The CIO exchange podcast features technology and business leaders from around the world, discussing what's working, what's not, and what's next. Through stories of failure, success, passion, and struggle, we explore the ways in which these tech executives have moved both their companies and their careers forward. Each episode is a conversation focusing on a unique topic intended to provide the insight and perspective needed to help others make progress. This podcast is produced by VMware, a ...
…
continue reading
CIO Exchange Podcasts
In each episode of "Exchanges," people from the firm share their insights on developments shaping industries, markets and the global economy.
…
continue reading
Higher Exchanges is a weekly cannabis-investing conversation hosted by Jesse Redmond, the Head of Investor Relations and Business Development at LEEF Brands, and Morgan Paxhia, Co-Founder of Poseidon.
…
continue reading
The Alpha Exchange is a podcast series launched by Dean Curnutt to explore topics in financial markets, risk management and capital allocation in the alternatives industry. Our in depth discussions with highly established industry professionals seek to uncover the nuanced and complex interactions between economic, monetary, financial, regulatory and geopolitical sources of risk. We aim to learn from the perspective our guests can bring with respect to the history of financial and business cy ...
…
continue reading
The power of Data is undeniable. And unharnessed - it's nothing but chaos. Making data your ally. Using it to lead with confidence and clarity. Host Jess Carter is solving problems in real-time to reveal what's possible. Helping communities and people thrive. This is Data Driven Leadership, a show brought to you by Resultant.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Your source for stock market analysis, global macro musings and hedge fund investment strategies. Hosts Julian Klymochko and Michael Kesslering aim to bring you the knowledge and analysis you need to become a more intelligent and wealthier investor
…
continue reading
Tune in for informative conversations covering a range of topics for post-acute providers. The Post-Acute POV focuses on the importance of innovative technology in care settings, and how it can help home-based and facility-based organizations optimize clinical, operational, and financial processes while delivering exceptional care and support for patients and residents. With new topics and guests on each episode, we explore trends and solutions that make connecting and collaborating across t ...
…
continue reading
As the US and China navigate trade tensions, what's the outlook for China's economic growth? Hui Shan, Chief China Economist in Goldman Sachs Research, discusses with Allison Nathan. This episode was recorded on November 3rd, 2025. The opinions and views expressed herein are as of the date of publication, subject to change without notice, and may n…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Building a Strong Data Foundation in an AI World
29:22
29:22
Play later
Play later
Lists
Like
Liked
29:22AI is everywhere, but it can't succeed without the judgment, creativity, and collaboration of real data science. In this episode, Jess Carter sits down with Alexa Myers, senior data science manager at Resultant, for a conversation about building successful data science teams. They discuss how isolation can hinder even the most skilled data scientis…
…
continue reading
1
Q3 Earnings Review with LEEF Brands CEO Micah Anderson
1:04:54
1:04:54
Play later
Play later
Lists
Like
Liked
1:04:54In this episode, we sit down with Micah Anderson, CEO of LEEF Brands (CSE: LEEF | OTCQB: LEEEF), to break down the company’s Q3 2025 financial results and what’s driving its turnaround story. LEEF delivered a standout quarter with revenue up 24% year-over-year to $8.4M, gross margins doubling to 45%, and the company generating positive adjusted EBI…
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-526
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Show Notes: https://securityweekly.com/swn-526
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-526
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
Play later
Play later
Lists
Like
Liked
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
Play later
Play later
Lists
Like
Liked
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
continue reading
1
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen - Rob Allen - SWN #525
32:25
32:25
Play later
Play later
Lists
Like
Liked
32:25AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
…
continue reading
1
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen - Rob Allen - SWN #525
32:25
32:25
Play later
Play later
Lists
Like
Liked
32:25AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
…
continue reading
1
Macro Challenges and Credit Opportunities: Davidson Kempner’s Tony Yoseloff
39:13
39:13
Play later
Play later
Lists
Like
Liked
39:13Davidson Kempner’s Tony Yoseloff, managing partner and chief investment officer, discusses the current market moment, the keys to investing across different market cycles, and where he sees opportunities in the alternative investing landscape. This episode was recorded on October 20, 2025. The opinions and views expressed herein are as of the date …
…
continue reading
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
…
continue reading
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
…
continue reading
1
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
Play later
Play later
Lists
Like
Liked
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
continue reading
1
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
Play later
Play later
Lists
Like
Liked
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
continue reading
1
Lockpick chaos, CoPhish, Atlas, Turing, ForumTroll, PKD, Kilgore Trout, Aaran Leyland - SWN #524
