The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impac ...
…
continue reading
CISA Podcasts
"What the Hack?" is the award-winning true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
A delicious mix of Insurance and TV
…
continue reading
A delicious mix of Insurance and TV
…
continue reading
Just Security is an online forum for the rigorous analysis of national security, foreign policy, and rights. We aim to promote principled solutions to problems confronting decision-makers in the United States and abroad. Our expert authors are individuals with significant government experience, academics, civil society practitioners, individuals directly affected by national security policies, and other leading voices.
…
continue reading
Fox updates on the latest trends, gadgets and news in the world of technology.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
My Price Is My Life is a podcast that explores themes of courage, sacrifice, and human nature through in-depth conversations. Episodes feature candid discussions that reveal what motivates people to take risks, and the personal cost of those decisions.
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
IT authors and entrepreneurs Ryan Morris, Karl Palachuk, and Dave Sobel provide commentary on the changing world of technology opportunities and emerging tech. We want to expand the discussion from the SMB IT channel to all things tech - with one eye on the future and the other on profits. Join us!
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
…
continue reading
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
…
continue reading
In 10 minutes daily, The Business of Tech delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering 'Why Do We Care?', channel veteran Dave Sobel brings you up to speed and provides resources to go deeper. With insights and analysis, this focused podcast focuses on the knowledge you need to be effective, profitable, and relevant.
…
continue reading
This is THE PODCAST for learning about how to dominate your professional accounting or finance career and how to become certified in your field as a CPA, CMA, EA, CIA or CISA. Bryan Kesler walks you through the steps he took to pass the CPA exam while working full time and hosts interviews with people very similar to yourself to learn how they are successful in their careers. Bryan launched his blog theCPAguide.com and CMAguide.com in July of 2012 and has helped thousands of people sign up a ...
…
continue reading
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your ...
…
continue reading
…
continue reading
A FEMA podcast highlighting innovation in the field of emergency management and sharing stories of communities and individuals recovering after disasters.
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
…
continue reading
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
…
continue reading
Emagine the Future is a cybersecurity and technology podcast aimed to offer ambitious technology and national security professionals with actionable insights and unique stories from proven industry leaders. Each week, we release conversations with experts from the intelligence, defense, civilian, and private sectors where we discuss current events, career and skill development, technology and national security, and the future. Obtain the edge you need to stay current, to accelerate your deve ...
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading
“It’s 5:05!'' is a daily audio news cast highlighting security and open source stories from around the world. We filter for the real cybersecurity and open source stories in the news, so you won't have to. Each day, a global team of journalists contribute stories they found interesting in their daily research from the previous 24 hours. We present them to you in an easy to listen to format, making the resources available at the end of each episode so you can do a deep dive on stories you fin ...
…
continue reading
1
EP. 109: The Future of Cyber Risk Without CISA: How Insurers and Businesses Can Adapt
17:00
17:00
Play later
Play later
Lists
Like
Liked
17:00Aon’s Brent Rieth discusses the ripple effects of the Cyber Information Security Act (CISA) not being renewed, warning that insurers now face a major data gap in assessing cyber threats and pricing risk. Without this vital information-sharing platform, both carriers and businesses must find new ways to access real-time insights into emerging attack…
…
