Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Blacklight Build Podcasts

show episodes
 
Our podcast series, SHeroeS - Celebrating African Female Excellence, will be back in full swing as soon as possible. We are excited to announce this. Join Stephanie Etiaka as she spotlights the elite women on the African continent—SHeroeS—who are empowering their communities through entrepreneurship and innovation. Featuring stories from their journeys, we learn from these ladies who are breaking through the most challenging and ambitious initiatives in Africa.
  continue reading
 
Artwork

1
Veteran Business Community Podcast

Peter Liston, Co-Founder - VBC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
There are many lessons business can learn from the military and your host Pete Liston is going to share exactly what he learnt in the Australian Army that has allowed him to create and build multiple 7 figure businesses. Pete will be joined by guests who have also transitioned from military to entrepreneurship and are keen to share their stories.
  continue reading
 
Loading …
show series
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-illusion-of-security-how-iam-anti-patterns-sneak-into-every-system. IAM isn’t security by default. Learn how common IAM anti-patterns create false confidence, enable breaches, and how to fix them before it’s too late. Check more stories related to cybersecurity at: htt…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-$50000-pdf-no-one-reads-why-your-security-audits-are-failing. Security isn't about generating paperwork; it's about finding the cracks before the water gets in. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check e…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/post-quantum-cryptography-why-your-encryption-has-a-5-year-shelf-life. RSA encryption faces quantum threat by 2030. Learn why your encrypted data has a 5-year shelf life and how to migrate to quantum-safe cryptography. Check more stories related to cybersecurity at: https:…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/astras-new-cloud-vulnerability-scanner-targets-the-oops-factor-behind-73percent-of-cloud-breaches. Astra’s scanner detects cloud misconfigurations causing 73% of breaches with real-time monitoring, agentless visibility, and validated risk alerts. Check more stories related…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-compliance-requirements-shape-modern-software-architecture. GDPR's "right to be forgotten" just redesigned your database. HIPAA moved your PHI to a separate infrastructure. Here’s how compliance shapes architecture. Check more stories related to cybersecurity at: https…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-markups-blacklight-tool-now-has-new-tracking-info-and-caching-options. Blacklight, The Markup’s real-time web privacy detector tool, has exposed privacy violations on COVID-19 vaccine websites and has spurred legislative action. Check more stories related to cybersecur…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/should-you-trust-your-vpn-location. IPinfo reveals how most VPNs misrepresent locations and why real IP geolocation requires active measurement, not claims. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/sais-grc-framework-establishing-trust-and-enhancing-resilience-in-ai-driven-supply-chains. The SAIS-GRC Framework is not a reactive measure but a blueprint for a new competitive advantage. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecuri…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/quantum-security-governance-building-a-framework-for-the-post-quantum-world. The convergence of quantum computing advancements and evolving cybersecurity regulations is reshaping how organizations approach security governance. Check more stories related to cybersecurity at…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/why-one-lock-isnt-enough-how-buburuza-designs-multi-layer-security-for-ai-banking. Why AI banking needs multi-layer security, not just encryption. Buburuza’s COO explains how to stop deepfake fraud and breaches. Check more stories related to cybersecurity at: https://hacke…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-hidden-cost-of-invalid-traffic-why-ip-data-is-the-missing-link. IPinfo stops invalid traffic by detecting bots, VPNs, and proxies with real-time IP intelligence, helping ad platforms cut waste and improve ROI. Check more stories related to cybersecurity at: https://hac…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-battle-for-the-borders-how-ai-and-cyber-intelligence-are-reshaping-statecraft. From Tel Aviv to Silicon Valley, a new generation of AI-driven intelligence platforms is redefining how states secure their borders. Check more stories related to cybersecurity at: https://h…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/link11-identifies-five-cybersecurity-trends-set-to-shape-european-defense-strategies-in-2026. DDoS attacks will increasingly be used as Diversion Tactics. API-First Architectures Increase Exposure to Misconfigurations and Business Logic Abuse. Check more stories related to…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/debunking-the-998percent-accurate-ip-data-claim. IPinfo explains why ‘99% accurate IP data’ is misleading and how real accuracy requires ongoing measurement, transparency, and ProbeNet validation. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyb…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/what-i-learned-from-scanning-dozens-of-small-government-websites-and-why-the-same-bugs-keep-coming. What I found while scanning dozens of small U.S. government websites with an open-source tool — the same five security mistakes and how to fix them. Check more stories relat…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/sase-meets-edge-ai-why-security-will-be-decided-in-the-first-millisecond. In security, milliseconds decide trust. Why Edge AI must judge every packet instantly to prevent threats without killing performance. Check more stories related to cybersecurity at: https://hackernoo…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-hidden-cost-of-free-apps-and-the-battle-for-your-attention. The “free” model of popular apps often disguises data collection, behavioral profiling, and monetization of user attention. