Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Your dose of tips about all things Information Security, ICT Legislation and Risk. South African podcast.
…
continue reading
…
continue reading
Cybersecurity Architecture Podcast aims to help security professionals to rethink their approach to infosec design and simplify their decision-making process while they face the overcrowded innovative cybersecurity market.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Linux “Off The Cuff”
…
continue reading
The Call Kent podcast is a regular podcast where you call in with a question and Kent answers. Call in with your questions right from your web browser with any device at https://kentcdodds.com/call
…
continue reading
Beyond the Hype is a monthly podcast from the Scott Logic team where we cast a practical eye over what is new and exciting in software development – everything from Kafka to Kubernetes, AI to APIs, microservices to micro-frontends. We look beyond the promises, the buzz and excitement to guide you towards the genuine value. At Scott Logic, we have years of experience in tackling tough software problems for our clients, often at the bleeding edge of technology. Each month on this podcast, our ...
…
continue reading
Technology has become increasingly important to policy debates, but these debates won’t be productive without an understanding of how the technology in question works. AEI Visiting Fellow Shane Tews interviews tech industry experts to explain how the apps, services, and structures of today's information technology systems work, and how they shape our social and economic life.
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
continue reading
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
…
continue reading
Broadcasting from Dubai, The CTO Show with Mehmet explores the latest trends in technology, startups, and venture funding. Host Mehmet Gonullu leads insightful discussions with thought leaders, innovators, and entrepreneurs from diverse industries. From emerging technologies to startup investment strategies, the show provides a balanced view on navigating the evolving landscape of business and tech, helping listeners understand their profound impact on our world. [email protected]
…
continue reading
SquareX is excited to launch The Be Fearless Podcast Series, where we bring together industry experts and professionals from the cybersecurity community. Hosted by SquareX Founder - and cybersecurity veteran - Vivek Ramachandran, look forward to insights about our guests’ journeys in security, the evolution of the field, the changing threatscape and how enterprises across industries are addressing them today.
…
continue reading
Technical interviews about software topics.
…
continue reading
Too often we work at the pleasure of technology. This is backwards. Technology should serve our needs and support our humanity. Instead, we can use tools to translate our desires into the language that technology requires. You aren’t alone in this…I will be your guide. Together, we'll protect our personal privacy, security, and get better use of technology.
…
continue reading
Spreading awarness about data privacy, cybersecurity tips and how you should become an alert citizen by protecting your privacy
…
continue reading
Here we talk about many untalked subjects in Sri Lanka and in the world and also talked about subjects to give our take on it. Brought to you by Shiyon Perera. If you enjoy listening be sure to follow and let us know on social media: https://twitter.com/dashamaya_ https://www.facebook.com/DashamayaPodcast/
…
continue reading
Welcome to AI News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news about machine learning, robotics, automation, natural language processing, AI ethics, and more. Whether you're a tech enthusiast, AI researcher, or simply curious about the future of technology, this podcast is your go-to source for AI news. T ...
…
continue reading
Talking about the newest tech, such as phones, computers, and more!
…
continue reading
Hands-On Windows, featuring Paul Thurrott, will help you adapt to the changes made in Windows 11. From visual tweaks to performance boosts Hands-On Windows will show you how to get the most out of your Windows 11 PC. You can join Club TWiT for $10 per month and get ad-free audio and video feeds for all our shows plus everything else the club offers...or get just this podcast ad-free for $5 per month. New episodes every Thursday.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Protecting your privacy from identity theft, fraud, and cyber threats is easy with a Privacy Mentor. Get the latest on threats, tools, and tips to staying safe in the digital age. Tune in weekly.
…
continue reading

1
#482 The Browser Is the New Battleground: John Carse on Securing the Modern Endpoint
49:37
49:37
Play later
Play later
Lists
Like
Liked
49:37In this episode of The CTO Show with Mehmet, we’re joined by John Carse, Field CISO at SquareX, to explore a fast-emerging shift in cybersecurity: the browser as the new endpoint. John shares why traditional tools like EDR and CASB are no longer sufficient, how modern threats are bypassing enterprise defenses, and what CISOs need to prioritize in a…
…
continue reading

1
40K IoT cameras stream secrets to browsers, Marks & Spencer taking online orders post-cyberattack, PoC Code escalates Roundcube Vuln threat
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04CISA, Microsoft warn of Windows zero-day used in attack on ‘major’ Turkish defense org 40K IoT cameras worldwide stream secrets to anyone with a browser Marks & Spencer begins taking online orders again, out for seven weeks due to cyberattack Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more effic…
…
continue reading

