A regular conversation with those at the convergence of data privacy, data security, data regulation, records, and governance.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The State and Popular Culture
…
continue reading
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Welcome to a podcast that dives deep into the fascinating crossroads of data, AI, privacy, and cybersecurity. Hosted by data and AI expert Kate Carruthers, this series explores the cutting-edge frontiers of our digital world, where data is forging an entirely new economy. Tune in to stay ahead of the curve and uncover the opportunities, challenges, and innovations shaping our future.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Data Hurdles is a podcast that brings the stories of data professionals to life, showcasing the challenges, triumphs, and insights from those shaping the future of data. Hosted by Michael Burke and Chris Detzel, this podcast dives into the real-world experiences of data experts as they navigate topics like data quality, security, AI, data literacy, and machine learning. Each episode features guest data professionals who share their journeys, lessons learned, and the impact of data on industr ...
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
Jen Psaki tackles the biggest issues of the week and features one-on-one interviews with newsmakers.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
…
continue reading
Our latest TIAKI thought leadership to help determined leaders achieve differentiation in the global sports ecosystem. Listen to our expert analysis and bold thinking to help you achieve the extraordinary in sport.
…
continue reading
A podcast on the journey to discovery through data in information security by Bob Rudis & Jay Jacobs
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading

1
Healthcare NOW Radio Podcast Network - Discussions on healthcare including technology, innovation, policy, data security, telehealth and more. Visit HealthcareNOWRadio.com
Healthcare NOW Radio and Podcast Network - Radio and Podcasts for the Healthcare Industry
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
The Rebel Tech podcast, hosted by Zach Whiting and David Dunmoyer, is a product of the Texas Public Policy Foundation that explores technology and innovation, and its implications on everything from culture, public policy discussions, business, to how we live our lives and interact with one another. The Rebel Tech podcast features prominent guests, ranging from lawmakers to entrepreneurs to thought leaders fighting on the side of humanity on the digital frontier.
…
continue reading
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
For those who are interested in the hottest field in a technology world. Whether you are a professional who wants to learn more about privacy, data protection, or cyber law or someone who just finds this fascinating, we have topics for you from data management to cybersecurity to social justice and data ethics and AI. In-depth information on serious privacy topics. This podcast, hosted by Dr. K Royal, Paul Breitbarth and Ralph O'Brien, features open, unscripted discussions with global privac ...
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
…
continue reading
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
…
continue reading
Covering everything from the future of organizational culture to accelerated cloud adoption, in this inaugural podcast series, Splunk thought leaders sit down with Principal Analyst Daniel Newman to discuss the unique intricacies organizations are navigating in an era of rapid digital transformation and how data remains the key solution to thriving in uncertain times.
…
continue reading
Interesting, fascinating, provoking, insightful - or all of the above - GDPR decisions, rulings and other tidbits discussed by two very opinionated people.
…
continue reading
A gumbo of cybersecurity insights about Data Protection, Data Governance, and Data Backup
…
continue reading
The Power of Digital Policy is a podcast that teaches you and your organization how to balance the risks and opportunities that come with operating websites, social media, mobile applications, voice assistants, AI and other channels. Through a monthly focus on individual topics, such as accessibility, cookies, copyrights, social media faux pas, data breaches, and data privacy, you will learn how to develop guardrails to maximize digital opportunity and minimize risk. Whether you work for a s ...
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
Data Center Frontier’s editors are your guide to how next-generation technologies are changing our world, and the critical role the data center industry plays in creating our extraordinary future.
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
An open show powered by community LINUX Unplugged takes the best attributes of open collaboration and turns it into a weekly show about Linux.
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
All things data.
…
continue reading

1
DCIM (Data Center Infrastructure Management) and its Role in Data Center Security
17:25
17:25
Play later
Play later
Lists
Like
Liked
17:25Explore the critical intersection of Data Center Infrastructure Management (DCIM), Common Data Center Security issues and Zero Trust Architecture (ZTA) with a special focus on how our innovative OpenData solution can help. As data centers face increasing security threats and regulatory pressures, understanding how to effectively integrate DCIM into…
…
continue reading

1
VBC Insights: Advancing Post Hospital Recovery Through Value Based Models
26:21
26:21
Play later
Play later
Lists
Like
Liked
26:21As hospitals and health systems continue to evolve in value-based care, optimizing the post-acute recovery process has become a top priority. On this episode Dan is joined by Diane Shifley, Assistant Vice President of Population Health and Post-Acute Services at a major Chicago health system to discuss how robust transitions-in-care programs can dr…
…
continue reading

