Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
…
continue reading
Compliance And Data Protection Podcasts
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
1
The Medcurity Podcast: HIPAA Compliance | Security | Technology | Healthcare
Medcurity: HIPAA Compliance
Healthcare is complicated. Joe Gellatly and the Medcurity team are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more. HIPAA laws continue to evolve. Go to hhs.gov for the latest information. Learn more at https://medcurity.com.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
There is tremendous value to simplification. To quote Steve Jobs, “Simple can be harder than complex: You have to work hard to get your thinking clean to make it simple. But it is worth it in the end because once you get there, you can move mountains." In this series, we explore how people and companies achieve simplification.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
How does GDPR, data privacy, and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance, hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader, or InfoSec security expert, this is the podcast to learn about what is happening in the UK, EU, US, and beyond.
…
continue reading
Privacy in Practice, brought to you by VeraSafe, is the podcast for actionable insights and real-world strategies for privacy and compliance teams. Hosted by privacy pros Kellie Du Preez and Danie Strachan, each episode unpacks the practical side of compliance and data management, bringing together industry leaders and thought-provoking discussions. Whether you’re leading privacy efforts at your company or just beginning to explore this field, tune in for meaningful conversations that provid ...
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impac ...
…
continue reading
FINRA Unscripted is the voice of the nation’s largest non-government securities regulator. We bring together FINRA leaders to discuss existing and emerging regulatory topics that impact the broker-dealer industry. We share best practices for compliance officers, insights into the operations of a 3,500 person self-regulated organization and educational tools and information for investors. Every investor in America relies on one thing: fair financial markets. That is what FINRA works every day ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
The Today's Wills & Probate Podcast will speak to some of the industry's most influential people and those at the forefront of innovation. Listeners will have the opportunity to pick up key business insights, gain valuable knowledge and ask questions to guests.
…
continue reading
Universal Engineering has become a trusted name in conducting Milestone Inspections in Palm Beach, providing detailed, engineering-driven evaluations for residential and commercial properties. Their team of licensed structural engineers performs thorough assessments of building components—foundations, slabs, columns, beams, and load-bearing walls—ensuring every structure meets required safety benchmarks. Unlike basic visual inspections, Universal Engineering’s milestone process involves data ...
…
continue reading
Interesting, fascinating, provoking, insightful - or all of the above - GDPR decisions, rulings and other tidbits discussed by two very opinionated people.
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™
Startuprad.io – Europe’s Startup & VC Podcast Network
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we're proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we're pleased to share the talent and perspective of our staff as it relates to today's emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
…
continue reading
The world’s accomplishments depend on data security. Join PKWARE CEO Spencer Kupferman every month as he chats with data security experts on eliminating security gaps, taking control of sensitive data, and meeting the most stringent data compliance requirements. Tune in to find out how industry leaders are eliminating data security gaps and achieving compliance goals.
…
continue reading
Welcome to Food Tech Talk: Supply Chain Insights From Farm to Fork, a bite-sized podcast discussing the latest trends and technology in the food and supplements industries, featuring conversations with regulatory experts, quality and safety champions, and thought leaders across the industry. Together, we are on a mission to change the food and dietary supplement industry for the better. In short snippets, guests will discuss a range of topics, from regulatory compliance to sustainable operat ...
…
continue reading
Software testing is the most important part of software development, but it is especially significant for healthcare software. Healthcare software applications manage patient data, offer medical services, and ensure compliance with various standards and regulations. Defects or errors in healthcare software can have consequences for patient security, data protection, and functional efficiency.
…
continue reading
Get the most recent and juiciest data protection and privacy news and latest court and DPA decisions from across Europe in GDPR today: the GDPRhub newsletter - the audio version! Produced by NoTies.Consulting, read by Rie Aleksandra Walle - GDPRhub volunteer.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
TempGenius has established itself as a trusted name in wireless temperature monitoring, offering advanced solutions designed to meet the needs of diverse industries. Their systems are ideal for healthcare facilities, laboratories, food services, and industrial environments where temperature control is critical for compliance, safety, and efficiency. The wireless monitoring technology from TempGenius provides real-time data tracking, automated alerts, and detailed reporting, ensuring that bus ...
