Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Cyber Hygiene Podcasts
A weekly podcast with short (15min) interviews around Cyber Security and Cyber Hygiene in the world of IoT
…
continue reading
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and sta ...
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
Working in cybersecurity can lead to many restless nights worrying about the safety of your applications. But don’t let software insecurity get you down – we’re here to help you take back your sleep. World-renowned software security evangelists will join our Checkmarx experts Stephen Gates and Matt Slotten to get inside the minds of cyber attackers. Our conversations will be packed with insight into the latest software threats and best practices for maturing your application security program ...
…
continue reading
Terry Tateossian is on a mission to explore how emerging technologies, media, robotics, data and behavioral science will solve humanity’s most pressing challenges. From education, mobility, energy, food and water supplies, the environment, employment all the way to disease and basic human rights - nothing is off limits.
…
continue reading
1
Thriving Beyond Human Labor with Context-Powered AI with Daniel Miessler
29:40
29:40
Play later
Play later
Lists
Like
Liked
29:40The real disruption isn’t AI replacing humans, it’s the shocking possibility that human labor was the economic bubble all along. In this episode, Ron Eddings sits down with Daniel Miessler, founder of Unsupervised Learning and longtime security leader, to break open why companies are hitting record profits with shrinking workforces, and what that m…
…
continue reading
What if your next great cyber defender is a teenager gaming in their bedroom right now? In this Threat Talks episode, Lieuwe Jan Koning and former FBI Supervisory Special Agent William McKean (founder of The Redirect Project) explore how young digital natives go From Hacker to Hero. They chart the journey from gaming and online communities to risky…
…
continue reading
1
Building EDR for AI: Controlling Autonomous Agents Before They Go Rogue with Ron Eddings
19:36
19:36
Play later
Play later
Lists
Like
Liked
19:36AI agents aren't just reacting anymore, they're thinking, learning, and sometimes deleting your entire production database without asking. The real question isn't if your AI agent will be hacked, it's when, and whether you'll have the right hooks in place to stop it before it happens. In this episode, Ron breaks down the ChatGPT Atlas vulnerability…
…
continue reading
1
Critical Infrastructure: Everything is Connected and Vulnerable
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52When hackers target the systems controlling your water, power, and transportation, the consequences go far beyond data breaches—people can die. Leslie Carhartt, Technical Director of Incident Response at Dragos, pulls back the curtain on one of cybersecurity's most critical blind spots: industrial control systems that keep society running but remai…
…
continue reading
The world’s biggest open-source ecosystem - npm - faced its first self-spreading worm. They called it Shai Hulud. It didn’t just infect one package. It infected developers themselves. When a maintainer got phished, the worm harvested credentials, hijacked tokens, and created new CI/CD workflows to keep spreading - automatically. No command-and-cont…
…
continue reading
You were promised safe SaaS - but got silent data loss. In Inside the Salesloft Breach, Rob Maas and Luca Cipriano expose how trusted integrations became the attack vector. They trace how vishing calls, trojanized Salesforce tools, and GitHub-to-AWS pivots gave attackers OAuth access and drained CRMs without a single alert. You’ll hear how Drift in…
…
continue reading
1
Red Team Warfare: A Navy Cyber Officer's Inside Look at Military Offensive Operations
41:13
41:13
Play later
Play later
Lists
Like
Liked
