Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Endpoint Security Strategies Podcasts
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Join us on Proofpoint’s Insider Insight, the podcast where we delve deep into the intricate realm of Endpoint Data Loss Prevention (DLP) and Insider Threat Management (ITM). In each episode, we unravel the complexities of safeguarding your organization's sensitive information by adopting a people-centric approach to managing insider threats. From inadvertent mistakes to malicious intent, insider threats pose a significant risk to the confidentiality and integrity of your data. This podcast i ...
…
continue reading
Welcome to "Analyze Happy: Crafting Your Modern Data Estate", the podcast where data meets delight! Dive into the world of modern data estate tools and discover how to harness advanced analytics, data governance, and AI transformation to accelerate growth in your organization. With a spotlight on the Microsoft ecosystem—think Fabric, Azure Databricks, Power Platform, IoT Edge, and Real-Time Intelligence—we’ll explore best practices, actionable insights, and the latest innovations to build a ...
…
continue reading
IGEL provides the next-gen edge OS for cloud workspaces. Their solutions offer you extreme CAPEX hardware cost savings, sharply reduced ongoing operating expenses, and a more secure and manageable endpoint management and control platform across nearly any x86 device. We will discuss the endpoint trends in the industry, IGEL updates, and general news. XenTegra is THE preferred IGEL partner
…
continue reading
As part of Workplace Ninjas Netherlands, we will publish podcast recordings about several topics regarding the Workplace. These will be hosted in our live events and the recordings will be published.
…
continue reading
Broadcasting from Dubai, The CTO Show with Mehmet explores the latest trends in technology, startups, and venture funding. Host Mehmet Gonullu leads insightful discussions with thought leaders, innovators, and entrepreneurs from diverse industries. From emerging technologies to startup investment strategies, the show provides a balanced view on navigating the evolving landscape of business and tech, helping listeners understand their profound impact on our world. [email protected]
…
continue reading
The RocketMSP Podcast, formerly known as MSP Webinars, is a comprehensive platform that caters to Managed Service Providers (MSPs) and the IT community. Hosted by Steve Taylor, a seasoned IT professional, the podcast serves as a knowledge exchange hub, offering a wealth of industry insights, best practices, and innovative solutions. Each episode features interviews and conversations with MSP business owners, channel vendors, and other noteworthy figures in the IT space. The podcast aims to p ...
…
continue reading

1
Rethinking Identity: IAM, PAM & Passwordless Trends from Identiverse - David Lee, Amit Masand, Chip Hughes, Ashley Stevenson, John Pritchard, Matt Caulfield - ESW #412
1:38:23
1:38:23
Play later
Play later
Lists
Like
Liked
1:38:23In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
…
continue reading

1
#486 The Brave Leap: Michael Cutajar on Automating Accounting with AI Agents & Building with Purpose
40:38
40:38
Play later
Play later
Lists
Like
Liked
40:38In this episode of The CTO Show with Mehmet, we sit down with Michael Cutajar, CEO of AI Partners, who’s on a mission to fix the broken world of accounting through the power of AI agents. From his early days as a PwC accountant in Malta to founding multiple startups—including a VR venture and now an AI-driven automation company—Michael shares what …
…
continue reading

1
Donut Holes, clickfix, rapperbots, bad devs, war, Doug Rants about Backups, and More. - SWN #487
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37Donut Holes, clickfix, rapperbots, bad devs, war, Doug Rants about Backups, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-487
…
continue reading
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
…
continue reading

1
#485 Scaling Starts with People: Nahed Khairallah on Building Teams That Don’t Break
1:02:38
1:02:38
Play later
Play later
Lists
Like
Liked
1:02:38Mehmet sits down with Nahed Khairallah, founder of Organized Chaos, to discuss why startups that reach initial traction often stall or fail due to people-related blind spots. With experience advising over 150 startups globally, Nahed unpacks the tactical, cultural, and strategic layers of building scalable teams that last. 🔑 Key Takeaways • 🚫 The r…
…
continue reading

1
Implementing Data Mesh with Microsoft Fabric Domain
15:07
15:07
Play later
Play later
Lists
Like
Liked
15:07Send us a text In this episode, we dive deep into how Microsoft Fabric is revolutionizing enterprise data architecture with its powerful Domains feature—an essential building block for implementing a modern data mesh. Join us as we explore: What a data mesh really is—and why it's the future of scalable, decentralized data operations How Fabric Doma…
…
continue reading

1
CISO Cyber Insurance Empowerment - Morey Haber, Peter Hedberg, Stephan Jou - BSW #400
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
…
continue reading

1
AI Zombie Lawyer, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet - SWN #486
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26AI Zombie Lawyers, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-486
…
continue reading

