Expert analysts from Enterprise Management Associates (EMA) discuss the latest technologies impacting cybersecurity.
…
continue reading
Enterprise Cybersecurity Podcasts
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Inspiring & informing entrepreneurs and business owners
…
continue reading
theCUBEresearch principal Cybersecurity analyst Jon Oltsik hosts the newest SiliconANGLE podcast focusing on bridging the gap between Cybersecurity and all other parts of tech
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
…
continue reading
Verbose Mode is a bi-weekly podcast from the team at TuxCare, where IT pros Eric Hendricks and Chris DeMars dig into open source, enterprise IT, and cybersecurity without the jargon. Each episode blends real-world stories, practical insights, and a bit of geeky humor to keep sysadmins, developers, IT leaders, and open-source enthusiasts informed and inspired.
…
continue reading
Enterprise AI Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. The show is hosted by Evan Reiser, the CEO & founder of Abnormal AI, and Mike Britton, the CIO of Abnormal AI.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
…
continue reading
Inspiring & informing entrepreneurs and business owners
…
continue reading
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
…
continue reading
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
…
continue reading
The IoT For All Podcast is focused on bringing together the smartest and most creative minds in the Internet of Things (IoT) industry to share their knowledge and experiences with the world. The ultimate goal is to help others succeed and educate the world on the benefits and inner workings of the Internet of Things industry.
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
Tech Disruptors by Bloomberg Intelligence features conversations with thought leaders and management teams on disruptive trends. Topics covered in this series include cloud, e-commerce, cybersecurity, AI, 5G, streaming, advertising, EVs, automation, crypto, fintech, AR/VR, metaverse and Web 3.0. This podcast is intended for professional investors only. It is being prepared solely for informational purposes only and does not constitute an offer or investment advice.
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Tech Transformation with Evan Kirstel: A podcast exploring the latest trends and innovations in the tech industry, and how businesses can leverage them for growth, diving into the world of B2B, discussing strategies, trends, and sharing insights from industry leaders! With over three decades in telecom and IT, I've mastered the art of transforming social media into a dynamic platform for audience engagement, community building, and establishing thought leadership. My approach isn't about per ...
…
continue reading
The Security Bench offers insightful discussions on the latest cybersecurity concerns, innovations, technologies and so much more. My name is Duronke and I'm a Cloud & Enterprise Security Practitioner. I help FTSE100 companies protect themselves from IT related risk.
…
continue reading
Struggling to keep pace with the ever-changing world of technology? For experienced tech professionals, making sense of this complexity to find real strategic advantages is key. This series offers a clear path, featuring insightful, casual conversations with leading global experts, innovators, and key voices from Red Hat, all cutting through the hype. Drawing from Red Hat's deep expertise in open source and enterprise innovation, each discussion delves into new and emerging technologies-- fr ...
…
continue reading
In a world where technology moves faster than strategy, how do businesses keep their data and their future secure? Smarter, Strategic Thinking brings you conversations with leaders, innovators, and partners shaping the future of IT. From ransomware protection and storage innovation to smarter infrastructure decisions, each episode explores the strategies that matter most to today’s technology leaders. Hosted by Fortuna Data — trusted partners of IBM, Lenovo, Seagate, HYCU, QNAP, and Qualstar ...
…
continue reading
From technology to workplace culture, from geopolitical trends to economics, Heavy Strategy debates pivotal questions in enterprise IT. Hosts Johna Till Johnson & John Burke bring their technical expertise, analytical acumen, and contrasting viewpoints to discuss complex topics of interest to IT leaders. Frequently irreverent and always thought-provoking, these are the conversations you wish you could have at the leadership table. Tune in and join the think tank, where unanswered questions a ...
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
The Bare Metal Cyber CCISO Audio Course is your complete, executive-level training companion for mastering the Certified Chief Information Security Officer (CCISO) certification. Built for experienced cybersecurity professionals and strategic leaders, this Audio Course delivers over seventy focused episodes covering every domain, concept, and competency area tested on the official EC-Council exam. From governance, risk, and compliance to strategic planning, vendor oversight, and technical co ...
…
continue reading
The role of IT leaders has never been more critical or more complex. The Bridgecast is where enterprise tech decision-makers come to make sense of it all and to connect the dots between technology, strategy, and business success. Hosted by veteran technologist and Bridgepointe Chief Strategy Officer Scott Kinka, each episode features candid conversations with top CIOs, CTOs, Innovators, Authors and Analysts. Together, they explore how to simplify technology decisions, drive measurable outcom ...
