Introducing the new podcast series from the National Cyber Security Centre (NCSC). Join us as we dive deep into the ever-evolving world of cyber security, bringing you discussions on topical issues, emerging trends, and expert insights from our in-house experts and external guests. Each episode offers a comprehensive exploration of a specific topic, providing listeners with valuable knowledge and actionable advice. Visit ncsc.gov.uk to find out more about the topics discussed, access additio ...
…
continue reading
Cyber Essentials Podcasts
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
We are a Police led not for profit company. We offer simple, free and easily understood cyber security guidance for small and medium sized businesses. Remember it doesnt have to be complicated or expensive to give your business the cyber protection and peace of mind that you need. All this from industry experts who partner with us in the cyber security arena.
…
continue reading
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
…
continue reading
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Welcome to The Pink Room Podcast. A space for values-led professionals and business owners who want to lead with heart, act with clarity, and make a meaningful impact without losing themselves along the way. Hosted by Bryony Roberts, founder of Pragmatic Consultancy, this podcast lifts the curtain on the real work behind purpose-driven growth. Part mentor, part truth-teller, part coach in your corner, Bryony shares stories, insights, and behind-the-scenes lessons from years spent helping peo ...
…
continue reading
Join Host Mark L. Madrid as he shares his insights on business excellence, leadership, differentiation, and adaptive strategies that resonate deeply. His energetic, dynamic leadership and innovative approaches have helped countless businesses navigate challenges, experience breakthroughs, and seize opportunities.
…
continue reading
I'm Andy Poulton and I've been marketing online since 1999. Listen to my podcasts to learn a little more about a wide range of digital marketing and online security security issues. I talk about Search Engine Optimisation - SEO Google Ads, Facebook Ads and other forms of Pay per Click - PPC Social Media Marketing Email Marketing Video Marketing Web Design and Web Usability Cyber Security Passwords and Password Security And quite a bit more
…
continue reading
NorthStandard‘s podcast features thought-provoking discussions on news and topics in the maritime industry. We talk with experts from the club and special guests in the field from around the world
…
continue reading
Join Rick Watson, 20+ year eCommerce veteran and CEO & Founder of RMW Commerce, to hear all the latest in the world of eCommerce — from established players like Amazon and Shopify to the new startups, fresh off their latest round of funding. From Marketplaces to Direct-to-Consumer to Supply Chain to Payments, it’s all here. New episodes every Monday, just in time for your morning commute! Find more great content from Rick on LinkedIn: https://www.linkedin.com/in/ecommercestrategyconsulting/ ...
…
continue reading
Pathways-2-Partnership (P2P) delivers expert insights, real-world success stories, and actionable strategies from MoveAmerica—the premier think tank for public-private collaboration. Each episode will explore innovations, partnerships, and policies that strengthen the defense industrial base, secure supply chains, and drive mission success. Created for entrepreneurs, industry executives, government leaders, and policy makers, P2P helps you navigate the acquisition processes, ethically influe ...
…
continue reading
It’s easy to get lost in the space that is cybersecurity which encompasses dozens of specialty areas that can be further segmented into more than 50 career roles. Andrew Hoffritz, a cybersecurity enthusiast and professional, interviews a diverse selection of cybersecurity-minded professionals worldwide each month and pulls back the curtain on how to break into the cybersecurity field, discussing unique skills and why cybersecurity is a continuously growing field. Each episode contains powerf ...
…
continue reading
EV Revolution Show Audio Podcasts - talking about the world of Electric Vehicles and the ecosystem.
…
continue reading
SquareX is excited to launch The Be Fearless Podcast Series, where we bring together industry experts and professionals from the cybersecurity community. Hosted by SquareX Founder - and cybersecurity veteran - Vivek Ramachandran, look forward to insights about our guests’ journeys in security, the evolution of the field, the changing threatscape and how enterprises across industries are addressing them today.
