In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
Cybersecurity Education Podcasts
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Phillip Wylie interviews cybersecurity industry experts on offensive security and techniques around penetration testing and red teaming.
…
continue reading
James McQuiggan brings inspiring stories of cybersecurity practitioners "break-into-industry" stories across all dimensions of cybersecurity.
…
continue reading
Mastering Cybersecurity is your narrated audio guide to the essential building blocks of digital protection. Each 10–15 minute episode turns complex security concepts into clear, practical lessons you can apply right away—no jargon, no fluff. From passwords and phishing to encryption and network defense, every topic is designed to strengthen your understanding and confidence online. Whether you’re new to cybersecurity or refreshing your knowledge, this series makes learning simple, smart, an ...
…
continue reading
A teacher podcast for busy educators—about 10 minutes, every week. Stay current on artificial intelligence in education (plain English), edtech, and what matters in the classroom: culture, instruction, assessment, digital health and wellness, and more. Simple ideas you can use right away. Hosted by AP Computer Science teacher Vicki Davis (Cool Cat Teacher)—author and longtime edtech blogger—this teaching podcast features best-selling teachers, researchers, and in-the-classroom administrators ...
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
This podcast will give you help you with passing your CompTIA exams. We also sprinkle different technology topics.
…
continue reading
Hear directly from the frontlines. Our podcast features candid conversations with our own experts as well as external experts driving cybersecurity forward. Real stories, real solutions, real impact.
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
Teaching you all about IRAs & Roth IRAs, employer retirement plans, taxes, Social Security, Medicare, portfolio withdrawal strategies, annuities, estate planning and much more!
…
continue reading
A bi-weekly podcast that helps you curb cybersecurity risk and tackle technology challenges
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
…
continue reading
Musing On Society, Technology, and Cybersecurity | Hosted by Marco Ciappelli Let’s face it: the future is now. We live in a hybrid analog-digital society, and it’s time to stop ignoring the profound impact technology has on our lives. The line between the physical and virtual worlds? It’s no longer real — just a figment of our imagination. We’re constantly juggling convenience, privacy, freedom, security, and even the future of humanity in a precarious balancing act. There’s no better place ...
…
continue reading
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
Discussion
…
continue reading
SipCyber: Where Great Coffee Meets Essential Cybersecurity What happens when a former special education teacher turned Minnesota State Cybersecurity Coordinator sits down with a perfect cup of coffee? You get cybersecurity advice that's actually approachable. Jen Lotze from IT Audit Labs brings you SipCyber — the podcast that pairs cozy coffee shop discoveries with decaffeinated cybersecurity tips. No jargon. No fear-mongering. Just practical ways to protect yourself, your family, and your o ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
We explore the risks arising from the use and misuse of digital devices and electronic communication tools. We interview experts in the fields of cybersafety, cybersecurity, privacy, parenting, and technology and share the wisdom of these experts with you!
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
This Week in NET is Cloudflare’s weekly roundup exploring the Internet’s past, present, and future. Hosted by João Tomé with expert guests, it shares insights that matter to developers, businesses, and Internet enthusiasts alike. Follow us on X: @CloudflareTV and @Cloudflare Read our blog posts at blog.cloudflare.com Watch our full video library at cloudflare.tv/ThisWeekInNet
…
continue reading
Welcome to the "Zero Breach Zone," where we delve into the vital mission of fortifying K-12 schools against breaches and phishing threats. Hosts Andy Lombardo and Phil Hintz lead insightful conversations with top experts in cybersecurity, education, and technology, uncovering strategies to protect our schools. From breaking down the latest digital threats to sharing actionable security measures, this podcast empowers educators, administrators, and parents with the tools they need to safeguar ...
…
continue reading
On this podcast, I sit down with business leaders, researchers and executives to explore innovative technology solutions and products, whether they’re transforming industries today or still in development. But we go far beyond the tech itself. From real-world use cases and business implementation journeys to cybersecurity challenges and future trends, we uncover what’s shaping the digital landscape. We also dive into topics that matter to every tech professional: Work/life balance, business ...
…
continue reading
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
…
continue reading
Making artificial intelligence practical, productive & accessible to everyone. Practical AI is a show in which technology professionals, business people, students, enthusiasts, and expert guests engage in lively discussions about Artificial Intelligence and related topics (Machine Learning, Deep Learning, Neural Networks, GANs, MLOps, AIOps, LLMs & more). The focus is on productive implementations and real-world scenarios that are accessible to everyone. If you want to keep up with the lates ...