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurit…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/is-shadow-ai-worse-than-shadow-it. Shadow IT was just the first of the hidden threats; now shadow AI has upped the ante. But which is worse — and how can you defend against them? Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You ca…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/authorization-in-the-age-of-ai-agents-beyond-all-or-nothing-access-control. Authorization is the process of determining *what* you’re allowed to do. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/automating-incident-response-how-to-reduce-malware-forensics-time-by-99percent-with-python-and-virustotal. Build a pipeline that aggressively removes "Safe" files using three layers. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Yo…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-sudo-problem-why-google-is-locking-down-ai-agents-before-they-break-the-web. Google has released a whitepaper on how they are architecting security for Chrome’s new Agentic capabilities. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecu…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/ine-earns-g2-winter-2026-badges-across-global-markets. Awards include Leader status in the Online Course Providers Grid Report, Momentum Leader recognition in two major training categories, and regional leadership. Check more stories related to cybersecurity at: https://ha…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-louvre-heist-intimidation-dna-and-the-real-story-behind-the-global-headline. Louvre heist and how the simple password is not the story. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #c…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/i-built-a-tiny-browser-only-encryption-tool-because-i-dont-trust-your-backend. A developer builds Encrypter, a browser-only tool for encrypting text without servers, logins, or tracking—offering a simple, secure way to share secrets. Check more stories related to cybersecu…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/securing-kafka-for-pci-dss-compliance-a-practical-guide-for-financial-data-pipelines. comprehensive guide on aligning Kafka security with PCI DSS requirements, covering topics like Encryption, authentication and access Control, Auditing and monit Check more stories related…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-quantum-computers-threaten-bitcoin-and-the-entire-internet-simply-explained. Learn how Shor's Algorithm breaks RSA, ECC, and Bitcoin. Understand the 'Decrypt Later' threat and the urgent global race for Post-Quantum Cryptography (PQC). Check more stories related to cyb…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/$146-million-in-rwa-hacks-this-year-reveals-the-gap-between-tokenization-hype-and-reality. RWA tokenization hit $35.68B in 2025, but $14.6M in hacks exposed security gaps. Can the industry scale to $2 trillion by 2028 amid regulatory fragmentation? Check more stories relat…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-invisible-breach-how-ai-is-quietly-creating-new-security-blind-spots-in-modern-tech. We're watching organizations introduce sophisticated machine learning systems to reduce risk, only to discover its creating entirely new categories of risk. Check more stories related …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-request-response-really-works. Learn how the request–response model really works under the hood. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #network, #request-response-model, #reque…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/taking-control-of-software-supply-chains-in-the-open-source-era. Understanding how these recent npm attacks unfolded will help signal a way forward for a more secure software supply chain. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecuri…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/youve-learned-to-break-wi-fi-now-learn-to-lock-it-down. A practical guide to Wi-Fi hardening using strong passwords, entropy, OpSec and key router safeguards for a safer, more resilient network. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyber…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/ai-cybersecurity-the-sword-and-shield-of-the-next-cyber-frontier. Offense is simple; defense demands perfection. How nation-states are using AI to poison data, hack trust, and bypass the "Zero Trust" perimeter. Check more stories related to cybersecurity at: https://hacker…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-will-we-distinguish-truth-from-fiction. Deepfakes powered by AI are redefining trust online. Can technology and human oversight still separate fact from fiction? Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/a-developers-guide-to-choosing-the-right-dast-tool-in-2026. A practical guide for developers to choose the right DAST tool in 2026. Compare top tools, key features, and what really matters for secure applications. Check more stories related to cybersecurity at: https://hac…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/adversarial-attacks-on-large-language-models-and-defense-mechanisms. Comprehensive guide to LLM security threats and defenses. Learn how attackers exploit AI models and practical strategies to protect against adversarial attacks. Check more stories related to cybersecurity…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/cybersecuritys-global-defenders-converge-in-riyadh-for-black-hat-mea-2025. Black Hat MEA 2025 will bring together over 45k attendees, 450 exhibitors, & 300 globalspeakers from December 2–4 at Riyadh Exhibition and Convention Center Check more stories related to cybersecuri…
  continue reading
 
