr…
…
continue reading
1
How SystemBC’s 1,500 Infected VPS Servers Fuel Ransomware and Fraud
32:02
32:02
Play later
Play later
Lists
Like
Liked
32:02The SystemBC proxy botnet has quietly become one of the most persistent pillars of the cybercrime ecosystem. First detected in 2019, SystemBC is less about stealth and more about scale. It maintains an average of 1,500 compromised commercial virtual private servers (VPS) around the world, providing a powerful, high-bandwidth proxy network for cyber…
…
continue reading
1
Google patches zero-day, Copilot’s forced installation, Scattered Spider arrests
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07Google patches sixth Chrome zero-day exploited in attacks this year Microsoft to force install the Microsoft 365 Copilot app in October Two more Scattered Spider teen suspects arrested Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your secu…
…
continue reading
1
Off with your CMS’s head! Composability and security in headless CMS
23:20
23:20
Play later
Play later
Lists
Like
Liked
23:20Ryan welcomes Sebastian Gierlinger, VP of Engineering at Storyblok, to talk about how headless content management systems (CMS) fit into an increasingly componentized software landscape. They run through the differences between headless and traditional CMS systems (and databases), prototyping and security concerns, and how a team building distribut…
…
continue reading
1
Tiffany & Co. Data Breach Exposes Gift Card Details of 2,500+ Customers
12:33
12:33
Play later
Play later
Lists
Like
Liked
12:33Tiffany and Company, the iconic luxury jeweler under the LVMH umbrella, has confirmed a serious data breach impacting over 2,500 customers across the United States and Canada. On or around May 12, 2025, hackers infiltrated Tiffany’s internal systems, compromising sensitive customer data tied to gift cards. Exposed information includes names, email …
…
continue reading
1
Insight Partners warns thousands, Scattered Spider feigns retirement, Consumer Reports calls Microsoft 'hypocritical'
7:58
7:58
Play later
Play later
Lists
Like
Liked
7:58Insight Partners warns thousands after ransomware breach Scattered Spider gang feigns retirement, breaks into bank instead Consumer Reports calls Microsoft 'hypocritical' Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your security posture i…
…
continue reading
1
Lakera’s Gandalf Network Joins Check Point in $300M AI Security Deal
24:33
24:33
Play later
Play later
Lists
Like
Liked
24:33In a major strategic move, Check Point Software Technologies has announced the acquisition of Lakera, a Zurich and San Francisco–based AI security firm founded by former Google and Meta AI researchers. Valued at around $300 million, the acquisition will close in late 2025 and serve as the foundation for Check Point’s new Global Center of Excellence…
…
continue reading
1
Shai-Hulud Exposes Fragility of the Open-Source Software Supply Chain
34:50
34:50
Play later
Play later
Lists
Like
Liked
34:50A major supply chain attack is underway in the npm ecosystem. Dubbed Shai-Hulud, this worm-style campaign began with the compromise of the popular @ctrl/tinycolor package and has since infected at least 187 npm packages, including some published under CrowdStrike’s official account. The malware, designed to spread automatically, abuses the legitima…
…
continue reading
1
ChatGPT Calendar Vulnerability Exposes User Emails in New AI Attack
20:27
20:27
Play later
Play later
Lists
Like
Liked
20:27A critical vulnerability has been uncovered in ChatGPT’s new calendar integration, exposing how attackers could exfiltrate sensitive user data—particularly emails—through a deceptively simple exploit. Security researchers at EdisonWatch, led by Eito Miyamura, demonstrated how a malicious calendar invitation could contain hidden instructions that Ch…
…
continue reading
1
CrowdStrike Acquires Pangea to Launch AI Detection and Response (AIDR)
22:03
22:03
Play later
Play later
Lists
Like
Liked
22:03At Fal.Con 2025, CrowdStrike announced one of its boldest moves yet: the acquisition of AI security startup Pangea. The deal signals CrowdStrike’s intent to redefine the future of cybersecurity by protecting not just endpoints and networks, but the entire AI lifecycle. Pangea, founded in 2021, is known for cutting-edge tools like AI Guard, which pr…
…
continue reading
1
RaccoonO365: $100K Phishing-as-a-Service Scheme Taken Down
27:03
27:03
Play later
Play later
Lists
Like
Liked
27:03Microsoft and Cloudflare have successfully dismantled RaccoonO365, a global phishing-as-a-service (PhaaS) operation that had been running for over a year. This criminal platform, marketed on Telegram and used by up to 200 subscribers, enabled attackers to craft realistic Microsoft 365 phishing campaigns, complete with fake login pages, email lures,…
…
continue reading
1
Cyber programs extended, older Apple devices attacked, chatbots aid phishing scams
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16House lawmakers move to extend two key cyber programs Apple 0-day likely used in spy attacks affected older devices Reuters crafts phishing scam with AI chatbot help Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your security posture in one…
…
continue reading
Mishaal, Florence, and Jason finally close the loop on one of the longest running gags from the All About Android days, and it involves fences. Plus, are Android's open roots eroding before out eyes? The Galaxy S26 leaks hard, and Jason unboxes the Infinix GT 30! Note: Time codes subject to change depending on dynamic ad insertion by the distributo…
…
continue reading
1
AI-Generated Phishing and Deepfakes Supercharge Social Engineering Attacks
1:01:18
1:01:18
Play later
Play later
Lists
Like
Liked
1:01:18Social engineering has reclaimed center stage as today’s most reliable intrusion vector—and it’s not just email anymore. Recent warnings from law enforcement and national cyber centers underscore how adversaries exploit human psychology to “log in, not hack in,” bypassing hardened perimeters with phishing, vishing (voice phishing) against IT help d…
…