…
continue reading
Co-hosts Brianna Lennon, county clerk in Boone County, Missouri and Eric Fey, director of elections in St. Louis County, Missouri, talk to subject-matter elections experts and local election administrators to ask the questions that are most meaningful to their work and talk with colleagues about how to best approach issues like voter education, cybersecurity, and integrity.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
The Bid Picture is a podcast about building a healthier relationship with technology. Host Bidemi Ologunde blends deep-dive monologues with candid conversations with entrepreneurs and innovators solving real-world problems—from everyday devices to emerging tech like AI—helping listeners use tech more wisely and live better.
…
continue reading
Welcome to Treasury Talk, a podcast for Michigan taxpayers hosted by State Treasurer, Rachael Eubanks. Our trending topics with Subject Matter Experts will include cybersecurity, tax prep tips, education savings plans, the budget and our economy, and leadership best practices. Listen for take-aways that will support you, your family and your business!
…
continue reading
UMBC Mic'd Up Podcast welcomes faculty, students, alumni, and industry thought leaders to share their insights and UMBC experiences.
…
continue reading
The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
We are in the throws of the digital revolution. During this time, it can be challenging to sift through all of the hype and find what works, what is still viable two years from now, and what contributes to your organization. Many IT organizations need help with confusing messages and conflicting technologies. We help organizations sort through the chatter and embrace digital transformation. The world of digital transformation is constantly changing, and you need to know what is viable today. ...
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
A weekly podcast with cybersecurity and physical security tips for the logistics community and security professionals. Hosted by a retired FBI Special Agent and former UK Intelligence Community member. Give a listen, tell a friend.
…
continue reading
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
Join Malcolm Gladwell, author and host of Revisionist History, for Smart Talks with IBM as he speaks with visionaries who are creatively applying technology in business to drive change and transform their industries. This season, Smart Talks with IBM is hitting the road. We’re stepping outside the studio to explore how IBM clients are using artificial intelligence to transform the way they do business. It’s a fresh look behind the curtain of technology, where big ideas meet cutting-edge solu ...
…
continue reading
Cyber Security Compliance and IT Jobs
…
continue reading
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Many people first meeting cybersecurity feel lost in a storm of disconnected tools, rules, and scary headlines about breaches. Without a shared map of attacker behavior, every new term or alert can feel random and hard to compare meaningfully. The MITER ATTACK matrix gives that shared map by organizing real attacker behaviors into a picture that pe…
…
continue reading
1
Balancing Education and Real-World Cybersecurity with a SOC Analyst Student
31:50
31:50
Play later
Play later
Lists
Like
Liked
31:50In this episode of Simply Defensive, host Josh Mason and co-host discuss their experiences and challenges in cybersecurity, along with guest Victoria, a student and SOC analyst at UNLV. The conversation covers the complexities of building a Security Operations Center (SOC) and compares academic learning with real-world applications. Victoria shares…
…
continue reading
1
The Explosion of Security Data & Modern Detection with Joshua Scott | DailyCyber 280 ~ Watch Now ~
1:01:10
1:01:10
Play later
Play later
Lists
Like
Liked
1:01:10The Explosion of Security Data & Modern Detection with Joshua Scott | DailyCyber 280 ~ Watch Now ~ In this episode of DailyCyber, I sit down with Joshua Scott, VP of Security at Hydrolix, a leader with nearly 30 years of hands-on experience across enterprise security, cloud architecture, GRC, risk, IR, compliance, detection engineering, and product…
…
continue reading
1
CAUGHT: Biggest Spy in US History--Spies, Lies & Cybercrime
54:07
54:07
Play later
Play later
Lists
Like
Liked
54:07Question? Text our Studio direct. 🔥New Episode🔥 dives into a famous betrayal case, showcasing the breach movie trailer as an example of Hollywood's take on espionage. This story highlights the perilous nature of insider threat and the critical importance of **counterintelligence**. We explore this true spy narrative, bringing you another compelling…
…
continue reading
1
UX for XR: User Experience Design and Strategies for Immersive Technologies (Design Thinking)
17:00
17:00
Play later