34:35
34:35
Play later
Play later
Lists
Like
Liked
34:35Lockpicks, Microsoft, CoPhish, Atlas, Turing, ForumTroll, PKD, even Kilgore Trout, the Amazing Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-524
…
continue reading
1
Lockpick chaos, CoPhish, Atlas, Turing, ForumTroll, PKD, Kilgore Trout, Aaran Leyland - SWN #524
34:35
34:35
Play later
Play later
Lists
Like
Liked
34:35Lockpicks, Microsoft, CoPhish, Atlas, Turing, ForumTroll, PKD, even Kilgore Trout, the Amazing Aaran Leyland, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-524
…
continue reading
1
Alex Kazan, Partner and Geopolitical Co-Lead, Brunswick Group
50:37
50:37
Play later
Play later
Lists
Like
Liked
50:37The global economic and geopolitical order has long been balanced by the United States. Today, however, that traditional stabilizing role is in flux. The drivers of market uncertainty, typically resulting from changes in monetary policy and the economy, are increasingly linked to US politics. Fiscal strain, tariffs, and hyper-partisanship are sourc…
…
continue reading
1
Gold, Oil, and Rare Earths: Commodities on the Move
12:58
12:58
Play later
Play later
Lists
Like
Liked
12:58With gold, oil, and rare earth minerals making headlines this year, Goldman Sachs Research’s Daan Struyven shares his views on what’s ahead for these markets and how commodities can fit into portfolios today. This episode was recorded on October 27, 2025. The opinions and views expressed herein are as of the date of publication, subject to change w…
…
continue reading
1
Quantum Computing Isn’t A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
continue reading
1
Quantum Computing Isn't A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
continue reading
1
Quantum Computing Isn't A Threat To Blockchains - Yet - Sandy Carielli, Martha Bennett - ASW #354
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
continue reading
1
Is US Stock Market Wealth a Reflexive Risk?
24:05
24:05
Play later
Play later
Lists
Like
Liked
24:05Loyal listeners, I hope your recent days have gone well, even if they are becoming shorter. On my mind – and where I hope to engage your interest for 20 odd minutes – is the topic of risk and uncertainty. The SPX is at an all time high and it is also highly concentrated with volatile and richly valued but uncorrelated tech behemoths. That’s very un…
…
continue reading
1
Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Dave Lewis, Mike Poole, Conor Mulherin - ESW #430
1:39:12
1:39:12
Play later
Play later
Lists
Like
Liked
1:39:12Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
…
continue reading
1
Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Mike Poole, Conor Mulherin, Dave Lewis - ESW #430
1:39:12
1:39:12
Play later
Play later
Lists
Like
Liked
1:39:12Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
…
continue reading
1
Robo Bees, side, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet - SWN #523
32:35
32:35
Play later
Play later
Lists
Like
Liked
32:35Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-523
…
continue reading
1
Robo Bees, side, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet - SWN #523
32:35
32:35
Play later
Play later
Lists
Like
Liked
32:35Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
…
continue reading
1
‘Culture is Everything’: Sixth Street’s Alan Waxman on Flexibility and Alpha
33:27
33:27
Play later
Play later
Lists
Like
Liked
33:27What's driving opportunities in alternative assets, and how are investors adapting to an accelerating pace of change? Sixth Street Co-Founder, CEO, and Co-CIO Alan Waxman discusses his career and the importance of flexibility in finding alpha on the latest edition of Goldman Sachs Exchanges: Great Investors. This episode was recorded on September 3…
…
continue reading
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
…
continue reading
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
…
continue reading
1
Cannabis Done Right with Jetty CEO Ron Gershoni
58:37
58:37
Play later
Play later
Lists
Like
Liked
58:37In this episode of Higher Exchanges, we sit down with Ron Gershoni, CEO and co-founder of Jetty Extracts — one of California’s longest-standing cannabis brands — to explore what it takes to build, protect, and scale a cannabis brand in today’s challenging market. We cover: 🚀 Jetty’s founding story and lessons from a decade of brand building 💨 From …
…
continue reading
1
Ben Hoff, Global Head of Commodity Strategy Société Générale
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05The distribution of asset price returns is a subject of much study in the literature of empirical finance. We know, of course, that equity returns are left-tailed, subject to the occasional violent plunge. But other asset classes are different, and in this context it was a pleasure to welcome Ben Hoff, Global Head of Commodity Strategy at Société G…
…
continue reading
1
Making Sense of Weak Job Growth Alongside Solid GDP Growth
19:13
19:13
Play later
Play later
Lists
Like
Liked
19:13Goldman Sachs Research’s Chief US economist David Mericle explains the factors driving the economy and the divergence between solid GDP growth and a slowing labor market. This episode was recorded on October 20, 2025.The opinions and views expressed herein are as of the date of publication, subject to change without notice and may not necessarily r…
…
continue reading
1
Security That Sticks: Shaping Human Behavior - Rinki Sethi, Nicole Jiang - BSW #418
1:03:00
1:03:00
Play later
Play later
Lists
Like
Liked
1:03:00As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
…
continue reading
1
Security That Sticks: Shaping Human Behavior - Nicole Jiang, Rinki Sethi - BSW #418
1:03:00
1:03:00
Play later
Play later
Lists
Like
Liked
1:03:00As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
…
continue reading