Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
…
continue reading
Endpoint Security Podcasts
Join us on Proofpoint’s Insider Insight, the podcast where we delve deep into the intricate realm of Endpoint Data Loss Prevention (DLP) and Insider Threat Management (ITM). In each episode, we unravel the complexities of safeguarding your organization's sensitive information by adopting a people-centric approach to managing insider threats. From inadvertent mistakes to malicious intent, insider threats pose a significant risk to the confidentiality and integrity of your data. This podcast i ...
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
…
continue reading
Welcome to IGEL Weekly, the podcast that explores the future of endpoint management and cloud workspaces. Hosted by XenTegra, this show dives deep into IGEL’s next-generation edge OS solutions. Discover how IGEL delivers extreme hardware cost savings, reduced operating expenses, and a more secure, streamlined platform for endpoint management across nearly any x86 device. Each week, we’ll unpack the latest industry trends, IGEL updates, and actionable insights to help you optimize your IT env ...
…
continue reading
How does GDPR, data privacy, and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance, hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader, or InfoSec security expert, this is the podcast to learn about what is happening in the UK, EU, US, and beyond.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
…
continue reading
Young Professionals in Technology is a community that helps foster your burgeoning tech career, no matter what “age” you are.
…
continue reading
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
…
continue reading
IGEL provides the next-gen edge OS for cloud workspaces. Their solutions offer you extreme CAPEX hardware cost savings, sharply reduced ongoing operating expenses, and a more secure and manageable endpoint management and control platform across nearly any x86 device. We will discuss the endpoint trends in the industry, IGEL updates, and general news. XenTegra is THE preferred IGEL partner
…
continue reading
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
If you're a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
…
continue reading
IT talk with a healthy dose of empathy: Hosts Matt Yette & Matt Cozzolino draw on their combined 40+ years of infrastructure experience as they discuss the ever-changing technology landscape – from virtualization to storage, security to networking, and everything in between.
…
continue reading
Azure McFarlane, Ru Campbell, Femke Cornelissen, Peter Rising, & Kat Beedim talk about Microsoft 365 and Azure, and are joined each episode by a guest to talk about their journey in tech, and the challenges they have faced along the way.
…
continue reading
The RocketMSP Podcast, formerly known as MSP Webinars, is a comprehensive platform that caters to Managed Service Providers (MSPs) and the IT community. Hosted by Steve Taylor, a seasoned IT professional, the podcast serves as a knowledge exchange hub, offering a wealth of industry insights, best practices, and innovative solutions. Each episode features interviews and conversations with MSP business owners, channel vendors, and other noteworthy figures in the IT space. The podcast aims to p ...
…
continue reading
1
Embedded Executive: Commercial RTOS Goes Open Source | Micro Digital
16:02
16:02
Play later
Play later
Lists
Like
Liked
16:02It’s not the first time this has occurred, but it is the latest—a previously commercial real-time operating system is now being offered as open source. In this case, it’s SMX from Micro Digital. If you’re wondering, like I was, where the company would choose to go this route, check out this week’s Embedded Executives podcast with Ralph More, the Fo…
…
continue reading
51
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432
1:38:17
1:38:17
Play later
Play later
Lists
Like
Liked
1:38:17Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the cha…
…
continue reading
1
Embedded Executive: Get All Your AI In One Place | Analog Devices
11:28
11:28
Play later
Play later
Lists
Like
Liked
