Our podcast series, SHeroeS - Celebrating African Female Excellence, will be back in full swing as soon as possible. We are excited to announce this. Join Stephanie Etiaka as she spotlights the elite women on the African continent—SHeroeS—who are empowering their communities through entrepreneurship and innovation. Featuring stories from their journeys, we learn from these ladies who are breaking through the most challenging and ambitious initiatives in Africa.
…
continue reading
Blacklight Build Podcasts
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
There are many lessons business can learn from the military and your host Pete Liston is going to share exactly what he learnt in the Australian Army that has allowed him to create and build multiple 7 figure businesses. Pete will be joined by guests who have also transitioned from military to entrepreneurship and are keen to share their stories.
…
continue reading
1
The Illusion of Security: How IAM Anti-Patterns Sneak into Every System
6:42
6:42
Play later
Play later
Lists
Like
Liked
6:42This story was originally published on HackerNoon at: https://hackernoon.com/the-illusion-of-security-how-iam-anti-patterns-sneak-into-every-system. IAM isn’t security by default. Learn how common IAM anti-patterns create false confidence, enable breaches, and how to fix them before it’s too late. Check more stories related to cybersecurity at: htt…
…
continue reading
1
The $50,000 PDF No One Reads: Why Your Security Audits Are Failing
4:50
4:50
Play later
Play later
Lists
Like
Liked
4:50This story was originally published on HackerNoon at: https://hackernoon.com/the-$50000-pdf-no-one-reads-why-your-security-audits-are-failing. Security isn't about generating paperwork; it's about finding the cracks before the water gets in. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check e…
…
continue reading
1
Post-Quantum Cryptography: Why Your Encryption Has a 5-Year Shelf Life
8:40
8:40
Play later
Play later
Lists
Like
Liked
8:40This story was originally published on HackerNoon at: https://hackernoon.com/post-quantum-cryptography-why-your-encryption-has-a-5-year-shelf-life. RSA encryption faces quantum threat by 2030. Learn why your encrypted data has a 5-year shelf life and how to migrate to quantum-safe cryptography. Check more stories related to cybersecurity at: https:…
…
continue reading
1
Astra’s New Cloud Vulnerability Scanner Targets the “Oops Factor” Behind 73% of Cloud Breaches
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15This story was originally published on HackerNoon at: https://hackernoon.com/astras-new-cloud-vulnerability-scanner-targets-the-oops-factor-behind-73percent-of-cloud-breaches. Astra’s scanner detects cloud misconfigurations causing 73% of breaches with real-time monitoring, agentless visibility, and validated risk alerts. Check more stories related…
…
continue reading
1
How Compliance Requirements Shape Modern Software Architecture
4:19
4:19
Play later
Play later
Lists
Like
Liked
4:19This story was originally published on HackerNoon at: https://hackernoon.com/how-compliance-requirements-shape-modern-software-architecture. GDPR's "right to be forgotten" just redesigned your database. HIPAA moved your PHI to a separate infrastructure. Here’s how compliance shapes architecture. Check more stories related to cybersecurity at: https…
…
continue reading
1
The Markup's Blacklight Tool Now Has New Tracking Info and Caching Options
2:06
2:06
Play later
Play later
Lists
Like
Liked
2:06This story was originally published on HackerNoon at: https://hackernoon.com/the-markups-blacklight-tool-now-has-new-tracking-info-and-caching-options. Blacklight, The Markup’s real-time web privacy detector tool, has exposed privacy violations on COVID-19 vaccine websites and has spurred legislative action. Check more stories related to cybersecur…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/should-you-trust-your-vpn-location. IPinfo reveals how most VPNs misrepresent locations and why real IP geolocation requires active measurement, not claims. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive…
…
continue reading
1
SAIS-GRC Framework: Establishing Trust and Enhancing Resilience in AI-Driven Supply Chains
18:49
18:49
Play later
Play later
Lists
Like
Liked
18:49This story was originally published on HackerNoon at: https://hackernoon.com/sais-grc-framework-establishing-trust-and-enhancing-resilience-in-ai-driven-supply-chains. The SAIS-GRC Framework is not a reactive measure but a blueprint for a new competitive advantage. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecuri…
…
continue reading
1
Quantum Security Governance: Building a Framework for the Post-Quantum World
15:28
15:28
Play later
Play later
Lists
Like
Liked
15:28This story was originally published on HackerNoon at: https://hackernoon.com/quantum-security-governance-building-a-framework-for-the-post-quantum-world. The convergence of quantum computing advancements and evolving cybersecurity regulations is reshaping how organizations approach security governance. Check more stories related to cybersecurity at…