Play later
Lists
Like
Liked
17:00Focusing on the application of user experience (UX) principles to Extended Reality (XR), which includes Virtual Reality (VR) and Augmented Reality (AR). The content explores the history of XR, the rise of UX design, and how these methodologies are crucial for driving the adoption of immersive technologies in areas like EdTech, MedTech, enterprise, …
…
continue reading
1
Episode 195 Cloudflare’s Outage, DoorDash hacked, Nvidia $57B revenue, and Tech Career Crashouts
2:00:14
2:00:14
Play later
Play later
Lists
Like
Liked
2:00:14Get into cybersecurity here : https://app.techtualconsulting.tech/bundles/57 ------------------------------------------------------------------------------------ In this episode, HD and CyberShortieee dive into everything from navigating IT career moves and salary negotiation, to analyzing the recent Cloudflare outage, security breaches at DoorDash…
…
continue reading
1
What Happens in Your BRAIN During Social Engineering Attacks
51:48
51:48
Play later
Play later
Lists
Like
Liked
51:48Question? Text our Studio direct. What Happens in Your BRAIN During Social Engineering Attacks We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Growth without Interr…
…
continue reading
1
Cyber Journeys: Transition, Leadership, and Trekking with Bill "The Reel Bilbo" Boston
43:45
43:45
Play later
Play later
Lists
Like
Liked
43:45This week we chat with Bill Boston, also known as 'The Real Bilbo,' to explore his extensive journey from IT support roles to becoming a cybersecurity professional. With over 20 years in support and a strong background in healthcare and consulting, Bill shares unique insights into overcoming mental health challenges, the importance of being fair, f…
…
continue reading
1
November 21, 2025 | Transforming Education: AI's Role in Shaping Future Skills
4:18
4:18
Play later
Play later
Lists
Like
Liked
4:18In this captivating deep dive, discover how AI is revolutionizing education by personalizing learning experiences and empowering educators. Imagine a classroom where lessons are tailored to each student’s unique needs, fostering engagement and retention like never before. As AI becomes a vital ally in teaching, educators are adapting their methods …
…
continue reading
1
Visual Studio Code for Python Programmers
15:58
15:58
Play later
Play later
Lists
Like
Liked
15:58An extensive table of contents and introductory material for a guide on using the popular code editor for Python development. The source details fundamental setup procedures such as installing Visual Studio Code, configuring a Python interpreter and extensions, and managing core editor features like settings, keybindings, and the Command Palette. F…
…
continue reading
1
Think Like a Spy, Hunt Like a Hacker: Former FBI Agent Eric O’Neill on Outsmarting Cybercriminals
46:47
46:47
Play later
Play later
Lists
Like
Liked
46:47In this episode of the Cybersecurity Mentors Podcast, Eric O'Neill shares his experiences as an undercover FBI agent who caught one of the most damaging spies in U.S. history, Robert Hansen. He discusses the evolution of cybercrime, the importance of understanding cyber attacks, and the intersection of espionage and cybersecurity. O'Neill emphasize…
…
continue reading
Question? Text our Studio direct. LOCKBIT Cyber Crime Takedown Uncovered! Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT. Chapters 00:00 Introduction and Backgroun…
…
continue reading
1
AI in Insurance: Transforming Risk, Efficiency and Decision-Making
22:03
22:03
Play later
Play later
Lists
Like
Liked
22:03Can AI really revolutionize insurance? Amanda Razani interviews Sonny Patel, CPO and CTO of Socotra, to explore how artificial intelligence is transforming the industry. Patel explains how Socotra’s policy administration system leverages AI to streamline policy management, boost efficiency, and support better decision‑making. He highlights AI’s rol…
…
continue reading
Send Bidemi a Text Message! In this episode, host Bidemi Ologunde spoke with Gal Borenstein—CEO and founder of The Borenstein Group—to unpack how brands earn and scale trust in a noisy, AI-driven world. They dig into the “trust deficit” in B2B/B2G, what separates branding from true trust-building, and how to keep human authenticity while using AI a…
…
continue reading
1
November 20, 2025 | Cybersecurity 2025: AI Threats & Europe's Winning Strategies
5:14
5:14
Play later
Play later
Lists
Like
Liked
5:14In today's digital landscape, AI tools pose significant risks to national security and business integrity. Discover the latest global cybersecurity rankings and learn why Europe is excelling in international cybersecurity challenges. This video dives deep into rising cyber threats, examines successful global defense strategies, and explores the imp…
…
continue reading
1
Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future