…
continue reading
Formerly the Joy Joya Jewelry Marketing Podcast, Marketing With Laryssa is a podcast for purpose-driven, product-based brand owners who want to build real connections with their customers. Hosted by Laryssa Wirstiuk, founder of Joy Joya and marketing strategist since 2018, the show zooms out beyond tactics to explore the bigger picture of email, SMS, and digital storytelling. With a mix of practical tips, inspiring ideas, and behind-the-scenes insights, Laryssa shares how to grow your brand ...
…
continue reading
Pam Grice, counselor/crocheter turned crochet business coach, from Crochetpreneur® and Made with a Twist™ hosts the Crochet Business Chat podcast to help you turn yarn into money. Whether you're a maker, designer, or blogger, your handmade business will benefit from these bite-sized tidbits and actionable strategies for taking your business from passion to profits. Each week, Pam and other yarn industry experts will answer your questions about creating, selling, designing, marketing, time ma ...
…
continue reading
Welcome to Future in Focus podcast from LRQA. Risk doesn’t sleep – and neither do we. In each episode, we explore how organisations can turn business risk into opportunity, using connected risk management solutions to gain a competitive edge. From certification and cyber to sustainability and supply chains, we connect the dots across today’s complex and evolving landscape. With data-driven insight, sector expertise and a partnership approach, we help you navigate risk with clarity, stay one ...
…
continue reading
The TechSavvyLawyer.Page Podcasts are interviews with Judges, Lawyers, and other professionals discussing utilizing technology in the practice of law. Each guest will be asked three questions and provide their three best answers to each question asked. There is no right or wrong answer as each answer may not be the right one for you. But, it may springboard an idea and help you in your own pursuit of the business we call "practicing law". I'm your host, Michael D.J. Eisenberg, the Tech-Savvy ...
…
continue reading
‘Tech Insurance Leaders’ – the podcast that positions you at the forefront of the digital insurance landscape. Our host Louisa Weix, Managing Partner at TittmannWeix, interviews Chief Claims Officers, Tech Officers, Claims Directors, and other insurance professionals about: - Cutting-edge insurance products - Complex issues surrounding AdTech and Media Claims - Artificial Intelligence - Data Security, and more. Here, you’ll gain the knowledge and guidance you need to thrive in the fast-paced ...
…
continue reading
Welcome to The Coverage Forge, where complex commercial insurance gets hammered into simple, actionable insights. Hosted by Jessica Weaver, CIC | CEO & Founder of Iron Valley Insurance Group in Sheridan, Wyoming, this podcast cuts through industry jargon to deliver straight-talking advice for business owners, risk managers, and entrepreneurs. Each episode, we forge real solutions to real business challenges—from navigating workers' comp and liability coverage to understanding cyber insurance ...
…
continue reading
PJO Insurance Brokerage is a full-service independent insurance agency that specializes in providing personalized insurance solutions for individuals and businesses. With our brokers having over 60 years of combined insurance experience, at PJO Insurance Brokerage, we take pride in the fact that we put our clients’ needs first and foremost.
…
continue reading
The Banking on Data podcast is for community bank and credit union leaders who understand that the future of financial services is powered by data. Hosted by Ed Vincent, CEO of Lumio Solutions, this podcast offers executive-level insights into how financial institutions can leverage business intelligence, data strategy, and advanced analytics to drive performance, manage risk, and unlock growth opportunities. Each episode features conversations with industry leaders, data experts, and financ ...
…
continue reading
In a world where businesses and individuals leave billions of dollars unclaimed, hidden in plain sight, The Claim Hunters takes you behind the scenes with the experts who recover what others overlook. From uncovering unclaimed property to investigating complex fraud schemes, we’ll dive into real stories of high-stakes financial recoveries, the tools used by industry-leading professionals, and the strategies that help businesses and individuals recover lost assets. Whether it’s insurance clai ...
