Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cybersecurity Education Podcasts

show episodes
 
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
  continue reading
 
Artwork

1
The Hacker's Cache

Kyser Clark - Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
  continue reading
 
Artwork

1
Hacker Valley Studio

Hacker Valley Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
  continue reading
 
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
Artwork
 
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
  continue reading
 
Artwork

1
The Harvard EdCast

Harvard Graduate School of Education

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In the complex world of education, the Harvard EdCast keeps the focus simple: what makes a difference for learners, educators, parents, and our communities. The EdCast is a weekly podcast about the ideas that shape education, from early learning through college and career. We talk to teachers, researchers, policymakers, and leaders of schools and systems in the US and around the world — looking for positive approaches to the challenges and inequities in education. Through authentic conversat ...
  continue reading
 
Artwork

201
Redefining Society and Technology Podcast

Marco Ciappelli, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Musing On Society, Technology, and Cybersecurity | Hosted by Marco Ciappelli Let’s face it: the future is now. We live in a hybrid analog-digital society, and it’s time to stop ignoring the profound impact technology has on our lives. The line between the physical and virtual worlds? It’s no longer real — just a figment of our imagination. We’re constantly juggling convenience, privacy, freedom, security, and even the future of humanity in a precarious balancing act. There’s no better place ...
  continue reading
 
Artwork

1
CyBytes

Nik Mohanlal

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
CyBytes is a podcast that features bite-sized conversations with tech and cybersecurity pros - sharing insights, stories, and actionable advice to help you navigate and thrive in the industry
  continue reading
 
A teacher podcast for busy educators—about 10 minutes, every week. Stay current on artificial intelligence in education (plain English), edtech, and what matters in the classroom: culture, instruction, assessment, digital health and wellness, and more. Simple ideas you can use right away. Hosted by AP Computer Science teacher Vicki Davis (Cool Cat Teacher)—author and longtime edtech blogger—this teaching podcast features best-selling teachers, researchers, and in-the-classroom administrators ...
  continue reading
 
Jethro Jones interviews instructional leaders from around the nation to learn and teach what it takes to become a transformative principal. Episodes address topics like Response to Intervention (RTI), Multi-Tiered System of Support (MTSS), Positive Behavior Interventions and Supports (PBIS), the latest advances in educational research, standards-based grading, and interviews with industry leaders like Bill Daggett, Rick Wormeli, Todd Whitaker and even people outside the education like Seth G ...
  continue reading
 
Artwork
 
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
  continue reading
 
Artwork

1
CMMC Academy

Armada Cyber Defense LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
  continue reading
 
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
Artwork

1
Zero Breach Zone

Andy Lombardo & Phil Hintz

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to the "Zero Breach Zone," where we delve into the vital mission of fortifying K-12 schools against breaches and phishing threats. Hosts Andy Lombardo and Phil Hintz lead insightful conversations with top experts in cybersecurity, education, and technology, uncovering strategies to protect our schools. From breaking down the latest digital threats to sharing actionable security measures, this podcast empowers educators, administrators, and parents with the tools they need to safeguar ...
  continue reading
 
Artwork

1
Treasury Talk PODCAST

Treasury Talk with MI Treasurer Rachael Eubanks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Treasury Talk, a podcast for Michigan taxpayers hosted by State Treasurer, Rachael Eubanks. Our trending topics with Subject Matter Experts will include cybersecurity, tax prep tips, education savings plans, the budget and our economy, and leadership best practices. Listen for take-aways that will support you, your family and your business!
  continue reading
 
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
  continue reading
 
Artwork

1
Simply ICS Cyber

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
  continue reading
 
Artwork

1
Full Tech Ahead

Amanda Razani

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
On this podcast, I sit down with business leaders, researchers and executives to explore innovative technology solutions and products, whether they’re transforming industries today or still in development. But we go far beyond the tech itself. From real-world use cases and business implementation journeys to cybersecurity challenges and future trends, we uncover what’s shaping the digital landscape. We also dive into topics that matter to every tech professional: Work/life balance, business ...
  continue reading
 