41:13What if your security team is playing defense while hackers play offense 24/7? Foster Davis, former Navy cyber warfare officer and founder of BreachBits, breaks down why traditional penetration tests become obsolete in weeks—and how continuous red teaming changes the game. From hunting pirates in the Indian Ocean to defending critical infrastructur…
…
continue reading
1
Can AI Run Your SOC Better Than You? with Ahmed Achchak
32:48
32:48
Play later
Play later
Lists
Like
Liked
32:48What if your security team never missed a single alert and actually had time to think strategically? In this episode, Ahmed Achchak, CEO and Co-Founder of Qevlar AI, reveals how autonomous SOCs are reshaping security operations worldwide. From tackling alert fatigue to empowering analysts with intelligent AI-driven investigations, Ahmed shares the …
…
continue reading
1
The App Store Nightmare: Why AI MCP Stores Are a Trap
35:01
35:01
Play later
Play later
Lists
Like
Liked
35:01The new AI app store is here - and it’s already making choices for your company. This episode shows you how to spot it, stop it, and stay safe. Host Lieuwe Jan Koning with RobMaas (Field CTO, ON2IT) explain the app storenightmare in plain language. A new system (MCP) lets AI tools like ChatGPT, Claude, and Gemini do tasks for you - sometimes too mu…
…
continue reading
1
Making Cybersecurity Marketing Creative (and a Little Sexy) with Maria Velasquez
30:04
30:04
Play later
Play later
Lists
Like
Liked
30:04Who said cybersecurity had to be serious? The future of cyber is creative, human, and even a little sexy. In this special 400th episode, Ron Eddings celebrates six incredible years of Hacker Valley Studio with one of cyber’s most creative voices, Maria Velasquez, Co-Founder of the Cybersecurity Marketing Society and Co-Host of Breaking Through in C…
…
continue reading
Cyber defense doesn’t just happen in code. It’s shaped in conversation. Behind every cyber norm or sanction, there’s a diplomat working to stop digital wars before they start. In this episode of Threat Talks, Lieuwe Jan Koning (CTO & co-founder of ON2IT) sits down with Ernst Noorman, Ambassador at Large for Cyber Affairs for the Kingdom of the Neth…
…
continue reading
1
Field Notes: AI's $10 Trillion Lie + Coffee Roasting & Starlink Hacks
26:28
26:28
Play later
Play later
Lists
Like
Liked
26:28What if everything AI tells you about cybersecurity costs is completely wrong? The Audit crew unpacks a shocking data black hole that has infected every major AI model—plus field-tested tech that actually works. In this laid-back Field Notes episode, Joshua Schmidt, Eric Brown, and Nick Mellum return from Gartner's CIO Symposium with insights that'…
…
continue reading
1
How to See Your Organization Like a Hacker with Chris Dale
25:18
25:18
Play later
Play later
Lists
Like
Liked
25:18To defend like a human, you first have to think like a hacker. In this episode, Ron Eddings sits down with Chris Dale, Co-Founder and Chief Hacking Officer at River Security, to explore the human side of hacking, where curiosity, persistence, and vigilance meet defense. Chris shares how the traditional idea of penetration testing has evolved into a…
…
continue reading
Patch smarter, not harder. Lieuwe Jan Koning and ON2IT Field CTO Rob Maas break down why “patch everything now” isn’t a strategy, but a risk multiplier. In this session, they teach a practical patching strategy: know your assets, patch edge first, stage updates, and use Zero Trust segmentation to choke off exposure so you only patch what truly matt…
…
continue reading
1
Coding by Vibe: The Future of AI-Built Security with Ron Eddings
20:22
20:22
Play later
Play later
Lists
Like
Liked
20:22When code meets intuition, innovation gets personal. But what happens when we let AI vibe with our ideas? In this episode, Ron Eddings covers the rise of AI-driven development from Vibe Coding, where natural language shapes real code, to the emerging Model Context Protocols (MCPs) that redefine how apps talk to AI. He breaks down the recent Figma M…
…
continue reading
1
Public Key Infrastructure: The Foundation of Digital Trust
34:41
34:41
Play later
Play later
Lists