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
Welcome to **Mind the Breach**, the podcast series designed to protect your UK small business from the costly threat of payment fraud. I'm Sarah, and in this essential series, **The Phantom Invoice: Protecting Your UK Small Business from Payment Scams**, we're diving deep into the number one cyber threat facing businesses like yours across the UK. Are you a small business owner, director, or sole trader worried about cunning scams that could wipe out your hard-earned profits? Then this show ...
…
continue reading
1
December 8th, 2025: Black Friday Cyber Monday - You Devil You! Sam Altman Calls a Code Red to Stop Google Threat, Amazon and Visa Partner on Agentic Payments, and Nike CEO Purges John Donahoe’s Lieutenants ...
10:07
10:07
Play later
Play later
Lists
Like
Liked
10:07Today on our show: Black Friday Cyber Monday - You Devil You! Sam Altman Calls a Code Red to Stop Google Threat Amazon and Visa Partner on Agentic Payments Nike CEO Purges John Donahoe’s Lieutenants - and finally, The Investor Minute which contains 3 items this week from the world of venture capital, acquisitions, and IPOs. Today's episode is spons…
…
continue reading
1
Building Decentralized Blockchain Applications: Learn How to Use Blockchain as the Foundation for Next-Gen Apps
24:11
24:11
Play later
Play later
Lists
Like
Liked
24:11A comprehensive guide to understanding and developing applications using blockchain technology. The book covers fundamental blockchain concepts, including its history, core components, and various consensus mechanisms like Proof of Work and Proof of Stake. It further explores key platforms like Bitcoin and Ethereum, detailing their architecture, tr…
…
continue reading
1
Bug Bounty Hunting Essentials: Quick-paced guide to help white-hat hackers get through bug bounty programs
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12A guide for white-hat hackers participating in bug bounty programs. It covers fundamental concepts like bug bounty platforms, methodologies, and the process of reporting vulnerabilities effectively. The text explores various common web application vulnerabilities in detail, including Cross-Site Request Forgery (CSRF), Cross-Site Scripting (XSS), SQ…
…
continue reading
1
Blockchain in e-Governance: Driving the next Frontier in G2C Services
18:18
18:18
Play later
Play later
Lists
Like
Liked
18:18Explores the transformative potential of Blockchain technology, particularly in e-governance and various enterprise applications. It begins by detailing the foundational concepts of Blockchain, including its cryptographic principles, consensus mechanisms, and different platform types like Ethereum and Hyperledger Fabric. The document then highlight…
…
continue reading
1
Beginning Java MVC 1.0: Model View Controller Development to Build Web, Cloud, and Microservices Applications
19:52
19:52
Play later
Play later
Lists
Like
Liked
19:52A comprehensive guide for developing web, cloud, and microservices applications using Java MVC. It introduces the fundamental Model-View-Controller (MVC) design pattern, tracing its history and adaptation for web applications, especially within the Java EE/Jakarta EE ecosystem utilizing JSR-371. The text covers practical aspects of setting up a dev…
…
continue reading
1
AWS Certified Machine Learning Specialty: MLS-C01 Certification Guide: The definitive guide to passing the MLS-C01 exam on the very first
35:17
35:17
Play later
Play later
Lists
Like
Liked
35:17Focusing on practical applications of machine learning (ML) within the Amazon Web Services ecosystem. The content systematically covers the exam syllabus, starting with ML fundamentals like modeling pipelines, supervised and unsupervised learning, and data splitting strategies to prevent overfitting and underfitting. It then details various AWS ser…
…
continue reading
1
You found a mentor, signed the MPA, and won the contract: what's next?