…
continue reading
1
Why One Lock Isn’t Enough: How Buburuza Designs Multi-Layer Security for AI Banking
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46This story was originally published on HackerNoon at: https://hackernoon.com/why-one-lock-isnt-enough-how-buburuza-designs-multi-layer-security-for-ai-banking. Why AI banking needs multi-layer security, not just encryption. Buburuza’s COO explains how to stop deepfake fraud and breaches. Check more stories related to cybersecurity at: https://hacke…
…
continue reading
1
The Hidden Cost of Invalid Traffic: Why IP Data Is the Missing Link
4:43
4:43
Play later
Play later
Lists
Like
Liked
4:43This story was originally published on HackerNoon at: https://hackernoon.com/the-hidden-cost-of-invalid-traffic-why-ip-data-is-the-missing-link. IPinfo stops invalid traffic by detecting bots, VPNs, and proxies with real-time IP intelligence, helping ad platforms cut waste and improve ROI. Check more stories related to cybersecurity at: https://hac…
…
continue reading
1
The Battle for the Borders: How AI and Cyber Intelligence Are Reshaping Statecraft
9:23
9:23
Play later
Play later
Lists
Like
Liked
9:23This story was originally published on HackerNoon at: https://hackernoon.com/the-battle-for-the-borders-how-ai-and-cyber-intelligence-are-reshaping-statecraft. From Tel Aviv to Silicon Valley, a new generation of AI-driven intelligence platforms is redefining how states secure their borders. Check more stories related to cybersecurity at: https://h…
…
continue reading
1
Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies In 2026
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47This story was originally published on HackerNoon at: https://hackernoon.com/link11-identifies-five-cybersecurity-trends-set-to-shape-european-defense-strategies-in-2026. DDoS attacks will increasingly be used as Diversion Tactics. API-First Architectures Increase Exposure to Misconfigurations and Business Logic Abuse. Check more stories related to…
…
continue reading
1
Debunking the "99.8% Accurate IP Data" Claim
7:59
7:59
Play later
Play later
Lists
Like
Liked
7:59This story was originally published on HackerNoon at: https://hackernoon.com/debunking-the-998percent-accurate-ip-data-claim. IPinfo explains why ‘99% accurate IP data’ is misleading and how real accuracy requires ongoing measurement, transparency, and ProbeNet validation. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyb…
…
continue reading
1
What I Learned from Scanning Dozens of Small Government Websites (and Why the Same Bugs Keep Coming)
9:27
9:27
Play later
Play later
Lists
Like
Liked
9:27This story was originally published on HackerNoon at: https://hackernoon.com/what-i-learned-from-scanning-dozens-of-small-government-websites-and-why-the-same-bugs-keep-coming. What I found while scanning dozens of small U.S. government websites with an open-source tool — the same five security mistakes and how to fix them. Check more stories relat…
…
continue reading
1
SASE Meets Edge AI: Why Security Will Be Decided in the First Millisecond
13:20
13:20
Play later
Play later
Lists
Like
Liked
13:20This story was originally published on HackerNoon at: https://hackernoon.com/sase-meets-edge-ai-why-security-will-be-decided-in-the-first-millisecond. In security, milliseconds decide trust. Why Edge AI must judge every packet instantly to prevent threats without killing performance. Check more stories related to cybersecurity at: https://hackernoo…
…
continue reading
1
The Hidden Cost of “Free” Apps and the Battle for Your Attention
7:12
7:12
Play later
Play later
Lists
Like
Liked
7:12This story was originally published on HackerNoon at: https://hackernoon.com/the-hidden-cost-of-free-apps-and-the-battle-for-your-attention. The “free” model of popular apps often disguises data collection, behavioral profiling, and monetization of user attention. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurit…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/is-shadow-ai-worse-than-shadow-it. Shadow IT was just the first of the hidden threats; now shadow AI has upped the ante. But which is worse — and how can you defend against them? Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You ca…
…
continue reading
1
Authorization in the Age of AI Agents: Beyond All-or-Nothing Access Control
25:20
25:20
Play later
Play later
Lists
Like
Liked
25:20This story was originally published on HackerNoon at: https://hackernoon.com/authorization-in-the-age-of-ai-agents-beyond-all-or-nothing-access-control. Authorization is the process of determining *what* you’re allowed to do. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content…
…
continue reading
1
Automating Incident Response: How to Reduce Malware Forensics Time by 99% with Python and VirusTotal
5:03
5:03
Play later
Play later
Lists
Like
Liked