SipCyber: Where Great Coffee Meets Essential Cybersecurity What happens when a former special education teacher turned Minnesota State Cybersecurity Coordinator sits down with a perfect cup of coffee? You get cybersecurity advice that's actually approachable. Jen Lotze from IT Audit Labs brings you SipCyber — the podcast that pairs cozy coffee shop discoveries with decaffeinated cybersecurity tips. No jargon. No fear-mongering. Just practical ways to protect yourself, your family, and your o ...
  continue reading
 
Artwork

1
Practical AI

Practical AI LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Making artificial intelligence practical, productive & accessible to everyone. Practical AI is a show in which technology professionals, business people, students, enthusiasts, and expert guests engage in lively discussions about Artificial Intelligence and related topics (Machine Learning, Deep Learning, Neural Networks, GANs, MLOps, AIOps, LLMs & more). The focus is on productive implementations and real-world scenarios that are accessible to everyone. If you want to keep up with the lates ...
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Welcome to Smarter Online Safety: Protect, Empower, Transform—your go-to channel for digital security, AI productivity, and digital transformation. As cyber fraud, identity theft, and AI-driven risks grow, Jocelyn King, “The Queen of Online Safety,” is here to help you stay secure and thrive. A Top 10 Woman in Cybersecurity, speaker, and educator, she has been featured on Dr. Phil, prime-time news, international radio, and top podcasts. 💡 What You’ll Learn: ✔️ Protect yourself & your family ...
  continue reading
 
Welcome to the Passwork Cybersecurity Webinars — a space for insightful conversations on digital security and the latest trends in the world of cybersecurity. Each episode, we bring together industry experts, thought leaders, and practitioners to share real-world stories, practical tips, and deep dives into the challenges and innovations shaping our digital lives. Join us as we unravel the complexities of cybersecurity and empower you to protect what matters most.
  continue reading
 
Artwork

1
High Turnout Wide Margins

High Turnout Wide Margins

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Co-hosts Brianna Lennon, county clerk in Boone County, Missouri and Eric Fey, director of elections in St. Louis County, Missouri, talk to subject-matter elections experts and local election administrators to ask the questions that are most meaningful to their work and talk with colleagues about how to best approach issues like voter education, cybersecurity, and integrity.
  continue reading
 
Artwork

1
Plugged In: ACPE Amplified

ACPE: Association for Computer Professionals in Education

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
How people connect and learn has evolved in the 50+ years since ACPE was formed. But our mission and ethos haven’t: (1) increasing collaboration and professional development opportunities and (2) fostering long-lasting relationships among our members. We’re eager to keep diversifying ways to connect, learn, and have fun together. The Plugged In podcast is a place for us to amplify the voices of our colleagues and celebrate the work we do in education technology. Join hosts Marc Elliott and R ...
  continue reading
 
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
  continue reading
 
Artwork

1
AI Education

AI Education

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
"AI Education" is a cutting-edge podcast dedicated to exploring the vast world of artificial intelligence and its impact on society. Each episode delves into current topics and news related to AI, offering listeners a comprehensive understanding of this rapidly evolving field. The podcast breaks down complex concepts into accessible discussions, making it suitable for both AI enthusiasts and newcomers. By covering a wide range of subjects, "AI Education" keeps its audience informed and engag ...
  continue reading
 
Artwork
 
Dive into the pulse of the Internet with This Week in NET. A weekly roundup of Cloudflare's latest news, innovations and the most impactful developments shaping the Internet. From security updates to performance breakthroughs, we deliver insights that matter to developers, businesses, and Internet enthusiasts alike. Each episode features expert analysis with special guests offering unique perspectives on today's digital challenges and evolving landscape. Follow us @CloudflareTV Read the blog ...
  continue reading
 
