In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
Email Security Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
HIPAA compliance is complicated, confusing and easy to get wrong. Violations, data breaches and ransomware attacks are everywhere in healthcare. HIPAA Critical brings interviews with leaders in cybersecurity, InfoSec, healthcare, and compliance straight to you. Each 30-minute episode is designed to keep you informed and entertained. A new episode is released on the first three Wednesdays of every month.
…
continue reading
Learn how to think not what to think.
…
continue reading
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading

1
All Things Secured | Online Privacy & Security on Odysee
All Things Secured | Online Privacy & Security
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
…
continue reading
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
…
continue reading
…
continue reading
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
Welcome to “Let’s Talk Attachments”, a podcast all about ATTACHMENT THEORY! My name is Jessica Da Silva and I’m a Licensed Marriage and Family Therapist & Attachment Coach helping you transform the way you experience love by teaching you the ins and outs of your attachment style in a practical and relatable way. Website: https://jessicadasilvacoaching.com/ Instagram: @thejessicadasilva Tiktok: @jessicadasilvacoaching Email: [email protected]
…
continue reading
Conversations about self awareness, sport, counter-culture, world events, gaming, social commentary, travel, music, movies and general nonsense. Every now and then, TDLS hosts a one on one with an individual who has lived a specific experience or from a certain field that brings insight, merit or education. Host: Dim Follow TDLS on Spotify, YouTube, Instagram, X, Facebook, iTunes Email at [email protected] https://linktr.ee/thedukeleverageshow #TheDukeLeverageShow #comedy #entert ...
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
This is the Philippine Stock Market Weekly podcast series by FirstMetroSec, where we will be featuring timely and relevant discussions on the Philippine stock market and economy, in the hope of providing investing and trading guidance to Filipinos. Enjoying our episodes? Don't forget to follow the podcast, rate us 5 stars and hit the notification bell. Connect with us through social media with the handle, @firstmetrosec. #YourFutureFirst Website: www.firstmetrosec.com.ph Email: events@firstm ...
…
continue reading
Audio versions of new articles as they’re posted on http://askleo.com
…
continue reading
The Dugout is a weekly Black anarchist podcast hosted by Prince Shakur & Jordan. We bring radical, decolonial, and queer takes on politics, movements, and media—covering everything from Black anarchism and Afro-pessimism to uprisings, direct action, and liberation struggles worldwide. Have ideas, reading recs, or want to be a guest? Email us. Consider supporting us on Patreon: https://www.patreon.com/TheDugoutPod
…
continue reading
If you want to understand what’s really happening on Britain’s streets, you need to hear this. The Crime Agents, the new podcast from the makers of The News Agents, goes beyond the headlines to uncover the truth behind crime that affects all of us. Why is violence rising? Why is public trust in the police collapsing? And what’s really driving young people to kill each other? Hosted by two insiders who have spent their lives chasing the answers, this is your front-row seat to the realities of ...
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
A new beginning in IT
…
continue reading
Talking all things money. Maya Fisher-French discusses the do’s and don’ts when it comes to your finances. To join the conversation send me an email via https://mayaonmoney.co.za/contact/
…
continue reading
Intuition Consultancies has a decade of expertise, in empowering businesses with innovative tech solutions for growth and efficiency. Your success, our mission. https://intuitionconsultanciesinc.com/
…
continue reading
Bestselling author, professor and entrepreneur Scott Galloway combines business insight and analysis with provocative life and career advice. On Mondays and Fridays, Office Hours features Scott answering your questions about business, career, and life. On Tuesdays, China Decode co-hosts Alice Han and James Kynge discuss the latest economic, political and cultural news shaping China’s role on the global stage. On Wednesdays, Raging Moderates brings Scott together with political strategist and ...
…
continue reading
Learn the latest Business IT and security strategies you can execute today.
…
continue reading
Elliott Danker hosts this Asia Collective podcast series where we take a look at what's behind the pulse of Asia right now. We discuss what governments and businesses are paying attention to around the world and especially in Asia and what businesses need to pay attention to when expanding in the region. Be a part of setting the rhythm in Asia For enquiries on collaborations and partnerships, email us at [email protected]
…
continue reading
Selva Kumar is SAP Career Trainer specializing in SAP Career Coaching, identifying skills for getting a Job. You can reach me @ 302 494 9476 or Email: [email protected] Download Free SAP GRC Guide. http://expressgrc.com/sap-grc-10-1-step-step-guide/
…
continue reading
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you! Got questions/suggestions/stories to share? Email: [email protected] Twitter: @NakedSecurity Instagram: @NakedSecurity
…
continue reading
The Mid-Atlantic’s Best IT services company. Helping Business Owners create, improve and scale their Technology strategy. IT services, IT Security and IT Support advice and leadership from expert professionals. Q&A with Senior Engineers, Service Managers and Business Development.
…
continue reading
Join Jae Oh, nationally recognized Medicare expert, certified financial planner, and Education Fellow at the Alliance for Lifetime Income, on Jae’s Corner, where financial reality is clarified and simplified. Each episode explores healthcare, insurance, investments, and economic news, offering clear, actionable insights valuable for subscribers of all ages and backgrounds. Author of the bestselling book, Maximize Your Medicare, Jae also provides a free newsletter packed with tips for lasting ...
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Welcome to Shift with Elena Agar — The Career & Growth Lab I’m Elena — a talent development expert, entrepreneur, and wellness advocate. This podcast is where career strategy meets leadership, personal growth, and well-being. Each episode brings honest conversations with experts, thought leaders, and professionals across industries as we explore topics like: Each episode dives into topics like: Career development & leadership skills Workplace wellness & productivity Entrepreneurship 🎧 New ep ...
…
continue reading