…
continue reading
Dr. Darren Pulsipher, Chief Enterprise Architect for Public Sector, author and professor, investigates effective change leveraging people, process, and technology. Which digital trends are a flash in the pan—and which will form the foundations of lasting change? With in-depth discussion and expert interviews, Embracing Digital Transformation finds the signal in the noise of the digital revolution. People Workers are at the heart of many of today’s biggest digital transformation projects. Lea ...
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We're going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject's benefit or ju ...
…
continue reading
This feed is Light Reading's main podcast feed for "The Light Reading Podcast," "The Divide," "The Light Reading Extra," and "What's the Story?" Light Reading provides daily news, analysis and insight for the global communications networking and services industry. The publication was founded in 2000 and, since July 2016, has been a part of Informa Tech, a division of Informa PLC. We're part of a big team providing specialist research, media, events and training for businesses and professiona ...
…
continue reading
Kill Chain features experts and guests in the platform and vehicle cybersecurity space. Each week we'll discuss the latest in cybersecurity news as well as topics surrounding platform and vehicle cybersecurity.
…
continue reading
GlobalEdgeTalk is a podcast about Global entrepreneurs, executives, and innovators. In our episodes, we will be combining the best of storytelling with the richness of our guests' experiences in business, market-entry, entrepreneurship, and lifestyle. We strive to inspire, empower and transform entrepreneurs, businessmen, business owners, and all involved and determined around the world. Our episodes feature guests with global experiences, from CEOs of Fortune 500 companies to software devel ...
…
continue reading
Where business & technology meet. Covering topics as diverse as cybersecurity, enterprise software, hardware, data centers, blockchain, AI, cloud, 5G and IIoT.
…
continue reading
1
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
The Small Business Cyber Security Guy
The UK's leading small business cybersecurity podcast helping SMEs protect against cyber threats without breaking the bank. Join cybersecurity veterans Noel Bradford (CIO at Boutique Security First MSP) and Mauven MacLeod (ex-UK Government Cyber Analyst) as they translate enterprise-level security expertise into practical, affordable solutions for UK small businesses. 🎯 WHAT YOU'LL LEARN: - Cyber Essentials certification guidance - Protecting against ransomware & phishing attacks - GDPR comp ...
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Tech Tomorrow is your front-row seat to the conversations redefining the future. Each episode explores one big question about data, AI, or emerging tech, giving leaders clear, focused answers they can trust. If you're navigating complex innovation, from AI-augmented delivery to sustainability, this show helps you cut through the noise, connect cross-disciplinary trends, and lead with confidence in a rapidly evolving landscape. Previously known as Data Today, this podcast has examined how out ...
…
continue reading
The power of Data is undeniable. And unharnessed - it's nothing but chaos. Making data your ally. Using it to lead with confidence and clarity. Host Jess Carter is solving problems in real-time to reveal what's possible. Helping communities and people thrive. This is Data Driven Leadership, a show brought to you by Resultant.
…
continue reading
1
Cybersecurity Isn’t an IT Problem, It’s a Leadership Imperative
14:26
14:26
Play later
Play later
Lists
Like
Liked
14:26Scott Alldridge, a cybersecurity and AI governance thought leader, bestselling author of the VisibleOps series, and CEO of IP Services and the IT Process Institute … Read more The post Cybersecurity Isn’t an IT Problem, It’s a Leadership Imperative appeared first on Top Entrepreneurs Podcast | Enterprise Podcast Network.…
…
continue reading
1
Enterprise DevOps for Architects: Leverage AIOps and DevSecOps for secure digital transformation
13:22
13:22
Play later
Play later
Lists
Like
Liked
13:22A comprehensive guide for architects and engineers on implementing and scaling modern DevOps practices within large enterprises, focusing heavily on automation, quality assurance, and security. Key topics covered include defining DevOps architecture, managing IT delivery in sourcing models, leveraging AIOps (Artificial Intelligence for IT Operation…
…
continue reading
1
How Can Businesses Address Guardrails for Autonomous AI Agents with Permissions?