continue reading
1
U.S. Cyber Defense Weakens as CISA Faces Cuts; EU Eases GDPR for AI; UK Tightens Cybersecurity Laws
15:15
15:15
Play later
Play later
Lists
Like
Liked
15:15The expiration of the Cybersecurity Information Sharing Act (CISA) on September 30, 2025, has resulted in a notable decline in U.S. cyber defense capabilities, with a reported drop of over 70% in the sharing of threat indicators. This lapse has created a legal and operational vacuum, leading to increased delays in alert dissemination and a rise in …
…
continue reading
1
Reauthorizing CISA, Electric bus kill switches, GDPR for AI
7:33
7:33
Play later
Play later
Lists
Like
Liked
7:33CISA reauthorization Denmark and Norway investigating electric bus "kill switches" European Commission looking to simplify privacy laws for AI Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" ....or the really scary one: "how do I get out from under these o…
…
continue reading
On this week’s Safe Mode, Greg welcomes Jason Pufahl, VP of Security Services at Vancord. Jason shares deep insights into the evolving managed security landscape, focusing on challenges faced by small and mid-sized businesses and the practical fundamentals they need for strong cybersecurity. He also discusses the evolving role of CISA and the impor…
…
continue reading
CISA says cooperation between federal agencies and the private sector remains steady. Long-standing Linux kernel vulnerability in active ransomware campaigns confirmed. A Chinese-linked group targets diplomatic organizations in Hungary, Belgium, and other European nations. A government contractor breach exposes data of over 10 million Americans. Lu…
…
continue reading
1
Two RMMs walk into a phish… [Research Saturday]
24:00
24:00
Play later
Play later
Lists
Like
Liked
24:00Alex Berninger, Senior Manager of Intelligence at Red Canary, and Mike Wylie, Director, Threat Hunting at Zscaler, join to discuss four phishing lures in campaigns dropping RMM tools. Red Canary and Zscaler uncovered phishing campaigns delivering legitimate remote monitoring and management (RMM) tools—like ITarian, PDQ, SimpleHelp, and Atera—to gai…
…
continue reading
1
MSP Events Shift: From Mega Conferences to Micro Communities and the Rise of Cybersecurity Focus
44:02
44:02
Play later
Play later
Lists
Like
Liked
44:02MSP events are experiencing a notable shift, with a growing preference for smaller, localized gatherings over traditional mega-conferences. Jessica Davis, Principal Analyst at Omdia, highlights that this trend is driven by factors such as increased travel costs and a desire for more meaningful community interactions. Research indicates that MSPs ar…
…
continue reading
1
Google Pixel 10 Bridges the Gap with iPhone: File Sharing Made Easy
1:45
1:45
Play later
Play later
Lists
Like
Liked
1:45Google's Pixel 10 now supports direct file sharing with iPhones via Quick Share and Apple's AirDrop, enhancing cross-platform communication. This feature marks a significant step towards parity between phone builds, though it remains exclusive to Pixel 10. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading
1
Cyberattacks Surge 85% During Shutdown; Telecom Security Regulations Weaken Amid AI Evolution
15:53
15:53
Play later
Play later
Lists
Like
Liked
15:53Cyberattacks against U.S. government employees surged by 85% during the recent government shutdown, with projections estimating over 555 million attacks by the end of November 2025. These attacks, characterized as targeted digital assaults rather than generic phishing attempts, exploit vulnerabilities during periods of financial stress, particularl…
…
continue reading
Cyber Command names a new head of AI. The UK introduces its long-delayed Cyber Security and Resilience Bill. Researchers highlight a critical Oracle Identity Manager flaw. Salesforce warns customers of a third-party data breach. Italy’s state-owned railway operator leaks sensitive information. SonicWall patches firewalls and email security devices.…
…
continue reading
1
DoJ Sanctions, the SEC Abandons the SolarWinds Action, and the FCC Reverses Course on Telecom Security
36:56
36:56
Play later
Play later
Lists
Like
Liked
36:56It's an acronym-filled, government-only bonanza this week! We discuss the DoJ sanctioning Russian bulletproof hosting provider Media Land (0:53), the SEC dropping its enforcement action against SolarWinds and its CISO (13:25), and the FCC reversing course on a longstanding security rule for telecom providers (26:00). Support the show…