…
continue reading
Join us for an in-depth exploration of InfoGov.com, the pioneering firm redefining Information Governance for businesses of all sizes. In this episode, we break down how InfoGov.com empowers Independent Professionals and InfoAdvisors™ to help organizations manage their data, protect sensitive information, and navigate the evolving landscape of security, privacy, compliance, and risk. From boutique revenue-sharing models to agnostic advisory services, we’ll discuss what sets InfoGov.com apart ...
…
continue reading
Hosted by natural health practitioner and holistic biologist Catherine Edwards, this show uncovers what’s really making us — and our animals — sick, stressed, and disconnected. With years of experience, Catherine empowers sovereignty, critical thinking & natural healing. Connect With Me Website - https://www.catherineedwards.life/ Health & Wellness Consultations for you and your animals - https://www.catherineedwards.life/consults Academy Website - https://catherineedwardsacademy.com/ Root B ...
…
continue reading
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. The Cyber Risk Podcast for Business Leaders, hosted by Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute and CEO of NCX Group, delivers weekly, no-nonsense insights tailored to CEOs, CFOs, and decision-makers. From data breaches to practical cybersecurity and data privacy strategies, we offer steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk in ...
…
continue reading
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
…
continue reading
Welcome to the podcast: Sustainable Compliance. Are you passionate about data protection, GDPR, information security, and general compliance? Then, this podcast is dedicated to you. We delve into the intricacies of data protection and compliance. Join us as the host, Jacob Høedt Larsen, interviews experts and discusses the latest trends, insights, and advice within the realm of compliance. We also explore how we can reshape the way we think and organise ourselves around compliance, to forge ...
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Welcome to the Proceed Podcast, where we explore data and document management in the SAP world. Our goal is to help SAP customers manage their data effectively for reduced costs, improved IT agility, compliance, sustainability, and to drive IT transformation. Join us for expert interviews, case studies, and analysis to gain valuable insights into how you can optimise your data management processes.
…
continue reading
Join me in conversation with experts around the world as we talk about new privacy laws, global trends in data protection and the impact of these developments.
…
continue reading
1
The 1347 PODCAST -HEALTHCARE FRAUD DETECTION, CORPORATE COMPLIANCE AND ORGANIZATIONAL INTEGRITY
The 1347
The podcast focuses on healthcare fraud detection, corporate compliance, organizational integrity, and research security best practices.
…
continue reading
Forcepoint, powered by Raytheon, is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.Forcepoint. ...
…
continue reading
In the digital age, privacy is more important than ever. But as technology advances, so do the challenges to privacy. We explore the latest trends in privacy and technology, and discuss how businesses can build strong privacy programs that protect their customers' data. We invite top privacy compliance and tech guests to discuss privacy in a fun and interesting manner, covering topics such as data privacy, cybersecurity, and AI. Whether you're a business owner, a privacy professional, or sim ...
…
continue reading
The Security Collective is the podcast for leaders tasked with, and interested in, securing technology, people, processes and data for the protection of all. Join best-selling author Claire Pales, together with industry thought leaders who answer your questions about security leadership, trends, technologies, and more. 'The Security Collective' podcast - formerly 'The Secure CIO'
…
continue reading
Data privacy is a hot sector in the world of business. But it can be hard to break in and have a career that thrives. That’s where our podcast comes in! We interview leading Privacy Pros and share the secrets to success each fortnight. We'll help guide you through the complex world of Data Privacy so that you can focus on achieving your career goals instead of worrying about compliance issues. It's never been easier or more helpful than this! You don't have to go at it alone anymore! It’s ea ...
