Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
Compliance And Data Protection Podcasts

1
The Medcurity Podcast: HIPAA Compliance | Security | Technology | Healthcare
Medcurity: HIPAA Compliance
Healthcare is complicated. Joe Gellatly and the Medcurity team are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more. HIPAA laws continue to evolve. Go to hhs.gov for the latest information.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
The FCPA Compliance Report is the longest running podcast in the in compliance and business ethics. Join its award-winning host, Tom Fox, the Voice of Compliance as he visits with top compliance practitioners, key figures from business, the government and law firms in the top podcast dedicated to all things compliance.
…
continue reading
Privacy in Practice, brought to you by VeraSafe, is the podcast for actionable insights and real-world strategies for privacy and compliance teams. Hosted by privacy pros Kellie Du Preez and Danie Strachan, each episode unpacks the practical side of compliance and data management, bringing together industry leaders and thought-provoking discussions. Whether you’re leading privacy efforts at your company or just beginning to explore this field, tune in for meaningful conversations that provid ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. The Cyber Risk Podcast for Business Leaders, hosted by Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute and CEO of NCX Group, delivers weekly, no-nonsense insights tailored to CEOs, CFOs, and decision-makers. From data breaches to practical cybersecurity and data privacy strategies, we offer steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk in ...
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
FINRA Unscripted is the voice of the nation’s largest non-government securities regulator. We bring together FINRA leaders to discuss existing and emerging regulatory topics that impact the broker-dealer industry. We share best practices for compliance officers, insights into the operations of a 3,500 person self-regulated organization and educational tools and information for investors. Every investor in America relies on one thing: fair financial markets. That is what FINRA works every day ...
…
continue reading
How does GDPR, data privacy and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader or InfoSec security expert this is the podcast to learn about what is happening in the UK, EU, US and beyond.
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
A weekly podcast providing fraud prevention and vendor setup training to protect the vendor master file. Immediate takeaways with actionable steps you can implement today into your vendor onboarding and maintenance process to reduce fraud and regulatory fines. Great tips for the Accounts Payable and Procurement teams to clean-up their vendor data, clean-up their vendor processes so that they can pay the right vendor.
…
continue reading
Interesting, fascinating, provoking, insightful - or all of the above - GDPR decisions, rulings and other tidbits discussed by two very opinionated people.
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
…
continue reading
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
…
continue reading
The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impac ...
…
continue reading
The world’s accomplishments depend on data security. Join PKWARE CEO Spencer Kupferman every month as he chats with data security experts on eliminating security gaps, taking control of sensitive data, and meeting the most stringent data compliance requirements. Tune in to find out how industry leaders are eliminating data security gaps and achieving compliance goals.
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
There is tremendous value to simplification. To quote Steve Jobs, “Simple can be harder than complex: You have to work hard to get your thinking clean to make it simple. But it is worth it in the end because once you get there, you can move mountains." In this series, we explore how people and companies achieve simplification.
…
continue reading
Software testing is the most important part of software development, but it is especially significant for healthcare software. Healthcare software applications manage patient data, offer medical services, and ensure compliance with various standards and regulations. Defects or errors in healthcare software can have consequences for patient security, data protection, and functional efficiency.
…
continue reading
Get the most recent and juiciest data protection and privacy news and latest court and DPA decisions from across Europe in GDPR today: the GDPRhub newsletter - the audio version! Produced by NoTies.Consulting, read by Rie Aleksandra Walle - GDPRhub volunteer.
…
continue reading
Join us for an in-depth exploration of InfoGov.com, the pioneering firm redefining Information Governance for businesses of all sizes. In this episode, we break down how InfoGov.com empowers Independent Professionals and InfoAdvisors™ to help organizations manage their data, protect sensitive information, and navigate the evolving landscape of security, privacy, compliance, and risk. From boutique revenue-sharing models to agnostic advisory services, we’ll discuss what sets InfoGov.com apart ...
…
continue reading
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
…
continue reading
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
…
continue reading
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
…
continue reading
Welcome to the podcast: Sustainable Compliance. Are you passionate about data protection, GDPR, information security, and general compliance? Then, this podcast is dedicated to you. We delve into the intricacies of data protection and compliance. Join us as the host, Jacob Høedt Larsen, interviews experts and discusses the latest trends, insights, and advice within the realm of compliance. We also explore how we can reshape the way we think and organise ourselves around compliance, to forge ...
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Welcome to the Proceed Podcast, where we explore data and document management in the SAP world. Our goal is to help SAP customers manage their data effectively for reduced costs, improved IT agility, compliance, sustainability, and to drive IT transformation. Join us for expert interviews, case studies, and analysis to gain valuable insights into how you can optimise your data management processes.
…
continue reading
Join me in conversation with experts around the world as we talk about new privacy laws, global trends in data protection and the impact of these developments.
…
continue reading