1
Chilling Tales for Dark Nights: A Horror Anthology and Scary Stories Series Podcast
Chilling Entertainment, LLC & Studio71
Chilling Tales for Dark Nights is a horror fiction anthology podcast, with each weekly episode featuring several creepy tales from talented authors, brought to life by professional voice actors, and accompanied by SFX and music. For advertising opportunities please email [email protected] We wanna make the podcast even better, help us learn how we can: https://bit.ly/2EcYbu4 Privacy Policy: https://www.studio71.com/us/terms-and-conditions-use/#Privacy%20Policy.
…
continue reading
Touro Talks are timely conversations engaging college students, thought leaders and experts from around the world on academic and contemporary issues. Hosted by Touro University president, Dr. Alan Kadish. Touro Talks is sponsored by Robert and Arlene Rosenberg. If you would like to sponsor, please email [email protected]
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Formerly known as Intelligence Matters, the NatSec Matters podcast features former senior national security officials Michael Allen, Jeremy Bash, and Andrew Shapiro as they interview top leaders in national security, including intelligence officers, military leaders, and policymakers, on the most critical security challenges of our time. Their interviews offer insights into the world’s most pressing problems and assess the effectiveness of U.S. policy responses. They also explore the biograp ...
…
continue reading
An archive of each full weekday episode of the award-winning program presented by Stephen Grootes.
…
continue reading
Late-night podcast where I speak with PhDs about their research subjects, their decision on studying it and its importance throughout academic life. A podcast of entertainment and education, whose aim is to approach students and graduates who want to go through their future careers inside or outside of academia with a PhD and for those who are on a moment of uncertainty in continuing their studies further, as if we are having a drink and talk about PhD culture at a lounge on a late-night sum ...
…
continue reading
Cyber Security for Small Businesses doesn't need to be complicated or expensive. Most of the time it comes down to planning, procedures and good Systems Administration. Learn the techniques that you can use to increase Cyber Resilience in your Small Business. The podcast covers auditing tools like the ACSC Essential 8, NIST and ISO 27001. It will look at ways that you can identify, protect, detect, respond and recovery to a cyber incident. You will learn about: Malware Denial of Service Man ...
…
continue reading
Welcome to Hands-On Tech, where host Mikah Sargent turns tech troubles into tech triumphs. Each episode zooms in on a specific theme, unpacking listener questions with expert analysis and easy-to-follow advice. From decoding the latest gadgets to simplifying everyday tech, Mikah's got you covered. Submit your tech queries through email at [email protected] or via TWiT's social media. You might hear your question answered on air! Whether you're puzzled by privacy settings or curious about cutting-e ...
…
continue reading
Johnny Ball is famous for knowing many things, so who better to tell you how to keep your computer safe from online fraud. Johnny's guides contain all you need to know about internet and email security. There are four wisdom-packed episodes to download onto your computer and portable audio player.
…
continue reading
Listen in on brief discussions among Cisco and industry experts about the latest issues in network security and the solutions available to help address your business challenges.
…
continue reading
Life gets lonely after the kids leave the nest. If you're craving connection, conversation, and community, we've got your back. Karyn, newly fifty years old, and Pam, now empty nesting, are inviting you to their weekly deep, yet fun girl chats about everything that happens in your second chapter of life. No matter where you live in the world, all gals over 50 are welcome here. Connection through all the ties that bind us is our goal-- elderly parents, finances, relationships, managing adult ...
…
continue reading
Join us as we discuss news and current events, trends, and controversies in the world of cybersecurity. We have strong feelings and they're not limited to FedRAMP, CMMC, FISMA, IRAP, security engineering, or documentation. Anything goes -- some of the things we say are probably even helpful! Interested in having words? Email us at [email protected].
…
continue reading
Episode summary In this episode, we’re exploring who can benefit most from our email workshop. If email causes you stress, frustration, or fear -- this workshop might be for you. But improving your email situation requires doing things differently, and you need to be ready to do that. There are many strategies, and I’ll work with you to find the on…
…
continue reading