1
'A huge freaking deal': Psaki sounds alarm on Supreme Court letting DOGE access social security data
41:39
41:39
Play later
Play later
Lists
Like
Liked
41:39Even as the feud between Donald Trump and Elon Musk threatens untold chaos, the Supreme Court ruled in favor of DOGE in granting access to Americans' personal Social Security data. Jen Psaki, Ronan Farrow, Senator Elissa Slotkin, and Rep. Melanie Stansbury discuss the dangers and the level of concern among American voters.…
…
continue reading

1
Kettering data published, Reddit sues Anthropic, North Face breached
7:27
7:27
Play later
Play later
Lists
Like
Liked
7:27Stolen Kettering Health data published Reddit sues Anthropic for scraping North Face website customer accounts breached Huge thanks to our sponsor, Conveyor Let me guess, another security questionnaire just landed in your inbox. Which means all the follow up tasks you don’t have time for are close behind. What are you going to do? Here’s a better q…
…
continue reading

1
Securing Society Through Data Kindness: How Cooperation Becomes Our Best Defense with Aram Sinnreich and Jesse Gilbert
53:36
53:36
Play later
Play later
Lists
Like
Liked
53:36Episode Description: Every device around you is collecting data about you and everyone you interact with. Amazon Echo recordings are being subpoenaed in murder trials. Period tracking apps are being used to prosecute women. Ancestry websites are revealing family secrets. We're participants in the largest social experiment in human history—and we ne…
…
continue reading

1
300: Why Data Classification Might Be Your Biggest Security Risk – Data Management Veteran
24:08
24:08
Play later
Play later
Lists
Like
Liked
24:08Anand Athavale, Data Management veteran joins to explain why separating regulatory data (like PII) from security-sensitive data (like passwords and keys) is mission-critical. Learn how ransomware’s evolution has blurred roles between compliance and security, and why top-down policy, automation, and AI must reshape your data strategy now.…
…
continue reading

1
Securing Desktops and Data from Ransomware Attacks
39:30
39:30
Play later
Play later
Lists
Like
Liked
39:30Ransomware remains one of the most formidable cybersecurity threats facing organizations worldwide. In this episode of the ISACA Podcast, host Chris McGowan speaks with Netwrix endpoint protection expert Jeremy Moskowitz, who explains how ransomware infiltrates and cripples desktop environments. He explains cybercriminals' tactics to exploit social…
…
continue reading

1
Gen Z & Alpha Are Here: Your Data & Security Deficit is Their Monetisation Exit
26:44
26:44
Play later
Play later
Lists
Like
Liked
26:44Send us a text Welcome back to the show! Today we're talking about why understanding and securing the data of Gen Z and Alpha fans is no longer optional for sports organizations – it's crucial for monetization. Fail to prioritize their data privacy and security, and you risk alienating these key demographics and losing out on significant revenue op…
…
continue reading

1
Aside From Text, Images, and Videos, GenAI Can’t Fool Me (Live in Boston)
46:53
46:53
Play later
Play later
Lists
Like
Liked
46:53All links and images can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Andy Ellis, partner, YL Ventures. Joining us is our sponsored guest, Sam Curry, global vp, CISO at Zscaler. This episode was recorded at a Zscaler event in Boston, MA. In this episode: Guardrails for decision making under …
…
continue reading

1
From Cold Leads to Real Connections! Selling with Social Insights
5:29
5:29
Play later
Play later
Lists
Like
Liked
5:29What if you could understand what your customer really cares about—before saying a single word? In this episode, we explore how socialprofiler is changing the game for sales professionals by using AI to unlock public social media interests. Whether you’re pitching real estate, raising capital, or hiring your next key employee, this tool helps you c…
…
continue reading

1
Cybersecurity News: Brute forcing Google accounts, Guardian's Secure Messaging, UNFI cyberattack
8:13
8:13
Play later
Play later
Lists
Like
Liked
8:13Brute forcing phone numbers linked to Google accounts The Guardian launches Secure Messaging service United Natural Foods hit by cyberattack Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. ea…
…
continue reading
Jake Gallen was a rising star in crypto. Then, after what seemed like a routine YouTube interview, his digital world unraveled. His NFTs? Liquidated. His social accounts? Hijacked. It turns out, the hackers didn’t need phishing links or fake job offers. They needed something much simpler: a Zoom invite. Learn about your ad choices: dovetail.prx.org…
…
continue reading

