Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Compliance And Data Protection Podcasts

show episodes
 
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
  continue reading
 
Healthcare is complicated. Joe Gellatly and the Medcurity team are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more. HIPAA laws continue to evolve. Go to hhs.gov for the latest information.
  continue reading
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
The FCPA Compliance Report is the longest running podcast in the in compliance and business ethics. Join its award-winning host, Tom Fox, the Voice of Compliance as he visits with top compliance practitioners, key figures from business, the government and law firms in the top podcast dedicated to all things compliance.
  continue reading
 
Privacy in Practice, brought to you by VeraSafe, is the podcast for actionable insights and real-world strategies for privacy and compliance teams. Hosted by privacy pros Kellie Du Preez and Danie Strachan, each episode unpacks the practical side of compliance and data management, bringing together industry leaders and thought-provoking discussions. Whether you’re leading privacy efforts at your company or just beginning to explore this field, tune in for meaningful conversations that provid ...
  continue reading
 
Artwork

1
Bite Size Security

Mike Fitzpatrick

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. The Cyber Risk Podcast for Business Leaders, hosted by Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute and CEO of NCX Group, delivers weekly, no-nonsense insights tailored to CEOs, CFOs, and decision-makers. From data breaches to practical cybersecurity and data privacy strategies, we offer steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk in ...
  continue reading
 
FINRA Unscripted is the voice of the nation’s largest non-government securities regulator. We bring together FINRA leaders to discuss existing and emerging regulatory topics that impact the broker-dealer industry. We share best practices for compliance officers, insights into the operations of a 3,500 person self-regulated organization and educational tools and information for investors. Every investor in America relies on one thing: fair financial markets. That is what FINRA works every day ...
  continue reading
 
How does GDPR, data privacy and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader or InfoSec security expert this is the podcast to learn about what is happening in the UK, EU, US and beyond.
  continue reading
 
Artwork

1
AWS Podcast

Amazon Web Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
  continue reading
 
Artwork

1
Putting the AP in hAPpy

Debra R Richardson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A weekly podcast providing fraud prevention and vendor setup training to protect the vendor master file. Immediate takeaways with actionable steps you can implement today into your vendor onboarding and maintenance process to reduce fraud and regulatory fines. Great tips for the Accounts Payable and Procurement teams to clean-up their vendor data, clean-up their vendor processes so that they can pay the right vendor.
  continue reading
 
Artwork

1
Grumpy GDPR

Rie & Miloš

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Interesting, fascinating, provoking, insightful - or all of the above - GDPR decisions, rulings and other tidbits discussed by two very opinionated people.
  continue reading
 
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
  continue reading
 
Artwork
 
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
  continue reading
 
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
  continue reading
 
The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impac ...
  continue reading
 
The world’s accomplishments depend on data security. Join PKWARE CEO Spencer Kupferman every month as he chats with data security experts on eliminating security gaps, taking control of sensitive data, and meeting the most stringent data compliance requirements. Tune in to find out how industry leaders are eliminating data security gaps and achieving compliance goals.
  continue reading
 
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
  continue reading
 
There is tremendous value to simplification. To quote Steve Jobs, “Simple can be harder than complex: You have to work hard to get your thinking clean to make it simple. But it is worth it in the end because once you get there, you can move mountains." In this series, we explore how people and companies achieve simplification.
  continue reading
 
Software testing is the most important part of software development, but it is especially significant for healthcare software. Healthcare software applications manage patient data, offer medical services, and ensure compliance with various standards and regulations. Defects or errors in healthcare software can have consequences for patient security, data protection, and functional efficiency.
  continue reading
 
Artwork

1
GDPR today: the GDPRhub newsletter

GDPRhub volunteer ❤️ Rie Aleksandra Walle

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Get the most recent and juiciest data protection and privacy news and latest court and DPA decisions from across Europe in GDPR today: the GDPRhub newsletter - the audio version! Produced by NoTies.Consulting, read by Rie Aleksandra Walle - GDPRhub volunteer.
  continue reading
 
Join us for an in-depth exploration of InfoGov.com, the pioneering firm redefining Information Governance for businesses of all sizes. In this episode, we break down how InfoGov.com empowers Independent Professionals and InfoAdvisors™ to help organizations manage their data, protect sensitive information, and navigate the evolving landscape of security, privacy, compliance, and risk. From boutique revenue-sharing models to agnostic advisory services, we’ll discuss what sets InfoGov.com apart ...
  continue reading
 
