Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cryptography Podcasts

show episodes
 
Artwork
 
Signaling Theory cuts through crypto’s noise to find the real signals. Host Rex Kirshner joins builders, thinkers, and researchers who are shaping the space for deep, nuanced and informed conversations. Curiosity first, signal over noise.
  continue reading
 
Intellectually Curious is a podcast by Mike Breault featuring over 1,600 AI-powered explorations across science, mathematics, philosophy, and personal growth. Each short-form episode is generated, refined, and published with the help of large language models—turning curiosity into an ongoing audio encyclopedia. Designed for anyone who loves learning, it offers quick dives into everything from combinatorics and cryptography to systems thinking and psychology. Inspiration for this podcast: "Mu ...
  continue reading
 
Artwork

1
a16z crypto podcast

a16z crypto, Robert Hackett, Sonal Chokshi

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The a16z crypto podcast is about the next generation of the internet, and about how builders and users — whether artists, coders, creators, developers, companies, organizations, or communities — now have the ability to not just "read" (web1) + "write" (web2) but "own" (web3) pieces of the internet, unlocking a new wave of creativity and entrepreneurship. Brought to you by a16z crypto, this show is the definitive resource for understanding and going deeper on all things crypto and web3. From ...
  continue reading
 
Artwork
 
Welcome to Energy Bytes with John Kalfayan and Bobby Neelon. Your essential guide to the intersection of data and energy. This podcast dives deep into the world of energy, shedding light on how data, AI, and technology are revolutionizing this sector. Each episode equips listeners with insights into the most efficient tools and resources, paving the way for a data-driven future in energy. From technical nuances to broader industry trends, Energy Bytes offers an unparalleled perspective on th ...
  continue reading
 
Artwork

1
Cypherpunk’d

cypherpunkd

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to Cypherpunk’d, where we explore the intersection of privacy, technology, and personal freedom in the digital age. Hosted by Matty Ice, this podcast delves into the challenges posed by government surveillance and big tech’s intrusion into our lives. We bring you thought-provoking conversations with thought leaders, authors, computer scientists, Bitcoiners, entrepreneurs, and human rights activists who are at the forefront of the digital resistance. Each episode cuts through the nois ...
  continue reading
 
Artwork

1
Tech Talks Daily

Neil C. Hughes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
  continue reading
 
Artwork

1
Cryptography FM

Symbolic Software

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
  continue reading
 
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
  continue reading
 
Artwork

1
Zero Knowledge

Zero Knowledge Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Zero Knowledge is a podcast which goes deep into the tech that will power the emerging decentralised web and the community building this. Covering the latest in zero knowledge research and applications, the open web as well as future technologies and paradigms that promise to change the way we interact — and transact — with one another online. Zero Knowledge is hosted by Anna Rose Follow the show at @ZeroKnowledgefm (https://twitter.com/zeroknowledgefm) or @AnnaRRose (https://twitter.com/Ann ...
  continue reading
 
Artwork

1
Monero Talk

Monero Talk

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Monero Talk broadcasts weekly conversations on YouTube (https://www.youtube.com/c/monerotalk) with topical guests to understand what the Monero cryptocurrency is today and what it hopes to become. We strive to give birth to new Monero users by simply reporting on the facts in our search to answer the question--Is Monero the truest cryptocurrency of them all? In staying true to the Monero ethos, we aim to always be skeptical. While we are Monero Talk by name, and Monero devotees at heart, the ...
  continue reading
 
Conversations with Web3 builders about what they're working on right now. Topics include: Ethereum, EVM, Solidity, blockchain programming and indexing, L2 scaling solutions, zero knowledge, multi-party computation, cryptography, NFTs, crowdfunding, blockchain art, onchain performance art, and building networks and community. Subscribe with your favorite podcast app https://web3galaxybrain.com
  continue reading
 
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
  continue reading
 
Artwork

1
TechnologyAI

Mike sanders

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Applications of Quantum Computing 1. Cryptography Quantum computers have the potential to break traditional encryption methods, prompting the development of quantum-resistant cryptographic algorithms. 2. Optimization Quantum computing excels in solving complex optimization problems, such as logistics, supply chain management, and financial modeling. https://kek.co/product/buy-youtube-views/
  continue reading
 