1
The 1347 PODCAST -HEALTHCARE FRAUD DETECTION, CORPORATE COMPLIANCE AND ORGANIZATIONAL INTEGRITY
The 1347
The podcast focuses on healthcare fraud detection, corporate compliance, organizational integrity, and research security best practices.
…
continue reading
In the digital age, privacy is more important than ever. But as technology advances, so do the challenges to privacy. We explore the latest trends in privacy and technology, and discuss how businesses can build strong privacy programs that protect their customers' data. We invite top privacy compliance and tech guests to discuss privacy in a fun and interesting manner, covering topics such as data privacy, cybersecurity, and AI. Whether you're a business owner, a privacy professional, or sim ...
…
continue reading
Forcepoint, powered by Raytheon, is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.Forcepoint. ...
…
continue reading
Data privacy is a hot sector in the world of business. But it can be hard to break in and have a career that thrives. That’s where our podcast comes in! We interview leading Privacy Pros and share the secrets to success each fortnight. We'll help guide you through the complex world of Data Privacy so that you can focus on achieving your career goals instead of worrying about compliance issues. It's never been easier or more helpful than this! You don't have to go at it alone anymore! It’s ea ...
…
continue reading
The Security Collective is the podcast for leaders tasked with, and interested in, securing technology, people, processes and data for the protection of all. Join best-selling author Claire Pales, together with industry thought leaders who answer your questions about security leadership, trends, technologies, and more. 'The Security Collective' podcast - formerly 'The Secure CIO'
…
continue reading
When it comes to storing vaccines for children, maintaining the correct temperature is critical to preserving their potency and safety. TempGenius offers a state-of-the-art Vaccine Temperature Monitoring System designed to meet CDC and VFC (Vaccines for Children) compliance standards. Ideal for paediatric clinics, hospitals, and pharmacies, this wireless solution ensures continuous, real-time monitoring of vaccine storage units with instant alerts for any temperature deviation. Using advance ...
…
continue reading
Uncovering Hidden Risks explores how enterprises can reduce their risk by moving to a more holistic approach to data protection. Each episode will feature a panel of Microsoft security professionals and community security experts. They’ll dive into topics like data governance, internal and external threats, risk management and compliance, industry trends, and customer challenges. Listen in to the podcast and follow us! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Experience the future of temperature monitoring with TempGenius' cutting-edge wireless temperature logging system. Perfect for industries where precision is paramount, this system ensures that your temperature-sensitive environments are consistently monitored with real-time accuracy. Say goodbye to manual checks and human errors, TempGenius offers seamless integration with your existing systems, providing automated alerts and detailed reports that keep you compliant with regulatory standards ...
…
continue reading
Experience the ultimate in temperature monitoring with the TempGenius Remote Temperature Probe. This advanced device is designed to provide you with accurate and real-time temperature readings, ensuring the safety and integrity of your valuable assets, whether it's in a medical facility, laboratory, food storage, or any other environment where temperature control is critical. Key Features: Precision Monitoring: The TempGenius Remote Temperature Probe offers unparalleled accuracy, allowing yo ...
…
continue reading
www.hoaunlimited.com HOA Unlimited- is a leading firm in the homeowner's Association industry specializing in providing exceptional customer service, hospitality, and professional Homeowner's Association management services. Our firm has dedicated its time experience with knowledge to being one of the best management companies, and we have a proven track record backed by multiple years of experience, great relationships, resources, and talented managers. Our Firm Effective Operations: Organi ...
…
continue reading