13:56
13:56
Play later
Play later
Lists
Like
Liked
13:56Argues that cybersecurity is primarily a behavioral challenge rather than a technological one, emphasizing that people are the cause of nearly all security incidents. The book introduces and elaborates on nine key cybersecurity habits—such as vigilance, skepticism, diligence, and deception—which are presented as actionable behaviors for both indivi…
…
continue reading
1
#179 – "Real" person chat with Beth Pinsker about her new book, My Mother's Money, A Guide to Financial Caregiving
1:13:40
1:13:40
Play later
Play later
Lists
Like
Liked
1:13:40Andy chats with a real person (not an advisor), Beth Pinsker, a columnist for MarketWatch, about her new book, My Mother's Money, A Guide to Financial Caregiving. In the book, Beth details her personal experience in becoming her mother's financial caregiver, both during her mother's end of life and health decline, and beyond her mother's death and …
…
continue reading
1
Beg Bounty: The New Wave of Unrequested Bug Claims and What They Mean | A Conversation with Casey Ellis | Redefining CyberSecurity with Sean Martin
36:25
36:25
Play later
Play later
Lists
Like
Liked
36:25⬥EPISODE NOTES⬥ Understanding Beg Bounties and Their Growing Impact This episode examines an issue that many organizations have begun to notice, yet often do not know how to interpret. Sean Martin is joined by Casey Ellis, Founder of Bugcrowd and Co-Founder of disclose.io, to break down what a “beg bounty” is, why it is increasing, and how security…
…
continue reading
1
Patch Tuesday: Zero-Day Alert and Patching Must-Dos ✅
7:11
7:11
Play later
Play later
Lists
Like
Liked
7:11Got a question or comment? Message us here! A new zero-day. 63 flaws. Endless patching chaos. This week’s #SOCBrief breaks down Microsoft’s November Patch Tuesday and what it means for your SOC. We’ll cover the top critical CVEs, patching priorities, and how to keep your systems resilient before attackers strike. Support the show Watch full episode…
…
continue reading
Fireflies CEO, Krish Ramineni shares how the company is transforming AI-powered note-taking into a deeper layer of knowledge automation. He breaks down the technology behind real-time functionality like Live Assist, the user behavior patterns driving product evolution, and how Fireflies is innovating far beyond meetings. Krish also shares insights …
…
continue reading
In this episode of Simply ICS Cyber, Don and Tom welcome Sam Blaney, retired Chief Warrant Officer (CW3) from the Georgia National Guard and current cybersecurity professor at the University of North Georgia. Sam shares insights from his career building and leading Cyber Protection Team 170, his transition into teaching, and his continued work help…
…
continue reading
1
Scams Exploiting Trust: Quishing & Pig Butchering
4:08
4:08
Play later
Play later
Lists
Like
Liked
4:08Trust is essential in our daily lives—but it's also what scammers exploit most. In this episode of SipCyber, Jen Lotze visits Central Park Coffee in Owatonna, MN, to discuss two evolving scams that prey on human trust: quishing (QR code fraud) and pig butchering (romance investment scams). From fake QR codes on restaurant tables to elaborate romanc…
…
continue reading
1
How Ordinary People Are Accidentally Helping Hackers Break Into Global Companies
12:00
12:00
Play later
Play later
Lists
Like
Liked
12:00In this episode of Darnley's Cyber Café, Darnley exposes how everyday people around the world are unknowingly helping hackers infiltrate global companies. We break down fake remote job scams, identity laundering, and the red flags that businesses and individuals need to watch for. Learn how cybercriminals recruit ordinary citizens, why these scheme…
…
continue reading
1
November 19, 2025 | How AI is Revolutionizing Business & Consumer Experience
4:32
4:32
Play later
Play later
Lists
Like
Liked
4:32Join us for a deep dive into the transformative world of Artificial Intelligence! Discover how AI is reshaping businesses, enhancing shopping experiences, and raising essential ethical questions. In this video, we explore the emergence of AI-generated employees and how they may redefine workplace dynamics. Learn about innovative AI tools like Googl…
…
continue reading
1
Hands-on Data Virtualization with Polybase: Administer Big Data, SQL Queries and Data Accessibility Across Hadoop, Azure, Spark, Cassandra
15:37
15:37
Play later
Play later
Lists
Like
Liked
15:37These excerpts from the book "Hands-on Data Virtualization with Polybase" provide an extensive look at how to implement data virtualization using PolyBase within SQL Server, including its use in Big Data Clusters and Azure Synapse Analytics. The text thoroughly explains the technical details, prerequisites, and setup procedures for connecting SQL S…
…
continue reading
1
What Happens When AI Collides with MODERN Warfare?
