Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast! Security Journey introduces the newest go-to AppSec resource, The Security Champions Podcast, hosted by Director of Application Security Michael Burch.Gain exclusive insight from software development leaders and security experts – from recounting their security champion journey to diving into the latest headlines in the AppSec world. Learn how to build, maintain and scale a successful software securit ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
Financial security isn’t just about numbers—it’s about peace of mind, protection, and a lasting legacy. Welcome to The JondaKnows Show, where we bring together leading personal finance experts, industry professionals, and real-world success stories to empower you with practical financial wisdom that helps you take control of your money. Are you a personal finance expert, author, coach, or industry professional with valuable insights on budgeting, investing, borrowing, or financial security? ...
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
…
continue reading
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
…
continue reading
Welcome to Premio Inc's rugged edge media hub, a resource for rugged edge computing content that features product videos, technical application videos, podcasts, and company insights.
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Three essential stories to round off your working day. Explaining the big topics and news from Africa, the people behind them, plus an African perspective on global stories. Hosted by Audrey Brown. Five days a week, ready by late afternoon, Monday to Friday.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
Consumer advocacy in application security
…
continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
continue reading
As a Visa Consultant based in Chandigarh, Amit Kakkar has gained extensive experience in providing Visa services to clients. With his vast knowledge of the Visa application process and his understanding of the complex legal requirements, Amit has helped countless individuals and families secure their visas.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
The podcast of foojay.io, a central resource for the Java community’s daily information needs, a place for friends of OpenJDK, and a community platform for the Java ecosystem — bringing together and helping Java professionals everywhere.
…
continue reading
The need for change in the fundraising sector has never been greater. But innovations in technology are evolving faster than our ability to understand them. Are these advances good or bad? Do they have unintended consequences? And what is the application to the fundraising sector? That’s what we’re here to find out. Welcome to the FundraisingAI podcast, your up-to-date resource for beneficial and responsible AI for the global fundraising community. In our podcast, we explore the intersection ...
…
continue reading
An application technology podcast series with industry engineers that promises to keep you up to speed on some of the embedded semiconductor industry’s newest, fastest-growing and most exciting technologies, applications, and design techniques used by renowned industry engineers. Experience endless episodes packed with entertaining discussion topics that cover the latest ins and outs of embedded systems as well as how to thrive in trending markets while avoiding common design pitfalls and st ...
…
continue reading
Sales is a thinking process. The Catalyst Sale Podcast is a weekly podcast with Catalyst Sale founder Mike Simmons and host Jody Maberry. We discuss real stories with practical application, in the context of B2B Sales. Other topics discussed include - Sales Strategy, Revenue Operations, Training, Onboarding, Sales Enablement, Organization Enablement, Workforce Development, and Execution.
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
The cybersecurity podcast about application security and those who practice it. Hosted by tech industry veterans Frank Catucci and Dan Murphy, AppSec Serialized by Invicti puts a new spin on the ”two guys talking” format by starting each episode with a security-themed fiction story in the style of old-time radio shows. Each episode focuses on a specific area of cybersecurity, with the hosts and their guests sharing their practitioners’ experiences and opinions, sprinkled liberally with a sol ...
…
continue reading
Technical interviews about software topics.
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Podcasts from the MiSec, OWASP Detroit, and BSides Detroit communities.
…
continue reading
Struggling to keep pace with the ever-changing world of technology? For experienced tech professionals, making sense of this complexity to find real strategic advantages is key. This series offers a clear path, featuring insightful, casual conversations with leading global experts, innovators, and key voices from Red Hat, all cutting through the hype. Drawing from Red Hat's deep expertise in open source and enterprise innovation, each discussion delves into new and emerging technologies-- fr ...
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
Explore and learn about the present and future of application delivery and security, and how to solve the business challenges facing IT teams and end users.
…
continue reading

1
Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334
1:09:09
1:09:09
Play later
Play later
Lists
Like
Liked
1:09:09CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
…
continue reading

1
David Kosorok - Mastering Application Security
1:02:58
1:02:58
Play later
Play later
Lists
Like
Liked
1:02:58David Kosorok, the Director of Information Security Programs at Toast, Inc., has over 25 years of experience in software and security testing - including more than 16 years dedicated to security. He’s led and scaled product security programs across organizations of all sizes, making him a trusted voice in the appsec space. In this episode of The Se…
…
continue reading