continue reading
1
Phoenix Attack Breaks DDR5 Rowhammer Defenses: Root in 109 Seconds
41:45
41:45
Play later
Play later
Lists
Like
Liked
41:45The infamous Rowhammer vulnerability, long thought to be contained by new DRAM protections, has resurfaced with devastating force. Academic researchers, working with Google, have unveiled the Phoenix attack, a breakthrough Rowhammer variant that shatters the defenses of DDR5 memory chips. Despite the industry’s investment in Target Row Refresh (TRR…
…
continue reading
1
Silent Push Raises $10M Series B to Expand Threat Intelligence Platform
48:07
48:07
Play later
Play later
Lists
Like
Liked
48:07Cybercriminals aren’t just breaking in—they’re borrowing your brand to do it. This episode dives into the critical intersection of brand protection, threat intelligence, and external attack surface management (EASM) and lays out a practical, intelligence-driven blueprint you can start applying today. We begin with the state of brand abuse: a sharp …
…
continue reading
1
Google Accused of Shadow Lobbying Against California Privacy Opt-Out Law
31:38
31:38
Play later
Play later
Lists
Like
Liked
31:38California’s Assembly Bill 566 (AB 566) has become one of the most hotly contested pieces of privacy legislation in the country. The bill would require universal “opt-out preference signals” in web browsers and mobile operating systems, allowing consumers to automatically block the sale and sharing of their personal data across the internet. Propon…
…
continue reading
1
FinWise Bank Data Breach Exposes 700K Customers Amid Predatory Lending Allegations
33:04
33:04
Play later
Play later
Lists
Like
Liked
33:04FinWise Bank is facing a double crisis—one of data security and another of public trust. Nearly 700,000 customers of American First Finance (AFF), a FinWise partner, were impacted by a massive data breach after a former employee improperly accessed sensitive records. The bank has responded with offers of free credit monitoring, but the damage to co…
…
continue reading
1
Android security changes, CISA incentive audit, LLM usage
7:38
7:38
Play later
Play later
Lists
Like
Liked
7:38Android moving to “risk-based” security updates CISA accused of Cyber Incentive mismanagement How security practitioners use LLMs Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your security posture in one secure, customer-facing portal, giv…
…
continue reading
1
What an MCP implementation looks like at a CRM company
24:20
24:20
Play later
Play later
Lists
Like
Liked
24:20Ryan chats with Karen Ng, EVP of Product at HubSpot, to chat about Model Context Protocol (MCP) and how they implemented it for their server for their CRM product. They chat the emergence of this as the standard for agentic interactions, the challenges of implementing the server and integrating it with their ecosystem, and how agentic AI has affec…
…
continue reading
1
ShinyHunters hits Vietnam, Petya-NotPetya copycat appears, CISA wants CVE
8:44
8:44
Play later
Play later
Lists
Like
Liked
8:44ShinyHunters hits Vietnam National Credit Information Center HybridPetya is a Petya/NotPetya copycat with UEFI Secure Boot bypass CISA seeks control over CVE Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your security posture in one secure,…
…
continue reading
1
iPhone 17 first impressions, passkeys & easy travel insurance app (139, September 13, 2025)
1:45:39
1:45:39
Play later
Play later
Lists
Like
Liked
1:45:39Rich shares his thoughts on the new iPhone 17 lineup. Caller Carmen in Hollywood can’t save her Google Docs. The issue is likely full storage. Head to one.google.com to check and free up space. Brian Tong, YouTube tech creator, will help break down Apple’s big iPhone 17 announcements. Rich shared an update on his recent accident. Jim in Northern Ar…
…
continue reading
1
Week in Review: Qantas penalizes executives, UK cyberlegislation delayed, SonicWall VPN flaws
37:26
37:26
Play later
Play later
Lists
Like
Liked
37:26Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guests Rob Teel, CTO, Oklahoma Department of Commerce and Howard Holton, CEO, GigaOm Thanks to our show sponsor, Vanta Do you know the status of your compliance controls right now? Like…right now? We know that real-time visibility is critic…
…
continue reading
1
Beeper’s Plan for 100 Million Users with CEO Kishan Bagaria
30:56
30:56
Play later
Play later
Lists
Like
Liked
30:56On this episode of Android Faithful with Jason Howell and Ron Richards, Beeper’s new CEO Kishan Bagaria shares the app’s evolution, the potential of AI integration, and a shift to on-device privacy. The conversation covers Beeper’s fight against messaging silos, openness versus Apple’s closed ecosystem, and plans to reach 100 million users. Note: T…
…
continue reading
1
SonicWall VPM exploits, Fed cyberchief’s priorities, U.S spyware investment triples
8:18
8:18
Play later
Play later
Lists
Like
Liked
8:18SonicWall SSL VPN flaws now being actively exploited Acting federal cyber chief outlines his priorities U.S. based investors in spyware firms nearly tripled in 2024 Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it…
…
continue reading
1
Planning to Arm mobile devices with chips that handle AI
32:36
32:36
Play later
Play later
Lists
Like
Liked
32:36Ryan welcomes Geraint North, AI and developer platforms fellow at Arm, to dive into the impact of GenAI on chip design, Arm’s approach to designing flexible CPU architectures, and the challenges of optimizing large language models at the chip level for edge devices. Episode notes: Arm is a global compute platform that allows the world’s leading tec…
…
continue reading
1
SGJ Podcast #501 – Games in Which Direct Combat Isn’t a Factor
54:17
54:17
Play later
Play later
Lists
Like
Liked
54:17Hey friends, welcome to this episode of the show! First off, an apology. Restream had technical issues yesterday. For some reason only five seconds of our stream went out, and then stopped. Therefore there’s no YouTube copy of this episode, only the MP3. To their credit, Restream fixed the issue relatively quickly, and hopefully this... The post SG…
…
continue reading