Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

CyberSecurity Summary Podcasts

show episodes
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
  continue reading
 
Surprising insights into IT, security and the future of work – and what they mean for your business strategy. Join host and former Ivanti CEO Jeff Abbott and a rotating cast of global executives and thought leaders as they unpack Ivanti's latest research and share their own perspectives and experiences.
  continue reading
 
The Financial Management (FM) magazine podcast series features conversations with executives and thought leaders in management accounting. We discuss topics including governance, risk management, performance management, technology, corporate strategy, and leadership. Interviews are conducted by FM editors and contributors.
  continue reading
 
If you’re concerned about revenue at your hospital, then The Hospital Finance podcast is your go-to source for information and insights that can help you protect and enhance the revenue your hospital has earned. From regulatory changes to revenue cycle optimization, readmissions to bundled payments, you’ll get important perspectives, news and strategies from leading experts in healthcare finance. For show notes and additional resources from BESLER, visit https://www.besler.com/podcasts
  continue reading
 
Artwork

1
Today, Explained AI

Today, Explained AI

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
"Today, Explained AI" delves into the rapidly evolving world of artificial intelligence, providing listeners with insightful explorations of the latest AI developments and trends. Each episode offers an in-depth look at how AI technology impacts various aspects of life, from business and healthcare to entertainment and everyday living. Our team meticulously curates the most relevant topics and news, ensuring that our audience stays informed and ahead of the curve. Join us as we navigate the ...
  continue reading
 
Artwork

1
Best Book Breakdown

Best Book Breakdown

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Best Book Breakdown, the podcast that breaks down the bestseller books you need to read! If you love the idea of reading all the latest bestsellers but simply don't have the time, then this podcast is perfect for you. Each episode, we'll provide you with a comprehensive summary of a popular book that has made it onto the bestseller lists. We'll cover everything from plot and character development to key themes and takeaways, giving you all the information you need to know in a con ...
  continue reading
 
In a world where technology and cybersecurity are constantly evolving, staying ahead of the curve is no longer just an option—it's a necessity. Prime Cyber Insights plunges you into the fast-paced universe of tech and cybersecurity, where the stakes are high, and the pace is relentless. Hosted by Niko Pulse and Kyra Pixel, this daily podcast is your essential guide to navigating the ever-changing landscape of technology and cybersecurity. From AI breakthroughs to the latest in cyber threats, ...
  continue reading
 
Loading …
show series
 
An extensive overview of the Go programming language. It introduces fundamental concepts such as variables, functions, packages, program flow control, and data types like arrays and slices. Advanced topics covered include Go concurrency with goroutines and channels, systems programming, file I/O, networking (TCP/IP, HTTP, WebSockets, RESTful APIs),…
  continue reading
 
In celebration of CGMA Week, the FM podcast welcomed two CGMA designation holders who recently spoke at UK & Ireland ENGAGE to discuss the lessons they've learned throughout their careers, how their mindset has shifted over the years, and the advice they would give to finance professionals navigating opportunities in a challenging era defined by po…
  continue reading
 
A comprehensive overview of Microsoft 365 and related cloud concepts. The text thoroughly explains cloud computing fundamentals, including the benefits, economic models, and types like IaaS, PaaS, and SaaS. A significant portion details the diverse Microsoft 365 services covering productivity, collaboration (Teams, Viva, SharePoint), endpoint manag…
  continue reading
 
Grok’s leaked chats raise doubts about all AI platforms. We compare this incident to past failures in tech security. The findings suggest a pattern that’s hard to ignore. Get the top 40+ AI Models for $20 at AI Box: ⁠⁠https://aibox.ai AI Chat YouTube Channel: https://www.youtube.com/@JaedenSchafer Join my AI Hustle Community: https://www.skool.com/…
  continue reading
 
A comprehensive career guide for individuals in or entering the cybersecurity field. The book structures its advice around common career stages, addressing topics such as finding one's "why" for pursuing a security role, developing necessary technical and soft skills like emotional intelligence and effective communication, and strategies for managi…
  continue reading
 
A comprehensive guide for Red Hat Enterprise Linux 8 (RHEL8) administration, detailing various system management topics. The sources cover initial RHEL8 installation on both physical and virtual machines, including advanced options like cloud deployments and automated installation techniques. A significant portion focuses on core administration ski…
  continue reading
 