Artwork

1
Tech 'n Savvy

Tech 'n Savvy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Tech 'n Savvy! April is a software engineer, and Emily is a quantum computing and cryptography consultant. Listen in as we explore topics in technology and global issues important to us.
  continue reading
 
Artwork

1
Intellectual Icebergs

Ankh Infinity Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Sure, you already know all about computer science, physics, mathematics, yadda yadda yadda. But can you explain it to your boss in terms that won't explode his managerial head? More importantly, can you use your big, bulging brains to land dates? No, seriously? Okay, then. Intellectual Icebergs is for you. Join us, semi-weekly-to-monthly, as we explore topics ranging from cryptography and subatomic physics to geek dating tips and partyology. Intellectual Icebergs: helping to reveal the geek ...
  continue reading
 
Close your eyes and let the universe unfold. Sleep with Science is a nightly invitation to explore the quiet wonder of the natural world. Through calm, unhurried narration, we transform complex scientific ideas into soothing stories that ease your mind and spark gentle curiosity. From the vast patterns of astronomy to the elegant code of DNA, each episode offers a soft passage into topics like physics, biology, geology, helping you learn while you unwind. Perfect for thoughtful minds and res ...
  continue reading
 
Artwork

1
Blockchain Israel

Mordecai Holtz

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
A podcast hosted by Blockchain Israel, the largest community in Israel dedicated to Blockchain Solutions and Crypto Technologies. We'll be bringing thought leaders across industries to hear about their insights and input on how blockchain and crypto and its potential to disrupt industries. Our featured topics: Blockchain · Bitcoin · Cryptocurrency · Smart Contracts · Digital Currency · Virtual Currency · Decentralization · Cryptography · Decentralized Systems · Smart Property
  continue reading
 
Artwork

1
HerHax Podcast

herhaxpodcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HerHax Podcast was founded by a group of women who are passionate about the field of cybersecurity and want to spread the word about everything cyber! From the history of women in cryptography to modern day workplace tips, how to stay safe online or how to pwn your way to the top of the CTF scoreboard, come listen to our podcast and join our Discord Channel!
  continue reading
 
Artwork

1
ASecuritySite Podcast

Professor Bill Buchanan OBE

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
  continue reading
 
Artwork

1
Resilient Cyber

Chris Hughes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime. Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
  continue reading
 
Artwork

1
Trail of Bits

Trail of Bits

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
  continue reading
 
What does quantum physics tell us about reality? What progress have we made since the days of Einstein and Schrödinger, and what problems are today’s quantum research scientists trying to solve? This podcast aims to share a modern perspective on the most fundamental aspects of quantum theory, informed by up-to-date research insights. In each episode, I interview an active researcher about a topic related to their work, with the discussion aimed to be broadly accessible.
  continue reading
 
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and he ...
  continue reading
 
🎙️ In The Clouds: The First d/acc Podcast Exploring the intersection of technology, human agency, and our collective future through the lens of defensive accelerationism (d/acc). Join Hunter and Sam as we dive deep into emerging technologies, digital sovereignty, and how we can preserve human agency while embracing technological progress. 🔍 We cover: - AI and superintelligence - Digital sovereignty - Brain-computer interfaces - Cryptography and privacy - Decentralized systems - Cybernetics a ...
  continue reading
 
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
  continue reading
 
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
  continue reading
 
The PowerShell Podcast is a weekly show about building your career with PowerShell. Each episode features the tips, tech, and modules that make PowerShell the premier automation and scripting tool for IT professionals. Join us as we interview PowerShell experts to discover what makes PowerShell and its community so amazing and awesome.
  continue reading
 
Artwork

101
Embedded Insiders

Embedded Computing Design

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Assistant Managing Editor, and Ken Briodagh, Editor-in-Chief of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology m ...
  continue reading
 
Artwork

1
Network Break

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Artwork

1
SciLux

Hanna Siemaszko

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Podcast about science in Luxembourg and beyond - in every episode we have a look at the latest scientific research and technological changes in Luxembourg or we discuss it with scientists or researchers working in Luxembourg. This is a podcast for people who love science, but aren't necessarily science graduates. We post a new episode every second week.
  continue reading
 