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51In the this episode of Pathways-2-Partnership, MoveAmerica Program Manager Athena Powell pulls back the curtain on the critical question of “what’s next” once you’ve selected a mentor, signed your Mentor-Protégé Agreement (MPA), and received a contract award. With Athena's guidance, you’ll learn how to set your business up for success when it comes…
…
continue reading
1
The Fast-Track Guide to VXLAN BGP EVPN Fabrics: Implement Today’s Multi-Tenant Software-Defined Networks
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48Offers an extensive guide to implementing VXLAN BGP EVPN fabrics, focusing heavily on the spine-and-leaf architecture in data center networking. It details the logical and physical components necessary for fabric creation, including the configuration of the underlay network using protocols like OSPF and IS-IS, and establishing the overlay network w…
…
continue reading
Today on our show it’s no news, just thank yous. It’s been a roller coaster of a year for everyone, and despite everything, you have tuned in. Walking your dog, on the way to work, even in the shower you were there. Listening, laughing, cringing, and hopefully, even learning. I started this podcast back in 2021 and look forward to doing it for many…
…
continue reading
1
The Pythonic Way: An Architect’s Guide to Conventions and Best Practices for the Design, Development, Testing, and Management of Enterprise
10:43
10:43
Play later
Play later
Lists
Like
Liked
10:43A comprehensive guide for designing and developing enterprise Python code. It covers a vast array of topics, including best practices for code structure and quality (e.g., commenting, naming conventions, and PEP 8), effective use of Python data structures (lists, dictionaries, sets, and tuples), and object-oriented programming concepts (classes, in…
…
continue reading
1
Traefik API Gateway for Microservices: With Java and Python Microservices Deployed in Kubernetes
16:39
16:39
Play later
Play later
Lists
Like
Liked
16:39Detailing the configuration and use of Traefik as an API gateway in a microservices environment. The text explains the shift from monolithic to microservices architecture and the need for dynamic gateway solutions like Traefik, which offers features such as load balancing (Round Robin, Weighted Round Robin, Mirroring) for HTTP, TCP, and UDP traffic…
…
continue reading
1
🧪🎧 TSL Labs Bonus Podcast: Open vs. Closed AI — The Hidden Liability Trap in Your Firm ⚖️🤖
15:32
15:32
Play later
Play later
Lists
Like
Liked
15:32Welcome to TSL Labs Podcast Experiment. 🧪🎧 In this special "Deep Dive" bonus episode, we strip away the hype surrounding Generative AI to expose a critical operational risk hiding in plain sight: the dangerous confusion between "Open" and "Closed" AI systems. Featuring an engaging discussion between our Google Notebook AI hosts, this episode unpack…
…
continue reading
An extensive overview of systems analysis and design, primarily focusing on the tenth edition of a textbook on the subject, likely by Kendall and Kendall. The content comprehensively covers the phases of the systems development life cycle (SDLC), including project management techniques such as feasibility analysis, PERT diagrams, and various conver…
…
continue reading
1
Small Business is Big Business with Mark L Madrid - Episode 12: Texas State University Bobcat Grit: HBSA First-Gen Leaders & Big Dreams
19:28
19:28
Play later
Play later
Lists
Like
Liked
19:28Texas State standouts Brianna Miranda and Matthew Duran (HBSA execs, McCoy College of Business) share how family, faith, and familia turn campus leadership into real-world edge—networking at scale (350+ members!), first-gen courage, tech and finance ambitions, and why taking the leap beats playing small. It’s optimism you can feel—and a nudge to in…
…
continue reading
1
Why Cyber Needs Better Storytelling | Jeremy Ladner, Founder and CEO, The CISO Signal Podcast
1:02:29
1:02:29
Play later
Play later
Lists
Like
Liked
1:02:29Field CISO John Carse of SquareX sits down with Jeremy Ladner of The CISO Signal to discuss the critical art of storytelling in cybersecurity leadership. In this episode of Be Fearless podcasts, Jeremy reveals why facts alone fail in the boardroom and how AI is rewriting the rules of social engineering and fraud. The conversation covers why hackers…
…
continue reading
1
Loose Leaf for Systems Analysis and Design
15:07
15:07
Play later
Play later
Lists
Like
Liked