…
continue reading
Uncovering Hidden Risks explores how enterprises can reduce their risk by moving to a more holistic approach to data protection. Each episode will feature a panel of Microsoft security professionals and community security experts. They’ll dive into topics like data governance, internal and external threats, risk management and compliance, industry trends, and customer challenges. Listen in to the podcast and follow us! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Podcast by Marketplace Risk
…
continue reading
When it comes to storing vaccines for children, maintaining the correct temperature is critical to preserving their potency and safety. TempGenius offers a state-of-the-art Vaccine Temperature Monitoring System designed to meet CDC and VFC (Vaccines for Children) compliance standards. Ideal for paediatric clinics, hospitals, and pharmacies, this wireless solution ensures continuous, real-time monitoring of vaccine storage units with instant alerts for any temperature deviation. Using advance ...
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
Experience the future of temperature monitoring with TempGenius' cutting-edge wireless temperature logging system. Perfect for industries where precision is paramount, this system ensures that your temperature-sensitive environments are consistently monitored with real-time accuracy. Say goodbye to manual checks and human errors, TempGenius offers seamless integration with your existing systems, providing automated alerts and detailed reports that keep you compliant with regulatory standards ...
…
continue reading
www.hoaunlimited.com HOA Unlimited- is a leading firm in the homeowner's Association industry specializing in providing exceptional customer service, hospitality, and professional Homeowner's Association management services. Our firm has dedicated its time experience with knowledge to being one of the best management companies, and we have a proven track record backed by multiple years of experience, great relationships, resources, and talented managers. Our Firm Effective Operations: Organi ...
…
continue reading
Welcome, fellow Mid-Marketers, to the podcast that throws a wrench in the B2B machine! We’re not your average industry insiders, whispering secrets from ivory towers. We’re in the trenches with you, navigating the unique challenges and opportunities of the mid-market. We get it, because we live it, and we LOVE IT! Forget the tired, one-size-fits-all B2B advice. Here, we disrupt the status quo, sharing relatable stories from the real world, where hustle meets heart, and expert analysis cuts t ...
…
continue reading
1
I Built a Password Tool in 2 Weekends (And Got 1,000 Users)
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30This story was originally published on HackerNoon at: https://hackernoon.com/i-built-a-password-tool-in-2-weekends-and-got-1000-users. Indian government portals are a mess when it comes to passwords. Millions of Indians get locked out daily, not knowing what they did wrong. Check more stories related to cybersecurity at: https://hackernoon.com/c/cy…
…
continue reading
1
Are You Ready For The Next Health Data Attack? | Medcurity Podcast 114
9:43
9:43
Play later
Play later
Lists
Like
Liked
9:43Most incident response plans aren’t tested until it’s too late. This episode walks through what “ready” actually looks like in healthcare: knowing where PHI lives, keeping your Security Risk Analysis current, setting clear roles, and practicing real scenarios so teams don’t freeze when it matters. We cover fast detection, clean containment, and sma…
…
continue reading
1
Building a Real Security Culture: Why Most AppSec Champion Programs Fall Short | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 5 | A Musing On the Future of Cybersecurity with Sean Martin ...
2:24
2:24
Play later
Play later
Lists
Like
Liked
2:24Most organizations have security champions. Few have a real security culture. In this episode of AppSec Contradictions, Sean Martin explores why AppSec awareness efforts stall, why champion programs struggle to gain traction, and what leaders can do to turn intent into impact. 🔍 In this episode: Why compliance training doesn’t build culture The dat…
…
continue reading
1
Securing the Silicon: How HP Designed Quantum-Safe Hardware from the Ground Up
36:22
36:22
Play later
Play later
Lists
Like
Liked
36:22As quantum computing advances, organisations can no longer treat hardware migration as a secondary task. Thalia Laing, Principal Cryptographer at HP Security Lab, explains how HP adopted a hardware-first approach to post-quantum security by launching the world’s first quantum-safe Secure Boot for business PCs ahead of NIST standards. She describes …
…
continue reading
1
teissTalk: Getting the board’s ‘aye’ on your cyber-security investments
45:29
45:29
Play later
Play later
Lists
Like
Liked