Artwork

1
IT Unplugged

M2 Technology

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
  continue reading
 
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
  continue reading
 
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
  continue reading
 
Artwork
 
Welcome to the podcast: Sustainable Compliance. Are you passionate about data protection, GDPR, information security, and general compliance? Then, this podcast is dedicated to you. We delve into the intricacies of data protection and compliance. Join us as the host, Jacob Høedt Larsen, interviews experts and discusses the latest trends, insights, and advice within the realm of compliance. We also explore how we can reshape the way we think and organise ourselves around compliance, to forge ...
  continue reading
 
Artwork

1
Proceed podcast

Proceed Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Proceed Podcast, where we explore data and document management in the SAP world. Our goal is to help SAP customers manage their data effectively for reduced costs, improved IT agility, compliance, sustainability, and to drive IT transformation. Join us for expert interviews, case studies, and analysis to gain valuable insights into how you can optimise your data management processes.
  continue reading
 
In the digital age, privacy is more important than ever. But as technology advances, so do the challenges to privacy. We explore the latest trends in privacy and technology, and discuss how businesses can build strong privacy programs that protect their customers' data. We invite top privacy compliance and tech guests to discuss privacy in a fun and interesting manner, covering topics such as data privacy, cybersecurity, and AI. Whether you're a business owner, a privacy professional, or sim ...
  continue reading
 
Artwork

1
Forcepoint Podcast

Forcepoint Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Forcepoint, powered by Raytheon, is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.Forcepoint. ...
  continue reading
 
Artwork

4
Privacy Pros Podcast

The King of Data Protection - Jamal Ahmed

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Data privacy is a hot sector in the world of business. But it can be hard to break in and have a career that thrives. That’s where our podcast comes in! We interview leading Privacy Pros and share the secrets to success each fortnight. We'll help guide you through the complex world of Data Privacy so that you can focus on achieving your career goals instead of worrying about compliance issues. It's never been easier or more helpful than this! You don't have to go at it alone anymore! It’s ea ...
  continue reading
 
The Security Collective is the podcast for leaders tasked with, and interested in, securing technology, people, processes and data for the protection of all. Join best-selling author Claire Pales, together with industry thought leaders who answer your questions about security leadership, trends, technologies, and more. 'The Security Collective' podcast - formerly 'The Secure CIO'
  continue reading
 
Artwork
 
When it comes to storing vaccines for children, maintaining the correct temperature is critical to preserving their potency and safety. TempGenius offers a state-of-the-art Vaccine Temperature Monitoring System designed to meet CDC and VFC (Vaccines for Children) compliance standards. Ideal for paediatric clinics, hospitals, and pharmacies, this wireless solution ensures continuous, real-time monitoring of vaccine storage units with instant alerts for any temperature deviation. Using advance ...
  continue reading
 
Uncovering Hidden Risks explores how enterprises can reduce their risk by moving to a more holistic approach to data protection. Each episode will feature a panel of Microsoft security professionals and community security experts. They’ll dive into topics like data governance, internal and external threats, risk management and compliance, industry trends, and customer challenges. Listen in to the podcast and follow us! Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
The Daily Threat

QIT Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
  continue reading
 
Artwork

1
Wireless Temperature Logging

freezer temperature monitoring

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Experience the future of temperature monitoring with TempGenius' cutting-edge wireless temperature logging system. Perfect for industries where precision is paramount, this system ensures that your temperature-sensitive environments are consistently monitored with real-time accuracy. Say goodbye to manual checks and human errors, TempGenius offers seamless integration with your existing systems, providing automated alerts and detailed reports that keep you compliant with regulatory standards ...
  continue reading
 
Artwork

1
Remote Temperature Probe

freezer temperature monitoring

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Experience the ultimate in temperature monitoring with the TempGenius Remote Temperature Probe. This advanced device is designed to provide you with accurate and real-time temperature readings, ensuring the safety and integrity of your valuable assets, whether it's in a medical facility, laboratory, food storage, or any other environment where temperature control is critical. Key Features: Precision Monitoring: The TempGenius Remote Temperature Probe offers unparalleled accuracy, allowing yo ...
  continue reading
 
Artwork

1
HOA UNLIMITED

HOA UNLIMITED

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
www.hoaunlimited.com HOA Unlimited- is a leading firm in the homeowner's Association industry specializing in providing exceptional customer service, hospitality, and professional Homeowner's Association management services. Our firm has dedicated its time experience with knowledge to being one of the best management companies, and we have a proven track record backed by multiple years of experience, great relationships, resources, and talented managers. Our Firm Effective Operations: Organi ...
  continue reading
 