15:07A detailed overview of the various phases, concepts, and tools involved in the Systems Development Life Cycle (SDLC). The text covers organizational topics such as the role and required skills of a systems analyst, the structure of the IT department, and strategic planning, including cost-benefit analysis and feasibility studies. It extensively exp…
…
continue reading
1
THE COMPLETE GUIDE TO COMPUTER HACKING: All What You Needs To Learn To Be An Amazing Hacker
20:04
20:04
Play later
Play later
Lists
Like
Liked
20:04An extensive guide to computer hacking for beginners, detailing various types of hackers, including Black Hat, White Hat, and Grey Hat practitioners. It thoroughly explains the most popular hacking technique, social engineering, outlining different forms such as Phishing, Impersonation, Vishing, and Smishing, which exploit human vulnerabilities. Fu…
…
continue reading
A comprehensive technical overview of synchronization and timing solutions within telecommunications, with a specific focus on 4G and 5G mobile networks. It explores the historical necessity of synchronization, progressing from frequency alignment for digital networks to the modern requirement for phase and time synchronization driven by mobile bas…
…
continue reading
1
December 15th, 2025: Shopify Winter Editions 2025 Special Podcast
15:27
15:27
Play later
Play later
Lists
Like
Liked
15:27Today on our show: Shopify Winter Editions 2025 Special Podcast - and finally, The Investor Minute which contains 5 items this week from the world of venture capital, acquisitions, and IPOs. Today's episode is sponsored by Mirakl. https://www.rmwcommerce.com/ecommerce-podcast-watsonweekly This podcast uses the following third-party services for ana…
…
continue reading
1
Decoding Your Digital Footprint | James W., Valens Global Analyst
55:24
55:24
Play later
Play later
Lists
Like
Liked
55:24Host John Carse, Field CISO of SquareX sits down with James W., Valens Global Analyst and creator of the Smoke Signal Newsletter and Burn Signal Podcast. In this episode of The Be Fearless podcast, they discuss the concept of "digital exhaust" and how invisible data trails are weaponized into "weapons of mass disruption". James shares insights from…
…
continue reading
1
Statistics for Machine Learning: Implement Statistical methods used in Machine Learning using Python
15:00
15:00
Play later
Play later
Lists
Like
Liked
15:00An educational resource detailing statistical concepts foundational to machine learning, including descriptive statistics (mean, median, mode, and measures of dispersion), probability theory, and methods for parameter estimation and hypothesis testing. The book covers various analytical techniques such as ANOVA, regression models (linear, logistic,…
…
continue reading
1
362 - The One December Email That Carries Your Brand Into the New Year
8:44
8:44
Play later
Play later
Lists
Like
Liked
8:44Episode #362 - The One December Email That Carries Your Brand Into the New Year Between December 26 and the first week of January, something subtle—but powerful—happens. The holiday chaos fades, the pace slows, and your customers start imagining a new version of themselves. And that moment? It's one of the most emotionally open windows of the entir…
…
continue reading
1
Swift in 30 Days: Build iOS Apps by Learning Swift, Xcode, and SwiftUI in Just Four Weeks
18:00
18:00
Play later
Play later
Lists
Like
Liked
18:00A comprehensive guide for learning iOS app development, starting with the fundamentals of the Swift programming language, including variables, control flow, and collections. The book thoroughly explains the use of Apple's development tools, such as Xcode and Playgrounds, and covers key application architecture concepts like Model-View-Controller (M…
…
continue reading
1
Scalable Data Streaming with Amazon Kinesis: Design and secure highly available, cost-effective data streaming applications
19:54
19:54
Play later
Play later
Lists
Like
Liked
19:54A book about building scalable data streaming solutions using various Amazon Web Services (AWS) tools, primarily focusing on the Amazon Kinesis family of services (Data Streams, Firehose, Data Analytics, and Video Streams). The content explains the core concepts of data streaming and distributed systems, detailing how to produce and consume data us…
…
continue reading
1
🎙️ TSL LABs 🧪 Bonus: From Cyber Compliance to Cyber Dominance: What VA's AI Revolution Means for Government Cybersecurity, Legal Ethics, and ABA Model Rule Compliance!