53:38
53:38
Play later
Play later
Lists
Like
Liked
53:38Question? Text our Studio direct. Join us as we delve into the uncharted territory where artificial intelligence meets modern warfare, exploring the profound implications and potential consequences of this revolutionary intersection. From autonomous drones to predictive analytics, we'll examine how AI is transforming the face of combat and defense …
…
continue reading
1
Ransomware Rising: Confronting the K-12 Cybersecurity Crisis (Re-Air)
41:39
41:39
Play later
Play later
Lists
Like
Liked
41:39Welcome to episode 14 of the Zero Breach Zone, in this episode hosts Phil Hintz and Andy Lombardo dive into the current state of K-12 cybersecurity, analyzing key findings from the Cisco Talos 2024 report. They explore the concerning rise in ransomware attacks targeting educational institutions, the struggles schools face with limited security budg…
…
continue reading
1
From Passion to Advocacy | The Power of Community Leadership
21:39
21:39
Play later
Play later
Lists
Like
Liked
21:39Annie Byrd, a 2023 graduate of UMBC’s Community Leadership program, shares how her path through equity work, gender and women’s studies, and community partnerships led her to meaningful social impact. In this episode of UMBC Mic'd Up, she reflects on unlearning, building relationships, and discovering how leadership shows up in everyday life. Annie…
…
continue reading
1
Reimagining Outdoor Messaging with Drone-Powered Digital Displays
18:01
18:01
Play later
Play later
Lists
Like
Liked
18:01As drones move from niche gadgets to everyday infrastructure, they’re also becoming a new kind of storytelling canvas. In this episode, Jamar Williams, CEO and founder of Promo Drone, joins host Amanda Razani to share how his team is turning drones into flying video messaging boards for fan engagement, advertising, and public safety. Jamar explains…
…
continue reading
[email protected] The everyday internet feels effortless, but behind every click lives a maze of services quietly doing the heavy lifting. I pull back the curtain on the systems that make your workday possible—file shares that just appear on your desktop, printers that hum along until a 200‑page PDF wrecks the queue, and the alphabet soup of …
…
continue reading
1
You've Got to Build Some Labs with Daniel Lowrie
30:41
30:41
Play later
Play later
Lists
Like
Liked
30:41In this episode of Simply Offensive, Phillip Wylie interviews Daniel Lowrie, who shares his extensive background in IT and cybersecurity, particularly in penetration testing and education. Daniel discusses his journey from IT to teaching, effective learning strategies for aspiring pen testers, the importance of hands-on experience, and engaging tea…
…
continue reading
Malcolm Gladwell heads to San Francisco Tech Week to talk with IBM’s new Director of Research Jay Gambetta in front of a live audience. They discuss IBM’s plans to scale quantum computing power, the groundbreaking experiments already underway, and what impact these new computers could have on chemistry, medicine, and even finance. This is a paid ad…
…
continue reading
1
Are You Implying This Line Graph Isn't a Compelling Cybersecurity Narrative?
