Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

CIO Exchange Podcasts

show episodes
 
The CIO exchange podcast features technology and business leaders from around the world, discussing what's working, what's not, and what's next. Through stories of failure, success, passion, and struggle, we explore the ways in which these tech executives have moved both their companies and their careers forward. Each episode is a conversation focusing on a unique topic intended to provide the insight and perspective needed to help others make progress. This podcast is produced by VMware, a ...
  continue reading
 
Artwork

1
Higher Exchanges

Higher Exchanges

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Higher Exchanges is a weekly cannabis-investing conversation hosted by Jesse Redmond, the Head of Investor Relations and Business Development at LEEF Brands, and Morgan Paxhia, Co-Founder of Poseidon.
  continue reading
 
Artwork

1
GovCIO Media & Research Podcasts

GovCIO Media & Research

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The GovCIO Media & Research podcast network comprises GovCast, CyberCast and HealthCast featuring conversations with key leaders on timely issues impacting the federal IT landscape. Topics include cybersecurity, artificial intelligence, cloud computing, IT modernization, data analytics, workforce development and more. New episodes release each Tuesday.
  continue reading
 
Artwork

204
Absolute Return Podcast

Accelerate Financial Technologies Inc.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Your source for stock market analysis, global macro musings and hedge fund investment strategies. Hosts Julian Klymochko and Michael Kesslering aim to bring you the knowledge and analysis you need to become a more intelligent and wealthier investor
  continue reading
 
The power of Data is undeniable. And unharnessed - it's nothing but chaos. Making data your ally. Using it to lead with confidence and clarity. Host Jess Carter is solving problems in real-time to reveal what's possible. Helping communities and people thrive. This is Data Driven Leadership, a show brought to you by Resultant.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Tune in for informative conversations covering a range of topics for post-acute providers. The Post-Acute POV focuses on the importance of innovative technology in care settings, and how it can help home-based and facility-based organizations optimize clinical, operational, and financial processes while delivering exceptional care and support for patients and residents. With new topics and guests on each episode, we explore trends and solutions that make connecting and collaborating across t ...
  continue reading
 
Loading …
show series
 
Are you walking around with a phone in your hand? Probably, are ready for the day when it gets grabbed and disappears. Aaran, Doug, and Josh talk about phone strategies on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-533…
  continue reading
 
Tune in for some hands-on tips on how to use Claude code to create some amazing and not-so-amazing software. Paul will walk you through what worked and what didn't as he 100% vibe-coded a Python Flask application. The discussion continues with the crew discussing the future of vibe coding and how AI may better help in creating and securing software…
  continue reading
 
The Security Weekly 25 index is back near all time highs as the NASDAQ hits another record high. Funding and acquisitions have shifted to AI as the security industry continues to evolve. We also had a new IPO, Netskope. They will replace CyberArk once the Palo Alto Networks acquisition closes, allowing the index to survive another public company ac…
  continue reading
 
The Army needs innovative and efficient solutions to problems. At the Association of the United States Army's Annual Meeting and Exposition in Washington, D.C., Innovation Officer at the Army's 3rd Infantry Division's Marne Innovation Center (MIC) Capt. Brendan Shutt explained how the Army's grassroots innovation model is transforming problem-solvi…
  continue reading
 
What are your favorite resources for secure code? Co-hosts John Kinsella and Kalyani Pawar talk about the reality of bringing security into a business. We talk about the role of the OWASP Top 10 and the OWASP ASVS in crafting security programs. And balance that with a discussion in what's the best use of everyone's time -- developers and appsec fol…
  continue reading
 
On today’s show we welcome special guest, Kayne Anderson BDC President Frank Karl. Kayne Anderson BDC invests primarily in first lien senior secured loans with a secondary focus on unitranche and split-lien loans to private middle market companies. On the show, we discuss: Recent volatility in BDC prices and what is driving NAV discounts Credit mar…
  continue reading
 
Interview with Ravid Circus Ravid will discuss why security and engineering misalignment is the biggest barrier to fast, effective remediation, using data from Seemplicity’s 2025 Remediation Operations Report. This is costing some teams days of unnecessary exposure, which can lead to major security implications for organizations. Segment Resources:…
  continue reading
 
Despite a year marked by geopolitical uncertainty, higher tariffs, and slowing growth, deal-making activity is surging in 2025. So can this current wave of M&A activity continue? Goldman Sachs’ Stephan Feldgoise, head of the Global Mergers & Acquisition business in Global Banking & Markets, discusses the outlook with Allison Nathan. This episode wa…
  continue reading
 
Today on Higher Exchanges, Jesse and Morgan sit down with Whitt Steineker, Partner at Bradley Arant Boult Cummings LLP, to break down the major regulatory shifts impacting hemp, cannabis, and the broader U.S. market. We cover: What just happened to the U.S. hemp market — why it happened, what it means, and when enforcement may hit. How new hemp rul…
  continue reading
 
