Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Compliance And Data Protection Podcasts

show episodes
 
Artwork
 
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
  continue reading
 
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
  continue reading
 
Healthcare is complicated. Joe Gellatly and the Medcurity team are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more. HIPAA laws continue to evolve. Go to hhs.gov for the latest information. Learn more at https://medcurity.com.
  continue reading
 
Artwork
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
There is tremendous value to simplification. To quote Steve Jobs, “Simple can be harder than complex: You have to work hard to get your thinking clean to make it simple. But it is worth it in the end because once you get there, you can move mountains." In this series, we explore how people and companies achieve simplification.
  continue reading
 
Artwork
 
How does GDPR, data privacy, and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance, hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader, or InfoSec security expert, this is the podcast to learn about what is happening in the UK, EU, US, and beyond.
  continue reading
 
Privacy in Practice, brought to you by VeraSafe, is the podcast for actionable insights and real-world strategies for privacy and compliance teams. Hosted by privacy pros Kellie Du Preez and Danie Strachan, each episode unpacks the practical side of compliance and data management, bringing together industry leaders and thought-provoking discussions. Whether you’re leading privacy efforts at your company or just beginning to explore this field, tune in for meaningful conversations that provid ...
  continue reading
 
Artwork

1
AWS Podcast

Amazon Web Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
  continue reading
 
The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impac ...
  continue reading
 
FINRA Unscripted is the voice of the nation’s largest non-government securities regulator. We bring together FINRA leaders to discuss existing and emerging regulatory topics that impact the broker-dealer industry. We share best practices for compliance officers, insights into the operations of a 3,500 person self-regulated organization and educational tools and information for investors. Every investor in America relies on one thing: fair financial markets. That is what FINRA works every day ...
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Artwork

1
Today's Wills & Probate Podcast

Today's Wills and Probate

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Today's Wills & Probate Podcast will speak to some of the industry's most influential people and those at the forefront of innovation. Listeners will have the opportunity to pick up key business insights, gain valuable knowledge and ask questions to guests.
  continue reading
 
Universal Engineering has become a trusted name in conducting Milestone Inspections in Palm Beach, providing detailed, engineering-driven evaluations for residential and commercial properties. Their team of licensed structural engineers performs thorough assessments of building components—foundations, slabs, columns, beams, and load-bearing walls—ensuring every structure meets required safety benchmarks. Unlike basic visual inspections, Universal Engineering’s milestone process involves data ...
  continue reading
 
Artwork

1
Grumpy GDPR

Rie & Miloš

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Interesting, fascinating, provoking, insightful - or all of the above - GDPR decisions, rulings and other tidbits discussed by two very opinionated people.
  continue reading
 
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
  continue reading
 
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
  continue reading
 
Artwork

1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™

Startuprad.io – Europe’s Startup & VC Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
  continue reading
 
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
  continue reading
 
Artwork

251
Solutions Express

ePlus, Inc.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we're proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we're pleased to share the talent and perspective of our staff as it relates to today's emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
  continue reading
 
The world’s accomplishments depend on data security. Join PKWARE CEO Spencer Kupferman every month as he chats with data security experts on eliminating security gaps, taking control of sensitive data, and meeting the most stringent data compliance requirements. Tune in to find out how industry leaders are eliminating data security gaps and achieving compliance goals.
  continue reading
 
Welcome to Food Tech Talk: Supply Chain Insights From Farm to Fork, a bite-sized podcast discussing the latest trends and technology in the food and supplements industries, featuring conversations with regulatory experts, quality and safety champions, and thought leaders across the industry. Together, we are on a mission to change the food and dietary supplement industry for the better. In short snippets, guests will discuss a range of topics, from regulatory compliance to sustainable operat ...
  continue reading
 
Software testing is the most important part of software development, but it is especially significant for healthcare software. Healthcare software applications manage patient data, offer medical services, and ensure compliance with various standards and regulations. Defects or errors in healthcare software can have consequences for patient security, data protection, and functional efficiency.
  continue reading
 