1
A Developer's Guide to Life: Passion, Legacy & The "Foggy Staircase" of a Tech Career | Will Earp
42:55
42:55
Play later
Play later
Lists
Like
Liked
42:55"Am I going to spend my life trying to get the thing that I need, or am I going to spend my life doing the thing that I want?" In this deeply insightful episode of The Defender's Log, host David Redekop sits down with Will Earp, a veteran developer whose career journey began with an Amiga 600 in 1998. They explore the profound philosophy that has g…
…
continue reading

1
New in Syteca Release 7.21: Agentless Access, Sensitive Data Masking, And Smooth Session Playback
4:03
4:03
Play later
Play later
Lists
Like
Liked
4:03This story was originally published on HackerNoon at: https://hackernoon.com/new-in-syteca-release-721-agentless-access-sensitive-data-masking-and-smooth-session-playback. Users can now launch remote sessions (RDP for Windows or SSH for Linux/Unix) directly in web browsers (Chrome, Safari, and Edge) Check more stories related to cybersecurity at: h…
…
continue reading

1
3 Weeks Left Until The Start Of The OpenSSL Conference 2025
2:28
2:28
Play later
Play later
Lists
Like
Liked
2:28This story was originally published on HackerNoon at: https://hackernoon.com/3-weeks-left-until-the-start-of-the-openssl-conference-2025. The program will bring together lawyers, regulators, developers, and entrepreneurs to discuss security and privacy in a global context. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyb…
…
continue reading

1
Episode 356: 5 Ways to Speed Up the Vendor Onboarding and Change Process
27:07
27:07
Play later
Play later
Lists
Like
Liked
27:07I asked ChatGPT what vendor onboarding professionals have been searching for in the past week – and one of the blaring results was how to onboard vendors faster. I have five tips to speed up the vendor process…. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, …
…
continue reading

1
Agentic AI for SaaS: Multi-Agent Playbooks, Pricing Agents & EU AI Act Trust
56:20
56:20
Play later
Play later
Lists
Like
Liked
56:20Dashboards don’t decide. Agents do. In this episode of Startuprad.io, we sit down with Jennifer Grün, Senior Specialist for Generative AI & ML at AWS, to explore how agentic AI is rewriting the rules of SaaS. Instead of static dashboards and brittle automations, SaaS is moving toward agents that reason, plan, and act—delivering outcomes like churn …
…
continue reading

1
This Expectation Applies to Everyone | Medcurity Podcast 108
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43A ransomware incident. A settlement. And a clear message from OCR: when the basics are missing, enforcement follows. This episode zeroes in on the expectation that applies to everyone. Providers, health plans, and vendors alike are expected to keep a current Security Risk Analysis and act on what it finds. Hear what “current” looks like in real ope…
…
continue reading

1
Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace
4:33
4:33
Play later
Play later
Lists
Like
Liked
4:33This story was originally published on HackerNoon at: https://hackernoon.com/seraphic-browser-native-protection-now-available-for-purchase-on-the-crowdstrike-marketplace. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #seraphic-security, #cybernewswi…
…
continue reading

1
Preparing for New US Privacy Laws: Maryland, Tennessee, & Minnesota
1:00:37
1:00:37
Play later
Play later
Lists
Like
Liked
1:00:37Send us a text Three new US state privacy laws—Tennessee (July 1), Minnesota (July 31), and Maryland (October 1)—are now in enforcement. Each introduces requirements that go beyond “standard” compliance, and regulators are preparing to act. In this session, privacy attorneys Jordan Francis (Future of Privacy Forum) and Samuel Kane (WilmerHale) brea…
…
continue reading

1
Are Remote Workers from Gen Z REALLY Less Productive?
25:56
25:56
Play later
Play later
Lists
Like
Liked
25:56Are remote IT workers really more productive, or is it just hype? In this episode of IT Unplugged, Brandon and Ben dive deep into the remote work debate that's dividing the tech industry. What You'll Learn: Why 18% of IT jobs are fully remote (and why that number might surprise you) Real cybersecurity risks of remote work - 75% of IT professionals …
…
continue reading