Loading …
show series
 
"Am I going to spend my life trying to get the thing that I need, or am I going to spend my life doing the thing that I want?" In this deeply insightful episode of The Defender's Log, host David Redekop sits down with Will Earp, a veteran developer whose career journey began with an Amiga 600 in 1998. They explore the profound philosophy that has g…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/new-in-syteca-release-721-agentless-access-sensitive-data-masking-and-smooth-session-playback. Users can now launch remote sessions (RDP for Windows or SSH for Linux/Unix) directly in web browsers (Chrome, Safari, and Edge) Check more stories related to cybersecurity at: h…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/3-weeks-left-until-the-start-of-the-openssl-conference-2025. The program will bring together lawyers, regulators, developers, and entrepreneurs to discuss security and privacy in a global context. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyb…
  continue reading
 
I asked ChatGPT what vendor onboarding professionals have been searching for in the past week – and one of the blaring results was how to onboard vendors faster. I have five tips to speed up the vendor process…. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, …
  continue reading
 
Dashboards don’t decide. Agents do. In this episode of Startuprad.io, we sit down with Jennifer Grün, Senior Specialist for Generative AI & ML at AWS, to explore how agentic AI is rewriting the rules of SaaS. Instead of static dashboards and brittle automations, SaaS is moving toward agents that reason, plan, and act—delivering outcomes like churn …
  continue reading
 
A ransomware incident. A settlement. And a clear message from OCR: when the basics are missing, enforcement follows. This episode zeroes in on the expectation that applies to everyone. Providers, health plans, and vendors alike are expected to keep a current Security Risk Analysis and act on what it finds. Hear what “current” looks like in real ope…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/seraphic-browser-native-protection-now-available-for-purchase-on-the-crowdstrike-marketplace. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #seraphic-security, #cybernewswi…
  continue reading
 
Send us a text Three new US state privacy laws—Tennessee (July 1), Minnesota (July 31), and Maryland (October 1)—are now in enforcement. Each introduces requirements that go beyond “standard” compliance, and regulators are preparing to act. In this session, privacy attorneys Jordan Francis (Future of Privacy Forum) and Samuel Kane (WilmerHale) brea…
  continue reading
 
Are remote IT workers really more productive, or is it just hype? In this episode of IT Unplugged, Brandon and Ben dive deep into the remote work debate that's dividing the tech industry. What You'll Learn: Why 18% of IT jobs are fully remote (and why that number might surprise you) Real cybersecurity risks of remote work - 75% of IT professionals …
  continue reading
 
As regulators publish guidance and timelines tighten, organizations can’t treat quantum readiness as a “future-us” problem. Will Collison details HSBC’s approach: begin the migration now, build crypto agility into architecture, and manage both internal upgrades and external dependencies across vendors, partners, and customers. He clarifies where PQ…
  continue reading
 
Are you prepared for the psychological toll that comes with handling disturbing content in the cybersecurity world? Welcome to Razorwire, where today we’re exploring into the realities behind a career in cyber, from technical warfare to the often-overlooked human cost. In this episode, I’m joined by therapist and consultant Eve Parmiter to examine …
  continue reading
 
As member firm activity increases in blockchain and crypto assets, FINRA is launching a Crypto and Blockchain Education Program designed to empower member firm compliance and combat crypto fraud by broadening the knowledge base of member firms and associated persons. On this episode, FINRA’s Crypto Hub Chief Jason Foye, Director of Critical Skills …
  continue reading
 
The final months of the year move quickly, and compliance tasks often get left to the last minute. In this episode, we walk through five steps that can keep your organization ahead. Each one builds a stronger foundation for compliance and reduces the chance of scrambling when the new year begins. Learn more about Medcurity here: https://medcurity.c…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-to-get-a-reverse-shell-on-macos-using-a-flipper-zero-as-a-badusb. Using a Flipper Zero as an ethical pentesting device to establish a reverse shell on a macOS computer. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also…
  continue reading
 
In this episode, we will dive deep into Innovation Sandbox on AWS, a new AWS solution offering that transforms the management of temporary sandbox environments, by offering a ready-made solution that enables customers to reduce sandbox setup time from weeks to hours while automating spend controls, security policies, and usage monitoring. Learn how…
  continue reading
 