24:58
24:58
Play later
Play later
Lists
Like
Liked
24:58“People love the idea that an agent can go out, learn how to do something, and just do it,” Jeff Hickman, Head of Customer Engineering, Ory, said. “But that means we need to rethink authorization from the ground up. It’s not just about who can log in; it’s about who can act, on whose behalf, and under what circumstances.” In the latest episode of T…
…
continue reading
1
Health and Wellness of the CISO as They Crack Under Pressure and Need a BISO to Scale - Dr. Yonesy Núñez - BSW #422
56:46
56:46
Play later
Play later
Lists
Like
Liked
56:46It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
…
continue reading
1
Hands-on Data Virtualization with Polybase: Administer Big Data, SQL Queries and Data Accessibility Across Hadoop, Azure, Spark, Cassandra
15:37
15:37
Play later
Play later
Lists
Like
Liked
15:37These excerpts from the book "Hands-on Data Virtualization with Polybase" provide an extensive look at how to implement data virtualization using PolyBase within SQL Server, including its use in Big Data Clusters and Azure Synapse Analytics. The text thoroughly explains the technical details, prerequisites, and setup procedures for connecting SQL S…
…
continue reading
1
3492: How Mammoth Enterprise AI Browser Redefines Security at the Endpoint
26:41
26:41
Play later
Play later
Lists
Like
Liked
26:41Have you ever wondered what happens when the browser stops being a simple window to the web and starts becoming the control point for how AI touches every part of enterprise life? That was the starting point for my conversation with Michael Shieh, founder and CEO of Mammoth Cyber. What followed was a detailed look at why the browser is turning into…
…
continue reading
1
Clarity, Culture, and Change: Leading with Data-Driven Strategy
26:10
26:10
Play later
Play later
Lists
Like
Liked
26:10In today's fast-paced world, organizations can't rely on static, long-term plans. Strategies must continuously evolve to stay relevant. In this episode, Resultant EVP of Professional Services Mike Hughes shares his insights on leading through rapid change. He discusses how to maintain organizational health, align culture with strategy, and foster c…
…
continue reading
1
3491: From NHL Ice to Enterprise Data: Ataccama's CEO on Building AI That Actually Works
30:58
30:58
Play later
Play later
Lists
Like
Liked
30:58What happens when a former NHL player who once faced Wayne Gretzky ends up running a global data company that sits at the center of the AI boom? That question kept coming back to me as I reconnected with Mike McKee, the CEO of Ataccama, seven years after our last conversation. So much has shifted in the world since then, yet the theme that shaped t…
…
continue reading
1
Cloudflare, Gh0stRAT, npm, North Koreans, Arch, Steam, Documentaries, Aaran Leyland.. - SWN #530
35:24
35:24
Play later
Play later
Lists
Like
Liked
35:24Cloudflare, Gh0stRAT, npm, North Korean Employees, Arch Linux Steam Machine, Documentaries, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-530
…
continue reading
1
Building Trust as the Foundation of Leadership
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20Erin Stahla, Co-owner of Stahla Services, a nationwide provider of restroom, shower, and ADA trailer rentals joins Enterprise Radio. Erin will discuss the importance … Read more The post Building Trust as the Foundation of Leadership appeared first on Top Entrepreneurs Podcast | Enterprise Podcast Network.…
…
continue reading
1
Building Trust as the Foundation of Leadership
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20Erin Stahla, Co-owner of Stahla Services, a nationwide provider of restroom, shower, and ADA trailer rentals joins Enterprise Radio. Erin will discuss the importance … Read more The post Building Trust as the Foundation of Leadership appeared first on Top Entrepreneurs Podcast | Enterprise Podcast Network.…
…
continue reading
Interested in being a guest? Email us at [email protected] Tired of chatbots that stall when customers need real help? We dive into how agentic AI flips the script by taking actions inside your systems—issuing refunds within limits, updating orders, authenticating users, and escalating with intent—while humans handle complex, high-empathy momen…
…
continue reading
1
Is Current DLP Failing Data Security in the Age of Generative AI?