15:14
15:14
Play later
Play later
Lists
Like
Liked
15:14In this TSL Labs bonus episode, we examine how the Department of Veterans Affairs is leading a historic transformation from traditional compliance frameworks to a dynamic, AI-driven approach called "cyber dominance." This conversation unpacks what this seismic shift means for legal professionals across all practice areas—from procurement and contra…
…
continue reading
1
Why You Need to Fail to Succeed in Cyber | Andrew Crotty, Cybersecurity Content Creator
57:51
57:51
Play later
Play later
Lists
Like
Liked
57:51Host John Carse, Field CISO at SquareX, sits down with Andrew Crotty aka GingerHacker. In this episode of the Be Fearless podcast, Andrew provides insights into his role advising Army commanders, the evolving security landscape regarding AI agents and hallucinations, and the specific vulnerabilities found in web browsers. Andrew details the mission…
…
continue reading
Explores several critical areas concerning the security and privacy of online platforms. The chapters discuss privacy-preserving analytics techniques for social network data, including methods like k-anonymity and differential privacy, to protect user information from breaches such as the Cambridge Analytica incident. Several sections are dedicated…
…
continue reading
1
Security for Telecommunications Networks (Advances in Information Security Book 40)
14:50
14:50
Play later
Play later
Lists
Like
Liked
14:50An extensive overview of security in telecommunications networks, particularly focusing on cellular systems and their convergence with the Internet. The text first establishes core security concepts and cryptographic principles before thoroughly examining vulnerabilities in both traditional voice networks and modern cellular data services like GSM …
…
continue reading
1
Taking on tomorrow, together: NorthStandard’s Path to 2026 – Claims, Growth & Renewal
11:46
11:46
Play later
Play later
Lists
Like
Liked
11:46In this episode of 'Taking on tomorrow, together,' some of NorthStandard's Leadership Group reflect on the key challenges and achievements of 2025. Despite a calmer year for claims, the club highlights the need for caution still amid global conflicts, rising costs, and political uncertainties. Discussions include the Pre Renewal Report, and the str…
…
continue reading
1
Securing AI Agents: How to Stop Credential Leaks and Protect Non‑Human Identities with Idan Gour
33:07
33:07
Play later
Play later
Lists
Like
Liked
33:07Cast your vote for Cyber Sentries as Best Technology Podcast here! Bridging the AI Security Gap—Inside the Rise of Non‑Human Identities In this episode of Cyber Sentries from CyberProof, host John Richards sits down with Idan Gour, co-founder and president of Astrix Security, to unpack one of today’s fastest-emerging challenges: securing AI agents …
…
continue reading
1
Enterprise Security Architecture: A Business-Driven Approach
19:43
19:43
Play later
Play later
Lists
Like
Liked
19:43An extensive overview of enterprise security architecture, emphasizing a business-driven approach. It introduces the SABSA Model, a six-layer framework for developing security architectures, and explains how it guides the entire process from contextual business requirements to operational security. The text covers critical concepts like risk manage…
…
continue reading
1
Episode 62 – EV Revolution Show Audio Podcast – New EV Essentials Course offered in Ontario, Canada
23:56
23:56
Play later
Play later
Lists
Like
Liked
23:56My special guest: John Lee, Director of Operations, Thrive Career Wellness www.thrivemycareer.com Episode Recorded via Zoom.By EV Revolution Show - Audio Podcasts
…
continue reading
1
You Won’t Make $100k Starting Out in Cybersecurity | Patrick Gorman, Founder, InfosecPat