Artwork

1
GDPR today: the GDPRhub newsletter

GDPRhub volunteer ❤️ Rie Aleksandra Walle

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Get the most recent and juiciest data protection and privacy news and latest court and DPA decisions from across Europe in GDPR today: the GDPRhub newsletter - the audio version! Produced by NoTies.Consulting, read by Rie Aleksandra Walle - GDPRhub volunteer.
  continue reading
 
Artwork

1
Wireless Temperature Monitoring

freezer temperature monitoring

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
TempGenius has established itself as a trusted name in wireless temperature monitoring, offering advanced solutions designed to meet the needs of diverse industries. Their systems are ideal for healthcare facilities, laboratories, food services, and industrial environments where temperature control is critical for compliance, safety, and efficiency. The wireless monitoring technology from TempGenius provides real-time data tracking, automated alerts, and detailed reporting, ensuring that bus ...
  continue reading
 
Join us for an in-depth exploration of InfoGov.com, the pioneering firm redefining Information Governance for businesses of all sizes. In this episode, we break down how InfoGov.com empowers Independent Professionals and InfoAdvisors™ to help organizations manage their data, protect sensitive information, and navigate the evolving landscape of security, privacy, compliance, and risk. From boutique revenue-sharing models to agnostic advisory services, we’ll discuss what sets InfoGov.com apart ...
  continue reading
 
Hosted by natural health practitioner and holistic biologist Catherine Edwards, this show uncovers what’s really making us — and our animals — sick, stressed, and disconnected. With years of experience, Catherine empowers sovereignty, critical thinking & natural healing. Connect With Me Website - https://www.catherineedwards.life/ Health & Wellness Consultations for you and your animals - https://www.catherineedwards.life/consults Academy Website - https://catherineedwardsacademy.com/ Root B ...
  continue reading
 
Artwork

1
Bite Size Security

Mike Fitzpatrick

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. The Cyber Risk Podcast for Business Leaders, hosted by Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute and CEO of NCX Group, delivers weekly, no-nonsense insights tailored to CEOs, CFOs, and decision-makers. From data breaches to practical cybersecurity and data privacy strategies, we offer steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk in ...
  continue reading
 
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
  continue reading
 
Artwork
 
Welcome to the podcast: Sustainable Compliance. Are you passionate about data protection, GDPR, information security, and general compliance? Then, this podcast is dedicated to you. We delve into the intricacies of data protection and compliance. Join us as the host, Jacob Høedt Larsen, interviews experts and discusses the latest trends, insights, and advice within the realm of compliance. We also explore how we can reshape the way we think and organise ourselves around compliance, to forge ...
  continue reading
 
Artwork

1
Proceed podcast

Proceed Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Proceed Podcast, where we explore data and document management in the SAP world. Our goal is to help SAP customers manage their data effectively for reduced costs, improved IT agility, compliance, sustainability, and to drive IT transformation. Join us for expert interviews, case studies, and analysis to gain valuable insights into how you can optimise your data management processes.
  continue reading
 
Artwork

1
Forcepoint Podcast

Forcepoint Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Forcepoint, powered by Raytheon, is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.Forcepoint. ...
  continue reading
 
In the digital age, privacy is more important than ever. But as technology advances, so do the challenges to privacy. We explore the latest trends in privacy and technology, and discuss how businesses can build strong privacy programs that protect their customers' data. We invite top privacy compliance and tech guests to discuss privacy in a fun and interesting manner, covering topics such as data privacy, cybersecurity, and AI. Whether you're a business owner, a privacy professional, or sim ...
  continue reading
 
The Security Collective is the podcast for leaders tasked with, and interested in, securing technology, people, processes and data for the protection of all. Join best-selling author Claire Pales, together with industry thought leaders who answer your questions about security leadership, trends, technologies, and more. 'The Security Collective' podcast - formerly 'The Secure CIO'
  continue reading
 
Artwork

1
Privacy Pros Podcast

The King of Data Protection - Jamal Ahmed

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Data privacy is a hot sector in the world of business. But it can be hard to break in and have a career that thrives. That’s where our podcast comes in! We interview leading Privacy Pros and share the secrets to success each fortnight. We'll help guide you through the complex world of Data Privacy so that you can focus on achieving your career goals instead of worrying about compliance issues. It's never been easier or more helpful than this! You don't have to go at it alone anymore! It’s ea ...
  continue reading
 