45:29Bridging the CISO-board disconnect which hinders your cyber-security progress Measuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investments Focusing on governance and compliance – how to answer when asked “are we compliant? Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Zia …
…
continue reading
1
#122 Health Freedom & Digital ID: Your Body, Your Data, Your Choice | Draw the Line Now
25:31
25:31
Play later
Play later
Lists
Like
Liked
25:31Your body. Your data. Your choice. In this solo episode, I share why I joined the recent London protest against the Digital ID rollout — and why this moment might be the most important turning point in human history. We’re being told Digital ID is about safety and convenience, but it’s really about control — merging our health, identity, and freedo…
…
continue reading
1
Bridging the Cybersecurity Divide Between the Haves and Have-Nots: Lessons from Australia’s CISO Community | A Conversation with Andrew Morgan | Redefining CyberSecurity with Sean Martin
52:14
52:14
Play later
Play later
Lists
Like
Liked
52:14⬥GUEST⬥ Andrew Morgan, Chief Information Security Officer | On LinkedIn: https://www.linkedin.com/in/andrewmorgancism/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ The cybersecurity communi…
…
continue reading
1
How Engage helps teams scale client collaboration securely
18:19
18:19
Play later
Play later
Lists
Like
Liked
18:19It’s been 5 months since Tresorit Engage launched, offering organizations a new way to manage client and partner collaboration securely and efficiently. In this time, teams across industries have begun to discover the real-world benefits of customizable data rooms offering transparent task management and seamless, secure information sharing. This p…
…
continue reading
1
Inside CMMC Implementation: What November 10th Means for Defense Contractors | Secure Talk with Bob Kolasky
55:38
55:38
Play later
Play later
Lists
Like
Liked
55:38Bob Kolasky walked the halls where CMMC was built. As founding director of CISA's National Risk Management Center, he watched this policy evolve from concept to pilot program to federal law—surviving three presidential administrations because the need never changed. On November 10, 2025, that policy becomes mandatory reality for every defense contr…
…
continue reading
1
Webinar Audio - Cross Border Privacy Rules (CBPR): A Comprehensive Overview
52:28
52:28
Play later
Play later
Lists
Like
Liked
52:28Listen to Meru Data’s podcast — Cross Border Privacy Rules (CBPR): A Comprehensive Overview In this episode, we dive into the Cross Border Privacy Rules (CBPR) system, a globally recognized framework designed to streamline data transfers across jurisdictions. As organizations face increasing complexity in meeting international privacy standards, th…
…
continue reading
1
A Conversation with FINRA CEO Robert Cook and Small Firm Advisory Committee Chair Preston Haxo
26:51
26:51
Play later
Play later
Lists
Like
Liked
26:51Small firms face unique challenges. The regulatory landscape is evolving rapidly. And the conversation between regulators and the regulated is more important than ever. How does FINRA ensure that small firm voices are heard? How do small firms navigate an increasingly complex environment while serving their clients effectively? On this episode, we …
…
continue reading
1
Technology Innovations in Media and Entertainment
1:20:38
1:20:38
Play later
Play later
Lists
Like
Liked
1:20:38In this episode of the CDW Canada Tech Talks podcast, host KJ Burke engages with CDW experts Joe D'Amato, Kris Kostiuk and Kevin Ellsworth to explore the evolving technology landscape of media and entertainment. They discuss the unique challenges faced by the industry, including project-based workflows, cybersecurity threats and the impact of AI on…
…
continue reading
1
The $10 Billion Logic Error: What Happens When Security Moves Faster Than Sanity
13:31
13:31
Play later
Play later
Lists
Like
Liked
13:31This story was originally published on HackerNoon at: https://hackernoon.com/the-$10-billion-logic-error-what-happens-when-security-moves-faster-than-sanity. This article investigates how the July 2024 CrowdStrike crash exposed the fragility of automated AI‑driven security systems and their global fallout. Check more stories related to cybersecurit…
…
continue reading
1
Field Notes: AI's $10 Trillion Lie + Coffee Roasting & Starlink Hacks
26:28
26:28
Play later
Play later
Lists
Like
Liked
26:28What if everything AI tells you about cybersecurity costs is completely wrong? The Audit crew unpacks a shocking data black hole that has infected every major AI model—plus field-tested tech that actually works. In this laid-back Field Notes episode, Joshua Schmidt, Eric Brown, and Nick Mellum return from Gartner's CIO Symposium with insights that'…
…
continue reading
1
#744: Amazon Bedrock AgentCore, Amazon EC2 Capacity Manager, and so much more!