The threat landscape is moving faster than ever—and traditional response playbooks aren't keeping up. In this live Field Notes episode, Eric Brown and Nick Mellum dive into the surge of recent cyberattacks hitting state governments, transit systems, and critical infrastructure across the U.S. From Nevada's complete state office shutdown to Maryland…
  continue reading
 
Welcome to the award-winning FCPA Compliance Report, the longest-running podcast in compliance. In this episode, join Tom as he interviews Suhail Motwani from FTI Consulting on the FCPA Compliance Report. Suhail, a Senior Director in risk advisory and investigations, shares insights from his article ‘Navigating the Compliance Paradox. They discuss …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/introducing-the-infosec-colour-wheel-blending-developers-with-red-and-blue-security-teams-6437c1a07700. As a developer turned security person, I’ve learnt first-hand how important it is for all teams to work together, more than just DevSecOps. Check more stories related to…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-to-make-a-malicious-usb-device-and-have-some-harmless-fun. Make an inexpensive BadUSB from an old USB drive and learn about Windows shortcut files and how malicious actors are using .lnk files to spread malware. Check more stories related to cybersecurity at: https://h…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/identity-governance-and-administration-projects-are-never-done-but-can-get-much-easier. Identity & Access Management (IAM) and Identity Governance & Administration (IGA) are crucial for organizations, but current implementations often fall short. Check more stories related…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/innovations-in-cloud-based-standards-management-shaping-the-future-of-global-compliance. Ritesh Kumar drives innovation in cloud-based standards management with AI, SaaS, and automation, redefining global compliance and collaboration. Check more stories related to cybersec…
  continue reading
 
Threat modeling is often called the foundation of secure software design—anticipating attackers, uncovering flaws, and embedding resilience before a single line of code is written. But does it really work in practice? In this episode of AppSec Contradictions, Sean Martin explores why threat modeling so often fails to deliver: It’s treated as a one-…
  continue reading
 
As executives continue to postpone action, the window for preparing secure systems in the quantum era is rapidly closing. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Adrian Neal, Senior Director and Global Lead for Post-Quantum Cryptography at Capgemini, about the real timelines and challenges of P…
  continue reading
 
Do you have a non-vendor team member performing the confirmation call? I don’t recommend that certain steps are put into place to reduce the potential for both internal and external fraud. What are they? Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best…
  continue reading
 
In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Arvid Vermote, Chief Information Security Officer (CISO) at GlobalSign, to dive into the Certificate Authority/Browser Forum (CA/B Forum), the decision-making body behind the rules that keep the internet's trust backbone secu…
  continue reading
 
POC is dead. Proof of Value is the new standard for AI startups. In this episode, AWS’s Jennifer Grün reveals the AI monetization strategy that separates demos from businesses. What You’ll Learn in This Episode: – Why hybrid pricing models (subscriptions + credits) outperform per-seat SaaS in AI – How to replace Proof of Concept with Proof of Value…
  continue reading
 
AI is everywhere in application security today — but instead of fixing the problem of false positives, it often makes the noise worse. In this first episode of AppSec Contradictions, Sean Martin explores why AI in application security is failing to deliver on its promises. False positives dominate AppSec programs, with analysts wasting time on irre…
  continue reading
 
In a converted hat factory in 1990s Boston, a group of hackers worked through the night to techno beats and Soul Coughing, driven by a simple philosophy: "smarter beats bigger." One of them, Chris Wysopal, would later stand before Congress and deliver a stark warning—a small group of dedicated hackers could bring down the entire internet in 30 minu…
  continue reading
 
Clinical trials are rapidly evolving beyond traditional clinic settings, creating new opportunities and privacy challenges. In this episode of Privacy in Practice, hosts Kellie du Preez and Danie Strachan welcome Aarthi Iyer, Senior Director & Senior Corporate Counsel at Cogent Biosciences and Microsoft Fellow focused on AI in clinical research. Wh…
  continue reading
 
Key insights and practical tips from the first year of NIS2 to help improve your cybersecurity, compliance, and supply chain resilience.It’s been nearly a year since NIS2 came into force, marking a significant shift in how organizations approach cybersecurity and risk management. The first year has brought valuable lessons, revealed common pitfalls…
  continue reading
 
When ransomware hits a hospital, it's not just data that's at stake—patients are dying. Ed Gaudet, CEO of Censinet, reveals the shocking research proving what healthcare security professionals feared: cyberattacks on hospitals directly increase mortality rates and disrupt life-saving care. But Ed's biggest concern? The eerie quiet before what he be…
  continue reading
 