5:03This story was originally published on HackerNoon at: https://hackernoon.com/automating-incident-response-how-to-reduce-malware-forensics-time-by-99percent-with-python-and-virustotal. Build a pipeline that aggressively removes "Safe" files using three layers. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Yo…
…
continue reading
1
The 'Sudo' Problem: Why Google is Locking Down AI Agents Before They Break the Web
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57This story was originally published on HackerNoon at: https://hackernoon.com/the-sudo-problem-why-google-is-locking-down-ai-agents-before-they-break-the-web. Google has released a whitepaper on how they are architecting security for Chrome’s new Agentic capabilities. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecu…
…
continue reading
1
INE Earns G2 Winter 2026 Badges Across Global Markets
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35This story was originally published on HackerNoon at: https://hackernoon.com/ine-earns-g2-winter-2026-badges-across-global-markets. Awards include Leader status in the Online Course Providers Grid Report, Momentum Leader recognition in two major training categories, and regional leadership. Check more stories related to cybersecurity at: https://ha…
…
continue reading
1
The Louvre Heist: Intimidation, DNA, and the Real Story Behind the Global Headline
8:45
8:45
Play later
Play later
Lists
Like
Liked
8:45This story was originally published on HackerNoon at: https://hackernoon.com/the-louvre-heist-intimidation-dna-and-the-real-story-behind-the-global-headline. Louvre heist and how the simple password is not the story. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #c…
…
continue reading
1
I Built a Tiny Browser-Only Encryption Tool Because I Don’t Trust Your Backend
10:25
10:25
Play later
Play later
Lists
Like
Liked
10:25This story was originally published on HackerNoon at: https://hackernoon.com/i-built-a-tiny-browser-only-encryption-tool-because-i-dont-trust-your-backend. A developer builds Encrypter, a browser-only tool for encrypting text without servers, logins, or tracking—offering a simple, secure way to share secrets. Check more stories related to cybersecu…
…
continue reading
1
Securing Kafka for PCI DSS Compliance: A Practical Guide for Financial Data Pipelines
10:31
10:31
Play later
Play later
Lists
Like
Liked
10:31This story was originally published on HackerNoon at: https://hackernoon.com/securing-kafka-for-pci-dss-compliance-a-practical-guide-for-financial-data-pipelines. comprehensive guide on aligning Kafka security with PCI DSS requirements, covering topics like Encryption, authentication and access Control, Auditing and monit Check more stories related…
…
continue reading
1
How Quantum Computers Threaten Bitcoin and the Entire Internet: Simply Explained
17:43
17:43
Play later
Play later
Lists
Like
Liked
17:43This story was originally published on HackerNoon at: https://hackernoon.com/how-quantum-computers-threaten-bitcoin-and-the-entire-internet-simply-explained. Learn how Shor's Algorithm breaks RSA, ECC, and Bitcoin. Understand the 'Decrypt Later' threat and the urgent global race for Post-Quantum Cryptography (PQC). Check more stories related to cyb…
…
continue reading
1
$14.6 Million in RWA Hacks This Year Reveals the Gap Between Tokenization Hype and Reality
10:18
10:18
Play later
Play later
Lists
Like
Liked
10:18This story was originally published on HackerNoon at: https://hackernoon.com/$146-million-in-rwa-hacks-this-year-reveals-the-gap-between-tokenization-hype-and-reality. RWA tokenization hit $35.68B in 2025, but $14.6M in hacks exposed security gaps. Can the industry scale to $2 trillion by 2028 amid regulatory fragmentation? Check more stories relat…
…
continue reading
1
The Invisible Breach: How AI Is Quietly Creating New Security Blind Spots in Modern Tech
10:46
10:46
Play later
Play later
Lists
Like
Liked
10:46This story was originally published on HackerNoon at: https://hackernoon.com/the-invisible-breach-how-ai-is-quietly-creating-new-security-blind-spots-in-modern-tech. We're watching organizations introduce sophisticated machine learning systems to reduce risk, only to discover its creating entirely new categories of risk. Check more stories related …
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/how-request-response-really-works. Learn how the request–response model really works under the hood. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #network, #request-response-model, #reque…
…
continue reading
1
Taking Control Of Software Supply Chains in the Open Source Era
7:02
7:02
Play later
Play later
Lists
Like
Liked
7:02This story was originally published on HackerNoon at: https://hackernoon.com/taking-control-of-software-supply-chains-in-the-open-source-era. Understanding how these recent npm attacks unfolded will help signal a way forward for a more secure software supply chain. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecuri…
…
continue reading
1
You’ve Learned to Break Wi-Fi. Now Learn to Lock It Down.