1
Can you supercharge security with a browser?
39:41
39:41
Play later
Play later
Lists
Like
Liked
39:41In this episode of Threat Vector, Ofer Ben‑Noon steps in as guest host to interview cybersecurity strategist Kirsten Davies. They explore why browsers now handle 85 percent of work and how that shift makes them the prime attack surface. Learn how phishing and session hijacks exploit low‑friction paths, why Zero Trust and enterprise browsers must wo…
…
continue reading
Do you use any application more than your browser? No, we didn't think so. But which is the best browser for your needs, and how do you know you're browsing safely. The team discusses. #Priviso #PrivisoLive #Security #informationsecurityBy Anthony Olivier
…
continue reading

1
Risky Biz Soap Box: Push Security's browser-first twist on identity security
34:24
34:24
Play later
Play later
Lists
Like
Liked
34:24In this wholly sponsored Soap Box edition of the show, Patrick Gray chats with Adam Bateman and Luke Jennings from Push Security. Push has built an identity security platform that collects identity information and events from your users’ browsers. It can detect phish kits and shut down phishing attempts, protect SSO credentials, and find shadow/per…
…
continue reading

1
The Mechanics of Security Investing | Zain Rizavi, CEO at Stealth, ex-VC
54:35
54:35
Play later
Play later
Lists
Like
Liked
54:35Cybersecurity Co-Founder and ex-Venture Capitalist Zain Rizavi breaks down what really happens behind closed doors in cybersecurity investing. From his unconventional journey from political science to backing the next generation of security companies, Zain reveals why most founders get product-market fit completely wrong and what it really takes to…
…
continue reading

1
#483 Bootstrapping in Motion: Nelson Nigel’s Blueprint from Yellow Cab to Kidmoto
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14In this episode, Mehmet Gonullu sits down with Nelson Nigel, the founder of Kidmoto, a ride-hailing service designed specifically for families traveling with young children. From driving a yellow cab in New York to building a tech-enabled transportation service operating in 64+ cities, Nelson shares how he bootstrapped his company past $1M in reven…
…
continue reading

1
$200,000 Zoom Call, Microsoft, Zero-Click, China & HD With $649 million of Bitcoin - SWN #485
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38This week we have, $200,000 Zoom Call, Microsoft Teams, INTERPOL, Zero-Click, Junk Food, China & Hard Drive With $649 million of Bitcoin. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-485
…
continue reading

1
Week in Review: Google and Cloudflare outages, Copilot Zero-Click, Cloudflare's Claude flair
25:20
25:20
Play later
Play later
Lists
Like
Liked
25:20Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Christina Shannon, CIO, KIK Consumer Products Thanks to our show sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GR…
…
continue reading
Without even requiring user interaction on a phone, Pegasus: - Infects a target device, sometimes without any clicks (zero-click exploits via apps like iMessage or WhatsApp). = Accesses sensitive data, including messages, emails, photos, contacts, and calendar entries. - Activates microphones and cameras, enabling real-time surveillance. - Tracks l…
…
continue reading

1
Apple Plans Major Siri Upgrade, Oracle and Seekr Revolutionize AI, Tesla Sues Ex-Engineer, Meta AI Sparks Privacy Concerns, and more...
11:35
11:35
Play later
Play later
Lists
Like
Liked
11:35(0:10): Apple Sets 2026 for Major Siri AI Upgrade Amidst Previous Delays (2:08): Oracle and Seekr Partner to Revolutionize AI with Powerful New GPU Cluster (4:41): Tesla Sues Ex-Engineer for Trade Secrets Theft in Humanoid Robot Rivalry (6:35): Meta AI's Discovery Feed Sparks Privacy Fears as Personal Chats Go Public (8:38): Adobe Reports Record Q2…
…
continue reading

1
Microsoft Entra attack, Thursday’s Cloud outages, Mark Green retires
8:10
8:10
Play later
Play later
Lists
Like
Liked
8:10Hackers attacks target Microsoft Entra ID accounts using pentesting tool Google Cloud and Cloudflare outages reported House Homeland Chairman Mark Green announces his departure Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta.…
…
continue reading

1
SE Radio 672: Luca Palmieri on Rust In Production
57:46
57:46
Play later
Play later
Lists
Like
Liked
57:46Luca Palmieri, author of Zero to Production in Rust and Principal Engineering Consultant at MainMatter, speaks with SE Radio host Gavin Henry about Rust in production. They discuss what production Rust means, how to get Rust code into production, specific Rust issues to think about when getting an application into production, what Rust profiles are…
…
continue reading