11:28There are lots of semiconductor vendors that do a great job of providing AI hardware. But unfortunately, for many of them, their offerings end there, requiring developers to source software and tools from multiple sources. It’s no secret that designing a system with AI is complex enough. Having to go to different vendors for different pieces just a…
…
continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
Play later
Play later
Lists
Like
Liked
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
continue reading
1
Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Mike Poole, Conor Mulherin, Dave Lewis - ESW #430
1:39:12
1:39:12
Play later
Play later
Lists
Like
Liked
1:39:12Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
…
continue reading
1
Embedded Executive: Matter Certification Just Got Easier | CSA
13:56
13:56
Play later
Play later
Lists
Like
Liked
13:56Every IoT device should comply with the Connectivity Standard Alliance (CSA) Matter standard, but we know that’s not the case. For some developers, doing that is a no-brainer. However, there are some developers who struggle with the process. For that latter group, the CSA recently released a Matter-compliant platform certification that should help …
…
continue reading
1
Mitigating attacks against AI-enabled Apps, Replacing the CIA triad, Enterprise News - David Brauchler - ESW #429
1:38:26
1:38:26
Play later
Play later
Lists
Like
Liked
1:38:26Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost cause. And many developers inadvertently introduce serious threat vectors into their applications – risks they must later eliminate before they become ingrained across application stacks. NCC Group's …
…
continue reading
1
Embedded Executive: Tune Your Compiler for ADAS | Solid Sands
11:12
11:12
Play later
Play later
Lists
Like
Liked
11:12Compilers and ADAS aren’t often used in the same sentence. For developers, that anomaly can represent a design challenge, as compilers in general are not designed for this particular application, which also happens to be at the top of the safety and security checklist. To understand how these compilers should be tested and implemented, I spoke to S…
…
continue reading
1
Closing the Endpoint Gap: Business Continuity and IGEL’s Dual-Boot Solution
31:14
31:14
Play later
Play later
Lists
Like
Liked
31:14In this episode of IGEL Weekly, Andy Whiteside sits down with Chris Feeney from IGEL’s Office of the CTO to explore a critical, often overlooked element of disaster recovery—endpoint resilience. They unpack how IGEL is addressing business continuity challenges with innovative solutions like IGEL Dual Boot and USB Recovery, enabling organizations to…
…
continue reading
1
A Compliance Roadmap for ADS/ADMT - Part 2: Understanding Opt-In and Opt-Out Requirements
18:36
18:36
Play later
Play later
Lists
Like
Liked
18:36Welcome to a special series on Life with GDPR. Over the next five episodes, Tom Fox and Alyssa DeSimone, a legal/compliance & risk management expert, with an extensive background in HR, will discuss the complex topic of a Compliance Roadmap for ADS/ADMT. In this second episode, Tom Fox and Alyssa DeSimone review the opt-in and opt-out requirements …
…
continue reading
1
A Compliance Roadmap for ADS/ADMT - Part 1: Introduction & Jurisdiction
17:19
17:19
Play later
Play later
Lists
Like
Liked
17:19Welcome to a special series on Life with GDPR. Over the next five episodes, Tom Fox and Alyssa DeSimone, a legal/compliance & risk management expert with an extensive background in HR, will discuss the complex topic of a Compliance Roadmap for ADS/ADMT. In this first episode, we break down the essentials of ADS/ADMT, focusing on who is covered, the…
…
continue reading
1
New book from Dr. Anand Singh, why CISOs buy, and the latest news - Anand Singh - ESW #428
1:43:44
1:43:44
Play later
Play later
Lists
Like
Liked
1:43:44Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss wh…
…
continue reading
1
Endpoint Security and Data Protection: Uncovering the Hidden Compliance Risks in Printer Security with Jim LaRoe
24:31
24:31
Play later
Play later
Lists
Like
Liked