1
The Cl0p-Oracle Extortion Emails, Red Hat Breach, and Sad Government News
35:27
35:27
Play later
Play later
Lists
Like
Liked
35:27Dennis and Lindsey dissect a busy week in security news, starting with the Cl0p group's extortion campaign against Oracle customers (3:24), then moving into the Crimson Collective's claimed breach of some of Red Hat GitLab's repos (12:41), and finally the consequences of the expiration of th CISA legislation and de-funding of the MS-ISAC (22:46). P…
…
continue reading
New attack on ChatGPT research agent pilfers secrets from Gmail inboxesBy Carl Franklin
…
continue reading

1
No Mercy / No Malice: How Does the End Begin?
17:15
17:15
Play later
Play later
Lists
Like
Liked
17:15As read by George Hahn. https://www.profgalloway.com/how-does-the-end-begin/ Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy Vox Media Podcast Network
…
continue reading

1
Smile for the malware. [Research Saturday]
28:12
28:12
Play later
Play later
Lists
Like
Liked
28:12Eclypsium researchers Jesse Michael and Mickey Shkatov to share their work on "BadCam - Now Weaponizing Linux Webcams." Eclypsium researchers disclosed “BadCam,” a set of vulnerabilities in certain Lenovo USB webcams that run Linux and do not validate firmware signatures, allowing attackers to reflash the devices and turn them into BadUSB-style too…
…
continue reading

1
The Best Bits of The Money Show: Leading change: Magadagela & Stark Talk
49:40
49:40
Play later
Play later
Lists
Like
Liked
49:40Stephen Grootes spoke to Michelle Mokone about building a sustainable global décor brand from an origami swan, Bob Stark about the evolving journey and challenges of CEOs, Gary Booysen about the unusual market dynamics of rising precious metals and AI stocks, and Ndia Magadagela about leading South Africa’s transition to electric vehicle fleets thr…
…
continue reading
Skynet-1A: Military Spacecraft Launched 56 Years Ago Has Been Moved By Persons UnknownBy Carl Franklin
…
continue reading
Prosper data breach reportedly affected more than 17 million accounts. Microsoft revokes certificates used in Rhysida ransomware operation. Threat actors exploit Cisco flaw to deploy Linux rootkits. Europol disrupts cybercrime-as-a-service operation. BeaverTail and OtterCookie merge and display new functionality. Singapore cracks down on social med…
…
continue reading