Like
Liked
34:41How solid is your digital trust—or are you just hoping your PKI is secure? Let’s be honest: too many companies run on borrowed trust and forgotten certificates. In this episode of Threat Talks, ON2IT’s Lieuwe Jan Koning and Rob Maas pull back the curtain on what really holds your digital world together—and what can tear it down overnight. They brea…
…
continue reading
1
Apple Vision Pro Meets AI: Why Your Company Needs Both
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10What happens when Apple Vision Pro meets enterprise AI? In this episode of The Audit, Alex Bratton—applied technologist and AI implementation expert—joins hosts Joshua Schmidt and Nick Mellem to reveal how spatial computing and artificial intelligence are colliding to reshape how we work. From conducting million-dollar sales meetings in virtual rea…
…
continue reading
1
Learning How to Learn: Mastering the Cyber Fundamentals with Rich Greene
25:38
25:38
Play later
Play later
Lists
Like
Liked
25:38The real edge in cybersecurity isn’t found in new tools, it’s built through timeless fundamentals and a mindset that never stops learning. In this episode, Ron sits down with Rich Greene, Senior Solutions Engineer and Instructor at SANS Institute, to uncover how true cyber value starts with skills, curiosity, and mindset. Rich shares his remarkable…
…
continue reading
On this Month's episode of Smells Like Identity Hygiene, we chat with Field CTO at Xaliant, David MorimannoDon't miss out!#IdentityHygiene #TechTalk #CyberSecurityCurious about how much risk your organizations AD Environment is in? Request your free cyber risk assessment here (https://www.sphereco.com) or visit our website to learn how SPHERE (http…
…
continue reading
One unlocked phone can unravel the defenses of a billion-dollar enterprise—because in cybersecurity, small mistakes don’t stay small for long. Attackers can read notes, steal IDs, or impersonate you on WhatsApp. A reused password can launch a remote tool that looks completely legitimate. Rob Maas (Field CTO, ON2IT) and Luca Cipriano (Cyber Threat I…
…
continue reading
1
How AI Elevates Cyber Hygiene with Jason Rebholz
21:32
21:32
Play later
Play later
Lists
Like
Liked
21:32What if protecting your digital twin becomes the new cyber hygiene? In this week's episode, Ron welcomes back cybersecurity leader Jason Rebholz, CEO of Evoke, to discuss how AI is reshaping the fundamentals of cyber hygiene. From data breaches and deepfakes to everyday habits that protect our digital lives, Jason shares how small actions and smart…
…
continue reading
1
Resilience Over Fragmentation: The Risk You Can’t Ignore
56:26
56:26
Play later
Play later
Lists
Like
Liked
56:26By Threat Talks
…
continue reading
1
Field Notes: Coffee, Gliders & Trademark Scams
24:55
24:55
Play later
Play later
Lists
Like
Liked
24:55Ever wonder what the hosts of The Audit talk about when the mics are rolling but the formal interview isn't happening? This Field Notes episode gives you exactly that—unfiltered conversations covering everything from coffee preferences and glider flying to trademark scams targeting cybersecurity professionals. Nick and Eric dive into Eric's latest …
…
continue reading
1
Securing Software at AI Speed with Varun Badhwar
34:12
34:12
Play later
Play later
Lists
Like
Liked
34:12The biggest security threat isn’t in the cloud, it’s hidden in the code you trust the most. In this episode, Ron sits down with Varun Badhwar, Co-Founder & CEO of Endor Labs, who shares why research shows that nearly 80–90% of application code comes from open source and third-party libraries, not your own developers. Varun discusses the unseen risk…
…
continue reading
Boards don’t buy dashboards—they buy assurance. Breaches are late-stage symptoms of drift: rules pile up, logs lose signal, cloud/Kubernetes outpace governance. Lieuwe Jan Koning (ON2IT Co-Founder) and Rob Maas (Field CTO) show how Zero Trust Step 5B (Maintain) proves your controls still work—today. (00:00) - — Welcome & Zero Trust Step 5B (00:57) …
…
continue reading