1
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
…
continue reading

1
#484 The CTO as Orchestrator: Naga Vadrevu on Leading Tech with First Principles
42:33
42:33
Play later
Play later
Lists
Like
Liked
42:33In this episode of The CTO Show with Mehmet, Naga Vadrevu, Chief Technology Officer at Wonderschool and former engineering leader at Square, Adobe, and Autodesk, shares his journey from big tech to startup disruption. Naga dives deep into how he applies AI and machine learning to revolutionize childcare access in the U.S., and why modern CTOs must …
…
continue reading

1
PII, Purview, and Private Endpoints: Governing Data in Hybrid Databricks-Fabric Setups
31:19
31:19
Play later
Play later
Lists
Like
Liked
31:19Send us a text In this deep-dive episode, we explore the complexities—and solutions—of managing data governance across a hybrid architecture combining Azure Databricks with Unity Catalog and Microsoft Fabric with OneLake. If your organization handles PII across cloud platforms, this conversation is for you. We unpack: Why the lack of private endpoi…
…
continue reading

1
WPNinjasNL Podcast – Intune What's New: June 2025 Edition
47:08
47:08
Play later
Play later
Lists
Like
Liked
47:08Welcome to the June 2025 edition of the Workplace Ninja Netherlands podcast – What’s New! In this episode, we dive into the latest updates in Microsoft Intune, Endpoint Management, and security enhancements across platforms.🔍 Topics covered:Vulnerability Remediation Agent for Intune (Public Preview)🔗 https://learn.microsoft.com/en-us/intune/intune-…
…
continue reading

1
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411
1:19:04
1:19:04
Play later
Play later
Lists
Like
Liked
1:19:04Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
…
continue reading

1
#483 Bootstrapping in Motion: Nelson Nigel’s Blueprint from Yellow Cab to Kidmoto
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14In this episode, Mehmet Gonullu sits down with Nelson Nigel, the founder of Kidmoto, a ride-hailing service designed specifically for families traveling with young children. From driving a yellow cab in New York to building a tech-enabled transportation service operating in 64+ cities, Nelson shares how he bootstrapped his company past $1M in reven…
…
continue reading

1
$200,000 Zoom Call, Microsoft, Zero-Click, China & HD With $649 million of Bitcoin - SWN #485
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38This week we have, $200,000 Zoom Call, Microsoft Teams, INTERPOL, Zero-Click, Junk Food, China & Hard Drive With $649 million of Bitcoin. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-485
…
continue reading

1
AI Readiness: Beyond the Hype — What Fortune 500s Must Get Right
18:27
18:27
Play later
Play later
Lists
Like
Liked
18:27Send us a text In this episode, we unpack what it truly means to be AI-ready in today’s enterprise landscape. While many companies rush into “shiny AI use cases,” we go deeper—breaking down the three pillars of readiness: data quality, infrastructure maturity, and human capital. But that’s just the starting point. Drawing from the latest Cisco AI R…
…
continue reading

1
The Databricks-Fabric Connection: Paths, Pitfalls, and Possibilities
18:21
18:21
Play later
Play later
Lists
Like
Liked
18:21Send us a text In this deep-dive episode, we unpack the technical and strategic implications of integrating Databricks with Microsoft Fabric. As enterprises increasingly operate across hybrid data ecosystems, ensuring seamless interoperability between platforms is critical. This episode covers the full landscape—OneLake mounting techniques, Delta S…
…
continue reading

1
Healing with Data: Navigating Healthcare Governance & Compliance in 2025
26:05
26:05
Play later
Play later
Lists
Like
Liked
26:05Send us a text In this episode, we explore the evolving landscape of healthcare data governance and regulatory compliance. From HIPAA and GDPR to emerging cybersecurity mandates, we unpack the critical frameworks shaping how patient data is protected in mid-sized to enterprise healthcare organizations. Tune in to learn: What HIPAA, HITECH, GDPR, an…
…
continue reading

1
Fabric vs. Databricks: Securing Confidential Data in the Modern Azure Stack
36:20
36:20
Play later
Play later
Lists
Like
Liked
36:20Send us a text In this episode, we dive deep into how Microsoft Fabric stacks up against Azure Databricks' Unity Catalog when managing confidential and highly regulated data like Personally Identifiable Information (PII). You'll learn: The current state of Fabric's governance features, including Purview integration, access control via Azure AD, and…
…
continue reading

1
SAP + Databricks: Real-Time Insights Without Replication — Unlocking AI with Business Data Cloud
26:37
26:37
Play later
Play later
Lists
Like
Liked
26:37Send us a text n this episode, we dive deep into SAP’s strategic integration with Databricks—powered by SAP Business Data Cloud (BDC)—to explore how enterprises are unlocking AI, machine learning, and real-time analytics on top of their most critical business data without costly data replication. We’ll break down: What SAP Business Data Cloud is an…
…
continue reading