🎙 New Episode Drop! S02E48 | Joe Piasecki - Surfer, stockman, submariner, social procurement. One man's journey to find his personal legend. In this episode, we sit down with Joe Piasecki, a Royal Australian Navy veteran who has become one of Victoria’s strongest operators in social procurement and community impact. After nearly a decade serving in…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/one-identity-safeguard-named-a-visionary-in-the-2025-gartner-magic-quadrant-for-pam. Privileged Access Management (PAM) The placement reflects what the company observes across its customer and partner ecosystem, highlighting a collective emphasi Check more stories related …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/quttera-launches-evidence-as-code-api-to-automate-security-compliance-for-soc-2-and-pci-dss-v40. API feeds structured security evidence into GRC platforms. Threat Encyclopedia provides instant context for detected threats. Check more stories related to cybersecurity at: ht…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/when-just-following-guidelines-isnt-enough. A Reddit post highlights the failure modes of internal AI agents. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #ai-security, #machine-learning,…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/when-apis-talk-too-much-a-lesson-about-hidden-paths. Why API security requires more than just endpoint protection and what developers can take away. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/educational-byte-how-fake-captchas-can-steal-your-crypto. Fake CAPTCHAs are tricking users into installing malware that steals crypto wallets. Learn how they work and how to spot and avoid these scams. Check more stories related to cybersecurity at: https://hackernoon.com/…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/zero-trust-security-goes-mainstream-as-breach-costs-hit-record-highs. Learn why Zero Trust is vital in 2025, how AI-driven attacks and regulations increase the stakes, and practical ways to protect your business today. Check more stories related to cybersecurity at: https:…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/why-the-mitre-attandck-framework-actually-works. ATT&CK makes detection engineering measurable by mapping real TTPs to your content, exposing visibility gaps attackers rely on to stay hidden. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
  continue reading
 
🎙 New Episode Drop! S02E47 | Andrew Warner - Veteran Workforce Solutions - how Andy's 25 year career in the military has led to an amazing business helping corporate Australia hold and grow their veteran workforce. In this episode, we sit down with Andrew Warner, founder and CEO of Veteran Workforce Solutions (VWS) — a nationally recognised veteran…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/security-is-a-practice-not-a-one-time-project. Learn why security is a continuous practice, not a one-time project. Build daily habits, use smart tools, and strengthen your security posture. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecu…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/credshields-joins-forces-with-checkmarx-to-bring-smart-contract-security-to-enterprise-appsec. Nearly half of the largest DeFi breaches trace back to smart contract flaws. Research indicates that up to 89% of smart contracts contain vulnerabilities. Check more stories rela…
  continue reading
 
🎙 New Episode Drop! S02E46 | Angela Harper - Aviation medic to Press Club journalist to QLD Senate candidate to PR consultant. Everything you need to know about Public Affairs and Government Relations In this episode, we speak with Angela Harper, whose career spans the Army, national media, politics and now public affairs. From aviation medic to Pr…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/securitymetrics-wins-data-leak-detection-solution-of-the-year-in-2025-cybersecurity-breakthrough. SCI reduces the chances of an e-commerce skimming attack through the inspection of a website's shopping cart by a SecurityMetrics Forensic Investigator. Check more stories rel…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/securing-java-microservices-with-zero-trust-architecture. Zero Trust replaces outdated network trust in microservices. Learn how identity, mTLS, OPA, and Vault build a secure, modern architecture. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyb…
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play