1
HOW 144: Copiliot Search - Reimagining Search Engines with AI
13:28
13:28
Play later
Play later
Lists
Like
Liked
13:28Can traditional search engines keep up with the AI revolution? On this episode of Hands-On Windows, we're shaking up the norm with Microsoft's latest Co-Pilot Search feature. Explore how this cutting-edge tool promises to transform your search experience. Instead of just fetching facts, Co-Pilot Search offers contextual answers and deep insights th…
…
continue reading

1
UEFI Vulnerabilities Galore - PSW #878
2:10:48
2:10:48
Play later
Play later
Lists
Like
Liked
2:10:48This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
…
continue reading

1
Rethinking the Rules of Space (with Jay Schwarz)
36:44
36:44
Play later
Play later
Lists
Like
Liked
36:44Space-based satellite networks are transforming global connectivity, extending access to even the most remote corners of the planet. The rules that govern these networks have never been more critical. How does satellite spectrum actually function? Why is there an increasing need to revise the regulations that oversee it? And what are the key compon…
…
continue reading

1
Metasploit's Origin, Browser Bugs & Exposure Management | HD Moore, Founder of runZero & Metasploit
49:47
49:47
Play later
Play later
Lists
Like
Liked
49:47If you’re in the cybersecurity field, HD Moore, runZero founder and creator of Metasploit, needs no introduction — his work has fundamentally changed how the security industry thinks about vulnerabilities. In this candid conversation, HD shares the story behind building the world's most widely used penetration testing framework, war stories from th…
…
continue reading

1
S17 E05 (VIDEO) Are AI Models Being Trained with Lies?
31:27
31:27
Play later
Play later
Lists
Like
Liked
31:27Alex Sharpe is a Security Confidential Alumni, board member, practitioner, speaker, and author. He started his career in the intelligence community, built two startups, recognized as a top thought leader in cybersecurity, risk management, cloud, and digital assets. 00:00 Intro02:20 Cybersecurity Imposters05:50 How do we prepare for the future?12:40…
…
continue reading

1
Databricks Introduces Agent Bricks, Google Appoints New AI Chief, DeepL Launches SuperPOD for AI, Browser Company Launches AI Browser, and more...
10:32
10:32
Play later
Play later
Lists
Like
Liked
10:32(0:10): Databricks Unveils Agent Bricks: Revolutionizing AI with Custom Agents and No-Code Solutions (2:03): Google Appoints New AI Chief, Plans $75B Investment Amidst Fierce Competition (4:07): DeepL Unveils Europe's First DGX SuperPOD, Revolutionizing Language AI with 30x Faster Translations (6:20): The Browser Company Unveils Dia: A New AI-Power…
…
continue reading

1
TanStack and the Future of Frontend with Tanner Linsley
54:13
54:13
Play later
Play later
Lists
Like
Liked
54:13TanStack is an open-source collection of high-performance libraries for JavaScript and TypeScript applications, primarily focused on state management, data fetching, and table utilities. It includes popular libraries like TanStack Query, TanStack Table, and TanStack Router. These libraries emphasize declarative APIs, optimized performance, and deve…
…
continue reading

1
CoPilot zero-click, Operation Secure, FIN6 targets recruiters
7:43
7:43
Play later
Play later
Lists
Like
Liked
7:43Zero-click data leak flaw in Copilot Operation Secure targets infostealer operations FIN6 targets recruiters Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. easier—while also strengthening yo…
…
continue reading
Are you aware of the hidden risks lurking in your organization’s browser extensions? Nearly every enterprise user has at least one extension installed—and over half of those extensions request powerful permissions that can expose cookies, passwords, and sensitive data. In this video, we introduce ExtensionPedia, LayerX’s free, publicly available Br…
…
continue reading

1
Secure Your Summer: Top Cyber Myths, Busted
38:00
38:00
Play later
Play later
Lists
Like
Liked
38:00In this episode of Threat Vector, David Moulton talks with Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance. Lisa shares insights from this year’s “Oh Behave!” report and dives into why cybersecurity habits remain unchanged—even when we know better. From password reuse to misunderstood AI risks, Lisa explains how emotion, …
…
continue reading

1
S17 E05 Are AI Models Being Trained with Lies?
31:27
31:27
Play later
Play later
Lists
Like
Liked
31:27Alex Sharpe is a Security Confidential Alumni, board member, practitioner, speaker, and author. He started his career in the intelligence community, built two startups, recognized as a top thought leader in cybersecurity, risk management, cloud, and digital assets. 00:00 Intro02:20 Cybersecurity Imposters05:50 How do we prepare for the future?12:40…
…
continue reading