Ready to earn your AWS Certified Cloud Practitioner credential? Our Audio Course is your ultimate guide to mastering the fundamentals of AWS Cloud, including security, cost management, core services, and cloud economics. Whether you're new to IT or looking to expand your cloud knowledge, this series will help you confidently prepare for the exam and take the next step in your career. Produced by BareMetalCyber.com, your trusted resource for expert-driven cybersecurity education.
  continue reading
 
Artwork
 
The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
  continue reading
 
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
  continue reading
 
Welcome to the ETLA The Beat! This is the official podcast of the EdTech Leader Alliance. This is an Ohio based EdTech Leadership group acting as the COSN Chapter and ISTE Chapter. There is also a yearly ETLA Conference where leaders can meet and network to learn and grow around current topics in education. The group also support DPA, SPDC, Cybersecurity, Mentorship opportunities, AI, the COSN CETL program and more. Episodes will highlight topics supporting the EdTech community. For more inf ...
  continue reading
 
Loading …
show series
 
Step inside Darnleys Cyber Café for a thought-provoking journey from The Terminator’s Skynet to the eerie futures of Black Mirror. We explore how pop culture’s AI nightmares echo today’s breakthroughs and what they might mean for tomorrow. Grab a coffee, press play, and question how close fiction is to becoming your reality. Click here to send futu…
  continue reading
 
A comprehensive guide to developing sophisticated 3D game character animations and virtual worlds. The content covers a wide array of topics, starting with fundamental concepts like loading models and basic animations and progressing to advanced techniques such as GPU-accelerated calculations using compute shaders. Readers will learn about implemen…
  continue reading
 
A reference for Ruby programming. It covers a vast array of topics, beginning with fundamental data types like strings and numbers, and progressing through complex data structures such as arrays, hashes, and trees. The material also explores object-oriented programming (OOP) principles, file I/O and data storage methods, graphical user interface (G…
  continue reading
 
Focuses on machine learning for tabular data, covering its fundamental concepts and practical applications. The sources explore various machine learning and deep learning approaches, with a particular emphasis on gradient boosting techniques like XGBoost and LightGBM, highlighting their efficacy with structured data. Readers will learn about data p…
  continue reading
 
A powerful technology for programming the Linux kernel to enhance observability, networking, and security. It explains eBPF's fundamentals, including its virtual machine, instruction set, maps, and helper functions, along with the verifier that ensures program safety. The text details how eBPF programs are written in C (and increasingly Rust), comp…
  continue reading
 
⸻ Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com ______Title: Tech Entrepreneur and Author's AI Prediction - The Last Book Written by a Human Interview | A Conversation with Jeff Burningham | Redefining Society And Technology Podcast With Marco Ciappelli ______Guest: Eli Lopian Founder of Typemock Ltd |…
  continue reading
 
A comprehensive guide for developers creating AI and Large Language Model (LLM) applications. The book covers fundamental concepts such as prompt engineering and retrieval-augmented generation (RAG), explaining how to integrate external data and manage conversational memory. It thoroughly explores various cognitive architectures like chains, router…
  continue reading
 
A comprehensive guide for individuals seeking to understand and implement quantum programs using Python and the IBM Quantum platform. It explores fundamental quantum computing principles like superposition, entanglement, and interference, detailing how these concepts underpin the creation of quantum circuits. The text also provides practical instru…
  continue reading
 
[email protected] Ever wonder what happens behind the scenes when you tap "Login" on your favorite app? Authentication is the invisible guardian standing between your personal data and potential attackers, and it's more sophisticated than you might think. Authentication systems rely on three critical principles: Confidentiality keeps your cre…
  continue reading
 
Not all stories bask in the spotlight. We explore the ones that lingered in the shadows of bigger announcements. This episode proves that shadows often hide treasures. Get the top 40+ AI Models for $20 at AI Box: ⁠⁠https://aibox.ai AI Chat YouTube Channel: https://www.youtube.com/@JaedenSchafer Join my AI Hustle Community: https://www.skool.com/aih…
  continue reading
 