1
The End of Search and the Rise of AI Browsers and Voices with Ron Eddings
18:16
18:16
Play later
Play later
Lists
Like
Liked
18:16Search engines aren’t dying quietly, they’re being replaced in real time by AI browsers and voice agents. AI isn’t just answering questions anymore; it’s acting for us. In this episode, Ron Eddings explores how tools like NanoBrowser and Comet are reshaping browsing, why Google may be in trouble, and how AI voices are becoming the new interface for…
…
continue reading
1
Defend Against Hacktivist Groups like APT Handala | The Cyber Security Podcast
30:32
30:32
Play later
Play later
Lists
Like
Liked
30:32Hacktivists don’t need zero-days to hurt you—they weaponize people. Host Lieuwe Jan Koning sits down with Yuri Wit (SOC analyst) and Rob Maas (Field CTO) to dissect APT Handala: how they hunt targets, deliver wipers, and brag about leaks. We map their moves to the Lockheed Martin Kill Chain and turn it into a Zero Trust defense playbook you can act…
…
continue reading
1
Cybersecurity News: Grok AI Hijacked for Malware, Wi-Fi Heart Rate Hacks, Starlink Competition
14:39
14:39
Play later
Play later
Lists
Like
Liked
14:39Cybercriminals are exploiting X's Grok AI to bypass ad protections and spread malware to millions—while researchers discover your home Wi-Fi can now monitor your heart rate. This week's news breakdown covers the attack vectors you need to know about. Join co-hosts Joshua Schmidt, Eric Brown, and Nick Mellem as they dive into the latest cybersecurit…
…
continue reading
1
Where Automation Ends, Cyber Ingenuity Begins with Phillip Wylie
33:59
33:59
Play later
Play later
Lists
Like
Liked
33:59Some tools replace tasks. Others reshape the way we think about security. In this episode, Ron welcomes back Phillip Wylie, one of the most respected voices in offensive security, author, educator, and longtime friend of the Hacker Valley community. With over 27 years of experience across cybersecurity disciplines, Phillip has guided thousands of p…
…
continue reading
1
Promptlock – The First AI-Powered Malware | The Cyber Security Podcast
19:10
19:10
Play later
Play later
Lists
Like
Liked
19:10First documented case: AI inside the breach. Promptlock marks the first time malware has used AI during execution, not just in preparation. In this Threat Talks deep dive, Rob Maas (Field CTO, ON2IT) sits down with Yuri Wit (SOC Analyst, ON2IT) to break down how it works: a Go loader calling an attacker’s LLM in real time, generating fresh payloads…
…
continue reading
1
Field Notes: Why Cyber Attacks Are Accelerating
26:04
26:04
Play later
Play later
Lists
Like
Liked
26:04The threat landscape is moving faster than ever—and traditional response playbooks aren't keeping up. In this live Field Notes episode, Eric Brown and Nick Mellum dive into the surge of recent cyberattacks hitting state governments, transit systems, and critical infrastructure across the U.S. From Nevada's complete state office shutdown to Maryland…
…
continue reading
1
The Power of Showing Up: Daily Streams, Big Impact with Gerald Auger
34:04
34:04
Play later
Play later
Lists
Like
Liked
34:04What if showing up with consistency could spark opportunities, create careers, and build a global movement? In this episode, Ron sits down with Gerald Auger, Ph.D., cybersecurity educator, content creator, and founder of Simply Cyber. Gerald shares how his daily livestream grew into a thriving community, why consistency is the key to influence, and…
…
continue reading
1
Data Bouncing: How HTTP Headers Leak Data | The Cyber Security Podcast
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58Your tools say “secure.” Your headers say “leaking.” In this Threat Talks Deep Dive, ON2IT’s Luca Cipriano (CTI & Red Team Lead) exposes Data Bouncing—a stealthy exfiltration trick that hides inside HTTP headers and abuses DNS lookups through trusted third parties. We show the demo, decode the psychology of the attack, and translate it into Zero Tr…
…
continue reading
1
Healthcare Ransomware: When Cyberattacks Turn Deadly