1
OWASP software and data integrity failures (noun) [Word Notes]
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27Please enjoy this encore of Word Notes. Code and data repositories that don't protect against unauthorized changes.By N2K Networks
…
continue reading

1
Fix Identity Sprawl + Optimize Microsoft Entra
11:04
11:04
Play later
Play later
Lists
Like
Liked
11:04Strengthen your security posture in Microsoft Entra by following prioritized Secure Score recommendations. Enforce MFA, block legacy authentication, and apply risk-based Conditional Access policies to reduce exposure from stale accounts and weak authentication methods. Use built-in tools for user, group, and device administration to detect and clea…
…
continue reading

1
Cyber executive order, Neuberger’s infrastructure warning, Mirai botnet warning
8:42
8:42
Play later
Play later
Lists
Like
Liked
8:42Presidential cyber executive order signed Neuberger warns of U.S. infrastructure’s cyberattack weakness Mirai botnet infects TBK DVR devices Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. ea…
…
continue reading

1
Cybersecurity Today: Massive Smart TV Botnets and Major US Cyber Policy Overhaul
12:21
12:21
Play later
Play later
Lists
Like
Liked
12:21In this episode of Cybersecurity Today, host David Shipley delves into alarming developments in the cybersecurity landscape. The FBI has flagged a massive malware campaign named Bad Box 2.0, which has compromised 1 million consumer devices globally, turning them into residential proxies. Additionally, a new variant of the Mirai malware is targeting…
…
continue reading

1
How Companies Sidestep Protections to Spy on You
29:43
29:43
Play later
Play later
Lists
Like
Liked
29:43Episode 228: Meta & Yandex skirt around Android's sandboxing to violate your privacy even further, Apple turned over thousands of push notification data requests, billions of session cookies are for sale, Signal might be rolling out backup subscriptions soon, and more! Welcome to the Surveillance Report - featuring Techlore & The New Oil to keep yo…
…
continue reading
Our terminal apps are loaded, the goals are set, but we're already hitting a few snags. The TUI Challenge begins... Sponsored By: Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Management: 1Password Extended Access Management is a device …
…
continue reading

1
This Just In: HIMSS25 with Matthew Dietz and Normand Champigny
25:58
25:58
Play later
Play later
Lists
Like
Liked
25:58On this episode host Justin Barnes recorded live at HIMSS25 in Las Vegas. Stay tuned for the next few weeks to hear all his guests. This week his guests are Matthew Dietz, Global AI Leader at Cisco, and Normand Champigny, Co-Founder, Managing Partner at Azentys.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Devic…
…
continue reading

1
Healthcare for Humans: The Power of Story and Faith: Islamic Trauma Healing in Practice
54:55
54:55
Play later
Play later
Lists
Like
Liked
54:55Episode 70 The Power of Story and Faith: Islamic Trauma Healing in PracticeOn this episode they dive into the origins, structure, and impact of Islamic Trauma Healing—a community-driven, lay-led mental health intervention designed for Muslim communities, particularly Afghans and Somalis who have experienced significant trauma. Joining host Raj Sund…
…
continue reading

1
Cybersecurity Month in Review: Uncovering Digital and Physical Threats
48:37
48:37
Play later
Play later
Lists
Like
Liked
48:37In this episode of the 'Cybersecurity Today: The Month in Review' show, host Jim welcomes regular guests Laura Payne and David Shipley, along with newcomer Anton Levaja. The trio dives deep into various cybersecurity stories, analyzing trends, threats, and recent incidents. Topics include the intriguing Mystery Leaker exposing cyber criminals, the …
…
continue reading
May News You Can UseDebt, DNA, and a Dose of AIMedical Debt Crisis: U.S. medical debt remains a major issue, contrasting sharply with other countries that barely recognize the concept. COVID Confusion: Vaccine policies in the U.S. have been overly broad, with other countries focusing on vulnerable populations; data is slowly shifting perspectives. …
…
continue reading

1
Health UnaBASHEd: Edward Marx, Founder & CEO the Marx Advisory Group
28:07
28:07
Play later
Play later
Lists
Like
Liked
28:07Host Gil Bashe welcomes Ed Marx, CEO of Marx Advisory. They dive into the intricacies of healthcare digital transformation. Drawing from his extensive experience, Marx discusses the evolution of electronic health records, the rise of telehealth, and the influence of consumerism on healthcare delivery. He emphasizes the importance of emotional intel…
…
continue reading