1
UEFI Vulnerabilities Galore - PSW #878
2:10:48
2:10:48
Play later
Play later
Lists
Like
Liked
2:10:48This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
…
continue reading

1
#482 The Browser Is the New Battleground: John Carse on Securing the Modern Endpoint
49:37
49:37
Play later
Play later
Lists
Like
Liked
49:37In this episode of The CTO Show with Mehmet, we’re joined by John Carse, Field CISO at SquareX, to explore a fast-emerging shift in cybersecurity: the browser as the new endpoint. John shares why traditional tools like EDR and CASB are no longer sufficient, how modern threats are bypassing enterprise defenses, and what CISOs need to prioritize in a…
…
continue reading

1
Microsoft 365 Copilot Newsroom - May 2025
40:05
40:05
Play later
Play later
Lists
Like
Liked
40:05Want a quick download of the latest releases, updates, and tips for Microsoft 365 Copilot? With ongoing updates and new releases, it can be hard to keep up with all the great things you can do in M365 Copilot. Valorem Reply’s Modern Work experts are offering a Microsoft 365 Copilot Newsroom series where we compile the most important news and learni…
…
continue reading

1
Microsoft 365 Copilot Newsroom - April 2025
28:00
28:00
Play later
Play later
Lists
Like
Liked
28:00Want a quick download of the latest releases, updates, and tips for Microsoft 365 Copilot? With ongoing updates and new releases, it can be hard to keep up with all the great things you can do in M365 Copilot. Valorem Reply’s Modern Work experts are offering a Microsoft 365 Copilot Newsroom series where we compile the most important news and learni…
…
continue reading

1
Security Money: The Index is Up, CISOs Need to Get Out, and Are You Burning Out? - BSW #399
56:27
56:27
Play later
Play later
Lists
Like
Liked
56:27This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
…
continue reading

1
Vixen Panda, NPM, Roundcube, IoT, 4Chan, Josh Marpet, and more... - SWN #484
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23Vixen Panda, NPM, Roundcube, IoT, 4Chan, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-484
…
continue reading

1
#481 Go-to-Market Clarity in a Noisy World: Jan van Schuppen’s GTM Wisdom
45:22
45:22
Play later
Play later
Lists
Like
Liked
45:22In this episode, Mehmet sits down with Jan van Schuppen, a seasoned sales entrepreneur and founder of Ideas in Spades, who has led global B2B sales teams for over 30 years. They explore the biggest myths in go-to-market (GTM) strategy, the traps of founder-led content, how to balance automation with authenticity, and why selling before building is …
…
continue reading

1
Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334
1:09:09
1:09:09
Play later
Play later
Lists
Like
Liked
1:09:09CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
…
continue reading

1
The enterprise security news, more secure by removing credentials, & RSAC interviews - Marty Momdjian, Amit Saha, Dr. Tina Srivastava - ESW #410
1:38:02
1:38:02
Play later
Play later
Lists
Like
Liked
1:38:02Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
…
continue reading

1
#480 The Dangerous Gap: Why Startups Fail After MVP – Insights from Ali Hafizji
35:58
35:58
Play later
Play later
Lists
Like
Liked
35:58In this episode of The CTO Show with Mehmet, we’re joined by Ali Hafizji, founder of the product development agency Wednesday, for a candid look into one of the most overlooked phases in startup growth: the dangerous gap between MVP and Product-Market Fit (PMF). We explore why many startups lose momentum after MVP, how to avoid premature scaling, t…
…
continue reading

1
Elsa, Redline, ChaosRat, iMessage, Bladed Feline , Aaran Leyland, and More... - SWN #483
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00Elsa, Redline, ChaosRat, iMessage, Bladed Feline , Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-483
…
continue reading

1
Updating & Protecting Linux Systems - PSW #877
1:05:23
1:05:23
Play later
Play later
Lists
Like
Liked
1:05:23Two parts to this episode: Tech Segment: Updating Linux Systems - Beyond apt-get upgrade * Custom scripts for ensuring your Linux systems are up-to-date * topgrade - tutorial for using topgrade to update Linux systems on various Linux distributions Discussion Topic: Anti-Malware and/or EDR on Linux Platforms * PCI calls for scanning Linux systems *…
…
continue reading

1
#479 Rewriting the Music Playbook: Jeremy Sirota on Innovation, AI, and Artist Empowerment
44:54
44:54
Play later
Play later
Lists
Like
Liked
44:54In this episode of The CTO Show with Mehmet, we dive into the transformation of the global music industry with Jeremy Sirota, CEO of Merlin, the world’s leading digital licensing partner for independent music labels. Jeremy unpacks how Merlin is leveling the playing field for indie artists, leveraging tech and AI to streamline music licensing, and …
…
continue reading