We unpack the technology driving how Field AI is pushing the boundaries of smart machines. This could redefine how humans and robots interact. Get the top 40+ AI Models for $20 at AI Box: ⁠⁠https://aibox.ai AI Chat YouTube Channel: https://www.youtube.com/@JaedenSchafer Join my AI Hustle Community: https://www.skool.com/aihustle…
  continue reading
 
A comprehensive overview of the role and responsibilities of a Solutions Architect, focusing heavily on cloud computing environments. The text explores various architectural principles, including the importance of scalability and elasticity, security and compliance, and operational excellence in solution design. It details several architectural pat…
  continue reading
 
This discussion takes a closer look at how Nano Banana could change digital creativity. Tune in to hear what experts think about this new frontier. Get the top 40+ AI Models for $20 at AI Box: ⁠⁠https://aibox.ai AI Chat YouTube Channel: https://www.youtube.com/@JaedenSchafer Join my AI Hustle Community: https://www.skool.com/aihustle…
  continue reading
 
Focused on mastering the Secure Shell (SSH) protocol, primarily using OpenSSH and the Windows client PuTTY. The book is designed to guide both system administrators and general users beyond basic command-line usage, covering advanced topics such as encryption fundamentals, server and client configuration (including specific files like sshd_config a…
  continue reading
 
Aims to teach the Go programming language through an engaging, "brain-friendly" approach. It covers fundamental Go concepts such as variables, data types (including arrays, slices, maps, and structs), functions, packages, and control flow (conditionals and loops). The text also introduces advanced topics like pointers, methods, interfaces, error ha…
  continue reading
 
With AI at its core, Eight Sleep is reimagining nightly recovery. Explore how this innovation could impact wellness, performance, and everyday life. Get the top 40+ AI Models for $20 at AI Box: ⁠⁠https://aibox.ai AI Chat YouTube Channel: https://www.youtube.com/@JaedenSchafer Join my AI Hustle Community: https://www.skool.com/aihustle…
  continue reading
 
A comprehensive overview of healthcare information security and privacy for practitioners, focusing on the HCISPP certification. It covers critical areas such as medical coding systems (DRG, ICD, SNOMED CT), revenue cycle management, and workflow management in clinical and business settings. A significant portion addresses the regulatory environmen…
  continue reading
 
The 11 Labs API is breaking barriers in music creation. In this discussion, we unpack the tools driving new waves of creativity. Tune in to learn how AI is shaping the way music is made. Get the top 40+ AI Models for $20 at AI Box: ⁠⁠https://aibox.ai AI Chat YouTube Channel: https://www.youtube.com/@JaedenSchafer Join my AI Hustle Community: https:…
  continue reading
 
A beginner's guide to implementing CI/CD pipelines using Jenkins and YAML for various applications, including mobile, hybrid, and web. The author, a DevOps engineer, emphasizes DevOps as a cultural transformation driven by people, processes, and tools. The text introduces Jenkins, its evolution, and different pipeline types like Scripted, Declarati…
  continue reading
 
Perplexity’s bid to acquire Google has sent shockwaves through Silicon Valley and beyond. Our discussion dives into the strategy, the risks, and the potential rewards behind such a daring move. Tune in to hear how this move could reshape the entire digital economy and what’s at stake. Get the top 40+ AI Models for $20 at AI Box: ⁠⁠https://aibox.ai …
  continue reading
 
A structured approach to developing applications using Spring Boot. It covers foundational concepts like building web apps, data access, and developer tools, while also exploring advanced topics such as testing, production operations (including Docker and GraalVM), and building robust APIs. The book further examines messaging solutions and securing…
  continue reading
 
Smarter AI changes everything from workflows to culture. We discuss how GPT-5 updates could ripple through society. The smarter the AI, the smarter the systems built on top. Get the top 40+ AI Models for $20 at AI Box: ⁠⁠https://aibox.ai AI Chat YouTube Channel: https://www.youtube.com/@JaedenSchafer Join my AI Hustle Community: https://www.skool.c…
  continue reading
 