1
Microsoft 365 Copilot Newsroom - May 2025
40:05
40:05
Play later
Play later
Lists
Like
Liked
40:05Want a quick download of the latest releases, updates, and tips for Microsoft 365 Copilot? With ongoing updates and new releases, it can be hard to keep up with all the great things you can do in M365 Copilot. Valorem Reply’s Modern Work experts are offering a Microsoft 365 Copilot Newsroom series where we compile the most important news and learni…
…
continue reading

1
Has the Shared Security Model for SaaS Shifted?
28:55
28:55
Play later
Play later
Lists
Like
Liked
28:55All links and images can be found on CISO Series. Check out this post by Justin Pagano at Klaviyo for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is Jesse Webb, CISO and svp information systems, Avalon Healthcare Solutions. In th…
…
continue reading

1
Microsoft 365 Copilot Newsroom - April 2025
28:00
28:00
Play later
Play later
Lists
Like
Liked
28:00Want a quick download of the latest releases, updates, and tips for Microsoft 365 Copilot? With ongoing updates and new releases, it can be hard to keep up with all the great things you can do in M365 Copilot. Valorem Reply’s Modern Work experts are offering a Microsoft 365 Copilot Newsroom series where we compile the most important news and learni…
…
continue reading

1
TanStack and the Future of Frontend with Tanner Linsley
54:13
54:13
Play later
Play later
Lists
Like
Liked
54:13TanStack is an open-source collection of high-performance libraries for JavaScript and TypeScript applications, primarily focused on state management, data fetching, and table utilities. It includes popular libraries like TanStack Query, TanStack Table, and TanStack Router. These libraries emphasize declarative APIs, optimized performance, and deve…
…
continue reading

1
teissTalk: Mitigating human cyber-risks with data and behavioural sciences
45:38
45:38
Play later
Play later
Lists
Like
Liked
45:38Which behaviours increase risk and how we can measurably change them Driving employee engagement without incentives Which real-time interventions encourage safer employee behaviours Jonathan Craven, Host, teissTalk https://www.linkedin.com/in/jonathanbcraven/ Rebecca Stephenson, Specialist Lead Lecturer, Highlands College https://www.linkedin.com/i…
…
continue reading
Welcome to "Securing the Future," the podcast dedicated to navigating the complex world of AI security. In this episode, we unpack the vital role of AI security frameworks—acting as instruction manuals—in safeguarding AI systems for multinational corporations. These frameworks provide uniform guidelines for implementing security measures across div…
…
continue reading
A 31-year-old blogger, Albert Ojwang, has died in police custody in Kenya. A post-mortem revealed that he was hit on the head and his death was likely to have been caused by assault. The results of the post-mortem contradict police previous claims which said Albert had "sustained head injuries after hitting his head against a cell wall". His death …
…
continue reading

1
Episode 071 - The Future of HubSpot is Passwordless - Alyssa Robinson
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39The Future of HubSpot is Passwordless Learn how HubSpot’s CISO Alyssa Robinson breaks down passwordless authentication, innovative security strategies, and the art of balancing usability with protection on the latest episode. + + + Find more episodes on YouTube or wherever you listen to podcasts, as well as at netspi.com/agentofinfluence.…
…
continue reading

1
Episode 59 - Human + AI: Shaping the Nonprofit Work of Tomorrow
48:48
48:48
Play later
Play later
Lists
Like
Liked
48:48In an era where Artificial Intelligence is redefining our world at a remarkably swift pace, the traditional way of doing things no longer guarantees decent outcomes. The transformation of how we work, create, and find meaning due to AI puts the conventional job pyramid into a disruptive mode. It’s our responsibility to embrace curiosity, adapt bold…
…
continue reading

1
Security Money: The Index is Up, CISOs Need to Get Out, and Are You Burning Out? - BSW #399
56:27
56:27
Play later
Play later
Lists
Like
Liked
56:27This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
…
continue reading