1
PQC vs. QKD: What Matters Now and What Can Wait
36:23
36:23
Play later
Play later
Lists
Like
Liked
36:23As regulators publish guidance and timelines tighten, organizations can’t treat quantum readiness as a “future-us” problem. Will Collison details HSBC’s approach: begin the migration now, build crypto agility into architecture, and manage both internal upgrades and external dependencies across vendors, partners, and customers. He clarifies where PQ…
…
continue reading

1
The Psychological Toll of Working in Cybersecurity - When You Can't Unsee What You've Seen
57:20
57:20
Play later
Play later
Lists
Like
Liked
57:20Are you prepared for the psychological toll that comes with handling disturbing content in the cybersecurity world? Welcome to Razorwire, where today we’re exploring into the realities behind a career in cyber, from technical warfare to the often-overlooked human cost. In this episode, I’m joined by therapist and consultant Eve Parmiter to examine …
…
continue reading

1
Previewing FINRA’s Crypto and Blockchain Education Program
17:43
17:43
Play later
Play later
Lists
Like
Liked
17:43As member firm activity increases in blockchain and crypto assets, FINRA is launching a Crypto and Blockchain Education Program designed to empower member firm compliance and combat crypto fraud by broadening the knowledge base of member firms and associated persons. On this episode, FINRA’s Crypto Hub Chief Jason Foye, Director of Critical Skills …
…
continue reading

1
5 Ways to Get Compliance Ready Before Year-End Rush | Medcurity Podcast 107
5:00
5:00
Play later
Play later
Lists
Like
Liked
5:00The final months of the year move quickly, and compliance tasks often get left to the last minute. In this episode, we walk through five steps that can keep your organization ahead. Each one builds a stronger foundation for compliance and reduces the chance of scrambling when the new year begins. Learn more about Medcurity here: https://medcurity.c…
…
continue reading

1
How to Get a Reverse Shell on macOS Using A Flipper Zero as a BadUSB
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10This story was originally published on HackerNoon at: https://hackernoon.com/how-to-get-a-reverse-shell-on-macos-using-a-flipper-zero-as-a-badusb. Using a Flipper Zero as an ethical pentesting device to establish a reverse shell on a macOS computer. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also…
…
continue reading

1
#737: Accelerate your GenAI innovation journey on AWS with Innovation Sandbox solution
31:50
31:50
Play later
Play later
Lists
Like
Liked
31:50In this episode, we will dive deep into Innovation Sandbox on AWS, a new AWS solution offering that transforms the management of temporary sandbox environments, by offering a ready-made solution that enables customers to reduce sandbox setup time from weeks to hours while automating spend controls, security policies, and usage monitoring. Learn how…
…
continue reading

1
Field Notes: Why Cyber Attacks Are Accelerating
26:04
26:04
Play later
Play later
Lists
Like
Liked
26:04The threat landscape is moving faster than ever—and traditional response playbooks aren't keeping up. In this live Field Notes episode, Eric Brown and Nick Mellum dive into the surge of recent cyberattacks hitting state governments, transit systems, and critical infrastructure across the U.S. From Nevada's complete state office shutdown to Maryland…
…
continue reading

1
Suhail Motwani on Balancing Oversight and Autonomy in a Best Practices Compliance Program
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50Welcome to the award-winning FCPA Compliance Report, the longest-running podcast in compliance. In this episode, join Tom as he interviews Suhail Motwani from FTI Consulting on the FCPA Compliance Report. Suhail, a Senior Director in risk advisory and investigations, shares insights from his article ‘Navigating the Compliance Paradox. They discuss …
…
continue reading

1
Introducing the InfoSec colour wheel — blending developers with red and blue security teams.
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40This story was originally published on HackerNoon at: https://hackernoon.com/introducing-the-infosec-colour-wheel-blending-developers-with-red-and-blue-security-teams-6437c1a07700. As a developer turned security person, I’ve learnt first-hand how important it is for all teams to work together, more than just DevSecOps. Check more stories related to…
…
continue reading

