Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Digital Security Podcasts
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth, Bailey Harmon, and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Great security solution are designed from the ground up.. Secured by Design is a podcast where Santosh shares practical insights, frameworks, and perspectives on identity security and other aspects of cybersecurity. Each episode breaks down complex concepts into actionable ideas for professionals protecting digital identities, designing secure systems, and leading security initiatives. Because true security is built and not bolted on...
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
Best 10-minute, daily tech podcast on emerging technologies, hundreds of Silicon Valley CEOs, Influencers and Celebrities. Hosted by technology executive and creator of Coruzant Technologies.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
In conversation with leaders and experts, McKinsey's At the Edge podcast demystifies cutting-edge technologies and shares strategies on how companies can capture big opportunities.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
Our award-winning podcast gives you practical advice from experts on systems, communications, content and design. Whether you’re using digital signage, or just considering it, we help you communicate better.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
The MERICS China Podcast, brought to you by the Mercator Institute for China Studies, a show that analyses current affairs in China and the latest developments in EU-China relations.
…
continue reading
Conversations at the crossroads of data, AI, governance, cybersecurity, and digital transformation. Join Kate Carruthers as she dives into the world of data, AI, governance, cybersecurity, and digital transformation. Each episode explores how technology is changing business, society, and everyday life. From protecting privacy to powering innovation, this podcast breaks down the trends and ideas shaping the future of our digital world - all in clear, engaging conversations you’ll actually enj ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Star Link emphasizes in providing corporate organizations with all types of biometric attendance system & access control system and all most all types of softwares to speed up HRs, Admin & Top Most Management with smooth an effective workflow.
…
continue reading
Welcome to the Ctrl-Alt-Secure podcast, your guide to navigating the ever-changing landscape of cybersecurity. Join us as we delve into the latest trends, threats, and innovations shaping the infosec space.
…
continue reading
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what's new and what's next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
…
continue reading
Dr. Darren Pulsipher, Chief Enterprise Architect for Public Sector, author and professor, investigates effective change leveraging people, process, and technology. Which digital trends are a flash in the pan—and which will form the foundations of lasting change? With in-depth discussion and expert interviews, Embracing Digital Transformation finds the signal in the noise of the digital revolution. People Workers are at the heart of many of today’s biggest digital transformation projects. Lea ...
…
continue reading
Russ Branzell, President & CEO of the College of Healthcare Information Management Executives (CHIME), interviews leaders in Digital Health from around the world. These thought leaders share their knowledge, challenges, best practices, and ideas for helping to transform health and care on a global level.
…
continue reading
Digital certificate industry veterans Tim Callan and Jason Soroko explore the issues surrounding digital identity, PKI, and cryptographic connections in today's dynamic and evolving computing world. Best practices in digital certificates are continually under pressure from technology trends, new laws and regulations, cryptographic advances, and the evolution of our computing architectures to be more virtual, agile, ubiquitous, and cloud-based. Jason and Tim (and the occasional guest subject ...
…
continue reading
This show is for female entrepreneurs and health and wellness businesses to feel less overwhelmed about their digital marketing and SEO marketing for their online business. Cinthia talks to various experts about how to best approach online marketing, Google Analytics and SEO to be successful, while still staying sane.
…
continue reading
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
The Power of Digital Policy is a podcast that teaches you and your organization how to balance the risks and opportunities that come with operating websites, social media, mobile applications, voice assistants, AI and other channels. Through a monthly focus on individual topics, such as accessibility, cookies, copyrights, social media faux pas, data breaches, and data privacy, you will learn how to develop guardrails to maximize digital opportunity and minimize risk. Whether you work for a s ...
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Techlore Surveillance Report is your weekly deep-dive into the privacy and security news that matters for your digital freedom. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode cuts through the noise to bring you carefully selected stories with the context, analysis, and historical perspective you need to truly understand what's happening to protect yourself (and others!) in the digital space. Topics covered include: • Privacy tool updates and v ...