1
Exec pay rebounds amid fairness push; rich face financial strain – The Money Show Explainer
39:11
39:11
Play later
Play later
Lists
Like
Liked
39:11Stephen Grootes speaks to Leila Ebrahimi- PwC’s Reward Partner about the 2025 Directors Remuneration and Trends report, which reveals a rebound in executive pay, outpacing inflation and reflecting stronger performance-linked remuneration, rising shareholder scrutiny, and a growing emphasis on fairness, transparency, and alignment with global practi…
…
continue reading

1
How to Recover Deleted Data from Your Disk — Maybe
6:48
6:48
Play later
Play later
Lists
Like
Liked
6:48Think those old files on your hard drive are gone forever? Maybe not. I’ll walk you through what affects your chances of recovery, the tools you can try, and why sometimes, it all comes down to luck.
…
continue reading

1
The Truth About Podcast Ads, Life After the Military, and Scott’s London Tips
18:36
18:36
Play later
Play later
Lists
Like
Liked
18:36Scott explains why podcast ads still work and what makes them more powerful than traditional media. He then offers advice on rebuilding purpose and community after leaving the military and shares his favorite ways to do London like a local. Want to be featured in a future episode? Send a voice recording to [email protected], or drop your q…
…
continue reading
F5 discloses long-term breach tied to nation-state actors. PowerSchool hacker receives a four-year prison sentence. Senator scrutinizes Cisco critical firewall vulnerabilities. Phishing campaign impersonates LastPass and Bitwarden. Credential phishing with Google Careers. Reduce effort, reuse past breaches, recycle into new breach. Qilin announces …
…
continue reading

1
Creecy’s IVP deal faces heat; 80% of township firms unregistered, study urges formalisation
1:19:40
1:19:40
Play later
Play later
Lists
Like
Liked
1:19:40Stephen Grootes speaks to Andrew Pike Head Of Bowmans Ports. Transport And Logistics, and Warwick Lord, Chairperson of the Multi-Modal Inland Port Association about the Transport Minister Barbara Creecy’s decision to renew 25-year terminal operator agreements at Durban’s Island View Precinct—sparking backlash from local fuel traders and raising con…
…
continue reading
If your computer refuses to start, the problem might be the Master Boot Record (MBR). Fixing it isn’t as scary as it sounds. I’ll show you how to use Windows’ built-in Startup Repair and a couple of handy command-line tools to get your machine running again.
…
continue reading
In the wake of the disclosure of a serious intrusion at F5 that reportedly lasted about a year, we talk about the details of the disclosure, the potential link to Chinese state actors, the fallout from the attackers' access to source code and bug reports, and what this could mean in the long term.By Decipher
…
continue reading

1
America Is Fraying from Within — with Molly Jong-Fast
1:03:28
1:03:28
Play later
Play later
Lists
Like
Liked
1:03:28Scott speaks with Molly Jong-Fast, a journalist, author, political commentator and host of the “Fast Politics” podcast. They discuss the moral crisis of America’s billionaire class, Trump’s authoritarian drift, and the deepening class divide fueling populism. Molly shares her take on the Democrats’ messaging problem, the media’s collapse into ideol…
…
continue reading

1
CRSP06: State of AI 2025 pt.1 - Evolving role of AI across industries with Craig Suckling [AAA]
53:26
53:26
Play later
Play later
Lists
Like
Liked
53:26In 'Access All Areas' shows we go behind the scenes with the crew and their friends as they dive into complex challenges that organisations face—sometimes getting a little messy along the way. We’re launching a special AI mini-series exploring how artificial intelligence is reshaping industries. Each episode dives into key themes like scaling AI, s…
…
continue reading