31:36
31:36
Play later
Play later
Lists
Like
Liked
31:36Simon and Jillian walk you through all the new and interesting updates.By Amazon Web Services
…
continue reading
1
October 2025 Deep Dive – AI Startups, Venture Capital & Fintech in DACH
25:56
25:56
Play later
Play later
Lists
Like
Liked
25:56🏁 The Deep Dive is here. Germany, Austria and Switzerland enter a new startup cycle where the headline isn’t “Who raised the biggest check?” but “Who’s building the most defensible foundation?” Hosts Jörn ‘Joe’ Menninger and Chris Fahrenbach break down October 2025’s most important stories in AI, fintech, venture capital, and climate tech. 🔎 What Y…
…
continue reading
1
GodLoader Malware Loader: What You Need to Be Aware of
4:02
4:02
Play later
Play later
Lists
Like
Liked
4:02This story was originally published on HackerNoon at: https://hackernoon.com/godloader-malware-loader-what-you-need-to-be-aware-of. We would like to take this opportunity to remind users about some good security practices when it comes to downloading and executing software. Check more stories related to cybersecurity at: https://hackernoon.com/c/cy…
…
continue reading
1
Defending the Digital Frontline: Ransomware, AI, and Real-World Lessons | Alexander Rau
43:47
43:47
Play later
Play later
Lists
Like
Liked
43:47In this gripping episode of The Defender’s Log, host David Redekop sits down with Alexander Rau, Partner in Cybersecurity at KPMG, to explore the intense world of cyber incident response. From ransomware attacks and business email compromises to AI-driven ransom negotiations, Alexander shares firsthand experiences from the cyber frontlines, reveali…
…
continue reading
1
How to Stay Resilient When Cybercrime Becomes Your Competition | A Conversation with Author and Former FBI Agent, Eric O'Niell | Redefining CyberSecurity with Sean Martin
40:24
40:24
Play later
Play later
Lists
Like
Liked
40:24⬥GUEST⬥ Eric O'Neill, Keynote Speaker, Cybersecurity Expert, Spy Hunter, Bestselling Author. Attorney | On Linkedin: https://www.linkedin.com/in/eric-m-oneill/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com …
…
continue reading
1
What can be done to improve mental health and wellbeing in legal services?
37:39
37:39
Play later
Play later
Lists
Like
Liked
37:39As more than half of lawyers say they anticipate leaving their role within the next five years because of poor mental health and wellbeing, the latest Today's Wills and Probate Podcast tackles the issue head on with a wide ranging discussion on what organisations can do to protect their staff. Joining the podcast are Trish McLellan and Niamh Warnoc…
…
continue reading
1
Transforming Global IT Compliance: Rashmi Sets New Standards in NIST Framework Implementation
7:56
7:56
Play later
Play later
Lists
Like
Liked
7:56This story was originally published on HackerNoon at: https://hackernoon.com/transforming-global-it-compliance-rashmi-sets-new-standards-in-nist-framework-implementation. Rashmi Bharathan leads a global NIST compliance overhaul, improving audit readiness by 70% and setting new benchmarks in IT governance excellence. Check more stories related to cy…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/to-infinity-and-delete. In 1998, disaster struck at Pixar. A single mistyped command — rm -rf / — began erasing Toy Story 2 from existence. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #c…
…
continue reading
1
Europe’s AI Supercluster: How DACH Startups Are Outpacing Silicon Valley
26:35
26:35
Play later
Play later
Lists
Like
Liked
26:35What if Europe — not Silicon Valley — defined the future of AI? In this October 2025 episode of Startuprad.io Startup News, hosts Jörn “Joe” Menninger and Chris Fahrenbach break down the latest stories shaping Europe’s AI Supercluster, led by DeepL, Black Forest Labs, and N8N. From record climate tech funding to biotech breakthroughs and industrial…
…
continue reading
1
#121 AirPods, Wi-Fi, 5G & Kids: What the Science Shows & Get Protected with Atom Cell
35:43
35:43
Play later
Play later
Lists
Like
Liked
35:43If radiation from phones, AirPods, Wi-Fi and 5G is “safe,” why do device manuals tell you not to hold them on your body? In this episode of Live Love Learn, Catherine Edwards and Kim Kindersley unpack the research on EMF exposure, especially for children and teens, and show a live blood analysis demo that visually reveals how a phone call can chang…