1
Ignore Ram Shankar Siva Kumar’s Previous Directions
38:24
38:24
Play later
Play later
Lists
Like
Liked
38:24In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share Ram Shankar Siva Kumar’s dynamic keynote from BlueHat India 2025, where he explores the evolving threat landscape of AI through the lens of the Microsoft AI Red Team. From adversarial machine learning to psychosocial harms and persuasive AI, Ram highlights real-world…
…
continue reading

1
The Case for Telemetry with Liz Fong-Jones
32:17
32:17
Play later
Play later
Lists
Like
Liked
32:17How can modern telemetry solutions help you? While at NDC in Melbourne, Richard chatted with Liz Fong-Jones of Honeycomb about her approach to educating leadership on creating great telemetry solutions for organizations. Liz discusses the importance of being able to answer questions about reliability issues without causing problems, as opposed to r…
…
continue reading

1
Vixen Panda, NPM, Roundcube, IoT, 4Chan, Josh Marpet, and more... - SWN #484
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23Vixen Panda, NPM, Roundcube, IoT, 4Chan, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-484
…
continue reading
Hayden Smith, Hunted Labs Co-Founder comes on Absolute AppSec to discuss, among other things, the Hunted Labs work discovering and publicizing the EasyJson software supply chain threat. Before co-founding Hunted Labs, Hayden was Senior Director of Field Services at Anchore, assisting US government, intelligence, and Fortune 500 clients. Long a spec…
…
continue reading
Russia says the paramilitary group Wagner has accomplished its mission and has left Mali, although a Russian presence remains in the West African country, through the Africa Corps. So what did the Wagner Group achieve? Why has a separatist movement on the tiny, remote island of Annobón that is part of Equatorial Guinea, appealed to Argentina for su…
…
continue reading

1
The Challenge of AI Model Evaluations with Ankur Goyal
44:22
44:22
Play later
Play later
Lists
Like
Liked
44:22Evaluations are critical for assessing the quality, performance, and effectiveness of software during development. Common evaluation methods include code reviews and automated testing, and can help identify bugs, ensure compliance with requirements, and measure software reliability. However, evaluating LLMs presents unique challenges due to their c…
…
continue reading

1
Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334
1:09:09
1:09:09
Play later
Play later
Lists
Like
Liked
1:09:09CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
…
continue reading

1
Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334
1:09:09
1:09:09
Play later
Play later
Lists
Like
Liked
1:09:09CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
…
continue reading

1
Episode 114: SQL Server 2025 Security Improvements
25:21
25:21
Play later
Play later
Lists
Like
Liked
25:21In this episode, Michael talks to Pieter Vanhove and Pratim Dasgupta about the new security changes in SQL Server 2025. The news includes updates on MCP, Private Link and Microsoft Build 2025 security sessions presented by Michael and Sarah. https://aka.ms/azsecpod
…
continue reading
In 2023, Uganda voted in some of the world's harshest anti-homosexual legislation meaning that anybody engaging in certain same-sex acts can be sentenced to death. The World Bank decided to ban Uganda from receiving loans because of its legislation. The bank now says it's confident that new "mitigation measures" will allow it to roll out funding in…
…
continue reading

1
The enterprise security news, more secure by removing credentials, & RSAC interviews - Marty Momdjian, Amit Saha, Dr. Tina Srivastava - ESW #410
1:38:02
1:38:02
Play later
Play later
Lists
Like
Liked
1:38:02Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
…
continue reading

1
Elsa, Redline, ChaosRat, iMessage, Bladed Feline , Aaran Leyland, and More... - SWN #483
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00Elsa, Redline, ChaosRat, iMessage, Bladed Feline , Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-483
…
continue reading

1
How is Africa affected by the US travel ban?
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37Is Trump's latest travel ban part of a US disengagement from Africa? Why are many countries now shifting their views on Western Sahara in favour of Morocco? And how can digital skills be made more available for disabled people in Africa? Presenter: Audrey BrownProducers: Sunita Nahar, Patricia Whitehorne and Tom Kavanagh in London, with Charles Git…
…
continue reading

1
Updating & Protecting Linux Systems - PSW #877
1:05:23
1:05:23
Play later
Play later
Lists
Like
Liked
1:05:23Two parts to this episode: Tech Segment: Updating Linux Systems - Beyond apt-get upgrade * Custom scripts for ensuring your Linux systems are up-to-date * topgrade - tutorial for using topgrade to update Linux systems on various Linux distributions Discussion Topic: Anti-Malware and/or EDR on Linux Platforms * PCI calls for scanning Linux systems *…
…
continue reading