…
continue reading
1
Sturnus captures encrypted chats, PowerSchool schools blamed, SEC security bill
8:59
8:59
Play later
Play later
Lists
Like
Liked
8:59Sturnus Android Trojan captures encrypted chats and hijacks devices Canadian regulators say schools share blame for PowerSchool hack Bill reintroduced to bolster cybersecurity at Securities and Exchange Commission Huge thanks to our episode sponsor, KnowBe4 Your email gateway isn't catching everything — and cybercriminals know it. That's why there'…
…
continue reading
1
Inside Jingle Thief Cloud Fraud Unwrapped [Threat Vector]
36:10
36:10
Play later
Play later
Lists
Like
Liked
36:10In this special episode of Threat Vector, host David Moulton, Senior Director of Thought Leadership for Unit 42, sits down with Stav Setty, Principal Researcher at Palo Alto Networks, to unpack Jingle Thief a cloud-only, identity-driven campaign that turned Microsoft 365 into a gift card printing press. Stav explains how the Morocco based group kno…
…
continue reading
In an effort to comply with a new law passed by the Australian government, Meta is beginning to deactivate Facebook, Instagram and Threads accounts belonging to kids under the age of 16. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Podcasts
…
continue reading
1
AI Race Heats Up: Google Gemini 3, Intuit ChatGPT, OpenAI Codex MAX, and EU GDPR Changes
18:52
18:52
Play later
Play later
Lists
Like
Liked
18:52Google has launched its latest AI model, Gemini 3, which is designed to enhance multimodal processing capabilities by simultaneously handling text, images, and audio. This model, particularly the Gemini 3 Pro version, aims to improve the accuracy and reasoning capabilities of AI systems, positioning Google to compete more effectively with OpenAI in…
…
continue reading
The US and allies sanction Russian bulletproof hosting providers. The White House looks to sue states over AI regulations. The US Border Patrol flags citizens’ “suspicious” travel patterns. Lawmakers seek to strengthen the SEC’s cybersecurity posture. A new Android banking trojan captures content from end-to-end encrypted apps. A hidden browser API…
…
continue reading
1
How Visa's CISO turns a 'paranoid and pessimisitic mindset' into positive security outcomes
46:21
46:21
Play later
Play later
Lists
Like
Liked
46:21Visa CISO Subra Kumaraswamy joins Safe Mode to discuss the global scale and complexities of cybersecurity at Visa, from managing a billion transactions daily to maintaining a resilient, “paranoid” defensive posture. Subra reveals how his team blends innovation, threat intelligence, and layered security architectures—not just to protect Visa, but to…
…
continue reading
1
Risky Biz Soap Box: Greynoise knows when bad bugs are coming
37:51
37:51
Play later
Play later
Lists
Like
Liked
37:51In this sponsored Soap Box edition of the podcast, Andrew Morris joins Patrick Gray to talk about how Greynoise can often get a 90 day heads up on serious vulnerabilities. Whether it’s malicious actors doing reconnaissance or the affected vendors trying to understand the scope of the problem, it seems that mass scanning activity lines up pretty nic…
…
continue reading
1
Cloudflare blames database, Crypto heist takedown, WhatsApp flaw exposed billions
8:12
8:12
Play later
Play later
Lists
Like
Liked
8:12Cloudflare blames database Crypto heist takedown WhatsApp flaw exposed billions Huge thanks to our episode sponsor, KnowBe4 Your email gateway isn't catching everything — and cybercriminals know it. That's why there's KnowBe4's Cloud Email Security platform. It's not just another filter—it's a dynamic, AI-powered layer of defense that detects and s…
…
continue reading
A ton of web sites and internet services went down on Tuesday because of an error impacting the Cloudflare content delivery service. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Podcasts
…
continue reading
1
Microsoft's AI Agent 365 Launch, Vendor Integrations, and Cybersecurity Media Consolidation
17:24
17:24
Play later
Play later
Lists
Like
Liked
17:24Microsoft has launched Agent 365, a management platform designed for overseeing AI agents within enterprise environments. This platform, now available in early access, includes features such as the Microsoft Entra Registry for managing agent identities, risk-based access policies, and performance measurement tools. The introduction of Agent 365 sig…
…
continue reading
1
The oversized file that stalled the internet.
