Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

El Quick Podcasts

show episodes
 
Artwork

1
Word Alive Lawton

Pastor Danny El Kouri

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Now you can listen to WAC messages at anytime from anywhere! The WAC podcast is your quick, easy and free way to hear the latest sermons from Pastor Danny El Kouri, Senior Pastor of Word Alive Church in Lawton, OK.
  continue reading
 
Artwork

1
The Forum with Becky Quick

The Economic Club of New York

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
For over 115 years, the Economic Club of New York has stood as the premier forum for critical conversations among the world’s brightest leaders. Its podium has served as a transformative thought platform, shaping the world across domains from business and finance to policy, geopolitics, technology, society, and beyond. For the first time in history, the doors are open for all to experience these conversations guided by our host, CNBC anchor Becky Quick. To learn more about the Club and membe ...
  continue reading
 
Artwork

1
Meinl Radio

Meinl Cymbals

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Chris Brewer and Norbert Saemann host Meinl Radio and interviews today's top drummers. Hear artists discuss album cycles, motivational speaking, tour life and much more.
  continue reading
 
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
  continue reading
 
Modern day Black Sheep have become the biggest influencers of the 21st century, yet, have not been given the proper stage to reach the masses as they should. This channel will continuously reach out to the most unique people of our era, from those leaving the quietest footprints on earth, to those making the loudest impacts on our planet, and will help expose them to the world, through their very own words with no filtration. Hence why every podcast will truly be "The Black Sheep Perspective"
  continue reading
 
En un mundo cada vez más digitalizado, la tecnología puede ser tanto tu mejor aliada como tu mayor dolor de cabeza. "Tecno-Vida" es el podcast que transforma lo complejo en sencillo, ofreciéndote consejos prácticos y accesibles para aprovechar al máximo las herramientas digitales en tu día a día. Cada episodio está diseñado para brindarte soluciones reales a problemas cotidianos: desde optimizar tu productividad y organizar tu vida digital, hasta crear un hogar inteligente sin complicaciones ...
  continue reading
 
Artwork
 
A network sprawled quite literally... across the globe. Follow and subscribe for the latest in the network. Featuring the latest in controversial topics, politics, religion, sports, fitness, spirituality, current events, and anything worth talking about.
  continue reading
 
Artwork

1
The One Recipe

American Public Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
From the team that brought you The Splendid Table at APM Studios, The One Recipe is a pod devoted to that one recipe you keep in your back pocket. The one you send to friends, make for your mom, the one you entirely depend on because you know it’s going to work. We’re here to help you build up an arsenal of fast, simple and crowd-pleasing recipes, one episode at a time. Whether you’re cooking in a tiny kitchen and eating for one, or cooking breakfast, lunch, dinner and brunch during a weeklo ...
  continue reading
 
In 2016, Omar Samra called Omar Nour with a life-changing idea: “How about we row across the Atlantic Ocean?” Within a matter of hours, the two were registered to compete in the world’s toughest race: a 3,000-mile unsupported row across the mighty Atlantic Ocean, in a seven-meter rowing boat. However, about nine days into their journey, when their boat capsized in a severe storm and the life raft didn't open, they came face-to-face with death. Inspired by the documentary, Beyond the Raging S ...
  continue reading
 
Body Land is a collection of guided meditations that are accessible, experiential, and imaginative. These creative visualizations are informed by Eastern Medicine, Ecofeminism, Surrealist Art, and Somatic Therapies for the treatment of trauma. These creative visualizations help you feel more grounded, relaxed, and restored, and shift to a more positive frame of mind. Listen when you are quiet and still — and follow along in your body. Creator and host Liz Asch Greenhill is an acupuncturist, ...
  continue reading
 
Loading …
show series
 
The integration of smart medical devices (IoMT) offers transformative healthcare benefits but simultaneously exposes patients to severe cyber risks, including device manipulation, data breaches, and service disruptions that directly threaten safety and erode trust. This episode critically examines the ethical and legal challenges surrounding inform…
  continue reading
 
En 2025, le Canada est confronté à un paysage numérique de plus en plus complexe et menaçant, marqué par l'espionnage sophistiqué d'acteurs étatiques comme la Chine et la Russie, un écosystème de cybercriminalité mondial résilient et l'amplification des capacités de l'intelligence artificielle. Dans ce contexte, les législateurs canadiens s'adapten…
  continue reading
 
This podcast dives into Canada's rapidly evolving digital landscape in 2025, exploring the intensification of cyber threats from state-sponsored actors like the PRC and Russia, and sophisticated cybercriminals, all amplified by artificial intelligence. We examine the legislative battlefield, from the modernization of CSIS powers and the new Nationa…
  continue reading
 