24:31Jonathan Armstrong remains on assignment. Today, Tom Fox visits with fellow Texan Jim LaRoe, CEO of Symphion, to discuss data privacy, data protection, and compliance related to printer security in one of the most interesting podcasts Tom has done in some time. Jim provides insight into how 20-30% of network endpoints are printers, and alarmingly, …
…
continue reading
1
Embedded Executive: AI At the Endpoint | EMASS
11:56
11:56
Play later
Play later
Lists
Like
Liked
11:56AI at the endpoint gets yet another boost from EMASS, a fabless semiconductor company that recently emerged from stealth mode. Having your processing at the endpoint presents a few significant challenges, namely the amount of processing that can be made available and the ability to run from a battery. EMASS has come up with a way to do this a littl…
…
continue reading
Back from a short summer break, Stephen and Arvind return with a brand-new Sync Up episode—spotlighting audio overviews in OneDrive. From quick summaries to full podcast-style recaps, this new Copilot feature transforms how you catch up on documents. Joining the conversation are Cass Weber and Cammi Mejia from the OneDrive team, who share the insid…
…
continue reading
1
AI & IAM: Where Security Gets Superhuman (Or Supremely Stuck) - Matt Immler, Heather Ceylan, Alexander Makarov, Nitin Raina, Dor Fledel, Aaron Parecki - ESW #427
1:34:04
1:34:04
Play later
Play later
Lists
Like
Liked
1:34:04At Oktane 2025, leaders from across the security ecosystem shared how identity has become the new front line in protecting today's AI-driven enterprises. As SaaS adoption accelerates and AI agents proliferate, organizations face an explosion of human and non-human identities—and with it, growing risks like misconfigured access, orphaned accounts, a…
…
continue reading
1
From IT to Total Compliance Tracking with Adam Goslin
21:08
21:08
Play later
Play later
Lists
Like
Liked
21:08Jonathan Armstrong remains on assignment. Today, Tom visits with Adam Goslin, founder of Total Compliance Tracking, to discuss his journey from IT development and management to becoming a leader in the security and compliance sector. Adam shares his professional background, the challenges he faced with achieving PCI compliance, and the insights tha…
…
continue reading
1
Embedded Executive: The Same Level of Security Is Needed Whether You Have One Device or Millions | Infineon and CommScope
19:30
19:30
Play later
Play later
Lists
Like
Liked
19:30No matter what your end device is, be it a light bulb or a driver’s license, it needs to be secure. I don’t think we need to go through the reasons why it needs to be secure. How you do that is becoming increasingly more difficult. And you may be looking at protecting millions of devices, where each one needs its own unique identity. To get a handl…
…
continue reading
1
Live interviews from Oktane 2025: threats, AI in apps, and AI in cybersecurity tools - Brett Winterford, Shiv Ramji, Damon McDougald - ESW #426
1:35:13
1:35:13
Play later
Play later
Lists
Like
Liked
1:35:13How identity security can keep pace with the evolving threat landscape, with Brett Winterford Today's threat landscape has never been more complex. Malicious actors are leveraging tools like generative AI to develop more creative social engineering attacks that can have serious ramifications for businesses. Brett Winterford, VP of Okta Threat Intel…
…
continue reading
1
Embedded Executive: Move AI to the Endpoint | Ambiq
13:37
13:37
Play later
Play later
Lists
Like
Liked
13:37AI is a technology that generally requires a significant amount of power and high compute performance. Hence, it’s typically relegated to the Cloud or to an Edge-based computer. Performing AI at the endpoint has not been feasible for those reasons. With ambiq’s Sub-threshold Power Optimized technology (SPOT), performing AI at the endpoint is a real…
…
continue reading
1
Disruption is Coming for the Vulnerability Management Market - Tod Beardsley - ESW #425
1:47:15
1:47:15
Play later
Play later
Lists
Like
Liked
1:47:15Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and it shows. Let's talk about the state of VM. Check out https://securityweekly.com/runzero to learn more! Topic Segment: NPM Incidents In this week's topic segment, we're discussing all the NPM supply …