29:46
29:46
Play later
Play later
Lists
Like
Liked
29:46Cloudflare’s outage is rooted in an internal configuration error. The Trump administration is preparing a new national cyber strategy. CISA gives federal agencies a week to secure a new Fortinet flaw. MI5 warns that China is using LinkedIn headhunters and covert operatives to target lawmakers. Experts question the national security risks of TP-Link…
…
continue reading
1
AI, Acquisitions & What’s Next for Applied Systems | ITC Vegas
10:34
10:34
Play later
Play later
Lists
Like
Liked
10:34Applied Systems’ Doug McElhaney breaks down why the Cytora acquisition fits perfectly into their “digital round trip” strategy and how generative and agentic AI will streamline workflows, upgrade underwriting, and expand the future of insurance. Watch this interview at ITC Las Vegas with Carrier Management’s Deputy Editor Elizabeth Blosfield. The p…
…
continue reading
1
EP. 109: The Future of Cyber Risk Without CISA: How Insurers and Businesses Can Adapt
17:00
17:00
Play later
Play later
Lists
Like
Liked
17:00Aon’s Brent Rieth discusses the ripple effects of the Cyber Information Security Act (CISA) not being renewed, warning that insurers now face a major data gap in assessing cyber threats and pricing risk. Without this vital information-sharing platform, both carriers and businesses must find new ways to access real-time insights into emerging attack…
…
continue reading
1
FCC to torch Salt Typhoon rules, Group claims Danish party website hits, MI5 warns Chinese spies are on LinkedIn
7:35
7:35
Play later
Play later
Lists
Like
Liked
7:35FCC to torch rules from Salt Typhoon Group claims hits on Danish party websites MI5 warns Chinese spies are using LinkedIn Huge thanks to our episode sponsor, KnowBe4 Your email gateway isn't catching everything — and cybercriminals know it. That's why there's KnowBe4's Cloud Email Security platform. It's not just another filter—it's a dynamic, AI-…
…
continue reading
1
Risky Business #815 -- Anthropic's AI APT report is a big deal
51:24
51:24
Play later
Play later
Lists
Like
Liked
51:24In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Anthropic says a Chinese APT orchestrated attacks using its AI It’s a day ending in -y, so of course there are shamefully bad Fortinet exploits in the wild Turns out slashing CISA was a bad idea, now it’s time for a hiring spree Researchers brute for…
…
continue reading
1
AI Hacks Are Here Agentic AI Espionage, Cybersecurity Layoffs & Info Sharing Gaps
38:39
38:39
Play later
Play later
Lists
Like
Liked
38:39The conversation delves into the alarming use of AI in espionage, highlighting a recent incident reported by Anthropic where AI tools were manipulated to conduct attacks on various global organizations. The discussion emphasizes the unprecedented nature of these threats and the significant role AI plays in modern cybersecurity challenges.Article: A…
…
continue reading
Tokenization - or the process of creating digital units or tokens on a blockchain to represent ownership of a real-world asset - is gaining global momentum. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Podcasts
…
continue reading
1
AI-Driven Cyber Threats Surge: SMBs Embrace MDR, Shadow AI, and Evolving Malware Tactics
14:56
14:56
Play later
Play later
Lists
Like
Liked
14:56The rise of artificial intelligence (AI) in cyber attacks is prompting small and medium-sized businesses (SMBs) to adopt managed detection and response (MDR) services and explore autonomous security operations centers (SOCs). Research from TechAisle indicates that awareness of MDR among SMBs increased from 39% in 2023 to 61% in 2025, with 89% of mi…
…
continue reading
Cloudflare suffers a major outage. Google issues an emergency Chrome update. Logitech discloses a data breach. CISA plans a major hiring push. The House renews the State and Local Cybersecurity Grant Program. The GAO warns military personnel are oversharing online. Tech groups urge governments worldwide to reject proposals that weaken or bypass enc…
…
continue reading
1
Rich Mogull on the Cloudflare Outage, Resilience, and Single Points of Failure
24:52
24:52
Play later
Play later
Lists
Like
Liked