Artwork
 
Uncovering Hidden Risks explores how enterprises can reduce their risk by moving to a more holistic approach to data protection. Each episode will feature a panel of Microsoft security professionals and community security experts. They’ll dive into topics like data governance, internal and external threats, risk management and compliance, industry trends, and customer challenges. Listen in to the podcast and follow us! Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
When it comes to storing vaccines for children, maintaining the correct temperature is critical to preserving their potency and safety. TempGenius offers a state-of-the-art Vaccine Temperature Monitoring System designed to meet CDC and VFC (Vaccines for Children) compliance standards. Ideal for paediatric clinics, hospitals, and pharmacies, this wireless solution ensures continuous, real-time monitoring of vaccine storage units with instant alerts for any temperature deviation. Using advance ...
  continue reading
 
Artwork

501
The Daily Threat

QIT Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
  continue reading
 
Artwork

1
Wireless Temperature Logging

freezer temperature monitoring

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Experience the future of temperature monitoring with TempGenius' cutting-edge wireless temperature logging system. Perfect for industries where precision is paramount, this system ensures that your temperature-sensitive environments are consistently monitored with real-time accuracy. Say goodbye to manual checks and human errors, TempGenius offers seamless integration with your existing systems, providing automated alerts and detailed reports that keep you compliant with regulatory standards ...
  continue reading
 
Artwork

1
HOA UNLIMITED

HOA UNLIMITED

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
www.hoaunlimited.com HOA Unlimited- is a leading firm in the homeowner's Association industry specializing in providing exceptional customer service, hospitality, and professional Homeowner's Association management services. Our firm has dedicated its time experience with knowledge to being one of the best management companies, and we have a proven track record backed by multiple years of experience, great relationships, resources, and talented managers. Our Firm Effective Operations: Organi ...
  continue reading
 
Welcome, fellow Mid-Marketers, to the podcast that throws a wrench in the B2B machine! We’re not your average industry insiders, whispering secrets from ivory towers. We’re in the trenches with you, navigating the unique challenges and opportunities of the mid-market. We get it, because we live it, and we LOVE IT! Forget the tired, one-size-fits-all B2B advice. Here, we disrupt the status quo, sharing relatable stories from the real world, where hustle meets heart, and expert analysis cuts t ...
  continue reading
 
Loading …
show series
 
This story was originally published on HackerNoon at: https://hackernoon.com/i-built-a-password-tool-in-2-weekends-and-got-1000-users. Indian government portals are a mess when it comes to passwords. Millions of Indians get locked out daily, not knowing what they did wrong. Check more stories related to cybersecurity at: https://hackernoon.com/c/cy…
  continue reading
 
Most incident response plans aren’t tested until it’s too late. This episode walks through what “ready” actually looks like in healthcare: knowing where PHI lives, keeping your Security Risk Analysis current, setting clear roles, and practicing real scenarios so teams don’t freeze when it matters. We cover fast detection, clean containment, and sma…
  continue reading
 
Most organizations have security champions. Few have a real security culture. In this episode of AppSec Contradictions, Sean Martin explores why AppSec awareness efforts stall, why champion programs struggle to gain traction, and what leaders can do to turn intent into impact. 🔍 In this episode: Why compliance training doesn’t build culture The dat…
  continue reading
 
As quantum computing advances, organisations can no longer treat hardware migration as a secondary task. Thalia Laing, Principal Cryptographer at HP Security Lab, explains how HP adopted a hardware-first approach to post-quantum security by launching the world’s first quantum-safe Secure Boot for business PCs ahead of NIST standards. She describes …
  continue reading
 
Bridging the CISO-board disconnect which hinders your cyber-security progress Measuring cyber-risk in financial, economic and operational terms and demonstrating value in cyber-investments Focusing on governance and compliance – how to answer when asked “are we compliant? Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Zia …
  continue reading
 