…
continue reading
1
Securing the AI Era: Joshua Scott on Automation, Risk, and the Future of Cyber Defense | Ep 1159
9:08
9:08
Play later
Play later
Lists
Like
Liked
9:08In this episode of The Digital Executive, host Brian Thomas welcomes Joshua Scott, Vice President of Security at Hydrolix and a veteran with nearly 30 years of experience turning complex security risks into clear business value. Josh shares how Hydrolix is redefining what’s possible with massive-scale log data—processing everything from terabytes t…
…
continue reading
In today’s competitive world, profitability isn’t just about higher sales or cutting costs — it’s about operational intelligence. When inefficiencies slowly erode productivity, technology becomes the most powerful lever of profit.By Biometric Attendance & Access Control Solution
…
continue reading
1
Human behaviour, digital twins and resilient cybersecurity with Prof Ganna Pogrebna
42:54
42:54
Play later
Play later
Lists
Like
Liked
42:54In this episode of the Technology & Security podcast, host Dr. Miah Hammond-Errey is joined by Professor Ganna Pogrebna. They explore the intersections of behavioural data science, AI, cybersecurity, and technology adoption. The discussion covers urban-rural technology divides and the dilemmas faced by small businesses using "off the shelf" AI tool…
…
continue reading
1
Microsoft Digital Defense Report 2025
1:04:15
1:04:15
Play later
Play later
Lists
Like
Liked
1:04:15Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss Microsoft's Digital Defense Report for 2025. The conversation delves into the critical issues surrounding identity attacks, particularly focusing on the vulnerabilities associated with weak passwords. Andy highlights the prevalence of password spraying in i…
…
continue reading
1
So You Want to Be a CISO? With vCISO and Security Justice Alum Chris Clymer
31:09
31:09
Play later
Play later
Lists
Like
Liked
31:09In this special episode of the Shared Security Podcast, host Tom Eston reunites with former co-host and experienced fractional CISO, Chris Clymer. They reminisce about their early podcasting days and discuss the evolving role of a Chief Information Security Officer (CISO). The conversation covers the responsibilities, challenges, and skills require…
…
continue reading
1
Biorobotics & Neuralink: How Tech Is Rewiring the Human Body
9:30
9:30
Play later
Play later
Lists
Like
Liked
9:30In this episode of Darnley’s Cyber Café, we dive into the fascinating, and slightly unsettling, world of biorobotics, where human biology meets advanced robotics and neural technology. From groundbreaking innovations like Neuralink, next-gen prosthetics, and brain-computer interfaces, to the hidden cybersecurity risks of merging technology directly…
…
continue reading
1
AI-Native CRM: Maksim Ovsyannikov on the Future of Precision Selling | Ep 1158
18:44
18:44
Play later
Play later
Lists
Like
Liked
18:44In this episode of The Digital Executive, host Brian Thomas sits down with Maksim Ovsyannikov, a veteran enterprise product leader with over 25 years of experience shaping productivity solutions across supply chain, HR, marketing automation, customer success, and CRM. Now leading product and design at SugarCRM, Maksim shares how his diverse backgro…
…
continue reading
1
Former Deputy DNI Sue Gordon: ‘it is conceivable that the world order has already been broken’
26:16
26:16
Play later
Play later
Lists
Like
Liked
26:16Washington is trimming budgets… and bleeding digital expertise. So what happens when national security is run by agencies living in the past? Sue Gordon, former Principal Deputy Director of National Intelligence, helps us break it down. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading
1
Piet Buyck on Rethinking Supply Chain AI | Ep 1157
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25In this episode of The Digital Executive, host Brian Thomas welcomes Piet Buyck, global technology executive, AI strategist, and author of AI Compass for SC Leaders. With more than 30 years leading innovative IT solutions, Piet is on a mission to make AI-driven planning easy, accessible, and human-centered. Piet introduces the concept of the AI Com…
…
continue reading
1
SEO Case Study with Marci Buttars / ep349
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37In this episode, Cinthia sits down with her client Marcy, the creator behind the food blog Tidbits, to talk about what it really looks like to grow your SEO without losing your personality or joy in the process. Full episode shownotes here: https://digitalbloomiq.com/pod/marci-buttars/ Get email updates on all podcast episode (+ SEO tips, behind th…
…
continue reading
In this episode of Unspoken Security, host AJ Nash sits down with Charlotte Guiney, Cyber Threat Intelligence Manager at Toyota Financial Services. They explore what it takes to build threat intelligence programs that work for both security teams and the wider business. Charlotte cuts through the noise, stressing that buy-in is step one—and that it…
…
continue reading
Please enjoy this encore of Caveat. This week, we are joined by Michele Kellerman, Cybersecurity Engineer for Air and Missile Defense at Johns Hopkins University Applied Physics Lab discussing Women's health apps and the legal grey zone that they create with HIPAA. Ben has the story of the potential sale of TikTok to U.S. investors. Dave's got …
…
continue reading
1
Dr. Hany Demian on Regenerative Medicine, AI Diagnostics & Ending Chronic Pain | Ep 1156
15:06
15:06
Play later
Play later
Lists
Like
Liked
15:06In this episode of The Digital Executive, host Brian Thomas sits down with Dr. Hany Demian, physician innovator, regenerative medicine pioneer, and CEO of the Biop Spine Institute. With over 20 years of experience treating chronic pain, Dr. Demian has shifted away from traditional pain management toward a groundbreaking model that blends AI-driven …