24:52Dennis is joined by Rich Mogull, chief analyst at the Cloud Security Alliance, cloud security trainer, and all around good guy to talk about the Cloudflare outage, why the internet is now just six companies, and what, if anything, organizations can do to improve their resilience in the current environment. Support the show…
…
continue reading
1
Navigating Leadership in IT & Cyber Featuring Bryce Englin
52:28
52:28
Play later
Play later
Lists
Like
Liked
52:28Happy Veterans Day! In this episode of the Other Side of the Firewall podcast, host Ryan Williams Sr. interviews Bryce Englin, a retired Air Force veteran with extensive experience in IT and project management. They discuss the transition from military to civilian leadership, the importance of feedback and mentorship, and the challenges facing the …
…
continue reading
1
Azure hit by DDoS, Kenyan government sites recover, EVALUSION emerges
7:42
7:42
Play later
Play later
Lists
Like
Liked
7:42Azure hit by DDoS using 500K IPs Kenyan government websites back online EVALUSION emerges Huge thanks to our episode sponsor, KnowBe4 Your email gateway isn't catching everything — and cybercriminals know it. That's why there's KnowBe4's Cloud Email Security platform. It's not just another filter—it's a dynamic, AI-powered layer of defense that det…
…
continue reading
1
Episode 226: On Digital Fingerprints and Dirty Money
44:01
44:01
Play later
Play later
Lists
Like
Liked
44:01Jeff Williams on the business of moving money: who gets blocked, what slips through, and why checking the right boxes doesn’t always mean a win in the nascent AI-powered sanctions compliance space. From fentanyl money to shell companies, we follow the (often filthy dirty) money. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading
Managing identity has been an evolving challenge as networks have only continued to grow and become more sophisticated. In this current landscape, these challenges have only become further exacerbated with new emerging technologies. In this episode of CISO Perspectives, host Kim Jones sits down with Richard Bird from Singular AI to discuss this e…
…
continue reading
1
Department of Know: Autonomous AI cyberattack, CISOs back to work, bus kill switches
39:26
39:26
Play later
Play later
Lists
Like
Liked
39:26Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Robb Dunewood, Host, Daily Tech News Show, and Howard Holton, CEO, GigaOm Thanks to our show sponsor, KnowBe4 Your email gateway isn't catching everything — and cybercriminals know it. That's why there's KnowBe4's Cloud Email Security platform. It's not ju…
…
continue reading
1
Musk Lawsuit Against Apple and OpenAI Moves Forward
1:45
1:45
Play later
Play later
Lists
Like
Liked
1:45Elon Musk's X Corporation is allowed to proceed with a lawsuit against Apple and the makers of ChatGPT, arguing they colluded to gain an unfair advantage in the artificial intelligence space. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Podcasts
…
continue reading
1
IT Budgets Surge as AI Reshapes Roles; VMware Disruption Sparks Modernization Opportunities
17:55
17:55
Play later
Play later
Lists
Like
Liked
17:55The recent partnership between OpenAI and Search Kings, a digital marketing firm, aims to provide ChatGPT services to small and medium-sized businesses (SMBs), particularly in the home services sector. This collaboration is designed to facilitate the integration of artificial intelligence into SMB operations, addressing the challenges these busines…
…
continue reading
The Pentagon is spending millions on AI hacking. The New York Times investigates illicit crypto funds. Researchers uncover widespread remote code execution flaws in AI inference engines. Police in India arrest CCTV hackers. Payroll Pirates use Google Ads to steal credentials and redirect salaries. A large-scale brand impersonation campaign delivers…
…
continue reading
1
NB552: Nokia Switches On AI Ops; IBM Seeks a Quantum of Advantage
44:58
44:58
Play later
Play later
Lists
Like
Liked
44:58Take a Network Break! Red Hat Samba server has a remote command execution vulnerability, and we cover some follow-up on fusion as a viable energy source (still a work in progress). On the news front, we search for signs in SoftBank’s sale of its Nividia stake, Mplify debuts a new certificate on carrier Ethernet for... Read more »…
…
continue reading