Your body. Your data. Your choice. In this solo episode, I share why I joined the recent London protest against the Digital ID rollout — and why this moment might be the most important turning point in human history. We’re being told Digital ID is about safety and convenience, but it’s really about control — merging our health, identity, and freedo…
  continue reading
 
⬥GUEST⬥ Andrew Morgan, Chief Information Security Officer | On LinkedIn: https://www.linkedin.com/in/andrewmorgancism/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ The cybersecurity communi…
  continue reading
 
It’s been 5 months since Tresorit Engage launched, offering organizations a new way to manage client and partner collaboration securely and efficiently. In this time, teams across industries have begun to discover the real-world benefits of customizable data rooms offering transparent task management and seamless, secure information sharing. This p…
  continue reading
 
Bob Kolasky walked the halls where CMMC was built. As founding director of CISA's National Risk Management Center, he watched this policy evolve from concept to pilot program to federal law—surviving three presidential administrations because the need never changed. On November 10, 2025, that policy becomes mandatory reality for every defense contr…
  continue reading
 
Listen to Meru Data’s podcast — Cross Border Privacy Rules (CBPR): A Comprehensive Overview In this episode, we dive into the Cross Border Privacy Rules (CBPR) system, a globally recognized framework designed to streamline data transfers across jurisdictions. As organizations face increasing complexity in meeting international privacy standards, th…
  continue reading
 
Small firms face unique challenges. The regulatory landscape is evolving rapidly. And the conversation between regulators and the regulated is more important than ever. How does FINRA ensure that small firm voices are heard? How do small firms navigate an increasingly complex environment while serving their clients effectively? On this episode, we …
  continue reading
 
In this episode of the CDW Canada Tech Talks podcast, host KJ Burke engages with CDW experts Joe D'Amato, Kris Kostiuk and Kevin Ellsworth to explore the evolving technology landscape of media and entertainment. They discuss the unique challenges faced by the industry, including project-based workflows, cybersecurity threats and the impact of AI on…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-$10-billion-logic-error-what-happens-when-security-moves-faster-than-sanity. This article investigates how the July 2024 CrowdStrike crash exposed the fragility of automated AI‑driven security systems and their global fallout. Check more stories related to cybersecurit…
  continue reading
 
What if everything AI tells you about cybersecurity costs is completely wrong? The Audit crew unpacks a shocking data black hole that has infected every major AI model—plus field-tested tech that actually works. In this laid-back Field Notes episode, Joshua Schmidt, Eric Brown, and Nick Mellum return from Gartner's CIO Symposium with insights that'…
  continue reading
 
🏁 The Deep Dive is here. Germany, Austria and Switzerland enter a new startup cycle where the headline isn’t “Who raised the biggest check?” but “Who’s building the most defensible foundation?” Hosts Jörn ‘Joe’ Menninger and Chris Fahrenbach break down October 2025’s most important stories in AI, fintech, venture capital, and climate tech. 🔎 What Y…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/godloader-malware-loader-what-you-need-to-be-aware-of. We would like to take this opportunity to remind users about some good security practices when it comes to downloading and executing software. Check more stories related to cybersecurity at: https://hackernoon.com/c/cy…
  continue reading
 
In this gripping episode of The Defender’s Log, host David Redekop sits down with Alexander Rau, Partner in Cybersecurity at KPMG, to explore the intense world of cyber incident response. From ransomware attacks and business email compromises to AI-driven ransom negotiations, Alexander shares firsthand experiences from the cyber frontlines, reveali…
  continue reading
 
⬥GUEST⬥ Eric O'Neill, Keynote Speaker, Cybersecurity Expert, Spy Hunter, Bestselling Author. Attorney | On Linkedin: https://www.linkedin.com/in/eric-m-oneill/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com …
  continue reading
 