1
How to Make a Malicious USB Device and Have Some Harmless Fun
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54This story was originally published on HackerNoon at: https://hackernoon.com/how-to-make-a-malicious-usb-device-and-have-some-harmless-fun. Make an inexpensive BadUSB from an old USB drive and learn about Windows shortcut files and how malicious actors are using .lnk files to spread malware. Check more stories related to cybersecurity at: https://h…
…
continue reading

1
Identity Governance and Administration Projects Are Never Done – But Can Get Much Easier
5:27
5:27
Play later
Play later
Lists
Like
Liked
5:27This story was originally published on HackerNoon at: https://hackernoon.com/identity-governance-and-administration-projects-are-never-done-but-can-get-much-easier. Identity & Access Management (IAM) and Identity Governance & Administration (IGA) are crucial for organizations, but current implementations often fall short. Check more stories related…
…
continue reading

1
Innovations in Cloud-Based Standards Management: Shaping the Future of Global Compliance
7:18
7:18
Play later
Play later
Lists
Like
Liked
7:18This story was originally published on HackerNoon at: https://hackernoon.com/innovations-in-cloud-based-standards-management-shaping-the-future-of-global-compliance. Ritesh Kumar drives innovation in cloud-based standards management with AI, SaaS, and automation, redefining global compliance and collaboration. Check more stories related to cybersec…
…
continue reading

1
The Problem With Threat Modeling in Application Security: Too Slow, Too Theoretical, Not Agile | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 2 | A Musing On the Future of Cybersecurity ...
3:58
3:58
Play later
Play later
Lists
Like
Liked
3:58Threat modeling is often called the foundation of secure software design—anticipating attackers, uncovering flaws, and embedding resilience before a single line of code is written. But does it really work in practice? In this episode of AppSec Contradictions, Sean Martin explores why threat modeling so often fails to deliver: It’s treated as a one-…
…
continue reading

1
3, 5 or 8 Years? The Realistic Timeline for Migration and the Task That Can’t Wait
40:59
40:59
Play later
Play later
Lists
Like
Liked
40:59As executives continue to postpone action, the window for preparing secure systems in the quantum era is rapidly closing. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Adrian Neal, Senior Director and Global Lead for Post-Quantum Cryptography at Capgemini, about the real timelines and challenges of P…
…
continue reading

1
Episode 355: Before Allowing Non-Vendor Team Members to Make Confirmation Calls, Put These Steps in Place
26:46
26:46
Play later
Play later
Lists
Like
Liked
26:46Do you have a non-vendor team member performing the confirmation call? I don’t recommend that certain steps are put into place to reduce the potential for both internal and external fraud. What are they? Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best…
…
continue reading

1
Who Decides the Internet’s Trust Rules? Inside the CA/B Forum with Arvid Vermote
16:01
16:01
Play later
Play later
Lists
Like
Liked
16:01In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Arvid Vermote, Chief Information Security Officer (CISO) at GlobalSign, to dive into the Certificate Authority/Browser Forum (CA/B Forum), the decision-making body behind the rules that keep the internet's trust backbone secu…
…
continue reading

1
AI Monetization Strategy: From POC to Proof of Value with AWS
1:00:14
1:00:14
Play later
Play later
Lists
Like
Liked
1:00:14POC is dead. Proof of Value is the new standard for AI startups. In this episode, AWS’s Jennifer Grün reveals the AI monetization strategy that separates demos from businesses. What You’ll Learn in This Episode: – Why hybrid pricing models (subscriptions + credits) outperform per-seat SaaS in AI – How to replace Proof of Concept with Proof of Value…
…
continue reading

1
AI in Application Security: Why False Positives Still Overwhelm Teams Despite the Hype | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 1 | A Musing On the Future of Cybersecurity with Sean ...
2:37
2:37
Play later
Play later
Lists
Like
Liked
2:37AI is everywhere in application security today — but instead of fixing the problem of false positives, it often makes the noise worse. In this first episode of AppSec Contradictions, Sean Martin explores why AI in application security is failing to deliver on its promises. False positives dominate AppSec programs, with analysts wasting time on irre…
…
continue reading