1:27:31
1:27:31
Play later
Play later
Lists
Like
Liked
1:27:31Host John Carse, Field CISO at SquareX, sits down with Patrick Gorman, Founder of InfosecPat. In this episode of The Be Fearless podcast, they discuss Patrick's incredible journey from a rough upbringing in Queens and working in construction to becoming a renowned cybersecurity educator with over 100,000 YouTube subscribers. Patrick gets real about…
…
continue reading
1
🎙️Ep. 126: AI and Access to Justice With Pearl.com Associate General Counsel Nick Tiger
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55Our next guest is Nick Tiger, Associate General Counsel at Pearl.com, Nick shares insights on integrating AI into legal practice. Pearl.com champions AI and human expertise for professional services. He outlines practical uses such as market research, content creation, intake automation, and improved billing efficiency, while stressing the need to …
…
continue reading
1
Embracing Technology: Get Tech-Savvy by Learning About Your Computer, Smartphone, Internet, and Social Media Applications
18:33
18:33
Play later
Play later
Lists
Like
Liked
18:33An extensive overview of digital literacy and technology, covering a broad range of topics from basic computer and smartphone functionality to advanced internet applications. It introduces fundamental concepts of hardware and software, then expands into practical usage of online services like email, social media, digital maps, and e-commerce. The t…
…
continue reading
1
Data Scientist Pocket Guide: Over 600 Concepts, Terminologies, and Processes of Machine Learning and Deep Learning Assembled Together
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29A pocket guide offering a comprehensive overview of over 600 concepts, terminologies, and processes in the fields of machine learning and deep learning. Published in 2021, it aims to clarify the logic and mechanisms behind these concepts for data scientists, acting as a non-linear reference for both beginners and experienced practitioners. The guid…
…
continue reading
1
361 - The December Email Strategy Every Ecommerce Brand Needs
16:17
16:17
Play later
Play later
Lists
Like
Liked
16:17Episode #361 - The December Email Strategy Every Ecommerce Brand Needs BFCM brings a huge influx of first-time customers—but they're not loyal yet. Many came for a deal, were curious about your brand, or were buying a gift. Now is the critical moment where you either let them go cold… or turn them into repeat buyers who stay with you into 2026. In …
…
continue reading
1
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
20:52
20:52
Play later
Play later
Lists
Like
Liked
20:52A structured approach to managing third-party risk. The book covers fundamental concepts such as the CIA Triad (Confidentiality, Integrity, Availability), various cybercrime types (phishing, ransomware), and the five phases of a breach (research, intrusion, lateral movement, privilege escalation, exfiltration). It further explores the impact of the…
…
continue reading
1
Cracking the Coding Interview: 189 Programming Questions and Solutions
15:35
15:35
Play later
Play later
Lists
Like
Liked
15:35A comprehensive guide for technical interviews in the software industry, particularly focusing on algorithm, coding, and design questions. It offers detailed strategies for interview preparation, including how to approach problems, optimize solutions, and understand time and space complexity (Big O notation). The text provides interview-specific ad…
…
continue reading
1
🎙️ TSL Labs 🔬 Bonus Podcast: Google's Notebook LLM "Deep Dive" on December 1st, 2025, editorial on the the Lawyer's Defense Against Holiday Scams and 'Bargain' Tech Traps!