1
409: Blueprints for Madness - Chilling Tales for Dark Nights
1:17:09
1:17:09
Play later
Play later
Lists
Like
Liked
1:17:09Some homes are built to shelter us. Others are built to hide what we can’t bear to face. In this week’s chilling installment, host Steve Taylor invites you to step across the threshold of a house where every wall has a secret — and every secret has a body. Behind the façade of ordinary suburbia lies a legacy of obsession, guilt, and something far o…
…
continue reading
A record-breaking Bitcoin seizure. Patch Tuesday notes. Capita fined for unlawful access to personal data. Unity site skimmed by malicious script. Vietnam Airlines breached potentially exposing 20 million passengers. An automotive giant experiences a third-party breach. Tim Starks from CyberScoop is discussing how Sen. Peters tries another approach…
…
continue reading

1
S2 Ep9: Money Bootcamp: Can you retire before 80?
34:11
34:11
Play later
Play later
Lists
Like
Liked
34:11Most people can only afford to retire comfortably by age 80. This sobering statistic was the focus of our latest Insure your Future Money Bootcamp podcast discussion that asked the question of whether early retirement is even possible in today’s economic climate. In this episode, Maya and Mapalo are joined by seasoned financial planner Wynand Gouws…
…
continue reading

1
AI Attack and Defense With Adam Meyers and Elia Zaitsev of CrowdStrike
57:26
57:26
Play later
Play later
Lists
Like
Liked
57:26Have you heard about this AI thing? It's wild. Turns out, attackers are using it for all kinds of things we'd rather not have them doing. Dennis Fisher is joined by two experts from CrowdStrike--Adam Meyers, head of counter adversary operations, and Elia Zaitsev, CTO--to talk about how both defenders and attackers are leveraging AI and where things…
…
continue reading

1
Court blocks Eskom’s R54bn tariff hike as 1 in 3 South Africans turn to Side hustles to survive
1:20:06
1:20:06
Play later
Play later
Lists
Like
Liked
1:20:06Stephen Grootes speaks to Prof Samson Mamphweli, Head of SANEDI’s Energy Secretariat, Energy Expert at IMPOWER Matthew Cruise about AfriForum securing a court order halting Eskom’s proposed R54bn tariff hike. The agreement between Eskom and NERSA, intended to correct a data error, has been paused pending a judge’s review, preventing further sharp i…
…
continue reading

1
I Opened Something I Shouldn’t Have — Now What?
7:43
7:43
Play later
Play later
Lists
Like
Liked
7:43Accidentally run or opened something suspicious? We've all done it. I’ll walk you through the options from scans to resets, and consider what to learn from the experience.
…
continue reading

1
Madeleine McCann: why the case remains unsolved
36:36
36:36
Play later
Play later
Lists
Like
Liked
36:36When three year-old Madeleine McCann went missing from a Portuguese holiday resort in 2007, it was a story which had the nation gripped for all the wrong reasons. 18 years on, the case remains unsolved - but the story still has the power to create headlines and dominate the news agenda. In this episode, Andy and Neil look at the key mistakes that w…
…
continue reading
Michael speaks with Dan Twining, president of the International Republican Institute, about the future of US-Russia relations and the war in Ukraine. Dan discusses Valdimir Putin's current and long-term strategy, and his alliances with countries like North Korea and China. He also takes aim at Biden-era policies that forced Ukraine to "fight with o…
…
continue reading

1
Raging Moderates: Trump Has Completed Half of Project 2025
52:24
52:24
Play later
Play later
Lists
Like
Liked
52:24Two weeks into the government shutdown, the pain is starting to show — from closed museums to unpaid workers. Scott and Jessica break down who’s getting blamed, how long it could drag on, and Trump’s move to keep troops funded. Then, they dig into Project 2025 — the far-right blueprint that’s already halfway implemented — and what it means for demo…
…
continue reading