1
AI Coding Hype vs Reality: The 2025 AI Code Security Report with Chris Wysopal
46:36
46:36
Play later
Play later
Lists
Like
Liked
46:36In a converted hat factory in 1990s Boston, a group of hackers worked through the night to techno beats and Soul Coughing, driven by a simple philosophy: "smarter beats bigger." One of them, Chris Wysopal, would later stand before Congress and deliver a stark warning—a small group of dedicated hackers could bring down the entire internet in 30 minu…
…
continue reading

1
Adaptive Privacy in Clinical Research with Aarthi Iyer
37:09
37:09
Play later
Play later
Lists
Like
Liked
37:09Clinical trials are rapidly evolving beyond traditional clinic settings, creating new opportunities and privacy challenges. In this episode of Privacy in Practice, hosts Kellie du Preez and Danie Strachan welcome Aarthi Iyer, Senior Director & Senior Corporate Counsel at Cogent Biosciences and Microsoft Fellow focused on AI in clinical research. Wh…
…
continue reading

1
A year of NIS2 in action: Bridging policy and practice
28:25
28:25
Play later
Play later
Lists
Like
Liked
28:25Key insights and practical tips from the first year of NIS2 to help improve your cybersecurity, compliance, and supply chain resilience.It’s been nearly a year since NIS2 came into force, marking a significant shift in how organizations approach cybersecurity and risk management. The first year has brought valuable lessons, revealed common pitfalls…
…
continue reading

1
#736: AWS News: New Amazon Bedrock APIs, New EC2 Instance Types and Lots More.
22:44
22:44
Play later
Play later
Lists
Like
Liked
22:44Simon takes you through a big list of cool new things - something for everyone.By Amazon Web Services
…
continue reading

1
Healthcare Ransomware: When Cyberattacks Turn Deadly
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08When ransomware hits a hospital, it's not just data that's at stake—patients are dying. Ed Gaudet, CEO of Censinet, reveals the shocking research proving what healthcare security professionals feared: cyberattacks on hospitals directly increase mortality rates and disrupt life-saving care. But Ed's biggest concern? The eerie quiet before what he be…
…
continue reading

1
Exploring Compliance, in the US and Nigeria with Adeyinka Adejugbe
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03Welcome to the award-winning FCPA Compliance Report, the longest-running podcast in compliance. In this episode, join Tom as he interviews Adeyinka Adejugbe, a seasoned business lawyer and compliance expert, to discuss his professional journey and insights into compliance frameworks across various industries and countries. Adeyinka is a business la…
…
continue reading

1
Understanding Microsoft Zero Trust DNS with Aditi Patange
46:33
46:33
Play later
Play later
Lists
Like
Liked
46:33In this episode of the Defenders Log, we have Aditi Patange from Microsoft alongside our hosts, David Redekop and Francois from Adam Networks, for an in-depth discussion on Zero Trust DNS, a new enterprise security feature within Windows 11. Aditi shares her background in computer engineering and product management and how his work contributes to c…
…
continue reading

51
Special Edition on Is the US Going Socialist
20:19
20:19
Play later
Play later
Lists
Like
Liked
20:19Welcome to the award-winning FCPA Compliance Report, the longest-running podcast in compliance. In this episode, we discuss President Trump’s review of other interests in US business and its implications for compliance. The panel explores the evolving landscape of government involvement in major U.S. corporations and the resulting compliance and an…
…
continue reading

1
The Next Chapter in Securing the World's Internet
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06OpenSSL has secured the internet for over 25 years, but how does a project with such deep legacy prepare for the quantum future? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Tomáš Mráz, Director of the OpenSSL Foundation, and Jon Ericson, the Foundation’s Community Manager. Together they explore the…
…
continue reading

1
Episode 354: Tariffs May Affect Your Vendor Validations
29:36
29:36
Play later
Play later
Lists
Like
Liked
29:36Tariffs are here and many vendor team members may be busier than ever with how they have caused changes in the vendor process. There may be additional validations involved in four areas… Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to pre…
…
continue reading