⬥GUEST⬥ Aunshul Rege, Director at The CARE Lab at Temple University | On Linkedin: https://www.linkedin.com/in/aunshul-rege-26526b59/ ⬥CO-HOST⬥ Julie Haney, Computer scientist and Human-Centered Cybersecurity Program Lead, National Institute of Standards and Technology | On LinkedIn: https://www.linkedin.com/in/julie-haney-037449119/ ⬥HOST⬥ Host: S…
  continue reading
 
Are you curious about how colleges and universities are preparing students for the rapidly evolving tech workforce? In this episode of Full Tech Ahead, host Amanda Razani sits down with Scarlet Clouse, Dean of the College of Education and Director of the Kay Bailey Hutchinson Institute at Angelo State University, to discuss the explosion of AI, cyb…
  continue reading
 
Search engines aren’t dying quietly, they’re being replaced in real time by AI browsers and voice agents. AI isn’t just answering questions anymore; it’s acting for us. In this episode, Ron Eddings explores how tools like NanoBrowser and Comet are reshaping browsing, why Google may be in trouble, and how AI voices are becoming the new interface for…
  continue reading
 
A comprehensive guide for mastering shader programming within the Unity 5 game engine. Authored by Alan Zucconi and Kenneth Lammers, it explores various lighting models, rendering techniques, and visual effects, ranging from basic diffuse shading and texture mapping to advanced concepts like Physically Based Rendering (PBR) and screen effects. The …
  continue reading
 
Explores the integration of Cloud Computing and the Internet of Things (IoT), highlighting their combined applications across diverse sectors. It details the fundamental concepts of both cloud computing and IoT, including their architectures, components, advantages, and disadvantages. The source also examines real-world applications such as smart c…
  continue reading
 
The Department of Defense is making one of the most significant changes to cybersecurity compliance in over a decade: a move from the Risk Management Framework (RMF) to the Cybersecurity Risk Management Construct (CSRMC). For defense contractors, integrators, and managed service providers, this shift will redefine how compliance is achieved and mea…
  continue reading
 
In this episode of The Collective Podcast, host Jordy Decock sits down with security consultants Thor Nicolaï and Jasper Baes to explore the hidden challenges of maintaining strong security baselines in Microsoft environments. They dive into why small gaps appear, how drift monitoring and exception management can make or break your security posture…
  continue reading
 
In this episode, the Connection Security Center of Excellence team takes us on a journey—both literal and technical—sharing insights gained from a recent reconnaissance road trip across the United States. Their firsthand experiences offer a front-line perspective on the evolving landscape of post-quantum insecurity. Listeners will hear from our sec…
  continue reading
 
Schools around the world are cracking down on student cell phones, with many turning to outright bans as a fix for distraction, bullying, or mental health struggles. But as University of Birmingham Professor Vicky Goodyear and Harvard’s Carrie James explain, the story is more complicated than a simple “phones are bad.” “School phone policies alone …
  continue reading
 
Got a question or comment? Message us here! In this episode of The #SOCBrief, we break down the rising FileFix attack, a new social engineering technique using steganography to deliver info-stealing malware. Learn how attackers disguise malicious PowerShell commands, the risks this poses for browsers, messengers, and crypto wallets, and the proacti…
  continue reading
 
Industrial control systems (ICS) and operational technology (OT) are the backbone of modern society—powering electricity, water, gas, communications, manufacturing, chemicals, and even medical technology. But what happens when these systems must be secured in the middle of a warzone? On this episode of Simply ICS Cyber, hosts Don C. Weber and Tom V…
  continue reading
 
What happens when you combine the perfect latte with life-changing cybersecurity advice? Welcome to the very first episode of SipCyber! Jennifer Lotze kicks things off at Backstory Coffee Roasters in St. Paul, Minnesota—a hometown hero just three minutes from IT Audit Labs that's roasting beans and building community. But here's the kicker: while y…
  continue reading
 