Artwork

1
The Azure Security Podcast

Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
  continue reading
 
Loading …
show series
 
Kenny is a professor in the Department of Computer Science at ETH Zurich, where he leads the Applied Cryptography Group. He was previously a professor in the Information Security Group at Royal Holloway, University of London. He served as co-chair of the IRTF's research group on Cryptography, CFRG, from 2014 to 2019 and as the Editor-in-Chief for t…
  continue reading
 
Post-quantum cryptography does not arrive as a clean replacement for today’s systems. It forces organizations to rethink how cryptography is designed, deployed, governed, and maintained over time. In this special episode of Shielded, host Jo Lintzen leads a discussion that moves past algorithm selection and into operational reality. The panel conne…
  continue reading
 
A rigorous, introductory treatment of modern cryptography, focusing on definitions, precise assumptions, and proofs of security as distinguishing features from classical cryptography. It explores private-key encryption in depth, covering concepts like chosen-plaintext attacks (CPA-security) and chosen-ciphertext attacks (CCA-security), along with p…
  continue reading
 
The International Association of Cryptologic Research held their regular election using secure voting software called Helios…and lost the keys to decrypt the results, leaving them with no choice but to throw out the vote and call a new election. Hilarity ensues. We welcome special guest Matt Bernhard who actually works on secure voting systems to e…
  continue reading
 
Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro interviews Aaron and discusses id…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/post-quantum-cryptography-why-your-encryption-has-a-5-year-shelf-life. RSA encryption faces quantum threat by 2030. Learn why your encrypted data has a 5-year shelf life and how to migrate to quantum-safe cryptography. Check more stories related to cybersecurity at: https:…
  continue reading
 
What happens when engineering teams can finally see the business impact of every technical decision they make? In this episode of Tech Talks Daily, I sat down with Chris Cooney, Director of Advocacy at Coralogix, to unpack why observability is no longer just an engineering concern, but a strategic lever for the entire business. Chris joined me fres…
  continue reading
 
A journey from Prince Rupert’s late‑17th‑century bet to a 2025 breakthrough that ends the Rupert conjecture. We explore how Jakob Steininger and Sergey Yurkevich designed the Noperthedron—an ornate 152‑faced shape engineered to fail the Rupert test—and how, by partitioning orientation space into about 18 million regions and applying a global and a …
  continue reading
 
From the Arctic Tern’s 90,000 km yearly chase of endless summer to the bar-tailed godwit’s 11,000 km nonstop Pacific crossing, and the northern weeder’s 18,000-mile transcontinental hop, plus the shearwaters’ vast 40,000-mile circuits, this episode dives into how these birds push the limits of endurance and master navigation. We explore the physiol…
  continue reading
 
Trace the Chautauqua movement from its 1874 beginnings at Chautauqua Lake to the traveling tent circuits that reached tens of millions. Explore how lectures, music, and reform debates turned rural America into a national classroom—and why the idea of accessible, high‑quality education still shapes public culture today. Note: This podcast was AI-gen…
  continue reading
 
Offers an in-depth resource for individuals preparing for the LPIC-1 certification exam. The text covers a wide array of Linux system administration topics, including command-line tools, file management, software and process administration, hardware configuration, boot processes, graphical user interfaces (GUIs), user and group management, email an…
  continue reading
 
What does real AI transformation look like when leaders stop chasing prototypes and start demanding outcomes they can actually measure? That question sat at the center of my conversation with Alex Cross, Chief Technology Officer for EMEA at CI&T, alongside Melissa Smith, as we unpacked why so many organizations feel stuck between AI ambition and bu…
  continue reading
 
We uncover how river networks are not random but self-organizing, guided by scale-invariant math. We'll explore Hack's Law and Horton’s laws, the bifurcation ratio, and how fractal geometry defines the network's complexity, while stream power explains how rivers carve their channels. We'll also discuss the surprising log-normal width of headwater s…
  continue reading
 
Is everything you’ve been told about deflation a lie? In Episode 9 of our 12-part series on the groundbreaking book "Everything Divided By 21 Million," we sit down with legendary Bitcoin philosopher Knut Svanholm to dismantle the "government daycare" version of economics. We dive deep into why deflation is the natural state of a free market, why th…
  continue reading
 
From the first discoveries to the cosmos’ most energetic events, this deep dive follows gamma rays from their nuclear origins and vast energy range (roughly 10 keV up to beyond 10^11 keV) to how we harness them on Earth. We explore their roles in pulsars and gamma-ray bursts, how scientists shield against their penetrating power, and the lifesaving…
  continue reading
 