…
continue reading
1
4. Data Security. Locked and Loaded. Using security tools you have.
39:48
39:48
Play later
Play later
Lists
Like
Liked
39:48Welcome!...to 'Getting to Grips with Data Security' our podcast for anyone interested in learning more about how to 'beat the hackers' using the best types of information security controls. This new 5 part series covers all aspects of data security for businesses where we discuss: Ep 1: Strategy; Ep 2: Cloud Controls; Ep 3: People Risk; Ep 4: Using…
…
continue reading
1
Microsoft's Rare Confession: Windows AI Could Leak Your Data
35:54
35:54
Play later
Play later
Lists
Like
Liked
35:54This week's Surveillance Report covers Microsoft's AI Disaster getting worse on multiple levels as well as Google's AI, Malware is stealing E2EE messages from people all around the world, and updates to Chat Control & other EU regulations, and more! Support Techlore: https://techlore.tech/support Timestamps Sources 00:00 Welcome to Surveillance Rep…
…
continue reading
1
The Invisible Workforce: Understanding Non-Human Identities
16:22
16:22
Play later
Play later
Lists
Like
Liked
16:22Summary In this episode of Secured by Design, we discuss the growing prevalence of non-human identities (NHIs) in organisations, which outnumber human identities significantly. We highlight the security risks associated with NHIs, including their lack of oversight and the potential for exploitation by attackers. The conversation emphasises the need…
…
continue reading
1
FortiWeb Zero-Day: Silent Patch and Firewall Wake-Up Call 🔥
6:36
6:36
Play later
Play later
Lists
Like
Liked
6:36Got a question or comment? Message us here! This week’s #SOCBrief dives into the FortiWeb zero-day that’s letting attackers create admin accounts with a single unauthenticated HTTP request. With exploitation spiking and Fortinet pushing out a quiet fix, SOC teams are under pressure to lock down configs, audit firewalls, and patch fast. We break dow…
…
continue reading
1
The Bad Apple Latte: How One Insider Nearly Brewed a Cyber Disaster
11:17
11:17
Play later
Play later
Lists
Like
Liked
11:17In this episode of Darnley’s Cyber Café, we dive into the real story behind CrowdStrike’s recent insider scandal, and what it teaches us about the hidden dangers brewing inside modern companies. We break down how a “bad apple” employee allegedly leaked internal information to a notorious hacking collective, why insider threats are so hard to detect…
…
continue reading
1
Scaling Agentic AI with Chirag Agrawal | Ep 1155
15:39
15:39
Play later
Play later
Lists
Like
Liked
15:39
…
continue reading
1
Christmas Gifts for SysAdmins with Joey Snow and Rick Claus
36:57
36:57
Play later
Play later
Lists
Like
Liked
36:57The seasonal gift show is back - Joey Snow and Rick Claus bring their lists of great gifts for sysadmins. You know they're impossible to buy for, so we are making it easier for you with a range of prices and seriousness for your favorite sysadmin. Useful gadgets, upgrades to older devices, and some fun stuff that reminds the sysadmins in your life …
…
continue reading
1
A Practical Look at Incident Handling: How a Sunday Night Bug Bounty Email Triggered a Full Investigation | A Screenly Brand Spotlight Conversation with Co-founder of Screenly, Viktor Petersson
17:48
17:48
Play later
Play later
Lists
Like
Liked
17:48This episode focuses on a security incident that prompts an honest discussion about transparency, preparedness, and the importance of strong processes. Sean Martin speaks with Viktor Petersson, Founder and CEO of Screenly, who shares how his team approaches digital signage security and how a recent alert from their bug bounty program helped validat…
…
continue reading
1
Inside the Economics That Shape Modern Cybersecurity Innovations: How the Cybersecurity Startup Engine Really Works | A Conversation with Investor and Author, Ross Haleliuk | Redefining CyberSecurity with ...