…
continue reading
1
Embedded Executive: Manual Vs. Automated Code Generation | TeleCANesis
11:44
11:44
Play later
Play later
Lists
Like
Liked
11:44We’ve done podcasts in the past that discussed automating your code documentation. But we haven’t touched much on automating the code generation itself until now. On this week’s Embedded Executives podcast, I spoke to Jonathan Hacker, the Founder and CTO of TeleCANesis, and that’s exactly what they do. We got into the issues of why automated coding…
…
continue reading
1
Forrester's AEGIS Framework, the weekly news, and interviews with Fortra and Island - Jeff Pollard, Rohit Dhamankar, Michael Leland - ESW #424
1:40:37
1:40:37
Play later
Play later
Lists
Like
Liked
1:40:37Segment 1 - Interview with Jeff Pollard Introducing Forrester's AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this episode's interview, we're talking to Forrester analyst Jeff Pollard. I'm pulling this segment's description directly from the report's executive summary, which I think says it best: As AI agents and ag…
…
continue reading
1
Embedded Executive: AI Is Hard. It’s OK To Ask For Help | CEVA
10:32
10:32
Play later
Play later
Lists
Like
Liked
10:32Designing a device that incorporates AI can be daunting, for a good reason—it’s very complex. When you push that design out to the Edge, it brings in even more challenges, both on the hardware and software sides of the equation. To understand what these challenges are and where a designer can turn for help, I spoke to Amir Panush, the CEO of CEVA, …
…
continue reading
1
Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - HD Moore, Jason Passwaters, J.J. Guy, Theresa Lanowitz, Mickey Bresman, Yuval Wollman, Jawahar "Jawa" Sivasankaran - ESW ...
2:06:06
2:06:06
Play later
Play later
Lists
Like
Liked
2:06:06Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity's most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue's global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
…
continue reading
1
Embedded Executive: How Secure is Secure Enough | Silicon Labs
13:26
13:26
Play later
Play later
Lists
Like
Liked
13:26Silicon Labs recently announced an MCU that has achieved the highest level of security possible to date, which is PSA Level 4. The questions you may be asking are, “What does that mean, and is this something I need to understand?” To get answers to these questions and many related ones, I spoke to Sharon Hagi, the Chief Security Officer at Silicon …
…
continue reading
1
Dave Lewis talks M&A due diligence, TBD topic, the weekly news - Dave Lewis - ESW #422
1:46:21
1:46:21
Play later
Play later
Lists
Like
Liked
1:46:21Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organiza…
…
continue reading
1
Embedded Executive: Quantum Cryptography Must Be Part of Your Vocabulary | Infineon
11:49
11:49
Play later
Play later
Lists
Like
Liked
11:49We’re in the era of quantum computing. That brings with it a lot of great things. But at the same time, it brings some not so good things. Once again, we’re in a race to stay ahead of the bad guys to keep our systems secure. Folks like the experts at Infineon are doing what they can to do just that. And the best part is that they are trying to insu…
…
continue reading
1
Oktane Preview with Harish Peri, Invisible Prompt Attacks, and the weekly news! - Harish Peri - ESW #421
1:49:28
1:49:28
Play later
Play later
Lists
Like
Liked
1:49:28Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
…
continue reading
1
Embedded Executive: Minimize Power in Today’s Data Centers | Point2 Technology
8:49
8:49
Play later
Play later
Lists
Like
Liked
8:49The boom coming from AI is requiring data centers to be built as fast as we can build them. To that end, there is a lot of discussion about the power that’s needed to drive these data centers. What there’s not a lot of discussion about are the interconnects that are used within these power-hungry computing camps. And that’s the specialty of Point2 …
…
continue reading
1
Rethinking risk based vulnerability management, Black Hat expo insights, and the news - Snehal Antani - ESW #420
1:55:35
1:55:35
Play later
Play later
Lists
Like
Liked