Mexico's new Federal Law on the Protection of Personal Data Held by Private Parties (LFPDPPP) and the dissolution of its independent data authority mark a pivotal shift, introducing stricter rules and centralizing enforcement. This episode explores the profound implications for businesses, from expanded data definitions and AI accountability to the…
  continue reading
 
La nueva Ley Federal de Protección de Datos Personales en Posesión de los Particulares (LFPDPPP), efectiva desde marzo de 2025, y la disolución de su autoridad de datos autónoma, el INAI, marcan un giro fundamental que introduce reglas más estrictas y centraliza la aplicación de la ley. Este episodio explora las profundas implicaciones para las emp…
  continue reading
 
Genomic data, our very biological blueprint, is rapidly becoming a currency of innovation and power, holding the foundation of health and personalized medicine. However, this sensitive information is also transforming into our biggest security risk, with documented vulnerabilities ranging from synthetic DNA-encoded malware to AI-driven genome manip…
  continue reading
 
- The text is a podcast episode by Andrés Díaz about how to choose a robot vacuum using quick at-home tests and practical decision criteria.- Goal: simplify a technical decision, save time, and help listeners get a reliable cleaning assistant for family, work, or rest.- Key problem areas: pets and hair on carpets/hard floors, small apartments, and …
  continue reading
 
This episode delves into the Indiana Consumer Data Protection Act (ICDPA), also known as Senate Bill 5, a landmark privacy law signed in May 2023 and effective January 1, 2026. We explore how the ICDPA grants Indiana consumers expanded rights over their personal data, including the right to access, correct, delete, and opt-out of data sales and tar…
  continue reading
 
Recent events highlight a critical vulnerability in our digital world, from crippling ransomware attacks on vital infrastructure to massive data breaches exposing sensitive personal information. This podcast explores how Texas is responding, detailing major incidents like the Colonial Pipeline attack and PowerSchool data breach, alongside the state…
  continue reading
 
In the midst of the 2020 pandemic, as the world came to a standstill, Apocalypse BBQ emerged as a phoenix from the ashes. ​Amidst the challenges faced by countless individuals due to the global shutdown, one man, Jeffrey Budnechky, saw an opportunity for greatness. With unwavering determination, he transformed adversity into triumph. Armed with not…
  continue reading
 
Southeast Asia stands at a pivotal point in its digital transformation, facing an intricate web of escalating cyber threats, geopolitical pressures, and fragmented cybersecurity landscapes. This podcast explores the critical challenges hindering the region's digital resilience, from sophisticated cyberattacks and supply chain vulnerabilities to inc…
  continue reading
 
Explore how the rapidly digitalizing Gulf Cooperation Council (GCC) faces an escalating array of sophisticated cyber threats, from state-sponsored attacks and hacktivism to AI-enabled weaponization. We delve into the comprehensive national strategies, significant investments, and capacity-building initiatives, like those in Bahrain and Saudi Arabia…
  continue reading
 
In this episode, we unpack the critical compliance deadlines for U.S. state privacy and AI laws, spanning from immediate requirements in 2025 to strategic planning for 2028 and beyond. We explore how the phasing out of cure periods, the rise of Universal Opt-Out Mechanisms, and the complex landscape of AI governance are reshaping business operation…
  continue reading
 
This episode explores how identity-first infrastructure and dynamic secrets are fundamentally reshaping the landscape of cybersecurity. We discuss how moving beyond static credentials to granting cryptographically verifiable identities to non-human entities (NHIs) and leveraging temporary, automatically managed access tokens dramatically enhances s…
  continue reading
 
Identity sprawl, often called secrets sprawl, describes the unmanaged proliferation of digital credentials like API keys and tokens across an organization's IT environment. This widespread distribution creates a massive and expanded attack surface, as non-human identities (NHIs) often possess overprivileged access and their secrets are frequently e…
  continue reading
 
In 2025, the rapid evolution of AI, from sophisticated agents and coding assistants to widespread no-code tools, is inadvertently fueling an unprecedented surge in secrets sprawl across enterprises. This episode delves into how human error, "shadow AI" usage, and interconnected agent-to-agent communications are exposing critical credentials in ever…
  continue reading
 
This podcast explores the complex landscape where Washington State's leading tech industry meets evolving data privacy laws and city policy challenges. We unpack how major players like Amazon navigate stringent regulations such as the My Health My Data Act, implement robust cloud governance and cybersecurity best practices, and respond to demands f…
  continue reading
 
Dive deep into California's cutting-edge privacy and cybersecurity landscape, from the foundational CCPA and CPRA to the intricate new regulations governing Automated Decision-Making Technology (ADMT) and AI. We'll explore how businesses must navigate evolving compliance requirements, consumer rights, and state-led initiatives like Cal-Secure to pr…
  continue reading
 