…
continue reading
1
What Every E-Commerce Brand Should Know About Prompt Injection Attacks
11:38
11:38
Play later
Play later
Lists
Like
Liked
11:38This story was originally published on HackerNoon at: https://hackernoon.com/what-every-e-commerce-brand-should-know-about-prompt-injection-attacks. Prompt injection is hijacking AI agents across e-commerce. Learn how to detect, prevent, and defend against this growing AI security threat. Check more stories related to cybersecurity at: https://hack…
…
continue reading
1
InfoSec Beat: Careers in Information Security – Strategy and Emerging Programs
20:18
20:18
Play later
Play later
Lists
Like
Liked
20:18This episode of the InfoSec Beat podcast focuses on careers in information security. Accenture CISO Kris Burkhardt talks with Renée Fletcher, a program manager in Accenture Information Security. Renée is at a turning point in her career, moving from Governance, Risk and Compliance to a new strategic programs role as the Cyberstrategy, Geopolitical …
…
continue reading
1
CI/CD Pipeline Security: Why Attackers Breach Your Software Pipeline and Own Your Build Before Production | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 4 | A Musing On the Future of Cybersecurity ...
3:38
3:38
Play later
Play later
Lists
Like
Liked
3:38Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself. This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity. 🔍 In this episode: A 188% surge in malicious open-source packages (Sonatype 2025) 30% of 2024 cyberattacks…
…
continue reading
1
How IPinfo Turns Registry Data into Real Intelligence
18:58
18:58
Play later
Play later
Lists
Like
Liked
18:58This story was originally published on HackerNoon at: https://hackernoon.com/how-ipinfo-turns-registry-data-into-real-intelligence. Explore IP addresses, ASNs, and RIR challenges—and see how IPinfo transforms static WHOIS records into dynamic, verifiable intelligence. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
…
continue reading
1
Is Organic Food Truly Organic? The Hidden Truth About Food Supply Chain Data
34:44
34:44
Play later
Play later
Lists
Like
Liked
34:44In this episode of Food Tech Talk: Supply Chain Insights from Farm to Fork, host Lydia Adams sits down with Jeff Smith, co-founder of Colorado Craft Beef, to explore how traditional ranching can successfully merge with modern food systems. Jeff shares how his team leverages technology, transparency, and sustainable practices while preserving the va…
…
continue reading
1
How to Protect Your Kids Online When They're Playing Video Games
10:48
10:48
Play later
Play later
Lists
Like
Liked
10:48This story was originally published on HackerNoon at: https://hackernoon.com/how-to-protect-your-kids-online-when-theyre-playing-video-games. Avoid linking external services to your game console, such as signing in with a social media account or other platform and set up restricted child accounts. Check more stories related to cybersecurity at: htt…
…
continue reading
1
Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats
3:50
3:50
Play later
Play later
Lists
Like
Liked
3:50This story was originally published on HackerNoon at: https://hackernoon.com/arsen-launches-smishing-simulation-to-help-companies-defend-against-mobile-phishing-threats. The tool lets companies create and send their own text-message campaigns safely, at scale. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Y…
…
continue reading
1
#743: The Frugal Architect w/ Werner Vogels: The Ocean Cleanup's mantra: Start simple and iterate relentlessly
40:45
40:45
Play later
Play later
Lists
Like
Liked
40:45When Boyan Slat found more plastic than fish on a dive in Greece, he asked a simple question: "Why can't we just clean this up?" He was 16.What began as a humble project funded with pocket money has grown into a global initiative, removing millions of pounds of plastic from the world's rivers and oceans in the last decade. But simple questions don'…
…
continue reading
1
Security That Moves at Dev Speed: Practical Ways to Shift Left
8:53
8:53
Play later