1
The 3 Buckets Framework: How This CISO Thinks About Security | Sangram Dash, CISO, VP of IT, Sisense
1:00:39
1:00:39
Play later
Play later
Lists
Like
Liked
1:00:39Sangram Dash has spent over two decades in cybersecurity, from witnessing the massive eBay breach response to leading security at companies like PayPal and Square. In this episode, he breaks down his practical "3 buckets" framework that every security team should follow, shares lessons from previous incidents and why the human element of incident r…
…
continue reading

1
Security Money: The Index is Up, CISOs Need to Get Out, and Are You Burning Out? - BSW #399
56:27
56:27
Play later
Play later
Lists
Like
Liked
56:27This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
…
continue reading

1
Global ChatGPT Outage Shakes AI Industry, OpenAI and Google Cloud Unite, Android 16 Launches on Pixel, Cisco Unveils Secure AI Network, and more...
10:41
10:41
Play later
Play later
Lists
Like
Liked
10:41(0:10): Global ChatGPT Outage: AI Industry Faces Reliability Test Amid Growing Dependence (2:01): OpenAI and Google Cloud Forge Unlikely Alliance to Boost AI Computing Power Amid Competition (4:15): Android 16 Launches on Pixel: Live Updates, AI Security, and Enhanced Camera Features Unveiled (6:10): Cisco Unveils Secure AI Network Architecture, Su…
…
continue reading

1
Risky Business #795 -- How The Com is hacking Salesforce tenants
1:07:34
1:07:34
Play later
Play later
Lists
Like
Liked
1:07:34On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: New York Times gets a little stolen Russian FSB data as a treat iVerify spots possible evidence of iOS exploitation against the Harris-Walz campaign Researcher figures out a trick to get Google account holders’ full names and phone numbers Major US food distrib…
…
continue reading

1
Risky Business #795 -- How The Com is hacking Salesforce tenants
1:07:34
1:07:34
Play later
Play later
Lists
Like
Liked
1:07:34On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: New York Times gets a little stolen Russian FSB data as a treat iVerify spots possible evidence of iOS exploitation against the Harris-Walz campaign Researcher figures out a trick to get Google account holders’ full names and phone numbers Major US food distrib…
…
continue reading
Dev Opps, Majid’s Snapdragon, Keyboard wins over Mouse, Cybersecurity, Gnome, Stand-by Time On Linux. Start up time, and Way More!By Bill, Leo, Majid, Eric
…
continue reading

1
Vixen Panda, NPM, Roundcube, IoT, 4Chan, Josh Marpet, and more... - SWN #484
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23Vixen Panda, NPM, Roundcube, IoT, 4Chan, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-484
…
continue reading

1
#481 Go-to-Market Clarity in a Noisy World: Jan van Schuppen’s GTM Wisdom
45:22
45:22
Play later
Play later
Lists
Like
Liked
45:22In this episode, Mehmet sits down with Jan van Schuppen, a seasoned sales entrepreneur and founder of Ideas in Spades, who has led global B2B sales teams for over 30 years. They explore the biggest myths in go-to-market (GTM) strategy, the traps of founder-led content, how to balance automation with authenticity, and why selling before building is …
…
continue reading

1
UK FCA and Nvidia Launch AI Sandbox, Google CEO on AI's Creative Potential, Qualcomm Acquires Alphawave for $2.4B, UK PM Unveils AI Housing Tool, and more...
11:26
11:26
Play later
Play later
Lists
Like
Liked
11:26(0:10): UK FCA and Nvidia Unveil AI Sandbox to Boost Innovation and Competitiveness (2:22): Google CEO: AI to Boost Creativity, Not Replace Jobs; Plans to Hire More Engineers (4:43): Qualcomm to Acquire Alphawave for $2.4B, Strengthening AI Chip Arsenal (6:54): UK PM Unveils 'Extract': AI Tool to Revolutionize Housing Plans with Google Collaboratio…
…
continue reading

1
The Challenge of AI Model Evaluations with Ankur Goyal
44:22
44:22
Play later
Play later
Lists
Like
Liked
44:22Evaluations are critical for assessing the quality, performance, and effectiveness of software during development. Common evaluation methods include code reviews and automated testing, and can help identify bugs, ensure compliance with requirements, and measure software reliability. However, evaluating LLMs presents unique challenges due to their c…
…
continue reading

1
Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334
1:09:09
1:09:09
Play later
Play later
Lists
Like
Liked
1:09:09CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
…
continue reading