A comprehensive overview of fundamental networking concepts. It introduces various network components like RAM, NICs, hubs, switches, and routers, explaining their functions and interactions within a network. The material also details network topologies, including bus, ring, and star, alongside logical and physical implementations. A significant po…
  continue reading
 
A comprehensive exploration of mobile network technologies, detailing the evolution from GSM and UMTS to LTE and 5G New Radio. It outlines the intricate architecture, protocols, and operational procedures that underpin these wireless communication systems, including channel structures, mobility management, and call establishment. Furthermore, the t…
  continue reading
 
Datumo’s entrance as a Scale AI challenger highlights both disruption and opportunity. By targeting scalability and precision, the company positions itself as a transformative force. The competition may accelerate breakthroughs across industries. Get the top 40+ AI Models for $20 at AI Box: ⁠⁠https://aibox.ai AI Chat YouTube Channel: https://www.yo…
  continue reading
 
Provides an extensive overview of modern cybersecurity strategies, emphasizing the evolving role of the Chief Information Security Officer (CISO) from a technical expert to a strategic business leader. It covers critical aspects such as building a culture of security, managing diverse threat actors (nation-states, cybercriminals, hacktivists, and i…
  continue reading
 
Serves as an in-depth guide to Secure Access Service Edge (SASE). It explores the evolution of network security from traditional WANs to modern, cloud-centric architectures, emphasizing the need for SASE in today's distributed and dynamic enterprise environments. The source details SASE's foundational components, including SD-WAN, various security …
  continue reading
 
Cosmos is more than just another AI model—it’s a vision for the future. Nvidia is pushing boundaries with this bold innovation. We explore how it works and why it matters for everyone who uses technology. Get the top 40+ AI Models for $20 at AI Box: ⁠⁠https://aibox.ai AI Chat YouTube Channel: https://www.youtube.com/@JaedenSchafer Join my AI Hustle…
  continue reading
 
A field guide for designing, building, and assessing machine learning and AI systems. The book addresses the risks of AI failures, such as algorithmic discrimination and data privacy violations, which have become more common with wider adoption of ML technologies. It outlines a holistic approach to risk mitigation, combining technical practices, bu…
  continue reading
 
Pinterest’s statement has sent shockwaves through the tech and retail sectors. Our discussion explores how user experience and human creativity are driving Pinterest’s strategy. Whether AI advocates agree or not, the implications are massive for brands and consumers. Get the top 40+ AI Models for $20 at AI Box: ⁠⁠https://aibox.ai AI Chat YouTube Ch…
  continue reading
 
Executive coach and author Nick Robinson illuminates the challenging traits of work colleagues and shares strategies from his book — The 9 Types of Difficult People: How to Spot Them and Quickly Improve Working Relationships — that professionals can employ to improve relationships on the job. Robinson, a speaker at UK & Ireland ENGAGE earlier this …
  continue reading
 
Explores the integration of ITIL (Information Technology Infrastructure Library) principles with DevOps methodologies, offering innovative techniques for their combined application. It provides an in-depth look at ITIL's foundational concepts, including service lifecycle phases like strategy, design, transition, and operation, alongside essential p…
  continue reading
 
Meta is stepping deep into the world of AI-driven sound with its WaveForms acquisition. From immersive AR audio to smarter voice recognition, we cover the possibilities. Listeners will gain a clear view of how this could transform industries. Get the top 40+ AI Models for $20 at AI Box: ⁠⁠https://aibox.ai AI Chat YouTube Channel: https://www.youtub…
  continue reading
 
Trish and Tom take a deep dive into the NCSC Annual Review for 2025 and unpack practical tips for business leaders. We're tearing open the most critical report of the year: the NCSC Annual Review 2025. The message from GCHQ is crystal clear: Cyber risk is no longer just an IT issue—it’s a boardroom priority. Forget those old assumptions—the threats…
  continue reading
 
An introductory guide to cybersecurity and ethical hacking using Python. It covers fundamental concepts such as network basics, the CIA triad (Confidentiality, Integrity, and Availability), and different types of hackers, including black hat, white hat, and script kiddies. The book outlines the phases and methodologies of hacking, from reconnaissan…
  continue reading
 