1:55:35Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
…
continue reading
1
Embedded Executive: Thermal Issues Continue to Propagate | Ventiva
11:38
11:38
Play later
Play later
Lists
Like
Liked
11:38For as long as we’ve been designing embedded computers and consumer electronics, we’ve had a problem figuring out how to handle the heat that’s created. Known as thermal management, the problem seems omnipresent as systems become more compact, processors run faster, and so on. Unfortunately, many designers don’t think about thermal management until…
…
continue reading
1
Rethinking Endpoint Strategy: Inside IGEL’s Preventive Security Model
38:02
38:02
Play later
Play later
Lists
Like
Liked
38:02In Episode 103 of IGEL Weekly, host Andy Whiteside and Chris Feeney dive deep into what it means to truly rethink endpoint strategy in 2025. Using James Millington’s recent blog as a guide, they explore IGEL’s Preventive Security Model — a lightweight, adaptive, and policy-aligned approach that moves beyond the bloated, reactive stacks of the past.…
…
continue reading
1
ESW at BlackHat and the weekly enterprise security news - ESW #419
45:44
45:44
Play later
Play later
Lists
Like
Liked
45:44Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard so far at this year's event. Adrian's on vacation, so this episode is featuring Jackie McGuire and Ayman Elsawah! News Segment Then, in the enterprise security news, Tons of funding! SentinelOne picks …
…
continue reading
1
Embedded Executive: Proper Antenna Design Can Make or Break Your Product | Taoglas
13:12
13:12
Play later
Play later
Lists
Like
Liked
13:12While it may not be as intimidating as it once was, antenna design can still be a make-or-break aspect of your end product. Make the antenna too big, and the end users balk. Make the antenna too small, and the device won’t function properly (and end users will balk). To understand where and how the antenna design should begin, I spoke with Dermot O…
…
continue reading
1
Weekly Enterprise Security News and Tips on Building Security From Day 1 - Guillaume Ross - ESW #418
1:45:52
1:45:52
Play later
Play later
Lists
Like
Liked
1:45:52The Weekly Enterprise News (segments 1 and 2) This week, we've had to make some last minute adjustments, so we're going to do the news first, split into two segments. This week, we're discussing: Some interesting funding Two acquisitions - one picked up for $250M, the other slightly larger, at $25 BILLION Interesting new companies! On the 1 year an…
…
continue reading
1
Embedded Executive: TSMC Ends Its GaN Run | Infineon
14:17
14:17
Play later
Play later
Lists
Like
Liked
14:17TSMC recently announced its exit from the GaN space. Well, maybe “announced” is the wrong word, but they did let customers know that they will not be producing GaN devices going forward. Details are still coming out, so we don’t know exactly when that stoppage will occur. So what does that mean for TSMC partners who relied on them to produce their …
…
continue reading
1
tj-actions Lessons Learned, US Cyber Offense, this week's enterprise security news - Dimitri Stiliadis - ESW #417
1:42:01
1:42:01
Play later
Play later
Lists
Like
Liked
1:42:01Interview Segment - Lessons Learned from the tj-actions GitHub Action Supply Chain Attack with Dimitri Stiliadis Breach analysis is one of my favorite topics to dive into and I'm thrilled Dimitri is joining us today to reveal some of the insights he's pulled out of this GitHub Actions incident. It isn't an overstatement to say that some of the less…
…
continue reading
1
Navigating GDPR in Global Outsourcing with Inge Zwick
23:20
23:20
Play later
Play later
Lists
Like
Liked
23:20Tom Fox takes a solo turn as Jonathan Armstrong is on assignment. Today, Tom visits with Inge Zwick, Executive Director, Head of Europe, and ESG Lead at Emapta Global, a global outsourcing company. They discuss the company’s operations, with a particular focus on managing GDPR compliance within the outsourcing framework. They also discuss common mi…
…
continue reading
1
Embedded Executive: Where To Place the Compute In a Car | NXP
12:04
12:04
Play later
Play later
Lists
Like
Liked