1
Regain Control of Business Risks, Your Leadership Habits, and Being Present - Alla Valente - BSW #398
1:18:17
1:18:17
Play later
Play later
Lists
Like
Liked
1:18:17During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
…
continue reading

1
Bovril, Deranged, Crocodilus, Cartier, Jinx, Conti, Scattered Spider, Josh Marpet... - SWN #482
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10Bovril, Deranged Hookworm, Crocodilus, Cartier, Jinx, Conti, Scattered Spider, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-482
…
continue reading

1
#478 100x Outcomes, Not 10x Hype: AI Execution Strategies with Matt Leta
55:03
55:03
Play later
Play later
Lists
Like
Liked
55:03In this episode of The CTO Show with Mehmet, we dive deep into what it really takes to implement AI that works—not just experiments, but systems that scale. Joining us is Matt Leta, founder & CEO of Future Works, an AI-native company built alongside generative AI as his co-founder. 🔑 Key Takeaways • AI alone isn’t enough—without workflow integratio…
…
continue reading

1
AIs, MCPs, and the Acutal Work that LLMs Are Generating - ASW #333
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
…
continue reading

1
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409
1:38:33
1:38:33
Play later
Play later
Lists
Like
Liked
1:38:33Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
…
continue reading

1
#477 The Singularity of Hope: Sam Sammane on Amplifying Humanity with AI
54:33
54:33
Play later
Play later
Lists
Like
Liked
54:33In this thought-provoking episode of The CTO Show with Mehmet, we welcome Sam Sammane, physicist, serial entrepreneur, and author of The Singularity of Hope. With a background in nanotechnology, life sciences, and AI, Sam offers a rare mix of technical depth and philosophical insight. Together, we explore how AI is reshaping business, creativity, a…
…
continue reading

1
Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland... - SWN #481
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-481
…
continue reading
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
…
continue reading

1
#476 Stop Pitching Tech, Start Selling Outcomes: Josh Dorfman’s Advice for Climate Founders
57:15
57:15
Play later
Play later
Lists
Like
Liked
57:15In this episode, Mehmet is joined by Josh Dorfman, CEO of Supercool and host of the Supercool podcast. Josh is a serial sustainability entrepreneur, former investor, and media trailblazer with two decades of experience scaling climate-focused ventures. From founding The Lazy Environmentalist to helping build a company that landed a 10M panel deal w…
…
continue reading

1
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Jordan Avnaim, Chris Hickman, Amit Sinha, Albert Estevez Polo - BSW #397
1:07:59
1:07:59
Play later
Play later
Lists
Like
Liked
1:07:59This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
…
continue reading

1
AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more... - SWN #480
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-480
…
continue reading

1
#475 Focus, Grit, and Product-Market Fit: Lessons from Anya Cheng’s Startup Journey
50:43
50:43
Play later
Play later
Lists
Like
Liked
50:43In this episode, Mehmet sits down with Anya Cheng, the founder and CEO of Taelor, a fashion-tech startup revolutionizing how busy men dress—without shopping or doing laundry. With past leadership roles at Meta, eBay, and McDonald’s, Anya brings a unique product mindset and startup resilience that shines through her journey from MVP to raising milli…
…
continue reading

1
AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Shahar Man, Brian Fox, Mark Lambert - ASW #332
1:04:35
1:04:35
Play later
Play later
Lists
Like
Liked
1:04:35ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
…
continue reading

1
Reality check on SOC AI; Enterprise News; runZero and Imprivata RSAC interviews - Erik Bloch, HD Moore, Joel Burleson-Davis - ESW #408
1:49:38
1:49:38
Play later
Play later
Lists
Like
Liked
1:49:38Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
…
continue reading

1
#474 Execution Over Ideas: Andy Cwik on Building and Scaling
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52Episode Overview In this episode of The CTO Show with Mehmet, Andy Cwik—co-founder and CEO of Hubub—shares his lessons from three startups, including the painful failures and meaningful wins. From crashing his first startup to exiting a telehealth company, Andy now leads Hubub, a SaaS platform that automates client entertainment for B2B teams. He o…
…
continue reading

1
Keyboards, 3am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland... - SWN #479
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37Keyboards, 3 am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-479
…
continue reading

1
Malware Laced Printer Drivers - PSW #875
2:01:59
2:01:59
Play later
Play later
Lists
Like
Liked
2:01:59This week in the security news: Malware-laced printer drivers Unicode steganography Rhode Island may sue Deloitte for breach. They may even win. Japan's active cyber defense law Stop with the ping LLMs replace Stack Overflow - ya don't say? Aggravated identity theft is aggravating Ivanti DSM and why you shouldn't use it EDR is still playing cat and…
…
continue reading