Play later
Lists
Like
Liked
8:53This story was originally published on HackerNoon at: https://hackernoon.com/security-that-moves-at-dev-speed-practical-ways-to-shift-left. Shift Left Security practices developers actually like — with code examples, guardrails, and policy as code to reduce friction. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecu…
…
continue reading
1
What’s Hidden in Your Vendor Ecosystem? | Medcurity Podcast 113
5:37
5:37
Play later
Play later
Lists
Like
Liked
5:37Your organization doesn’t operate alone—and neither does your risk. In this episode, we look at how vendors, business associates, and service providers can quietly impact your HIPAA compliance and security. From overlooked contracts to outdated risk reviews, even trusted partners can become weak links if they’re not managed well. Hear what good ven…
…
continue reading
1
AI Sidebar Spoofing Attack:SquareX Uncovers Malicious Extensions That Impersonate AI Browser Sidebar
4:17
4:17
Play later
Play later
Lists
Like
Liked
4:17This story was originally published on HackerNoon at: https://hackernoon.com/ai-sidebar-spoofing-attacksquarex-uncovers-malicious-extensions-that-impersonate-ai-browser-sidebar. The attack can trick users into executing dangerous commands that can lead to credential theft, device hijacking, and password exfiltration. Check more stories related to c…
…
continue reading
1
Smart Attacks, Smarter Defenses: How AI is Transforming DDoS Attacks
9:49
9:49
Play later
Play later
Lists
Like
Liked
9:49This story was originally published on HackerNoon at: https://hackernoon.com/smart-attacks-smarter-defenses-how-ai-is-transforming-ddos-attacks. AI makes DDoS attacks 287% more sophisticated. Learn adversarial AI defense, behavioral biometrics, and other strategies that work today. Check more stories related to cybersecurity at: https://hackernoon.…
…
continue reading
1
Global Standards, Regional Variants: Designing for PQC Across Jurisdictions
28:01
28:01
Play later
Play later
Lists
Like
Liked
28:01As quantum computing accelerates, organizations can no longer treat cryptographic migration as a distant technical task. Dr Richard Searle of Fortanix explains how confidential computing and a software-first model enable enterprises to adopt post-quantum cryptography (PQC) rapidly while maintaining control, compliance, and agility. He describes how…
…
continue reading
1
teissTalk: Help your colleagues help you with an enhanced security awareness programme
44:42
44:42
Play later
Play later
Lists
Like
Liked
44:42How appreciation and gamification can improve your employees’ security awareness Making security behaviours stick – reframing mistakes as opportunities for growth Fostering a culture of continuous improvement with an inclusive learning environment Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Sara Carty, Founder & CEO, Un…
…
continue reading
1
How Xaver Lehmann Recovered from Burnout After a $60 M Startup Exit
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52He sold his AI startup for $60 million — and fell apart. In this raw and powerful conversation, Xaver Lehmann, co-founder and former CEO of e-bot7, opens up about burnout, loss, and recovery after one of Europe’s biggest AI exits. What happens when you achieve everything you ever wanted — and it breaks you? 💡 What you’ll learn in this episode: – Ho…
…
continue reading
1
#120 The Final Control Grid & How It All Connects: Digital ID, CBDCs, PsyOps & Health Freedom
57:19
57:19
Play later
Play later
Lists
Like
Liked
57:19Confusion is a tool of control. In this coffee chat with Brice from @EsotericAtlanta, we connect the dots between Digital ID, CBDCs/financial crisis, health system capture/Big Pharma, mass surveillance, and political theatre, and share calm, practical ways to resist and protect your family, sanity, and sovereignty. What we cover: Why Digital ID kee…
…
continue reading
1
Getting started with AI-enabled e-discovery: Do’s, don’ts, and lessons learned
23:52
23:52
Play later
Play later
Lists
Like
Liked
23:52Anthony Diana is joined by Therese Craparo and Marcin Krieger to start a new series on AI-enabled e-discovery. This series will look at practical and legal issues related to the use of AI in e-discovery, with a focus on actual use cases rather than theoretical discussions. Topics for this episode include how AI is currently being used in e-discover…