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08When ransomware hits a hospital, it's not just data that's at stake—patients are dying. Ed Gaudet, CEO of Censinet, reveals the shocking research proving what healthcare security professionals feared: cyberattacks on hospitals directly increase mortality rates and disrupt life-saving care. But Ed's biggest concern? The eerie quiet before what he be…
…
continue reading
1
The Rise of the Autonomous Blue Team with Vineet Edupuganti
37:24
37:24
Play later
Play later
Lists
Like
Liked
37:24What if defenders had their own AI-powered task force, always on, always adapting, and finally one step ahead of attackers? In this episode, Ron welcomes Vineet Edupuganti, Founder and CEO of Cogent Security, to discuss how AI agents are rewriting the rules of cybersecurity. Vineet shares why traditional vulnerability management is fundamentally br…
…
continue reading
1
AI, Play It Safe: Why CISOs Are Wrong to Ban AI
44:54
44:54
Play later
Play later
Lists
Like
Liked
44:54Playing it safe with AI sounds smart, but is banning it really how you prevent data leaks? In this episode of Threat Talks, ON2IT’s Lieuwe Jan Koning (ON2IT Co-Founder) sits down with Rob Maas, Field CTO at ON2IT, to tackle the hard question: How can CISOs and security leaders embrace AI safely—without exposing their organization to destructive dat…
…
continue reading
1
Al Meets Identity: A Conversation at the Cyber Frontier with Ed Amoroso
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58On this Month's episode of Smells Like Identity Hygiene, we chat with Founder and CEO of TAG Infosphere Ed AmorosoDon't miss out!#IdentityHygiene #TechTalk #CyberSecurityCurious about how much risk your organizations AD Environment is in? Request your free cyber risk assessment here (https://www.sphereco.com) or visit our website to learn how SPHER…
…
continue reading
1
Turning AI Into Your Super Tool with Ron Eddings
22:52
22:52
Play later
Play later
Lists
Like
Liked
22:52AI is neither friend nor foe, it’s both. The way we choose to use it determines whether it helps or harms. In this solo episode, Ron Eddings shares lessons from his first job at a grocery store, his early days in cybersecurity, and today’s AI-driven landscape. From productivity hacks like meeting transcription, to creative tools like content-aware …
…
continue reading
1
Zero Trust step 5A: Stop Breaches—Inspect Every Event Now | The Cybersecurity Podcast
25:16
25:16
Play later
Play later
Lists
Like
Liked
25:16Zero Trust step 5A is where monitoring turns raw logs into decisive action. Hosts Lieuwe Jan Koning and Rob Maas (Field CTO, ON2IT) expose why MDR alone isn’t protection—and how context closes the gap. Learn to inspect every event, use Indicators of Good/Compromise, and set Rules of Engagement that stop lateral movement and alert fatigue. (00:00) -…
…
continue reading
1
The Deepfake Hiring Crisis: AI Fraud in Job Interviews
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24What happens when your next hire isn't who they claim to be? In this eye-opening episode of The Audit, we dive deep into the alarming world of AI-powered hiring fraud with Justin Marciano and Paul Vann from Validia. From North Korean operatives using deepfakes to infiltrate Fortune 500 companies to proxy interviews becoming the new normal, this con…
…
continue reading
On this Month's episode of Smells Like Identity Hygiene, we chat with Justin Hansen, a Field CTO at CyberArk.Don't miss out!#IdentityHygiene #TechTalk #CyberSecurityCurious about how much risk your organizations AD Environment is in? Request your free cyber risk assessment here (https://www.sphereco.com) or visit our website to learn how SPHERE (ht…
…
continue reading
1
Mentorship to Mastery: AI and Community Lessons with Ron Eddings
32:22
32:22
Play later
Play later
Lists
Like
Liked
32:22AI might analyze your logs in seconds, but only the community can put you in the room that changes your career. In this solo episode, Ron Eddings discusses the powerful balance between human connection and artificial intelligence in shaping the future of cybersecurity and beyond. From the sacrifices that sparked his career to the mentors who opened…