As more than half of lawyers say they anticipate leaving their role within the next five years because of poor mental health and wellbeing, the latest Today's Wills and Probate Podcast tackles the issue head on with a wide ranging discussion on what organisations can do to protect their staff. Joining the podcast are Trish McLellan and Niamh Warnoc…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/transforming-global-it-compliance-rashmi-sets-new-standards-in-nist-framework-implementation. Rashmi Bharathan leads a global NIST compliance overhaul, improving audit readiness by 70% and setting new benchmarks in IT governance excellence. Check more stories related to cy…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/to-infinity-and-delete. In 1998, disaster struck at Pixar. A single mistyped command — rm -rf / — began erasing Toy Story 2 from existence. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #c…
  continue reading
 
What if Europe — not Silicon Valley — defined the future of AI? In this October 2025 episode of Startuprad.io Startup News, hosts Jörn “Joe” Menninger and Chris Fahrenbach break down the latest stories shaping Europe’s AI Supercluster, led by DeepL, Black Forest Labs, and N8N. From record climate tech funding to biotech breakthroughs and industrial…
  continue reading
 
If radiation from phones, AirPods, Wi-Fi and 5G is “safe,” why do device manuals tell you not to hold them on your body? In this episode of Live Love Learn, Catherine Edwards and Kim Kindersley unpack the research on EMF exposure, especially for children and teens, and show a live blood analysis demo that visually reveals how a phone call can chang…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/what-every-e-commerce-brand-should-know-about-prompt-injection-attacks. Prompt injection is hijacking AI agents across e-commerce. Learn how to detect, prevent, and defend against this growing AI security threat. Check more stories related to cybersecurity at: https://hack…
  continue reading
 
This episode of the InfoSec Beat podcast focuses on careers in information security. Accenture CISO Kris Burkhardt talks with Renée Fletcher, a program manager in Accenture Information Security. Renée is at a turning point in her career, moving from Governance, Risk and Compliance to a new strategic programs role as the Cyberstrategy, Geopolitical …
  continue reading
 
Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself. This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity. 🔍 In this episode: A 188% surge in malicious open-source packages (Sonatype 2025) 30% of 2024 cyberattacks…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-ipinfo-turns-registry-data-into-real-intelligence. Explore IP addresses, ASNs, and RIR challenges—and see how IPinfo transforms static WHOIS records into dynamic, verifiable intelligence. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
  continue reading
 
In this episode of Food Tech Talk: Supply Chain Insights from Farm to Fork, host Lydia Adams sits down with Jeff Smith, co-founder of Colorado Craft Beef, to explore how traditional ranching can successfully merge with modern food systems. Jeff shares how his team leverages technology, transparency, and sustainable practices while preserving the va…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-to-protect-your-kids-online-when-theyre-playing-video-games. Avoid linking external services to your game console, such as signing in with a social media account or other platform and set up restricted child accounts. Check more stories related to cybersecurity at: htt…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/arsen-launches-smishing-simulation-to-help-companies-defend-against-mobile-phishing-threats. The tool lets companies create and send their own text-message campaigns safely, at scale. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Y…
  continue reading
 
When Boyan Slat found more plastic than fish on a dive in Greece, he asked a simple question: "Why can't we just clean this up?" He was 16.What began as a humble project funded with pocket money has grown into a global initiative, removing millions of pounds of plastic from the world's rivers and oceans in the last decade. But simple questions don'…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/security-that-moves-at-dev-speed-practical-ways-to-shift-left. Shift Left Security practices developers actually like — with code examples, guardrails, and policy as code to reduce friction. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecu…
  continue reading
 
Your organization doesn’t operate alone—and neither does your risk. In this episode, we look at how vendors, business associates, and service providers can quietly impact your HIPAA compliance and security. From overlooked contracts to outdated risk reviews, even trusted partners can become weak links if they’re not managed well. Hear what good ven…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/ai-sidebar-spoofing-attacksquarex-uncovers-malicious-extensions-that-impersonate-ai-browser-sidebar. The attack can trick users into executing dangerous commands that can lead to credential theft, device hijacking, and password exfiltration. Check more stories related to c…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/smart-attacks-smarter-defenses-how-ai-is-transforming-ddos-attacks. AI makes DDoS attacks 287% more sophisticated. Learn adversarial AI defense, behavioral biometrics, and other strategies that work today. Check more stories related to cybersecurity at: https://hackernoon.…
  continue reading
 