1
What Actually Works in Cybersecurity (And What Doesn't)
41:06
41:06
Play later
Play later
Lists
Like
Liked
41:06Are you making career moves in cybersecurity or is cybersecurity making moves around you? Welcome to Razorwire. In this episode, I sit down with Marius Poskus - CISO, consultant, podcaster and all-round cyber expert - to how to succeed in cybersecurity. We discuss career paths, why security culture fails in most organisations and the risks of rushi…
…
continue reading
Fortra confirms an exploitation of the maximum-severity GoAnywhere flaw. Harvard investigates a claim of a breach. Banking Trojan targets Brazilian WhatsApp users. Reduction-in-force hits CISA. SimonMed says 1.2 million hit by Medusa ransomware. Netherlands invokes the Goods Availability Act against a Chinese company. We have our Business Breakdown…
…
continue reading

1
Ramaphosa faces pressure to unlock R2tn investment; Govt eyes Temu’s expansion in South Africa
1:17:22
1:17:22
Play later
Play later
Lists
Like
Liked
1:17:22Stephen Grootes speaks to Kevin Lings, Chief Economist at Stanlib Asset Management, and Lumkile Mondi, Senior Lecturer at the School of Economics and Business Science at Wits University, about South Africa’s growing investment strike as companies hold nearly R2-trillion in cash reserves. They discuss why corporates are delaying investment amid weak…
…
continue reading

1
Healing Your Attachment Through God with Gretchen Costanzo
37:08
37:08
Play later
Play later
Lists
Like
Liked
37:08In this heartfelt episode, I sit down with Gretchen Costanzo, a certified integrative attachment coach and creator of the Living Connected Method, to talk about what it means to create a secure relationship with God — and how transformational that can be for your healing and relationships. We explore how God can become your steady rock, the connect…
…
continue reading

1
The Difference with AI Red Teaming is We Added the Word AI
37:31
37:31
Play later
Play later
Lists
Like
Liked
37:31All links and images can be found on CISO Series. This week’s episode is hosted by David Spark, producer of CISO Series and Andy Ellis, principal of Duha. Joining us is our sponsored guest, Khush Kashyap, senior director, GRC, Vanta. In this episode: Skip the Sermon When to coach versus command Making risk quantification useful Recognizing a distin…
…
continue reading
In this episode of China Decode, Alice Han and James Kynge talk through Trump’s recent escalation in his war of words with Xi, in response to China’s move to ban the export of crucial rare earth minerals. Plus — why N.B.A. basketball is back in China after a six-year absence, and a breakthrough medical procedure that could change organ transplants …
…
continue reading

1
The Deal That Ended the Gaza War — with Dan Senor
1:12:13
1:12:13
Play later
Play later
Lists
Like
Liked
1:12:13Scott speaks with Dan Senor, co-author of The Genius of Israel and host of the Call Me Back podcast, about what may be the most consequential Middle East deal in decades. They discuss how Trump’s negotiators pushed Hamas to release hostages, Israel’s defiance of international pressure, and the regional realignment now underway across Qatar, Saudi A…
…
continue reading

1
Boxer’s R22.5bn Turnover signals retail Boom; Nobel prize sparks new wave in economic innovation
1:17:46
1:17:46
Play later
Play later
Lists
Like
Liked
1:17:46Stephen Grootes speaks to Boxer CEO, Marek Masojada about the retailer’s robust financial performance, marked by a 13.9% rise in turnover to R22.5 billion, strong trading profit growth, and strategic expansion — all driven by operational efficiency, customer loyalty, and a relentless focus on delivering value. In other interviews, Prof Adrian Savil…
…
continue reading

1
What’s the Difference Between an Email Account, an Email Address, an Email Program, and an Email Service?
12:21
12:21
Play later
Play later
Lists
Like
Liked
12:21What’s the difference between your email service, account, address, and program? I'll break it down so you’ll know what each term means, why it matters, and how not to get tripped up next time you want to change your email or ask a question.
…
continue reading