…
continue reading
1
From Stealth to Wipers: Inside Russia’s APT 44 AKA Seashell Blizzard | The Cybersecurity Podcast
25:11
25:11
Play later
Play later
Lists
Like
Liked
25:11Russia’s most notorious cyber unit—Seashell Blizzard (also known as Sandworm, APT 44 and Iron Viking)—has taken down shipping giants, Olympic systems, and Ukraine’s power grid. In this Threat Talks deep dive, Lieuwe Jan Koning, Yuri Wit (Red Team), and Rob Maas (Blue Team) reveal exactly how these attacks unfold, why they’re so hard to stop, and ho…
…
continue reading
On this Month's episode of Smells Like Identity Hygiene, we chat with JetBlue Director IAM, Governance and Compliance, E. Angie WoodruffDon't miss out!#IdentityHygiene #TechTalk #CyberSecurityCurious about how much risk your organizations AD Environment is in? Request your free cyber risk assessment here (https://www.sphereco.com) or visit our webs…
…
continue reading
1
From MCP Risks to AI Jailbreaks with Marco Figueroa
41:30
41:30
Play later
Play later
Lists
Like
Liked
41:30When AI agents move faster than security teams, the game changes, and the risks multiply. Ron welcomes back Marco “Mystic Marc” Figueroa, Program Manager at Mozilla’s 0DIN Program, to continue the conversation and update on 2025’s most pressing AI and cybersecurity shifts. From the explosive rise of AI agents and OpenAI’s rumored browser to the hid…
…
continue reading
1
Signal Gate: One Wrong Number Triggered the Largest U.S. Gov Data Leak | The Cybersecurity Podcast
13:45
13:45
Play later
Play later
Lists
Like
Liked
13:45One mis-typed contact detonates Signal Gate, turning “secure” messaging into a classified-data leak.Host Lieuwe Jan Koning (Co-founder, ON2IT) and Thomas Manolis (Security Officer, AMS-IX) lay out the breach blow-by-blow—then drop the Zero Trust, Shadow IT and information-governance tactics every CISO needs before the next incident hits.High stakes…
…
continue reading
1
How CTF Culture Gamifies Your Way to Unbreakable Security Teams
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10Can you spot the difference between real cybersecurity talent and someone using ChatGPT to fake their way through interviews? In this episode of The Audit, Thomas Rogers from Meta CTF reveals how Capture the Flag competitions are becoming the ultimate litmus test for authentic cyber skills—and why traditional hiring methods are failing in the AI er…
…
continue reading
1
Debt vs. Risk: What the SharePoint Breach Taught Us with Ron Eddings
16:00
16:00
Play later
Play later
Lists
Like
Liked
16:00The riskiest move in cybersecurity? Playing it too safe. In this solo episode, Ron Eddings redefines the way we think about technical debt, risk, and missed opportunities, in security and in life. Ron reframes the debt vs. risk paradigm through the lens of the SharePoint breach, personal milestones, and co-founding Hacker Valley. With sharp insight…
…
continue reading
1
Splinternet Reality Check: Zero Trust Strategies for a Fragmenting Web
39:31
39:31
Play later
Play later
Lists
Like
Liked
39:31ON2IT’s Lieuwe Jan Koning goes one-on-one with AMS-IX CEO Peter van Burgel to expose why the once-open internet is splintering into rival, firewalled regions. Discover the geopolitical forces fueling this cybersecurity trend. Learn the Zero Trust resilience moves CISOs must deploy to stay sovereign in the future of the internet.Key Topics Covered• …
…
continue reading
1
The Future of Cyber Talent Is African with Confidence Staveley
23:22
23:22
Play later
Play later
Lists
Like
Liked
23:22The world’s youngest continent is also its most untapped resource. Confidence Staveley, Founder of CyberSafe, makes a powerful case for why Africa’s youth are the answer to global cybersecurity and AI innovation… if we’re bold enough to invest. In this episode, Ron welcomes back cybersecurity leader and advocate Confidence Staveley for a discussion…
…
continue reading