As quantum computing accelerates, organizations can no longer treat cryptographic migration as a distant technical task. Dr Richard Searle of Fortanix explains how confidential computing and a software-first model enable enterprises to adopt post-quantum cryptography (PQC) rapidly while maintaining control, compliance, and agility. He describes how…
  continue reading
 
How appreciation and gamification can improve your employees’ security awareness Making security behaviours stick – reframing mistakes as opportunities for growth Fostering a culture of continuous improvement with an inclusive learning environment Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Sara Carty, Founder & CEO, Un…
  continue reading
 
He sold his AI startup for $60 million — and fell apart. In this raw and powerful conversation, Xaver Lehmann, co-founder and former CEO of e-bot7, opens up about burnout, loss, and recovery after one of Europe’s biggest AI exits. What happens when you achieve everything you ever wanted — and it breaks you? 💡 What you’ll learn in this episode: – Ho…
  continue reading
 
Confusion is a tool of control. In this coffee chat with Brice from @EsotericAtlanta, we connect the dots between Digital ID, CBDCs/financial crisis, health system capture/Big Pharma, mass surveillance, and political theatre, and share calm, practical ways to resist and protect your family, sanity, and sovereignty. What we cover: Why Digital ID kee…
  continue reading
 
Anthony Diana is joined by Therese Craparo and Marcin Krieger to start a new series on AI-enabled e-discovery. This series will look at practical and legal issues related to the use of AI in e-discovery, with a focus on actual use cases rather than theoretical discussions. Topics for this episode include how AI is currently being used in e-discover…
  continue reading
 
Universal Engineering has become a trusted name in conducting Milestone Inspections in Palm Beach, providing detailed, engineering-driven evaluations for residential and commercial properties. Their team of licensed structural engineers performs thorough assessments of building components—foundations, slabs, columns, beams, and load-bearing walls—e…
  continue reading
 
When we think about cybersecurity, images of tech giants and major financial centers come to mind—but what about the towns where most of us actually live? This SecureTalk episode with cybersecurity researcher Lars Kruse explores an often-overlooked question: how do communities of 20,000-100,000 residents protect themselves in an increasingly digita…
  continue reading
 
Privacy enhancing technologies (PETs) have evolved from academic concepts to practical tools that can transform how organizations handle sensitive data. In this episode of Privacy in Practice, hosts Kellie du Preez and Danie Strachan welcome Monisha Varadan, EMEA Privacy Lead at Google, for an in-depth exploration of how PETs work in practice and w…
  continue reading
 
What happens when Apple Vision Pro meets enterprise AI? In this episode of The Audit, Alex Bratton—applied technologist and AI implementation expert—joins hosts Joshua Schmidt and Nick Mellem to reveal how spatial computing and artificial intelligence are colliding to reshape how we work. From conducting million-dollar sales meetings in virtual rea…
  continue reading
 
The Security Risk Analysis isn’t just another compliance task. It’s the foundation of your HIPAA program and the proof that you’re protecting patient data. In this episode, hear why now—not January—is the time to get it done. Recent OCR fines show that organizations of every size are still being penalized for missing or outdated SRAs. Waiting costs…
  continue reading
 
✨ Feeling overwhelmed by supplements and still not getting results? If you’ve tried everything and feel stuck with fatigue, brain fog, poor sleep, or stress overload — this conversation is for you. In this video, I sit down with Danielle Matthews to explore ASEA Redox (redox signaling molecules) — a gentle, foundational way to support your body at …
  continue reading
 
In this episode of Bulletproof Your Marketplace, Jeremy dives into the critical topic of marketplace taxation with Nick Furtwengler, senior tax manager at Miller Cooper. Nick brings over 14 years of experience in state and local tax law and has worked extensively with digital marketplaces.Listeners will gain insights into why tax compliance is esse…
  continue reading
 
⬥GUEST⬥ Walter Haydock, Founder, StackAware | On Linkedin: https://www.linkedin.com/in/walter-haydock/ ⬥HOST⬥ Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ No-Code Meets AI: Who’s Really in Control? As A…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play