12:04Compute in the automobile is (again) moving toward consolidation and away from the discrete nature of multiple processors around the vehicle. Is this a trend that’s going to stick? I guess it depends on who you ask. In this case, I asked Robert Moran, the GM & VP for Automotive Processors at NXP Semiconductors. As we add AI and autonomous drive to …
…
continue reading
1
The Cyber Canon, ditching the SOC 2, and the weekly enterprise news - Helen Patton - ESW #416
1:49:28
1:49:28
Play later
Play later
Lists
Like
Liked
1:49:28Segment 1 - Interview with Helen Patton: Introducing the Cybersecurity Canon Did you know that there's a hall-of-fame for cybersecurity books? Over the past decade, the Cybersecurity Canon has published reviews on dozens of cybersecurity books and established a hall of fame. Hall of fame books are defined as titles that all cybersecurity profession…
…
continue reading
1
Embedded Executive: Your Devices Must Be Secure For a Long Time | Northern.tech
12:51
12:51
Play later
Play later
Lists
Like
Liked
12:51The Cyber Resilience Act (CRA) is a regulation designed to enhance cybersecurity for products mainly sold in Europe. It establishes common cybersecurity standards for hardware and software, requiring manufacturers to build security into their products from design through the products’ complete lifecycle. It’s this latter concept that can be troubli…
…
continue reading
1
Monzy Merza, How Much AI is Too Much, and the Weekly News - Monzy Merza - ESW #415
1:43:41
1:43:41
Play later
Play later
Lists
Like
Liked
1:43:41Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups build a basic wrapper around existing generative AI services like those offered by OpenAI and Anthropic. As a result, these services are expensive, and don't satisfy many security operations teams' p…
…
continue reading
1
Embedded Executive: AI Drives Autonomous Buses | Mozee
10:41
10:41
Play later
Play later
Lists
Like
Liked
10:41While most autonomous vehicle focus is on the automobile, Mozee is going in a slightly different direction, no pun intended. Mozee is focused on autonomous buses, or vehicles that transport large numbers of people. As you might expect, such a system has its challenges, in addition to those typically associated with an automobile. What makes the com…
…
continue reading
1
Mark Campbell of 3dot insights on AI, LLM’s, and the Future
1:13:50
1:13:50
Play later
Play later
Lists
Like
Liked
1:13:50In this episode, we sit down with Mark Campbell, CEO of 3DOT Insights, to explore the rapidly evolving world of Artificial Intelligence. Mark breaks down complex concepts like Large Language Models (LLMs), transformer models, and generative AI into everyday language—even using Dr. Seuss to explain how ChatGPT works. He also shares hard-earned wisdo…
…
continue reading
1
Identity, AI & Access: Highlights from Identiverse 2025 - Sagi Rodin, Ajay Amlani, Treb Ryan, Ajay Gupta, Artyom Poghosyan, Amir Ofek - ESW #414
1:49:38
1:49:38
Play later
Play later
Lists
Like
Liked
1:49:38Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
…
continue reading
1
Embedded Executive: AI and Space Travel | EdgeCortix
14:51
14:51
Play later
Play later
Lists
Like
Liked
14:51Two technologies seem to be barreling ahead at a rapid pace, and there is likely a convergence coming shortly, if it hasn’t already occurred. I’m referring to space travel and artificial intelligence. But in my limited knowledge, there appears to be a disconnect in this marriage, whereby how could AI make decisions on something it’s never encounter…
…
continue reading
1
The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413
1:52:05
1:52:05
Play later
Play later
Lists
Like
Liked
1:52:05Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organ…
…
continue reading
1
Embedded Executive: Acquisition Eases AI/ML Into Wearables | Nordic Semiconductor
9:13
9:13
Play later
Play later
Lists
Like
Liked
9:13Designing wearables with integrated AI /ML just got one step easier with Nordic Semiconductor’s acquisition of Neuton.AI. While the two companies had already been working together, you can expect a lot more integration between Nordic’s MCUs and the very low-power AI IP that Neuton.AI has become famous for. On this week’s Embedded Executives podcast…
…
continue reading