Take a Network Break! The virtual donut factory is back from hiatus, and we’ve got a fresh batch to pass around as we discuss the week’s tech news. We start with an emergency patch for Cisco ISE, then dig into a set of new product announcements from Arista including a new ability to deploy wireless... Read more »…
  continue reading
 
https://mcdn.podbean.com/mf/web/rut8gqkunha2xsvu/The_PowerShell_Podcast_episode_209_Matthew_Gillajwsp.mp3 Matthew Gill joins The PowerShell Podcast to talk about what it means to be a Site Reliability Engineer (SRE) and how SRE thinking changes the way you approach automation, reliability, and problem solving. Matthew and host Andrew Pla break down…
  continue reading
 
Matthew Gill joins The PowerShell Podcast to talk about what it means to be a Site Reliability Engineer (SRE) and how SRE thinking changes the way you approach automation, reliability, and problem solving. Matthew and host Andrew Pla break down core concepts like SLAs, SLOs, and SLIs, and why reliability through planning matters more than rushing s…
  continue reading
 
A journey from Maillard chemistry to terroir, exploring how culinary depth emerges from simple patterns repeated across scales. We explain why the elusive 'middle-ground' matrix—multi-step breakdown products—must develop slowly, and why industrial shortcuts often miss it. The episode also surveys how regenerative farming and AI-driven modeling are …
  continue reading
 
Provides practice tests and study material for the LPIC-1 Linux Professional Institute Certification, specifically addressing exams 101-500 and 102-500. It covers a wide range of Linux system administration topics, including system architecture, installation and package management, GNU and UNIX commands, filesystems and device management, shell scr…
  continue reading
 
What does AI-led transformation actually look like when it moves beyond pilots, hype, and slide decks and starts changing how work gets done every day? That question framed my conversation with Venk Korla, CEO of HGS, at a time when many organizations feel both excited and exhausted by AI. Boards want results, teams are buried in proofs of concept,…
  continue reading
 
Nine ultra-compact galaxies from the universe’s first billion years—identified by Hao Jin Yang and collaborators in archival JWST data—appear as tiny point sources at redshift ~12–12.6, yet their narrow emission lines and Milky Way–scale energy output defy the traditional quasar picture. Dubbed the “cosmic platypuses,” these objects hint at a previ…
  continue reading
 
47e6GvjL4in5Zy5vVHMb9PQtGXQAcFvWSCQn2fuwDYZoZRk3oFjefr51WBNDGG9EjF1YDavg7pwGDFSAVWC5K42CBcLLv5U OR DONATE HERE: https://www.monerotalk.live/donate GUEST LINKS: https://x.com/xenumonero TIMESTAMPS (00:00:00) Monerotopia Introduction. (00:16:12) Monerotopia Guest Segment w/ Xenu. (01:07:10) Monerotopia Price Report Segment w/ Bawdyanarchist. (02:00:0…
  continue reading
 
What if the biggest breakthrough in weight management is not a new diet, but finally seeing how your body responds in real time? That question sat at the center of my conversation with Sharam Fouladgar-Mercer, CEO and co-founder of Signos, a continuous glucose monitoring (CGM) and AI-powered health platform built to help people manage weight by und…
  continue reading
 
We unravel Helicoprion, the Permian cartilaginous fish whose jaw formed a circular saw. For a century scientists misidentified the spiral tooth-whorl. A pivotal Idaho 4 specimen with preserved jaw cartilage and 2013 CT scans finally revealed the saw tucked inside the lower jaw, a self-sharpening bite-feeder that sliced soft prey and crushed shells.…
  continue reading
 
A comprehensive guide to Linux, focusing on certification and practical administration. It covers fundamental Linux concepts like filesystems, shell commands, and process management, alongside advanced topics such as network configuration, server deployment, and cloud technologies. The text also addresses security, troubleshooting, and performance …
  continue reading
 
What if your website could spot its own problems, fix them, and quietly make more money while you focus on building your business? That question sat at the heart of my conversation with Aviv Frenkel, co-founder and CEO of Moonshot AI, and it speaks to a frustration almost every founder and digital leader recognizes. Traffic is expensive, attention …
  continue reading
 