1
German Startup Funding, Deep Tech AI, & Fintech M&A – September 2025 News
29:00
29:00
Play later
Play later
Lists
Like
Liked
29:00What if the next billion-dollar startup was brewing in Berlin, Munich, or Vienna right now? In this episode, we cover the game-changing deals, deep tech breakthroughs, and green innovation stories shaping the DACH startup scene in September 2025. Whether you’re a founder, VC, or ecosystem insider, this is your shortcut to staying ahead in Europe’s …
…
continue reading

1
Changes Ahead: What CMS’ 2026 Final Rule Means for Hospitals | Medcurity Podcast 106
7:39
7:39
Play later
Play later
Lists
Like
Liked
7:39CMS (Centers for Medicare & Medicaid Services) has released the Fiscal Year 2026 Final Rule for hospital and long-term care payments, and it brings important updates for quality reporting, interoperability, and compliance. Learn what’s changing, from the end of the low wage index hospital policy to adjustments in reporting programs, and new expecta…
…
continue reading
Understanding AI security threats before they become your next crisis On this episode of Razorwire, I explore the emerging frontier of AI security with leading experts Jonathan Care and Martin Voelk. We examine the latest risks, show you how adversaries are exploiting AI systems and share practical advice for professionals working with these rapidl…
…
continue reading
In this episode, KJ Burke and Qaiser Habib, head of engineering, Canada at Snowflake, discuss the challenges and strategies for unlocking the power of data within organizations. They explore the evolution of data management, the changing role of IT teams, the importance of data quality, and the shift towards unstructured data. The conversation also…
…
continue reading

1
#735: The Frugal Architect w/ Werner Vogels: Zillow's Chief Architect on why cheap ≠ frugal
41:47
41:47
Play later
Play later
Lists
Like
Liked
41:47Frugality wasn't something Craig Link learned on the job, it was passed down from his father, who would calculate the cost-benefit of driving for cheaper gas and meticulously track every tank's miles per gallon in a worn notebook tucked into the glove box. He would also pack sandwiches, toss them in a cooler, and store them in the back seat. These …
…
continue reading

1
DACH Startup News: Berlin AI Rockets, N26 Shakes & Europe’s Hydrogen Bet
21:33
21:33
Play later
Play later
Lists
Like
Liked
21:33Berlin’s AI just rocketed from $350M to $2.3B. At the same time, Switzerland locked in €825M hydrogen funding, and N26 faced its toughest governance test yet. This is not Silicon Valley news. This is the DACH region (Germany, Austria, Switzerland) reshaping startup dynamics — and it’s moving fast. In this Startuprad.io Summer Wrap-Up 2025, we unpac…
…
continue reading

1
Productionizing AI: AWS Bedrock, MCP & Agentic Workflows for Startups
57:14
57:14
Play later
Play later
Lists
Like
Liked
57:14What does it really take to move from a GenAI prototype to a production-ready system? In this episode, AWS AI Engineering Specialist Dennis Traub breaks down the hard truths behind scaling, securing, and monitoring AI systems — and why the future belongs to startups who learn how to productionize AI fast. What You’ll Learn in This Episode: Why most…
…
continue reading

1
Cyber Risk Advisor – Every CEO’s Missing Batman
8:12
8:12
Play later
Play later
Lists
Like
Liked
8:12Cyber Risk Advisor – Every CEO’s Missing Batman Every CEO has their trusted advisors: A CPA for the books An attorney for legal risks An insurance broker for disasters But when it comes to the #1 risk in 2025—cyber—the seat at the table is still empty. In this episode of Bite Size Security, Mike Fitzpatrick explains why a Cyber Risk Advisor is the …
…
continue reading

1
Post-Quantum Prep Without the Panic: Don’t Delay Your Upgrade to TLS 1.3
29:45
29:45
Play later
Play later
Lists
Like
Liked
29:45As governments and regulators accelerate PQC adoption timelines, the urgency for organizations to act has never been greater. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Kevin Hilscher, Senior Director of Product Management at DigiCert, to explore the practical first steps of post-quantum cryptography ad…
…
continue reading

1
Episode 353: Low-Cost But High-Impact Vendor Validation Step to Prevent Fraud
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33If you’re looking for a low-cost vendor validation step to deter fraud – I have one for you in today’s episode. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out th…
…
continue reading