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31This story was originally published on HackerNoon at: https://hackernoon.com/youve-learned-to-break-wi-fi-now-learn-to-lock-it-down. A practical guide to Wi-Fi hardening using strong passwords, entropy, OpSec and key router safeguards for a safer, more resilient network. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyber…
…
continue reading
1
AI Cybersecurity: The Sword and Shield of the Next Cyber Frontier
9:12
9:12
Play later
Play later
Lists
Like
Liked
9:12This story was originally published on HackerNoon at: https://hackernoon.com/ai-cybersecurity-the-sword-and-shield-of-the-next-cyber-frontier. Offense is simple; defense demands perfection. How nation-states are using AI to poison data, hack trust, and bypass the "Zero Trust" perimeter. Check more stories related to cybersecurity at: https://hacker…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/how-will-we-distinguish-truth-from-fiction. Deepfakes powered by AI are redefining trust online. Can technology and human oversight still separate fact from fiction? Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check …
…
continue reading
1
A Developer’s Guide to Choosing the Right DAST Tool in 2026
13:00
13:00
Play later
Play later
Lists
Like
Liked
13:00This story was originally published on HackerNoon at: https://hackernoon.com/a-developers-guide-to-choosing-the-right-dast-tool-in-2026. A practical guide for developers to choose the right DAST tool in 2026. Compare top tools, key features, and what really matters for secure applications. Check more stories related to cybersecurity at: https://hac…
…
continue reading
1
Adversarial Attacks on Large Language Models and Defense Mechanisms
9:24
9:24
Play later
Play later
Lists
Like
Liked
9:24This story was originally published on HackerNoon at: https://hackernoon.com/adversarial-attacks-on-large-language-models-and-defense-mechanisms. Comprehensive guide to LLM security threats and defenses. Learn how attackers exploit AI models and practical strategies to protect against adversarial attacks. Check more stories related to cybersecurity…
…
continue reading
1
Cybersecurity’s Global Defenders Converge in Riyadh for Black Hat MEA 2025
6:19
6:19
Play later
Play later
Lists
Like
Liked
6:19This story was originally published on HackerNoon at: https://hackernoon.com/cybersecuritys-global-defenders-converge-in-riyadh-for-black-hat-mea-2025. Black Hat MEA 2025 will bring together over 45k attendees, 450 exhibitors, & 300 globalspeakers from December 2–4 at Riyadh Exhibition and Convention Center Check more stories related to cybersecuri…
…
continue reading
1
S02E48 | Joe Piasecki - Surfer, stockman, submariner, social procurement. One man's journey to find his personal legend.
1:03:36
1:03:36
Play later
Play later
Lists
Like
Liked
1:03:36🎙 New Episode Drop! S02E48 | Joe Piasecki - Surfer, stockman, submariner, social procurement. One man's journey to find his personal legend. In this episode, we sit down with Joe Piasecki, a Royal Australian Navy veteran who has become one of Victoria’s strongest operators in social procurement and community impact. After nearly a decade serving in…
…
continue reading
1
One Identity Safeguard Named a Visionary In The 2025 Gartner Magic Quadrant For PAM
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45This story was originally published on HackerNoon at: https://hackernoon.com/one-identity-safeguard-named-a-visionary-in-the-2025-gartner-magic-quadrant-for-pam. Privileged Access Management (PAM) The placement reflects what the company observes across its customer and partner ecosystem, highlighting a collective emphasi Check more stories related …
…
continue reading
1
Quttera Launches "Evidence-as-Code" API to Automate Security Compliance For SOC 2 and PCI DSS v4.0
5:51
5:51
Play later
Play later
Lists
Like
Liked
5:51This story was originally published on HackerNoon at: https://hackernoon.com/quttera-launches-evidence-as-code-api-to-automate-security-compliance-for-soc-2-and-pci-dss-v40. API feeds structured security evidence into GRC platforms. Threat Encyclopedia provides instant context for detected threats. Check more stories related to cybersecurity at: ht…
…
continue reading
1
When "Just Following Guidelines" Isn't Enough
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10This story was originally published on HackerNoon at: https://hackernoon.com/when-just-following-guidelines-isnt-enough. A Reddit post highlights the failure modes of internal AI agents. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #ai-security, #machine-learning,…
…
continue reading
1
When APIs Talk Too Much – A Lesson About Hidden Paths
3:46
3:46
Play later
Play later
Lists
Like
Liked