1
Healthcare IT Today: CMS' Request for Input on Technology to Improve Medicare
28:08
28:08
Play later
Play later
Lists
Like
Liked
28:08Hosts Colin Hung and John Lynn discuss CMS' Request for Input on Technology to Improve Medicare.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthc…
…
continue reading

1
Talking the Walk: Evan Steele, CEO, Rater8 on Practice Reputation Management
25:45
25:45
Play later
Play later
Lists
Like
Liked
25:45On this episode, host Tom Testa sits down with Evan Steele, CEO of rater8 a company that specializes in online reputation management and practice improvement serving thousands of practices nationwide. Evan shares insights on ways AI-powered search is shaking up the patient decision-making process, the evolving role of patient reviews, and why struc…
…
continue reading

1
CIPA Reform Passes Without Retroactive Relief | Cookie Banner and GTM Consent Ruled Unlawful | TikTok Wins Data Delay
12:22
12:22
Play later
Play later
Lists
Like
Liked
12:22Send us a text 📢 Privacy Corner Newsletter: June 6, 2025 🔹 California tweaks CIPA lawsuits but the retroactive fix is gone The Senate passed SB 690 to limit wiretapping claims tied to adtech by aligning CIPA with the CCPA — but removed the retroactive clause, meaning older lawsuits can still proceed. 🔹 German court says 'Accept & Close' banners are…
…
continue reading

1
Week in Review: Senators’ CSRB bid, Deepfakes dodge detection, Microsoft-CrowdStrike collaboration
27:43
27:43
Play later
Play later
Lists
Like
Liked
27:43Link to episode page This week’s Cyber Security Headlines - Week in Review is hosted by Rich Stroffolino with guest Rusty Waldron, chief business security officer, ADP Thanks to our show sponsor, Conveyor Let me guess, another security questionnaire just landed in your inbox. Which means all the follow up tasks you don’t have time for are close beh…
…
continue reading
The Trump memecoin dinner looked like a political stunt. Maybe even a scam. But inside the crypto community, some saw something else: legitimacy. Today, we hear from one of crypto’s most thoughtful defenders. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading

1
Cyber Extortion, Ukraine's Cyber Offensive, and Chrome Trust Shake-up
12:19
12:19
Play later
Play later
Lists
Like
Liked
12:19Cybersecurity Today, hosted by Jim Love, delves into the latest in cyber threats. Cyber criminals have breached 20 organizations via convincing fake IT support calls, targeting Salesforce data for extortion. Ukraine's intelligence claims a significant cyber operation against Russia's aircraft manufacturer, stealing sensitive data and highlighting U…
…
continue reading

1
Musk inadvertently gives away the game in spat with Trump
41:43
41:43
Play later
Play later
Lists
Like
Liked
41:43In the midst of Donald Trump and Elon Musk throwing insults and threats at each other on their respective social media platforms, Musk accused Donald Trump of being ungrateful to Musk for purchasing the election for him, an admission of sorts that his support for Trump was transactional. Jen Psaki takes a closer look.…
…
continue reading

1
Health Stealth Radio: Cyber Insurance for Healthcare Provider Organizations
28:09
28:09
Play later
Play later
Lists
Like
Liked
28:09S2E8: Cyber Insurance for Healthcare Provider OrganizationsGuest host Lisa Gallagher, National Cybersecurity Advisor, CHIME Guest: Dan Bowden, CISO, McLennan Global BusinessTo stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podc…
…
continue reading
Five Good ThingsFive Good Things with Janae Sharp and Megan Antonelli: A rapid-fire segment highlighting positive developments in digital health. Janae and Megan share insights on recent innovations, successful implementations, and emerging trends that are driving progress in healthcare technology.To stream our Station live 24/7 visit www.Healthcar…
…
continue reading

1
Reliving International Data Center Day 2025 with 7x24 Exchange Leaders
29:33
29:33
Play later
Play later
Lists
Like
Liked
29:33As the digital economy accelerates on the back of AI and hyperscale infrastructure, the question of who will build and run tomorrow’s data centers has never been more urgent. Since its inception in 2015, International Data Center Day (IDCD), organized by 7x24 Exchange International, has steadily grown into a global campaign to answer that question—…
…
continue reading
Send us a text On this week of #SeriousPrivacy, Paul Breitbarth, Dr. K Royal, and Ralph O'Brien catch up on recent activity in the world of purveyors, data protection, and cyber law. Powered by TrustArc Seamlessly manage your privacy program, assess risks, and stay up to date on laws across the globe. With TrustArc’s Privacy Studio and Governance S…
…
continue reading