47:10
47:10
Play later
Play later
Lists
Like
Liked
47:10⬥EPISODE NOTES⬥ Understanding the Startup Engine Behind Cybersecurity This episode brings Sean Martin together with Ross Haleliuk, author, investor, product leader, and creator of Venture Insecurity, for a candid look at the forces shaping cybersecurity startups today. Ross shares how his decade of product leadership and long involvement in the sec…
…
continue reading
Welcome!...to 'Getting to Grips with Data Security' our podcast for anyone interested in learning more about how to 'beat the hackers' using the best types of information security controls. This new 5 part series covers all aspects of data security for businesses where we discuss: Ep 1: Strategy; Ep 2: Cloud Controls; Ep 3: People Risk; Ep 4: Using…
…
continue reading
Got a question or comment? Message us here! We’re back with the Hacker Holiday Gift Guide, and this year’s lineup is stacked with RF gadgets, Wi-Fi tools, red-team essentials, and quirky cyber gifts Tanner swears by. Whether you’re shopping for a pentester, a tinkerer, or someone who just loves breaking things (legally), these picks won’t miss. Get…
…
continue reading
1
Avoid Black Friday scams and shop safely online with Simon Miller | BLACK FRIDAY HOLIDAY SCAMS
1:03:47
1:03:47
Play later
Play later
Lists
Like
Liked
1:03:47Black Friday season is upon us! 🛍️ This week, we’re joined by Simon Miller from Cifas, the UK’s leading fraud prevention service, to unpack the latest online scams. He shares essential tips to help you stay safe online and protect your hard-earned cash while shopping online this holiday season. 💳🔒 In Watchtower Weekly, we dive into why weak passwor…
…
continue reading
1
#308 How Digital Transformers Win: Louisa Loran on Culture, AI
31:32
31:32
Play later
Play later
Lists
Like
Liked
31:32Curious about how to navigate the waves of digital transformation? Join our host, Doctor Darren, as he engages with Louisa Lora, a seasoned leader with diverse expertise spanning continents and industries. Together, they dive into the essential strategies business leaders must embrace to ensure sustainable growth amid rapid technological change, in…
…
continue reading
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the major announcements from Microsoft Ignite, focusing on the introduction of Security Copilot for Microsoft 365 E5 customers, innovations in identity management through Entra, and the integration of Defender for Cloud with GitHub. They also explore the new capabilit…
…
continue reading
1
Digital Signage for Hybrid Work: Content Ideas to Connect Employees
38:34
38:34
Play later
Play later
Lists
Like
Liked
38:34EPISODE 180 | Guest: Debbie DeWitt, marketing communications manager for Visix Hybrid work presents unique challenges, with communication being the biggest hurdle. This episode dives into how digital signage systems are more relevant than ever for keeping a dispersed workforce connected and engaged. The discussion focuses less on the technology its…
…
continue reading
We tend to picture cyberattacks as distant battles—state hackers, big targets, glowing maps of global chaos. But often, the frontlines are more local: a water plant, a 911 system, the power lines outside your window. In this CyberMonday crossover with WAMU’s 1A, we examine a small-town breach, the fragility of our digital infrastructure—and what it…
…
continue reading
1
Illuminating Leadership: Jack Griffin on Storytelling, Humility & Transformative Communication | Ep 1154
11:18
11:18
Play later
Play later
Lists
Like
Liked
11:18
…
continue reading
1
S36 Ep12: Steve Durbin - Cyber Governance in Transition: What Boards Should Do Next
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20In today's episode, Steve sits down with journalist Nick Witchell for a conversation focused on what business leaders can learn from this year's major cyber attacks and the recent AWS outage. The two also discuss cyber regulations and the challenge of operating global enterprise during significant geopolitical turmoil. Key Takeaways: Boards and sen…
…
continue reading
The latest Big Picture reports are out and cover a wide range of topics from financial markets to supply chains and onward to technology and AI. Two of the authors, Lindsey Hall and Chris Rogers, join host Eric Hanselman to talk about sustainability, supply chains and AI. These are tightly interwoven and their dependencies spill out into geopolitic…
…
continue reading
As AI innovation escalates, it’s predicted the demand for an uninterruptible power supply will increase dramatically. Crusoe, a company specializing in AI infrastructure, uses stranded and renewable energy sources to power facilities while cutting the time to market for new sites by more than half using modular components. On this episode of the At…
…
continue reading
1
2. Data Security. Head in the Clouds. (And hoping it's safe)