Few companies dare to speak out on export regulations, but Nvidia is rewriting the playbook. We explore the political, economic, and technological implications of their bold approach. Whether you’re a tech enthusiast or a policy watcher, this is a discussion you can’t afford to miss. Get the top 40+ AI Models for $20 at AI Box: ⁠⁠https://aibox.ai A…
  continue reading
 
Explores various facets of opportunistic networks (OppNets), which are dynamic, infrastructure-less wireless networks leveraging mobile device interactions for data transfer, often via a "store-carry-forward" mechanism. It details different routing protocols, categorizing them by approaches like replication-based (e.g., Epidemic, Spray and Wait), s…
  continue reading
 
GPT-5 Is Here—But Are We Ready? This could be the biggest AI milestone in years. Find out if GPT-5 is the AI you’ve been waiting for. Get the top 40+ AI Models for $20 at AI Box: ⁠⁠https://aibox.ai AI Chat YouTube Channel: https://www.youtube.com/@JaedenSchafer Join my AI Hustle Community: https://www.skool.com/aihustle To recommend a guest email: …
  continue reading
 
A comprehensive guide to enhancing network security using open-source tools. It begins by emphasizing the importance of strong password management and multi-factor authentication, before moving into detailed discussions of firewall configuration for network perimeter defense. The text then explores Host Intrusion Detection Systems (HIDS) for server…
  continue reading
 
Explores the multifaceted field of network science, detailing various network types such as social, biological, and technological systems like the Internet and telephone networks. It examines fundamental network properties including paths, connectivity, and the small-world effect, alongside different mathematical representations of networks. The so…
  continue reading
 
Explores various facets of network security and performance, providing practical guidance for hardening systems and optimizing network elements. It covers topics such as client and server security configurations, including detailed steps for Windows and Linux environments, and the benefits of virtualization for disaster recovery and elastic perform…
  continue reading
 
An extensive guide to Mastering Tableau, a prominent business intelligence tool, focusing on its advanced features for data analysis and visualization. It covers best practices for visual design, including formatting, color usage, and reducing clutter to create impactful data stories. Readers will learn about data preparation and handling using Tab…
  continue reading
 
Detailing its installation, configuration, and management for various IT infrastructure needs. It covers fundamental concepts like server roles, disk management, networking protocols, and PowerShell cmdlets for administration. The text also thoroughly explores advanced topics such as virtualization with Hyper-V, including virtual disks, networks, a…
  continue reading
 
North Cohere's AI Agents: The Next Frontier in Automation Some say this marks the dawn of a new AI era. We explore whether this innovation will inspire competitors or leave them behind. Get the top 40+ AI Models for $20 at AI Box: ⁠⁠https://aibox.ai AI Chat YouTube Channel: https://www.youtube.com/@JaedenSchafer Join my AI Hustle Community: https:/…
  continue reading
 
An introduction to Power BI, outlining its use in business intelligence applications. It covers fundamental concepts like data modeling, DAX calculations, and various visualization types such as bar, line, waterfall, scatter, donut, treemap, and map charts. The text also explains how to connect and shape data from diverse sources using Power Query …
  continue reading
 
Export Controls vs. Nvidia: Who Wins? This bold stance has the industry watching closely. Let’s see if Nvidia’s bet on open markets can withstand political pressure. Get the top 40+ AI Models for $20 at AI Box: ⁠⁠https://aibox.ai AI Chat YouTube Channel: https://www.youtube.com/@JaedenSchafer Join my AI Hustle Community: https://www.skool.com/aihus…
  continue reading
 
A practical resource for developing, deploying, and scaling containerized applications. It covers fundamental concepts like containerization versus virtual machines, Kubernetes architecture, and various Azure container services, alongside advanced topics such as serverless Kubernetes, Windows containers, and integrating with Azure DevOps for contin…
  continue reading
 
Their new AI agents are smarter, faster, and raising eyebrows. Industry leaders are split on whether this is a blessing or a warning sign. Let’s break down what’s exciting—and what’s concerning. Get the top 40+ AI Models for $20 at AI Box: ⁠⁠https://aibox.ai AI Chat YouTube Channel: https://www.youtube.com/@JaedenSchafer Join my AI Hustle Community…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play