In the security news: Cloudflare was down, it was not good Logitech breached The largest data breach in history? Fortinet Fortiweb - the saga continues Hacking Linux through your malware scanner, oh the irony I never stopped hating systemd The ASUS exploit that never existed If iRobot fails, can we deploy our own hacker bot army? Firmware encryptio…
  continue reading
 
It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
  continue reading
 
In today's fast-paced world, organizations can't rely on static, long-term plans. Strategies must continuously evolve to stay relevant. In this episode, Resultant EVP of Professional Services Mike Hughes shares his insights on leading through rapid change. He discusses how to maintain organizational health, align culture with strategy, and foster c…
  continue reading
 
Mitchell Thornbrugh, CIO and director of the Office of Information Technology at the Indian Health Service (IHS), is leading a transformative effort to modernize health care delivery for Native American and Alaska Native communities. Patients at the Heart Electronic Health Record (PATH EHR) is an enterprise-wide initiative uniting more than 200 sta…
  continue reading
 
Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
  continue reading
 
With inflation above target and the labor market weakening, is the Fed poised to cut rates again? Rob Kaplan, Vice Chairman ofGoldman Sachs, discusses the uncertain outlook with Allison Nathan. This episode was recorded on November 12, 2025. The opinions and views expressed herein are as of the date of publication, subject to change without notice,…
  continue reading
 
Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
  continue reading
 
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-529
  continue reading
 
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
  continue reading
 
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
  continue reading
 
Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
  continue reading
 
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
  continue reading
 
AI bubble concerns are back amid a rise in AI-exposed companies’ valuations, ongoing massive AI spend, and the increasing circularity of the AI ecosystem. Goldman Sachs Research’s Eric Sheridan and Kash Rangandiscuss whether bubble concerns are warranted or overblown. Date of recordings: September 26 and October 30, 2025 The opinions and views expr…
  continue reading
 
Kyle Cobb, acting deputy director for technology and product at the Centers for Disease Control and Prevention's Office of Public Health Data, Surveillance and Technology (OPHDST), shared how emerging technologies are transforming the way health care data is shared and managed. Cobb outlined how APIs are replacing outdated data connections with a h…
  continue reading
 
Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
As the US and China navigate trade tensions, what's the outlook for China's economic growth? Hui Shan, chief China economist in Goldman Sachs Research, discusses with Allison Nathan. This episode was recorded on November 3rd, 2025. The opinions and views expressed herein are as of the date of publication, subject to change without notice, and may n…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
AI is everywhere, but it can't succeed without the judgment, creativity, and collaboration of real data science. In this episode, Jess Carter sits down with Alexa Myers, senior data science manager at Resultant, for a conversation about building successful data science teams. They discuss how isolation can hinder even the most skilled data scientis…
  continue reading
 
In this episode, we sit down with Micah Anderson, CEO of LEEF Brands (CSE: LEEF | OTCQB: LEEEF), to break down the company’s Q3 2025 financial results and what’s driving its turnaround story. LEEF delivered a standout quarter with revenue up 24% year-over-year to $8.4M, gross margins doubling to 45%, and the company generating positive adjusted EBI…
  continue reading
 
Dr. Neil Evans, Acting Program Executive Officer for the Department of Veterans Affairs' Electronic Health Record Modernization Integration Office, provided an update on the rollout of the common electronic health record (EHR). The VA paused the rollout in 2023 following optimization and reliability issues. Evans outlined plans to restart deploymen…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Robert Sholtis, CIO at Marine Corps Forces Pacific, discussed at AFCEA TechNet Indo-Pacific his modernization efforts for the service across the Indo-Pacific region. MARFORPAC operates one of the largest services across some of the most challenging environments in the world, facilitating the need to quickly adopt, acquire and scale emerging technol…
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
  continue reading
 
Marine Corps Forces Pacific is standing up a Digital Transformation Team (DXT) as part of the Marine Corps' AI Implementation Plan's Digital Transformation Pilot. C5ISRT Systems Integration Officer and Agentic Warfare Lead Capt. Mason Millsap joined us at AFCEA TechNet Indo-Pacific to explain how the pilot helps personnel digitize processes, expand…
  continue reading
 
Naval officers explain how the Adaptive Rapid Engagement Squadron (ARES), a Midshipmen-led research and development team at the U.S. Naval Academy, has participated in competitions like the Squad with Autonomous Teammates – Challenge to test and prove new techniques, tactics and procedures relating to the adoption of emerging technology like drones…
  continue reading
 
Davidson Kempner’s Tony Yoseloff, managing partner and chief investment officer, discusses the current market moment, the keys to investing across different market cycles, and where he sees opportunities in the alternative investing landscape. This episode was recorded on October 20, 2025. The opinions and views expressed herein are as of the date …
  continue reading
 
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play