From 23 to 5 million years ago, the Miocene rewired Earth. Himalayan–Tibetan uplift reshaped climate and monsoons; Africa–Arabia sutured to Eurasia, enabling massive faunal exchanges; Antarctica's isolation launched the circumpolar current and long-term cooling. Global drying and cooling spurred grasslands, drove mammal diversification, and fostere…
  continue reading
 
What if the biggest performance risk in your company isn’t burnout, AI disruption, or digital overload… but your subconscious operating system? In this deep-dive conversation, we sit down with internationally recognized behavioral health expert and leadership strategist David Kingsbury, LPCC-S, LCADC, NCC, ICAADC to uncover the hidden identity-leve…
  continue reading
 
Why modern cybercrime targets trust, urgency, and decision-making instead of systems Deepfake Attacks, Voice Cloning, and Why AI Social Engineering Works Traditional fraud used to feel obvious: misspellings, odd links, weird emails. Now? Deepfakes embed perfectly familiar voices and faces into your feed — or your inbox. Listen to Perry Carpenter on…
  continue reading
 
Trace the Camino de Santiago—from a Roman trade route to a 9th‑century pilgrimage and a modern global quest for purpose. We’ll uncover the scallop shell’s symbolism, the Codex Calixtinus as a medieval travel guide, and the credencial that earns the Compostela, plus how hospitable networks helped birth today’s hospital system. From Sarria to Santiag…
  continue reading
 
A concise tour of the axioms that ground the natural numbers. We explore zero, the successor function, and induction, show how addition is defined recursively, and glimpse the deep questions about consistency and the existence of non-standard models in first-order logic. Note: This podcast was AI-generated, and sometimes AI can make mistakes. Pleas…
  continue reading
 
What happens when decades of supply chain planning collide with AI, volatility, and a world that no longer moves at a predictable pace? That question sat at the heart of my conversation with Piet Buyck, a serial entrepreneur whose career spans early optimization engines, cloud-era planning systems, and now AI-driven decision environments. Speaking …
  continue reading
 
A detailed guide for aspiring and experienced digital forensic investigators, covering a broad spectrum of topics essential to the field. It begins by introducing various types of computer-based investigations, from criminal to corporate, and then explains the meticulous forensic analysis process, including workstation setup, software, and evidence…
  continue reading
 
Any donation is greatly appreciated! 47e6GvjL4in5Zy5vVHMb9PQtGXQAcFvWSCQn2fuwDYZoZRk3oFjefr51WBNDGG9EjF1YDavg7pwGDFSAVWC5K42CBcLLv5U OR DONATE HERE: https://www.monerotalk.live/donate TODAY'S SHOW: In this episode of Monero Talk, Douglas Tuman interviews Aaluxx, co-founder of Maya Protocol, about cross-chain decentralized exchange technology, token…
  continue reading
 
A classic rope puzzle that seems simple unlocks a doorway to the foundations of mathematics. We trace how lighting two ends and timing the second fuse reveals the fusible numbers, show they are all dyadic rationals, and explore the well-ordered structure whose gaps encode epsilon naught—the proof-theoretic strength of Peano arithmetic. Join us as w…
  continue reading
 
In this episode of Resilient Cyber I'm joined by one of my favorite Vulnerability Researchers, Jerry Gamblin. Jerry recently published a comprehensive 2025 CVE retrospective, which we will dive into, as well as his thoughts around trends and patterns we may see emerge in the vulnerability management landscape moving into 2026 and beyond.…
  continue reading
 
We explore how a local AI agent becomes a chief of staff on your PC—granting direct file access, persistent rules via Claude.MD, and vibe coding that lets non-programmers design repeatable workflows. Learn about the Model Context Protocol, safety and permissions, and real-world ways to orchestrate Notion, Obsidian, Google Calendar, and more. Note: …
  continue reading
 
An official textbook for individuals pursuing careers in network administration or seeking to enhance their professional knowledge. The book comprehensively covers fundamental networking concepts, beginning with an overview of network types, topologies, and basic connectivity, and progressing to detailed explanations of protocols and models like TC…
  continue reading
 
Today's episode is a conversation with Bret Kinsella, recorded while he was in Las Vegas for CES and preparing to step onto the AI stage. Bret brings a rare combination of long-term perspective and hands-on experience. As General Manager of Fuel iX at TELUS Digital, he operates generative AI systems at a scale most enterprises never see, processing…
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play