1
AI in Content Management | Opportunities and Challenges
52:56
52:56
Play later
Play later
Lists
Like
Liked
52:56Feeling buried under content chaos? You're not alone. Ravi Singh, President and Chief Product Officer at Brightspot, joins us to break down how IT leaders can regain control, cut through AI-generated noise, and build scalable, secure content systems. He shares the secrets behind Brightspot’s success with some of the world’s biggest brands, explains…
…
continue reading

1
Russian bomber maker popped, vishing targets Salesforce, MS helps out governments
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28Ukraine claims cyberattack on Russian bomber maker Vishing campaign targets Salesforce Microsoft lends a hand to European governments Huge thanks to our sponsor, Conveyor Ever wish you had a teammate that could handle the most annoying parts of customer security reviews? You know, chasing down SMEs for answers, updating systems, coordinating across…
…
continue reading

1
Background Check or Invasion of Privacy? Where Do You Draw the Line?
7:01
7:01
Play later
Play later
Lists
Like
Liked
7:01In this episode of ask socialprofiler, we explore the fine line between awareness and intrusion when it comes to online screening. From job interviews to dating to parenting—how much should we rely on someone’s digital footprint? Is it responsible behavior or crossing a boundary? You’ll hear real stories and opinions on how people feel about being …
…
continue reading

1
Musk melts down over budget bill; Republicans in turmoil over their own bill
42:15
42:15
Play later
Play later
Lists
Like
Liked
42:15Jen Psaki reports on the tantrum Elon Musk is throwing over the Republican budget as his business interests are not well represented, and Republican support for their own bill seems to be splintering as details emerge about what the bill contains.By NBC News
…
continue reading
This week, our hosts Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from a listener on class action settlements: they’re a class action attorney …
…
continue reading

1
55. From Breached to Bulletproof: How Smart Businesses Stay Ahead of Cyber Threats with Michael Ritsema
37:20
37:20
Play later
Play later
Lists
Like
Liked
37:20What would happen if your entire business was encrypted overnight? No files. No access. No plan. In this episode of UnHacked, we sit down with Michael Ritsema—cybersecurity strategist and President of i3 Business Solutions—who’s helped multiple companies survive full-scale breaches. Together with co-hosts Bryan Lachapelle and Mario Zake, we unpack …
…
continue reading
Q&A227: Is RethinkDNS a good tool for easy traffic analysis? What are our thoughts on governmenet SSO services, like Australia's MyGov? What resources do we use to threat model? Do companies still sell phone location data, and how can users opt out? Are there any lessons to be learned from the way different governments treat privacy? Join our next …
…
continue reading
Meet Chris Brandt, the new host of IT Visionaries. In this special episode, outgoing host Albert Chou passes the mic to Chris—a seasoned Technology Strategist with a passion for connecting bold ideas to real business outcomes. Chris’s career spans startups to global enterprises, from building an EMP-shielded data center deep underground to deployin…
…
continue reading

1
Meta, Yandex take heat on browsing identifiers, Acreed malware makes gains, HPE warns of critical auth bypass
7:52
7:52
Play later
Play later
Lists
Like
Liked
7:52Meta and Yandex are de-anonymizing Android users’ web browsing identifiers LummaC2 fractures as Acreed malware becomes top dog Hewlett Packard Enterprise warns of critical StoreOnce auth bypass Huge thanks to our sponsor, Conveyor Tired of herding cats to complete customer security questionnaires? Your team probably spends hours daily juggling the …
…
continue reading

1
Emergency Patches, Ransomware Exposes, and Rising QR Code Scams
10:51
10:51
Play later
Play later
Lists
Like
Liked
10:51In this episode of Cybersecurity Today, host Jim Love discusses the latest urgent security updates and cyber threats. Google has released an emergency Chrome patch to fix a high-severity zero-day vulnerability, while Microsoft issued an emergency patch to resolve Windows 11 boot failures caused by their May 2025 update. A mysterious whistleblower k…
…
continue reading

1
Cyberrisk Quantification: Strengthening Financial Resilience
35:33
35:33
Play later
Play later
Lists
Like
Liked
35:33In this episode, ISACA's Lisa Cook engages with Yakir Golan, Executive Officer (CEO) and Co-Founder of Kovrr, to explore the critical role of Cyberrisk Quantification (CRQ) in enhancing organizational financial resilience. They discuss how CRQ solutions provide objective assessments of an organization's cybersecurity posture, enabling leaders to ma…
…
continue reading