Welcome to the award-winning FCPA Compliance Report, the longest-running podcast in compliance. In this episode, join Tom as he interviews Adeyinka Adejugbe, a seasoned business lawyer and compliance expert, to discuss his professional journey and insights into compliance frameworks across various industries and countries. Adeyinka is a business la…
  continue reading
 
In this episode of the Defenders Log, we have Aditi Patange from Microsoft alongside our hosts, David Redekop and Francois from Adam Networks, for an in-depth discussion on Zero Trust DNS, a new enterprise security feature within Windows 11. Aditi shares her background in computer engineering and product management and how his work contributes to c…
  continue reading
 
Welcome to the award-winning FCPA Compliance Report, the longest-running podcast in compliance. In this episode, we discuss President Trump’s review of other interests in US business and its implications for compliance. The panel explores the evolving landscape of government involvement in major U.S. corporations and the resulting compliance and an…
  continue reading
 
OpenSSL has secured the internet for over 25 years, but how does a project with such deep legacy prepare for the quantum future? In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Tomáš Mráz, Director of the OpenSSL Foundation, and Jon Ericson, the Foundation’s Community Manager. Together they explore the…
  continue reading
 
Tariffs are here and many vendor team members may be busier than ever with how they have caused changes in the vendor process. There may be additional validations involved in four areas… Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to pre…
  continue reading
 
What if the next billion-dollar startup was brewing in Berlin, Munich, or Vienna right now? In this episode, we cover the game-changing deals, deep tech breakthroughs, and green innovation stories shaping the DACH startup scene in September 2025. Whether you’re a founder, VC, or ecosystem insider, this is your shortcut to staying ahead in Europe’s …
  continue reading
 
CMS (Centers for Medicare & Medicaid Services) has released the Fiscal Year 2026 Final Rule for hospital and long-term care payments, and it brings important updates for quality reporting, interoperability, and compliance. Learn what’s changing, from the end of the low wage index hospital policy to adjustments in reporting programs, and new expecta…
  continue reading
 
Understanding AI security threats before they become your next crisis On this episode of Razorwire, I explore the emerging frontier of AI security with leading experts Jonathan Care and Martin Voelk. We examine the latest risks, show you how adversaries are exploiting AI systems and share practical advice for professionals working with these rapidl…
  continue reading
 
In this episode, KJ Burke and Qaiser Habib, head of engineering, Canada at Snowflake, discuss the challenges and strategies for unlocking the power of data within organizations. They explore the evolution of data management, the changing role of IT teams, the importance of data quality, and the shift towards unstructured data. The conversation also…
  continue reading
 
Frugality wasn't something Craig Link learned on the job, it was passed down from his father, who would calculate the cost-benefit of driving for cheaper gas and meticulously track every tank's miles per gallon in a worn notebook tucked into the glove box. He would also pack sandwiches, toss them in a cooler, and store them in the back seat. These …
  continue reading
 
Berlin’s AI just rocketed from $350M to $2.3B. At the same time, Switzerland locked in €825M hydrogen funding, and N26 faced its toughest governance test yet. This is not Silicon Valley news. This is the DACH region (Germany, Austria, Switzerland) reshaping startup dynamics — and it’s moving fast. In this Startuprad.io Summer Wrap-Up 2025, we unpac…
  continue reading
 
What does it really take to move from a GenAI prototype to a production-ready system? In this episode, AWS AI Engineering Specialist Dennis Traub breaks down the hard truths behind scaling, securing, and monitoring AI systems — and why the future belongs to startups who learn how to productionize AI fast. What You’ll Learn in This Episode: Why most…
  continue reading
 
Cyber Risk Advisor – Every CEO’s Missing Batman Every CEO has their trusted advisors: A CPA for the books An attorney for legal risks An insurance broker for disasters But when it comes to the #1 risk in 2025—cyber—the seat at the table is still empty. In this episode of Bite Size Security, Mike Fitzpatrick explains why a Cyber Risk Advisor is the …
  continue reading
 
As governments and regulators accelerate PQC adoption timelines, the urgency for organizations to act has never been greater. In this episode of Shielded: The Last Line of Cyber Defense, host Jo Lintzen speaks with Kevin Hilscher, Senior Director of Product Management at DigiCert, to explore the practical first steps of post-quantum cryptography ad…
  continue reading
 
If you’re looking for a low-cost vendor validation step to deter fraud – I have one for you in today’s episode. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out th…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play