North Carolina is confronting an unprecedented surge in cyberattacks, with thousands of incidents impacting millions of residents and vital sectors annually. From pervasive ransomware and sophisticated phishing campaigns targeting healthcare, education, and government, to data breaches affecting major tech hubs like the Research Triangle, the digit…
  continue reading
 
Oregon's Digital Frontier explores the intensifying cyber threats facing Oregon businesses and residents, from frequent cyberattacks and data breaches to complex data privacy concerns. We delve into the state's comprehensive response, examining the impact of the Oregon Consumer Privacy Act (OCPA) and Oregon Consumer Information Protection Act (OCIP…
  continue reading
 
This episode delves into the Virginia Consumer Data Protection Act (VCDPA), which took effect on January 1, 2023, exploring how its comprehensive framework for data privacy is shaping the state's vibrant tech sector. We'll examine the specific rights granted to consumers, such as the ability to opt-out of targeted advertising and data sales, and th…
  continue reading
 
Artificial intelligence is rapidly transforming New Zealand's digital landscape, offering new ways to process data, create content, and automate tasks, with services like ChatGPT gaining rapid user adoption. However, this rapid adoption raises significant privacy and cybersecurity concerns, including the malicious use of AI for fraud and deepfake i…
  continue reading
 
This episode delves into Hungary's evolving digital landscape, focusing on its robust cybersecurity framework, the challenges and opportunities presented by AI, and stringent data protection regulations. We explore the impact of the NIS2 Directive, the 2024 Cybersecurity Act, and the Critical Infrastructure Act, alongside the National Authority for…
  continue reading
 
Minnesota faces a relentless wave of daily cyberattacks targeting local governments, healthcare, and critical infrastructure, evidenced by a significant surge in malware reports following new incident reporting laws. In response, the state has enacted the Minnesota Consumer Data Privacy Act (MCDPA), a comprehensive law granting residents unpreceden…
  continue reading
 
Polska nawiguje przez złożony krajobraz ochrony danych, gdzie unijne RODO jest uzupełniane rozbudowanymi krajowymi ustawami, takimi jak Ustawa o Ochronie Danych Osobowych z 2018 roku i Ustawa z 2019 roku, która znowelizowała ponad 160 ustaw sektorowych. Firmy mierzą się z wyzwaniami, od luk w podstawowych zabezpieczeniach cybernetycznych, takich ja…
  continue reading
 
Deepfake creation tools are now freely available, rapidly improving, and astonishingly easy to use, allowing anyone with minimal effort to craft convincing synthetic media. This widespread accessibility fuels a surge in sophisticated scams, financial fraud, and disinformation campaigns, making deepfakes a normalized part of everyday threats. Join u…
  continue reading
 
This episode delves into the OWASP AI Maturity Assessment (AIMA), a groundbreaking framework designed to enhance the security, trustworthiness, and compliance of AI systems. We explore why traditional security models often fall short in addressing AI's unique challenges, such as non-deterministic behavior, opaque decision logic, and data-centric vu…
  continue reading
 
Neste episódio, mergulhamos no complexo e crescente cenário das ciberameaças no Brasil, um dos países mais visados por criminosos e atores estatais. Exploraremos desde ataques de ransomware e phishing generalizados, que se aproveitam da baixa conscientização e da dependência tecnológica, até as vulnerabilidades intrínsecas à governança cibernética …
  continue reading
 
This podcast delves into Israel's ambitious "Cyber Dome" initiative, a multi-layered, AI-driven system designed to proactively defend the nation's cyberspace and critical infrastructure, drawing parallels to its renowned Iron Dome missile defense. We'll explore how this advanced defense leverages big data and artificial intelligence for early threa…
  continue reading
 
This episode dives into the distinct digital journeys of Austria, a European nation making significant strides in technology adoption. We explore Austria's impressive progress in digital identity solutions like ID Austria, which provides 100% of its citizens with a secure digital proof of identity and unrestricted control over their personal data T…
  continue reading
 
In an increasingly connected world, the lines between traditional Information Technology (IT) devices and the burgeoning Internet of Things (IoT) are blurring, yet their fundamental differences create unique challenges. This episode delves into how IoT devices, with their direct interaction with the physical world and often limited built-in securit…
  continue reading
 
Smart home devices offer unparalleled convenience, from voice-controlled assistants and automated thermostats to video doorbells that let you see who's at your door. However, this interconnectedness comes at a significant cost, as these devices continuously collect vast amounts of personal data, from daily habits and purchases to biometric informat…
  continue reading
 
In an era defined by unprecedented digital connectivity, we often find ourselves facing a paradox: immense convenience coupled with a profound loss of control over our personal data and online experiences. This podcast delves into the critical implications of surveillance capitalism and algorithmic manipulation on our privacy, freedom of expression…
  continue reading
 