1
Event-Driven Architecture: The only data integration approach you need?
45:34
45:34
Play later
Play later
Lists
Like
Liked
45:34In this episode, Oliver Cronk dives into the world of Event-Driven Architecture (EDA) with Tom Fairbairn from Solace and Scott Logic’s Gordon Campbell. The discussion explores whether EDA has matured beyond the hype into a practical strategy for modern systems integration, or if it’s just another architectural buzzword. Together, they unpack the co…
…
continue reading

1
Cybersecurity News: Brute forcing Google accounts, Guardian's Secure Messaging, UNFI cyberattack
8:13
8:13
Play later
Play later
Lists
Like
Liked
8:13Brute forcing phone numbers linked to Google accounts The Guardian launches Secure Messaging service United Natural Foods hit by cyberattack Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. ea…
…
continue reading

1
The enterprise security news, more secure by removing credentials, & RSAC interviews - Marty Momdjian, Amit Saha, Dr. Tina Srivastava - ESW #410
1:38:02
1:38:02
Play later
Play later
Lists
Like
Liked
1:38:02Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
…
continue reading

1
The enterprise security news, more secure by removing credentials, & RSAC interviews - Marty Momdjian, Amit Saha, Dr. Tina Srivastava - ESW #410
1:38:02
1:38:02
Play later
Play later
Lists
Like
Liked
1:38:02Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
…
continue reading

1
The enterprise security news, more secure by removing credentials, & RSAC interviews - Marty Momdjian, Amit Saha, Dr. Tina Srivastava - ESW #410
1:38:02
1:38:02
Play later
Play later
Lists
Like
Liked
1:38:02Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
…
continue reading

1
Buffett Plans 2025 Retirement, Kali GPT Transforms Cybersecurity Education, Klarna CEO Warns of AI Recession, Alphabet's AI Innovations Thrive, and more...
11:31
11:31
Play later
Play later
Lists
Like
Liked
11:31(0:10): Warren Buffett to Retire in 2025; Berkshire Shifts Focus to AI, Amazon's AWS Boost (2:20): Kali GPT Revolutionizes Cybersecurity Education and Penetration Testing with AI-Powered Assistance (4:44): Klarna CEO Warns AI Could Trigger Recession by Displacing White-Collar Jobs (6:59): Alphabet's AI Innovations Make It a Top Pick for $3,000 Inve…
…
continue reading

1
Cyber executive order, Neuberger’s infrastructure warning, Mirai botnet warning
8:42
8:42
Play later
Play later
Lists
Like
Liked
8:42Presidential cyber executive order signed Neuberger warns of U.S. infrastructure’s cyberattack weakness Mirai botnet infects TBK DVR devices Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. ea…
…
continue reading
While everyone has heard about the Dark Web, fewer people are familiar with The Onion Router (TOR), the browser used to gain access to it. The team discuss the history of TOR, as well as some famous associated cases. #Priviso #PrivisoLive #informationsecurity #RiskBy Anthony Olivier
…
continue reading

1
#480 The Dangerous Gap: Why Startups Fail After MVP – Insights from Ali Hafizji
35:58
35:58
Play later
Play later
Lists
Like
Liked
35:58In this episode of The CTO Show with Mehmet, we’re joined by Ali Hafizji, founder of the product development agency Wednesday, for a candid look into one of the most overlooked phases in startup growth: the dangerous gap between MVP and Product-Market Fit (PMF). We explore why many startups lose momentum after MVP, how to avoid premature scaling, t…
…
continue reading

1
Elsa, Redline, ChaosRat, iMessage, Bladed Feline , Aaran Leyland, and More... - SWN #483
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00Elsa, Redline, ChaosRat, iMessage, Bladed Feline , Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-483
…
continue reading

1
Week in Review: Senators’ CSRB bid, Deepfakes dodge detection, Microsoft-CrowdStrike collaboration
27:43
27:43
Play later
Play later
Lists
Like
Liked
27:43Link to episode page This week’s Cyber Security Headlines - Week in Review is hosted by Rich Stroffolino with guest Rusty Waldron, chief business security officer, ADP Thanks to our show sponsor, Conveyor Let me guess, another security questionnaire just landed in your inbox. Which means all the follow up tasks you don’t have time for are close beh…
…
continue reading

1
Kettering data published, Reddit sues Anthropic, North Face breached
7:27
7:27
Play later
Play later
Lists
Like
Liked
7:27Stolen Kettering Health data published Reddit sues Anthropic for scraping North Face website customer accounts breached Huge thanks to our sponsor, Conveyor Let me guess, another security questionnaire just landed in your inbox. Which means all the follow up tasks you don’t have time for are close behind. What are you going to do? Here’s a better q…
…
continue reading