41:01
41:01
Play later
Play later
Lists
Like
Liked
41:01All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining them is our sponsored guest, Nathan Hunstad, director, security, Vanta. In this episode: Metrics that matter Testing for real AI as an assistant Intelligence without context Hu…
…
continue reading
1
Beyond Firewalls: The People Behind Cyber Resilience with Nathan Wenzler, Field CISO at Optiv
50:34
50:34
Play later
Play later
Lists
Like
Liked
50:34This episode features Nathan Wenzler, Field Chief Information Security Officer at Optiv. With nearly 30 years of experience leading cybersecurity programs across government agencies, nonprofits, and Fortune 1000 companies, Nathan has spent his career at the intersection of people, process, and technology. He’s helped organizations redefine what it …
…
continue reading
1
Hands-on DevOps with Linux: Build and Deploy DevOps Pipelines Using Linux Commands, Terraform, Docker, Vagrant, and Kubernetes
17:15
17:15
Play later
Play later
Lists
Like
Liked
17:15A practical guide for building and deploying DevOps pipelines using various open-source tools. The content focuses heavily on Linux fundamentals, including managing files, directories, users, and permissions, while also introducing modern DevOps practices. Specific technologies covered are VirtualBox and Vagrant for creating environments, core web …
…
continue reading
1
Episode 415: 8th Anniversary with Russel Treat
25:31
25:31
Play later
Play later
Lists
Like
Liked
25:31This anniversary episode of the Pipeliners Podcast features host Russel Treat reflecting on eight years of the show, highlighting its mission of education through conversation and the breadth of technical topics covered. He discusses the evolution of the show, acknowledges key contributors and sponsors, and offers insights into what may be ahead fo…
…
continue reading
1
Cyber Insurance Explained: What Blue Teams Need to Know Before an Incident
32:54
32:54
Play later
Play later
Lists
Like
Liked
32:54From teaching AP art history to brokering cyber insurance deals. 🎓➡️🛡️ In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Andy Runyan from Yukon to break down everything blue teamers need to know about cyber insurance — before an incident happens. Andy shares his unconventional journey from fourth-generation educator and b…
…
continue reading
1
Tech, Trust, and Teamwork: Lessons from a Local Government Leader
34:33
34:33
Play later
Play later
Lists
Like
Liked
34:33Empowering Communities: The Impact of Excellent Local Government Leadership Join us in this episode of Off the Wire as we interview Glenn Hasteadt, a retired IT director and longtime leader in local government. Glenn shares his insights on the importance of great government leadership, the impact technology has on communities, and the lessons he's …
…
continue reading
1
Play, Curiosity, and the Joy of Math with Dan Finkel
15:56
15:56
Play later
Play later
Lists
Like
Liked
15:56What if math could feel like play? 🎲 In this inspiring episode, mathematician and educator Dan Finkel—founder of Math for Love—joins Vicki Davis, the Cool Cat Teacher, to explore how curiosity, productive struggle, and play can make math more meaningful and fun for every learner. Discover how to start math lessons with questions, why struggle build…
…
continue reading
1
Hands-on Penetration Testing for Web Applications: Run Web Security Testing on Modern Applications Using Nmap, Burp Suite and Wireshark
14:35
14:35
Play later
Play later
Lists
Like
Liked
14:35A comprehensive guide for security professionals and testers, detailing methodologies for identifying and exploiting numerous web application vulnerabilities. It extensively covers topics like authentication flaws, session management issues, access controls, injection attacks (such as SQL and XML injection), and Cross-Site Scripting (XSS), using to…
…
continue reading
1
From Philosophy to Cybersecurity: An Unexpected Path With Christine Smoley
37:39
37:39
Play later
Play later
Lists
Like
Liked
37:39This week we have a captivating conversation with Christine Smoley, as she shares her journey from an academic background in phenomenology to a successful career in cybersecurity. Key topics include networking at DEFCON, the importance of language acquisition and mental models, challenges of building security teams in startups, and her unique inter…
…
continue reading
1
Spies, Lies & Cybercrime--Treason from Inside The FBI
42:56
42:56
Play later
Play later
Lists
Like
Liked
42:56Question? Text our Studio direct. A young undercover FBI operative risks everything to expose America’s most devastating traitor — revealing how Cold-War spycraft evolved into today’s cybercrime economy. The shocking true story of Robert Hanssen — the FBI mole who sold America’s deepest secrets to Russia for over 20 years, leading to the execution …
…
continue reading
1
November 16, 2025 | "AI Workers & Holiday Shopping Tech: Digital Transformation Insights Nov 2025"
3:58
3:58
Play later
Play later
Lists
Like
Liked
3:58Digital Transformation for the week of November 17, 2025 including news from Artificial Intelligence, Cybersecurity, Advanced Communications, and Embracing Digital Transformation.In a bold leap towards the future, a company is set to operate with entirely AI-generated employees, raising important questions about the chaos and ethical considerations…
…
continue reading
1
422. Your Electric Bill is Powering AI Data Centers
22:57
22:57
Play later
Play later
Lists
Like
Liked
22:57Send Bidemi a Text Message! In this episode, host Bidemi Ologunde investigates how ordinary people around the world are unknowingly footing the electricity bill for Big Tech’s booming AI data centers. From hidden charges in your utility bill to billion-dollar subsidies for companies like Google, Meta, Microsoft, OpenAI, and Amazon, this critical ep…
…
continue reading