Join us as we explore how Estonia transformed from a post-Soviet state into a global leader in digital governance, offering nearly all government services online and attracting entrepreneurs worldwide through its e-Residency program. We'll delve into the remarkable benefits of this digital revolution, from unparalleled convenience and citizen trust…
  continue reading
 
The Asia-Pacific region stands at a critical juncture, with its fast-growing digital economies confronting an increasingly sophisticated and diverse array of cyber threats, including evolving ransomware attacks, pervasive online scams, and state-backed intrusions. Businesses must navigate a fragmented data governance landscape marked by unique data…
  continue reading
 
Australia aims to be a global leader in cybersecurity by 2030, implementing a comprehensive strategy built on six "cyber shields" to protect citizens and businesses from escalating threats like ransomware and identity theft, while also enacting significant privacy reforms. However, these efforts are met with concerns over increasingly broad governm…
  continue reading
 
Africa is undergoing a profound digital transformation, driven by its mobile-first connectivity, innovative fintech solutions, and a burgeoning tech startup ecosystem, which together offer unprecedented opportunities for financial inclusion and economic growth across the continent. However, this rapid digitalization is accompanied by significant cy…
  continue reading
 
Latin America has become a hotspot for cyber activity, with countries like Chile, Mexico, and Colombia experiencing significant data breaches and ransomware attacks on critical infrastructure. This widespread vulnerability is often fueled by frequently outdated cybersecurity measures, a talent gap, and a pervasive lack of awareness at high levels o…
  continue reading
 
América Latina se ha convertido en un objetivo principal para los ciberdelincuentes, siendo considerada la región menos preparada globalmente a pesar de su rápida digitalización, lo que ha expuesto a empresas y gobiernos a un aumento exponencial de ciberataques. Exploraremos incidentes críticos como el ataque de ransomware Conti en Costa Rica, las …
  continue reading
 
This episode delves into how Hong Kong is bolstering its cybersecurity through landmark legislation like the Protection of Critical Infrastructures (Computer Systems) Bill, which sets strict security protocols and reporting obligations for essential services. We explore the city's extensive collaborative initiatives, from the Cyber Security and Tec…
  continue reading
 
This episode uncovers how global digital ID systems, paired with stringent age verification and online surveillance laws, are systematically eroding personal privacy and online anonymity. We delve into the comprehensive collection of biometric and behavioral data, examining how it creates a "digital twin" of every individual and enables cross-borde…
  continue reading
 
De NIS2-richtlijn hervormt het cybersecuritylandschap van Europa, met als doel een hoog gemeenschappelijk beveiligingsniveau te bereiken tegen toenemende cyberdreigingen. Deze aflevering duikt in de essentiële technische implementatierichtlijnen en biedt praktisch advies voor organisaties om cyberrisico's effectief te beheren en te voldoen aan de v…
  continue reading
 
Dive into the revolutionary world of Brain-Computer Interfaces (BCIs) and their incredible potential to connect human thought directly with technology. This podcast unravels the alarming vulnerabilities of these cutting-edge devices, exploring how they can be subjected to "neural hacking" through remote manipulation, AI-powered attacks, and sensiti…
  continue reading
 
The metaverse is rapidly transforming into a new digital frontier where immersive experiences meet real-world value, driven by cryptocurrencies and NFTs. However, this exciting evolution has opened a new battleground for sophisticated cybercrimes, including virtual identity theft, deep fake impersonation, NFT hacking, and pervasive social engineeri…
  continue reading
 
This podcast delves into the escalating cybersecurity threats facing modern medical devices, from Bluetooth-enabled pacemakers and insulin pumps to sophisticated patient monitors, revealing how vulnerabilities can lead to dire consequences for patient safety and data integrity. We explore the ethical frontiers of this challenge, examining how advan…
  continue reading
 
The Internet of Bodies (IoB) promises a revolution in personalized health and convenience by collecting intimate data directly from our bodies, ranging from heart rate to potential future capabilities like reading thoughts. However, this widespread data collection introduces profound privacy challenges, including unclear data ownership, bypassed in…
  continue reading
 
The Internet of Bodies (IoB) and Human Digital Twins promise a revolution in personalized health and daily convenience by collecting intimate data directly from our bodies. But as these technologies become more widespread, they introduce profound privacy challenges, from unclear data ownership and bypasses of informed consent to the creation of exp…
  continue reading
 
As machine identities exponentially outnumber human ones, creating a vast and vulnerable attack surface by 2025, organizations face unprecedented cybersecurity challenges. This podcast explores how artificial intelligence (AI) and advanced automation are becoming critical for managing the lifecycle of these digital credentials, from detecting anoma…
  continue reading
 
This episode explores the critical juncture where human behavior meets technological defense in cybersecurity, highlighting how a significant 68% of breaches are human-driven due to factors like ineffective training and a poor security experience. We delve into the growing imperative for organizations to shift from complex "tool sprawl" with dozens…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play