Senior penetration tester Vladimir Ichkov shares what really matters in cybersecurity job interviews from the perspective of both a candidate and an interviewer. We discuss the role of soft skills, confidence, and humor in landing a pentesting job, common red flags that turn interviewers away, and how technical experience as a system administrator …
  continue reading
 
A practical resource for mastering cybersecurity assessments. The text covers Nmap's versatile applications in network security, including penetration testing, red teaming, and purple teaming, detailing fundamental and advanced scanning techniques. It emphasizes setting up a lab environment for hands-on practice, mapping attack surfaces, identifyin…
  continue reading
 
Discuss Radio Frequency Identification (RFID) technology, exploring its evolution and applications across various industries, particularly supply chain management and retail. They examine the technical advancements in RFID, including printed electronics and silicon ink, highlighting their impact on cost reduction and performance. A significant port…
  continue reading
 
ETLA The Beat S2 E1 : An Edtech Leaders Alliance Podcast Welcome to ETLA The Beat! This is a monthly podcast sharing news, resources and content from the EdTech Leaders Alliance. As we kick off season 2, we have a focused discussion on cybersecurity, an explanation of HB 96, important deadlines this year and how to meet them in the most cost effect…
  continue reading
 
Had a great and insightful conversation with Joan about her journey, the challenges, and achievements. We also touched on creating her initiative, "Cyberlingo," starting "CyberTalks With Jojo" and how these are shaping individuals. From her membership program in CyberGirls to what she's up to lately. Bet you are going to love this laid-back convers…
  continue reading
 
In this episode, Daniel and Chris are joined by Chris Aquino, software engineer at Thunderbird to hear the story of how they developed a privacy-preserving AI executive assistant. They discuss various design decisions including remote (but confidential) inference, local encryption, and model selection. Chris A. does an amazing job describing the jo…
  continue reading
 
A quiet data breach at Stellantis could be more than it seems. In this episode of Darnley’s Cyber Café, we take you inside the cyber underbelly of today’s automakers and explore how a single compromise can ripple through an entire industry. What’s really at stake when cars, code, and global supply chains collide? Grab your coffee and tune in to fin…
  continue reading
 
SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.tiktok.com/@convocourses Facebook: htt…
  continue reading
 
What if the same innovations making cars self-driving could also make flying safer, faster, and more accessible? For decades, aviation has been bound by the limits of human workload, urban congestion, and safety concerns. But now, a new era is dawning—one where autonomous technologies may redefine how we travel in the skies. In this episode of Full…
  continue reading
 
Welcome to episode 21 of Zero Breach Zone! In this hosts Andy Lombardo and Phil Hintz welcome Itza White, the Director of Cybersecurity for Five Star. The group discusses the unique challenges of cybersecurity in K-12 education, the importance of documentation, and building a culture of security awareness. Itza shares her journey into cybersecurity…
  continue reading
 
[email protected] The digital world seems like magic to many, but behind every functioning computer is a complex system of hardware components and methodical troubleshooting approaches. In this comprehensive episode, we pull back the curtain on what makes IT specialists effective problem-solvers and explore the physical heart of computing sys…
  continue reading
 
In this special 15th-anniversary episode of This Week in NET, we sit down with Cloudflare co-founders Michelle Zatlyn and Matthew Prince to revisit the early days — from a Harvard Business School project to launching at TechCrunch Disrupt in 2010. We talk about how culture takes shape, the technical vision of Lee Holloway, and pivotal moments that …
  continue reading
 
This episode features Chris Inglis, former U.S. National Cyber Director and longtime Deputy Director of the NSA. With over 40 years in national security, Chris was at the center of one of the most high-stakes breaches in U.S. history: the Edward Snowden incident. In this episode, Chris shares what really happened inside the NSA during those critica…
  continue reading
 
Provides an extensive overview of operational security (opsec) and anonymity in the digital and physical realms. It thoroughly explains the use of tools like Tor, Freenet, and various encryption methods (PGP, Truecrypt, Veracrypt) to protect digital footprints, communications, and data. The text also highlights the importance of physical security p…
  continue reading
 