3:46This story was originally published on HackerNoon at: https://hackernoon.com/when-apis-talk-too-much-a-lesson-about-hidden-paths. Why API security requires more than just endpoint protection and what developers can take away. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content…
…
continue reading
1
Educational Byte: How Fake CAPTCHAs Can Steal Your Crypto
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01This story was originally published on HackerNoon at: https://hackernoon.com/educational-byte-how-fake-captchas-can-steal-your-crypto. Fake CAPTCHAs are tricking users into installing malware that steals crypto wallets. Learn how they work and how to spot and avoid these scams. Check more stories related to cybersecurity at: https://hackernoon.com/…
…
continue reading
1
Zero Trust Security Goes Mainstream as Breach Costs Hit Record Highs
10:48
10:48
Play later
Play later
Lists
Like
Liked
10:48This story was originally published on HackerNoon at: https://hackernoon.com/zero-trust-security-goes-mainstream-as-breach-costs-hit-record-highs. Learn why Zero Trust is vital in 2025, how AI-driven attacks and regulations increase the stakes, and practical ways to protect your business today. Check more stories related to cybersecurity at: https:…
…
continue reading
1
Why the MITRE ATT&CK Framework Actually Works
10:10
10:10
Play later
Play later
Lists
Like
Liked
10:10This story was originally published on HackerNoon at: https://hackernoon.com/why-the-mitre-attandck-framework-actually-works. ATT&CK makes detection engineering measurable by mapping real TTPs to your content, exposing visibility gaps attackers rely on to stay hidden. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
…
continue reading
1
S02E47 | Andrew Warner - Veteran Workforce Solutions - how Andy's 25 year career in the military has led to an amazing business helping corporate Australia hold and grow their veteran workforce.
42:09
42:09
Play later
Play later
Lists
Like
Liked
42:09🎙 New Episode Drop! S02E47 | Andrew Warner - Veteran Workforce Solutions - how Andy's 25 year career in the military has led to an amazing business helping corporate Australia hold and grow their veteran workforce. In this episode, we sit down with Andrew Warner, founder and CEO of Veteran Workforce Solutions (VWS) — a nationally recognised veteran…
…
continue reading
1
Security Is A Practice, Not A One-Time Project
7:40
7:40
Play later
Play later
Lists
Like
Liked
7:40This story was originally published on HackerNoon at: https://hackernoon.com/security-is-a-practice-not-a-one-time-project. Learn why security is a continuous practice, not a one-time project. Build daily habits, use smart tools, and strengthen your security posture. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecu…
…
continue reading
1
CredShields Joins Forces With Checkmarx to Bring Smart Contract Security to Enterprise AppSec
4:11
4:11
Play later
Play later
Lists
Like
Liked
4:11This story was originally published on HackerNoon at: https://hackernoon.com/credshields-joins-forces-with-checkmarx-to-bring-smart-contract-security-to-enterprise-appsec. Nearly half of the largest DeFi breaches trace back to smart contract flaws. Research indicates that up to 89% of smart contracts contain vulnerabilities. Check more stories rela…
…
continue reading
1
S02E46 | Angela Harper - Aviation medic to Press Club journalist to QLD Senate candidate to PR consultant. Everything you need to know about Public Affairs and Government Relations
1:00:52
1:00:52
Play later
Play later
Lists
Like
Liked
1:00:52🎙 New Episode Drop! S02E46 | Angela Harper - Aviation medic to Press Club journalist to QLD Senate candidate to PR consultant. Everything you need to know about Public Affairs and Government Relations In this episode, we speak with Angela Harper, whose career spans the Army, national media, politics and now public affairs. From aviation medic to Pr…
…
continue reading
1
SecurityMetrics Wins "Data Leak Detection Solution of the Year" in 2025 CyberSecurity Breakthrough
5:26
5:26
Play later
Play later
Lists
Like
Liked
5:26This story was originally published on HackerNoon at: https://hackernoon.com/securitymetrics-wins-data-leak-detection-solution-of-the-year-in-2025-cybersecurity-breakthrough. SCI reduces the chances of an e-commerce skimming attack through the inspection of a website's shopping cart by a SecurityMetrics Forensic Investigator. Check more stories rel…
…
continue reading
1
Securing Java Microservices with Zero Trust Architecture
5:38
5:38
Play later
Play later
Lists
Like
Liked
5:38This story was originally published on HackerNoon at: https://hackernoon.com/securing-java-microservices-with-zero-trust-architecture. Zero Trust replaces outdated network trust in microservices. Learn how identity, mTLS, OPA, and Vault build a secure, modern architecture. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyb…
…
continue reading