1
2025 Stanley Cup Finals - Constantine, Jacquelyn, Mike
32:17
32:17
Play later
Play later
Lists
Like
Liked
32:17Jacquelyn: “It honestly looked like a high school or college team was playing a professional team.” Constantine: “Passion. Commitment. Tenacity. These guys live and breathe this shit.” The crew recaps Round 2 of the Stanley Cup playoffs, confessing their inaccurate picks and celebrating Constantine's 50% accuracy. With deep hockey insight and hilar…
…
continue reading

1
Lesotho: Why are mothers against 'bluetoothing'?
34:58
34:58
Play later
Play later
Lists
Like
Liked
34:58Mothers in Lesotho are campaigning against a needle sharing method which exposes drug users to the risks of HIV and other diseases, taking root in the country. What is 'bluetoothing' or 'hotspotting'? Also, the wider impact of the rising Islamist attacks in West Africa And why do people choose Hunger strikes as a form of protest, and are they effec…
…
continue reading

1
Improving the Efficiency of Your Threat Intelligence
26:40
26:40
Play later
Play later
Lists
Like
Liked
26:40All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest Jason Steer, CISO, Recorded Future. In this episode We don't need more indica…
…
continue reading

1
Modern Distributed Applications with Stephan Ewen
41:02
41:02
Play later
Play later
Lists
Like
Liked
41:02A major challenge with creating distributed applications is achieving resilience, reliability, and fault tolerance. It can take considerable engineering time to address non-functional concerns like retries, state synchronization, and distributed coordination. Event-driven models aim to simplify these issues, but often introduce new difficulties in …
…
continue reading
Mali's army says it has repelled attacks by jihadists on two military bases. Why is the Al-Qaeda linked group stepping up attacks? South Africa's continued hunt for an alleged illegal mining kingpin in Lesotho And why is Nigeria the worst place in the world to give birth in? Presenter: Audrey BrownProducers: Sunita Nahar and Tom Kavanagh in London.…
…
continue reading

1
Episode 58 - Courage: From Fear to Forward Motion in the Age of AI with Mallory Erickson
40:59
40:59
Play later
Play later
Lists
Like
Liked
40:59In today’s rapidly evolving landscape of technology, Artificial Intelligence isn’t just another tool but is becoming a part of the framework of how we live and work. But with that realization comes the question: What does it mean to use AI responsibly? How do we balance innovation with impact? And what happens if we let fear get in our way of engag…
…
continue reading

1
Regain Control of Business Risks, Your Leadership Habits, and Being Present - Alla Valente - BSW #398
1:18:17
1:18:17
Play later
Play later
Lists
Like
Liked
1:18:17During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
…
continue reading

1
Securing the Edge: Exploring Advanced FPGA Technology
17:12
17:12
Play later
Play later
Lists
Like
Liked
17:12In today's embedded design, engineers have the capability to include System-on-Chip (SoC) FPGAs, which not only provide the flexibility of a programmable logic matrix, but embedded processing cores as well. FPGAs are also offering more advanced layers of security today for both design and data protection. In this episode of our special Executive In…
…
continue reading

1
Scaling AI inference with open source ft. Brian Stevens
29:39
29:39
Play later
Play later
Lists
Like
Liked
29:39Explore the future of enterprise AI with Red Hat's SVP and AI CTO, Brian Stevens. In this episode, we delve into how AI is being practically reimagined for real-world business environments, focusing on the pivotal shift to production-quality inference at scale and the transformative power of open source.Brian Stevens shares his expertise and unique…
…
continue reading

1
Fixing a Security Vulnerability in Active Directory with Steve Syfuhs
49:33
49:33
Play later
Play later
Lists
Like
Liked
49:33Why would a security vulnerability take more than two years to fix? Richard chats with Steve Syfuhs about the evolution of the response to KB5015754. Originally published in 2022, the issue involved vulnerabilities in the on-premises certificate authority for Active Directory. Pushing a fix to force the immediate replacement of the certificates cou…
…
continue reading