16:18
16:18
Play later
Play later
Lists
Like
Liked
16:18Listen in as Google's Notebook LLM provides an AI-powered conversation unpacks our December 1st, 2025 editorial examining how the holiday digital marketplace transforms into a lucrative hunting ground for device compromise and credential theft. We explore why attorneys and paralegals—trained to spot hidden clauses and anticipate risk—often abandon …
…
continue reading
A comprehensive overview of computer networking principles and technologies. The text explores foundational concepts such as gateways, routers, and network layers, alongside detailed examples of various networks like the Internet (including ARPANET's history and evolution of traffic), mobile phone networks (1G-5G), and wireless LANs (IEEE 802.11). …
…
continue reading
1
Browser Security Is Now Essential | Swetha Krishnamoorthi, Industry Principal, Frost & Sullivan
1:01:07
1:01:07
Play later
Play later
Lists
Like
Liked
1:01:07Frost & Sullivan’s Swetha Krishnamoorthi joins Audrey Adeline from SquareX Founder's Office to unpack emerging browser-based threats, including AI-driven phishing, encrypted last-mile exploits, malicious digital assets, and the rise of autonomous AI agents. She explains how Zero Trust browsers evolve beyond isolation, what organizations overlook to…
…
continue reading
1
Building Cyber Resilience That Lasts | Jim Rutt, CIO/CISO, Dana Foundation
40:33
40:33
Play later
Play later
Lists
Like
Liked
40:33In this episode of Be Fearless, Aleksandra Melnikova from the SquareX founder’s office speaks with Jim Rutt, CIO and CISO of the Dana Foundation. Jim traces his 25-year journey from marketing to data analytics to leading technology strategy in a major nonprofit, sharing how cybersecurity has shifted from HIPAA compliance to tackling AI-driven threa…
…
continue reading
1
Computer Forensics: Incident Response Essentials
21:54
21:54
Play later
Play later
Lists
Like
Liked
21:54A practical guide for investigating computer crimes, focusing on methodologies and tools for digital evidence acquisition and analysis. The text covers a broad range of topics, including the basics of hard drives and storage media, various data hiding techniques like encryption and steganography, and the identification and handling of hostile code …
…
continue reading
1
Securing Billions in Aircraft Assets | John Rojas, Vice President, IT, Air Lease
43:59
43:59
Play later
Play later
Lists
Like
Liked
43:59Host Aleksandra Melnikova of Founder's Office at SquareX sits down with John Rojas, Vice President, IT, of Air Lease. In this episode of The Fearless Podcast, they discuss John's fascinating transition from Marine Corps communications to managing cybersecurity for one of the world's largest aircraft leasing companies. John shares insights on protec…
…
continue reading
A comprehensive overview of penetration testing concepts and methodologies, covering various attack types and the tools used by security professionals. They detail social engineering techniques like phishing, vishing, smishing, and physical exploits such as dumpster diving and badge cloning. The sources also explore different penetration test scope…
…
continue reading
1
Leveling Up in Cybersecurity Today | Girard Kavelines, Technical Writer, TechHouse570
36:54
36:54
Play later
Play later
Lists
Like
Liked
36:54In this episode of the Be Fearless podcast, SquareX Field CISO John Carse sits down with Girard Kavelines and discusses how starting out on the help desk gave him fresh perspectives and practical insights that later shaped his work as a Network/Security Engineer. Girard also elaborates on other topics, schaas how blogging and content creation at Te…
…
continue reading
1
📻 BONUS/SHOUT OUT/REPOST: Your The Tech-Savvy Lawyer.Page Blogger/Podcaster Appears on Law Practice Today Podcast With Terrell Turner To Discuss Essential Tips for Managing Trust Accounts in Small and ...
16:00
16:00
Play later
Play later
Lists
Like
Liked
16:00🙏 Special Thanks to Terrell Turner and the ABA for having me on the Law Practice Today Podcast, produced by the Law Practice Division of the American Bar Association. We have an important discussion on trust account management. We cover essential insights on managing trust accounts using online services. This episode has been edited for time, but n…
…
continue reading
1
CISA – Certified Information Systems Auditor Study Guide: Aligned with the CISA Review Manual
14:02
14:02
Play later
Play later
Lists
Like
Liked
14:02Offers an in-depth look at the Certified Information Systems Auditor (CISA) certification. It covers critical aspects of information systems auditing, including processes, risk management, business resilience, and security controls, with a focus on preparing candidates for the CISA exam through key concepts and self-assessment questions. The text a…
…
continue reading