41:01
41:01
Play later
Play later
Lists
Like
Liked
41:01Welcome!...to 'Getting to Grips with Data Security' our podcast for anyone interested in learning more about how to 'beat the hackers' using the best types of information security controls. This new 5 part series covers all aspects of data security for businesses where we discuss: Ep 1: Strategy; Ep 2: Cloud Controls; Ep 3: People Risk; Ep 4: Using…
…
continue reading
1
80% Lie on Dating Apps — Here’s How to Know the Truth
6:49
6:49
Play later
Play later
Lists
Like
Liked
6:49They said they love hiking, jazz, and meditation—but their socials say otherwise. In a world where 80% of dating profiles contain lies or omissions, how can you know who you’re really talking to? In this episode of Ask Socialprofiler, Tony and Dave unpack the truth about online dating in 2025. From fake identities to billion-dollar scams, they show…
…
continue reading
1
Jesse Lipson on Reinventing Relationship Marketing for Small Businesses |Ep 1153
11:23
11:23
Play later
Play later
Lists
Like
Liked
11:23In this episode of The Digital Executive, host Brian Thomas sits down with Jesse Lipson, founder and CEO of Levitate, a relationship marketing platform helping small businesses build genuine, human connections at scale. A seasoned entrepreneur, Jesse previously founded ShareFile, growing it to millions of users before its acquisition by Citrix, and…
…
continue reading
1
Decentralizing Trust: Mike Miglio on Reinventing Insurance for the DeFi Era | Ep 1152
13:48
13:48
Play later
Play later
Lists
Like
Liked
13:48In this episode of The Digital Executive, host Brian Thomas welcomes Mike Miglio, CEO and founder of DEIN, the decentralized marketplace transforming how risk and insurance function across the DeFi ecosystem. With a deep history in crypto law, blockchain protocols, and decentralized innovation, Mike brings firsthand insight into why insurance—at it…
…
continue reading
1
AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage
18:12
18:12
Play later
Play later
Lists
Like
Liked
18:12In this episode, we discuss the first reported AI-driven cyber espionage campaign, as disclosed by Anthropic. In September 2025, a state-sponsored Chinese actor manipulated the Claude Code tool to target 30 global organizations. We explain how the attack was executed, why it matters, and its implications for cybersecurity. Join the conversation as …
…
continue reading
Jason explores the role cryptography and trust systems play in the command and control of groups of autonomous drone systems.By Tim Callan and Jason Soroko
…
continue reading
1
Reinventing Recruiting: David Windley on AI Agents, Human Judgment, and Future of Talent | Ep 1151
12:34
12:34
Play later
Play later
Lists
Like
Liked
12:34In this episode of The Digital Executive, host Brian Thomas sits down with David Windley, CEO and Executive Chairman of HootRecruit, the AI-powered talent sourcing platform reshaping how companies find and engage top talent. With a distinguished HR leadership background at Yahoo and Microsoft, David brings decades of expertise to his mission: trans…
…
continue reading
1
Season 2 E12: Phishing and Ransomware: Navigating Modern Threats | Red Sentry ft Bennet Hammer
19:12
19:12
Play later
Play later
Lists
Like
Liked
19:12In this episode of Ctrl-Alt-Secure, Valentina Flores sits down with Dr. Bennett Hammer, founder and president of Hammer IT, for a deep dive into one of today’s most common yet misunderstood risks: email security. They break down the evolving threat landscape, from the rise of phishing and ransomware to the ways AI is now being used by both attacker…
…
continue reading
In the electric chaos of DEF CON—where dial tones, solder smoke, and hacker legends collide—one figure stands out: John Aff, aka PANDA. A veteran in the hacker community, he moves effortlessly between challenge design, telephony wizardry, mesh networking experiments, and the culture that surrounds it all. Behind the reputation is a journey that sta…
…
continue reading
1
How to stand out as an E-commerce brand with Cassandra Caruso / ep348
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12In this episode, Cinthia sits down with Cassandra Caruso, intuitive brand mentor and founder of Wild Dreams Co., to explore what it really takes for e-commerce brands to stand out in a crowded market. Together, they dive into the power of storytelling, brand energy, and integrity and how heart-centered entrepreneurs can turn their personal stories …
…
continue reading
Milo Comerford has been studying online extremism for more than a decade. He’s watched ideologies rise and fall, platforms shift, and tactics mutate. Now, as kids fall into violent online communities with no ideology at all, Milo says we’re overdue for a new playbook. Today: the solutions he thinks might actually work. Learn about your ad choices: …
…
continue reading