…
continue reading
1
Milestone Inspection Palm Beach: Ensuring Structural Integrity with Universal Engineering
1:42
1:42
Play later
Play later
Lists
Like
Liked
1:42Universal Engineering has become a trusted name in conducting Milestone Inspections in Palm Beach, providing detailed, engineering-driven evaluations for residential and commercial properties. Their team of licensed structural engineers performs thorough assessments of building components—foundations, slabs, columns, beams, and load-bearing walls—e…
…
continue reading
1
Beyond Big Cities: Understanding Cybersecurity in Mid-Sized Communities | with Lars Kruse
51:57
51:57
Play later
Play later
Lists
Like
Liked
51:57When we think about cybersecurity, images of tech giants and major financial centers come to mind—but what about the towns where most of us actually live? This SecureTalk episode with cybersecurity researcher Lars Kruse explores an often-overlooked question: how do communities of 20,000-100,000 residents protect themselves in an increasingly digita…
…
continue reading
Privacy enhancing technologies (PETs) have evolved from academic concepts to practical tools that can transform how organizations handle sensitive data. In this episode of Privacy in Practice, hosts Kellie du Preez and Danie Strachan welcome Monisha Varadan, EMEA Privacy Lead at Google, for an in-depth exploration of how PETs work in practice and w…
…
continue reading
1
Apple Vision Pro Meets AI: Why Your Company Needs Both
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10What happens when Apple Vision Pro meets enterprise AI? In this episode of The Audit, Alex Bratton—applied technologist and AI implementation expert—joins hosts Joshua Schmidt and Nick Mellem to reveal how spatial computing and artificial intelligence are colliding to reshape how we work. From conducting million-dollar sales meetings in virtual rea…
…
continue reading
1
#742: Amazon Quick Suite, AWS MCP, and lots more!
30:35
30:35
Play later
Play later
Lists
Like
Liked
30:35Stay up-to-date, with almost 60 new updates this week!!By Amazon Web Services
…
continue reading
1
Why You Shouldn’t Wait on Your Security Risk Analysis | Medcurity Podcast 112
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04The Security Risk Analysis isn’t just another compliance task. It’s the foundation of your HIPAA program and the proof that you’re protecting patient data. In this episode, hear why now—not January—is the time to get it done. Recent OCR fines show that organizations of every size are still being penalized for missing or outdated SRAs. Waiting costs…
…
continue reading
1
#119 Tried Everything and Still No Results? Discover ASEA Redox: Gentle, Foundational Cellular Health
22:51
22:51
Play later
Play later
Lists
Like
Liked
22:51✨ Feeling overwhelmed by supplements and still not getting results? If you’ve tried everything and feel stuck with fatigue, brain fog, poor sleep, or stress overload — this conversation is for you. In this video, I sit down with Danielle Matthews to explore ASEA Redox (redox signaling molecules) — a gentle, foundational way to support your body at …
…
continue reading
1
Marketplace Taxation Compliance — An Overview
19:46
19:46
Play later
Play later
Lists
Like
Liked
19:46In this episode of Bulletproof Your Marketplace, Jeremy dives into the critical topic of marketplace taxation with Nick Furtwengler, senior tax manager at Miller Cooper. Nick brings over 14 years of experience in state and local tax law and has worked extensively with digital marketplaces.Listeners will gain insights into why tax compliance is esse…
…
continue reading
1
The Silent Risk in AI-Powered Business Automation: Why No-Code Needs Serious Oversight | A Conversation with Walter Haydock | Redefining CyberSecurity with Sean Martin
38:21
38:21
Play later
Play later
Lists
Like
Liked
38:21⬥GUEST⬥ Walter Haydock, Founder, StackAware | On Linkedin: https://www.linkedin.com/in/walter-haydock/ ⬥HOST⬥ Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ No-Code Meets AI: Who’s Really in Control? As A…
…
continue reading