1
EP247 The Evolving CISO: From Security Cop to Cloud & AI Champion
29:00
29:00
Play later
Play later
Lists
Like
Liked
29:00Guest: David Gee, Board Risk Advisor, Non-Executive Director & Author, former CISO Topics: Drawing from the "Aspiring CIO and CISO" book's focus on continuous improvement, how have you seen the necessary skills, knowledge, experience, and behaviors for a CISO evolve, especially when guiding an organization through a transformation? Could you share …
…
continue reading

1
Teaching Young Men to Invest, Mental Health at Work, and What Charlie Kirk Got Wrong (and Right)
18:15
18:15
Play later
Play later
Lists
Like
Liked
18:15Scott answers a teacher’s question on getting teens to value compounding over gambling, shares how to be candid about mental health with employers without oversharing, and offers thoughts on how to find common ground across politics. Want to be featured in a future episode? Send a voice recording to [email protected], or drop your question…
…
continue reading

1
What Happened to Hacker Culture? [Threat Vector]
38:02
38:02
Play later
Play later
Lists
Like
Liked
38:02While the N2K team is observing Indigenous Peoples' Day, we thought you'd enjoy this episode of the Threat Vector podcast from our N2K Cyberwire network partner, Palo Alto Networks. New episodes of Threat Vector release each Thursday. We hope you will explore their catalog and subscribe to the show. Join David Moulton, Senior Director of Thought Le…
…
continue reading

1
AI, Aging & Your Money: Dr. Chris Heye, CEO & Creator, whealthchat.ai
1:10:38
1:10:38
Play later
Play later
Lists
Like
Liked
1:10:38AI, Aging & Your Money: Dr. Chris Heye, CEO & Creator, whealthchat.ai In this episode of Jae’s Corner, Jae talks with Dr. Chris Heye—CEO and founder of Wealthcare Planning and WealthChat.ai—about how artificial intelligence can help families and advisors handle the hardest topic in finance: cognitive decline. Together they explore the connection be…
…
continue reading

1
HOT 237: Recycling Old Computers - How to E-Waste Your Old iMac Properly
15:43
15:43
Play later
Play later
Lists
Like
Liked
15:43On Hands-On Tech, Mikah Sargent answers a listener's question about disposing of their old iMac and the steps needed to do so. Don't forget to send in your questions for Mikah to answer during the show! [email protected] Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and …
…
continue reading

1
Chetan Conikee: Create narratives of your journey. [CTO] [Career Notes]
10:29
10:29
Play later
Play later
Lists
Like
Liked
10:29Please enjoy this encore of Career Notes. Founder and CTO of ShiftLeft, Chetan Conikee shares his story from computer science to founding his own company. When choosing a career, Chetan notes that "the liking and doing has to matter and be in conjunction with each other." Explaining the parallels in his home country of India and where he studied hi…
…
continue reading

1
Episode 98: Episode 98 - CyberCon Melbourne 2025
11:58
11:58
Play later
Play later
Lists
Like
Liked
11:58In this episode, Richard discusses what to expect from CyberCon Melbourne 2025.
…
continue reading

1
Windows Security to 2028? Why ESU Still Costs Extra
3:04
3:04
Play later
Play later
Lists
Like
Liked
3:04Wondering why Microsoft charges for Extended Security Updates when Windows Defender will get updates through 2028? They're not the same. I'll explain the difference between malware database updates and actual Windows fixes, and what you really need to know to stay protected on Windows 10.
…
continue reading

1
No Mercy / No Malice: Love Algorithmically
16:01
16:01
Play later
Play later
Lists
Like
Liked
16:01As read by George Hahn. https://www.profgalloway.com/love-algorithmically/ Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy Vox Media Podcast Network
…
continue reading

1
No honor among thieves. [Research Saturday]
25:03
25:03
Play later
Play later
Lists
Like
Liked
25:03John Fokker, Head of Threat Intelligence at Trellix is discussing "Gang Wars: Breaking Trust Among Cyber Criminals." Trellix researchers reveal how the once-organized ransomware underworld is collapsing under its own paranoia. Once united through Ransomware-as-a-Service programs, gangs are now turning on each other — staging hacks, public feuds, an…
…
continue reading