Offers an in-depth look at security concerns surrounding Large Language Models (LLMs), drawing heavily from "The Developer’s Playbook for Large Language Model Security" by Steve Wilson. It presents endorsements highlighting the book's importance for AI developers and security professionals due to the novel risks LLMs introduce. The text outlines va…
  continue reading
 
This episode of the Pipeliners Podcast features a conversation with Ben Gilman about the American Gas Association’s GIS and Asset Records Management Committee. The discussion explores the evolution of mapping and GIS in the utility industry, the committee’s focus on improving accuracy and best practices, and the growing importance of integrating GI…
  continue reading
 
- Ripple Effects Continue As a Result of The JLR Cyber Attack. - Fallout From JLR Cyber Breach. - Heathrow Data Breach Concerns. - Global & African Cybersecurity Pulse. Support the show Remember... Even with top-tier security, human negligence and/or error can compromise systems. Invest in employee training—it’s the ultimate safeguard. Stay Informe…
  continue reading
 
Cybercriminals are exploiting X's Grok AI to bypass ad protections and spread malware to millions—while researchers discover your home Wi-Fi can now monitor your heart rate. This week's news breakdown covers the attack vectors you need to know about. Join co-hosts Joshua Schmidt, Eric Brown, and Nick Mellem as they dive into the latest cybersecurit…
  continue reading
 
A comprehensive overview of ransomware. It details the history and evolution of various malware types, with a specific focus on ransomware families like Ryuk, WannaCry, and Locky. The sources explore the methods of ransomware distribution, such as email phishing and exploit kits, and explain why traditional antivirus software struggles to detect th…
  continue reading
 
A technical guide published by Packt Publishing in 2021. It focuses on optimizing Python application performance by integrating Rust code. The book provides practical guidance on creating Python pip modules with Rust, managing dependencies using Cargo, and structuring Rust code for efficient integration. It explores advanced topics like concurrency…
  continue reading
 
[email protected] Cryptology isn't just theory—it's the invisible shield protecting your every digital move. This second installment of our cryptology deep dive moves beyond the fundamentals to reveal how these powerful tools operate in real-world systems that safeguard our digital lives. Digital signatures stand as one of cryptology's most p…
  continue reading
 
In this episode, Jethro and Danny continue their "Reject the Premise" series, a collaborative book-writing and podcast project. They discuss challenging traditional assumptions in education, focusing on reimagining school leadership, student development, and the real purpose of education. Links to Parts 1-3: Reject the Premise 1: Podcasts Link Reje…
  continue reading
 
A comprehensive overview of networking fundamentals. It covers essential network concepts, including devices, applications, protocols, and services, explaining their roles within the OSI model and discussing routing and switching characteristics. The text further explores IP addressing components, network topologies, and wireless technologies, alon…
  continue reading
 
Provides comprehensive information on deploying, upgrading, customizing, and configuring the Windows 10 operating system. It covers essential topics such as managing local users, groups, and devices, configuring permissions and file access, implementing local policies, and securing data and applications. The text also explores network configuration…
  continue reading
 
A comprehensive guide to leveraging Azure OpenAI. It details the fundamentals of Large Language Models (LLMs), their various applications, and how to integrate them within the Microsoft Azure ecosystem. The book explores advanced topics such as multimodal capabilities, function calling, and Assistants API, along with crucial aspects of privacy, sec…
  continue reading
 
A comprehensive guide to securing cloud-native applications and APIs, specifically focusing on OAuth and OpenID Connect standards. The book covers a wide range of topics, including API authorization, token design and management, secure client implementations for various application types (web, mobile, desktop), and the deployment and operational as…
  continue reading
 
Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 275 ~ Watch Now ~ In this AMA edition of DailyCyber, I break down some of the most pressing issues in cybersecurity today. No guest—just me sharing unfiltered insights from the frontlines of vCISO advisory and leadership. 🔥 What we cover in this AMA: 1️⃣ The Cybersecurity Talent…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play