20:17
20:17
Play later
Play later
Lists
Like
Liked
20:17With more and more organisations adopting AI as part of their operations, a new layer of data risk has begun to emerge. In the recent episode of The Security Strategist Podcast, guest Gidi Cohen, CEO and Co-Founder of Bonfy.AI, sat down with host Richard Stiennon, Chief Research Analyst at IT Harvest. They discussed the reasons traditional data los…
…
continue reading
1
HS117: Environmental, Social and Governance Initiatives: What That Means for Your Organization (Sponsored)
34:13
34:13
Play later
Play later
Lists
Like
Liked
34:13Environmental, Social, Governance (ESG) initiatives aren’t just “the right thing to do”, they can also save companies real dollars, particularly if they’re investing in data centers and other infrastructure. Join Jonathan Ciccio, Continuous Improvement Manager for The Siemon Company, as we discuss The Siemon Company’s ESG initiatives. The Siemon Co…
…
continue reading
1
Why AI Supercharges Collective Learning and Community Insight
45:41
45:41
Play later
Play later
Lists
Like
Liked
45:41In a world dominated by loud voices and social media echo chambers, Dr. Darren invites Sandy, a leading mind in human-centered AI, to the podcast. Together, they delve into an innovative platform called deliberations.io. This episode is a deep dive into the essence of fostering genuine dialogue and collaboration, stripping away the noise of traditi…
…
continue reading
1
Building Resilience in the Age of AI-Driven Networks
27:34
27:34
Play later
Play later
Lists
Like
Liked
27:34In this live episode of The Bridgecast, recorded at the Bridgepoint Tech Summit 2025, host Scott Kinka welcomes Chad Townes, Senior Vice President of AT&T Partner Solutions, for an in-depth exploration of enterprise connectivity, AI-driven networking, and the infrastructure powering tomorrow's business landscape. With over 30 years of experience sp…
…
continue reading
1
The Divide: How Digicel is recovering from Hurricane Melissa
31:26
31:26
Play later
Play later
Lists
Like
Liked
31:26This week: Digicel's Liam Donnelly joins the podcast to discuss how the operator is restoring network services in regions ravaged by Hurricane Melissa. We also cover broader digital divide issues affecting the Caribbean and more. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
1
3490: How Zenoti Is Redefining Guest Experience With AI
26:11
26:11
Play later
Play later
Lists
Like
Liked
26:11What happens when a former Microsoft leader walks away from tech, immerses himself in personal wellbeing, and accidentally discovers one of the biggest blind spots in the global spa, salon, and wellness industry? That question sat with me as I spoke with Sudheer Koneru, founder and CEO of Zenoti, who has shaped one of the most influential platforms…
…
continue reading
1
DtSR Episode 680 - Debating Patching and Vulnerability Scoring
55:57
55:57
Play later
Play later
Lists
Like
Liked
55:57TL;DR: We heard RSnake's take on CVSS and CVEs and such, now let's hear Brian "Jericho" Martin's take. The gloves are off, and the opinions go native when we take this episode live. Brian doesn't pull any punches, and apparently I'm the only one without a pocket full of $2 bills? Sorry for the explicit rating, that's Brian's fault. YouTube Video: h…
…
continue reading
1
Beyond Firewalls: The People Behind Cyber Resilience with Nathan Wenzler, Field CISO at Optiv
50:34
50:34
Play later
Play later
Lists
Like
Liked
50:34This episode features Nathan Wenzler, Field Chief Information Security Officer at Optiv. With nearly 30 years of experience leading cybersecurity programs across government agencies, nonprofits, and Fortune 1000 companies, Nathan has spent his career at the intersection of people, process, and technology. He’s helped organizations redefine what it …
…
continue reading
1
Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
…
continue reading
1
Hands-on DevOps with Linux: Build and Deploy DevOps Pipelines Using Linux Commands, Terraform, Docker, Vagrant, and Kubernetes
17:15
17:15
Play later
Play later
Lists
Like
Liked
17:15A practical guide for building and deploying DevOps pipelines using various open-source tools. The content focuses heavily on Linux fundamentals, including managing files, directories, users, and permissions, while also introducing modern DevOps practices. Specific technologies covered are VirtualBox and Vagrant for creating environments, core web …
…
continue reading
1
3489: Tredence on Why Data Darwinism Will Shape the Next Wave of Enterprise AI
30:36
30:36
Play later
Play later
Lists
Like
Liked
30:36What happens when enterprise AI moves faster than the data foundations meant to support it? That question guided my conversation with Sumit Mehra, CTO and Co-Founder of Tredence, who joined me while travelling between customer meetings on the US West Coast. Sumit has a clear view of what is coming next, and he believes we are entering a phase he ca…
…
continue reading
1
SambaNova CEO Liang on Powering AI Efficiently
30:12
30:12
Play later
Play later
Lists
Like
Liked
30:12“The world’s now flipped to inference — and it’s limited by power. With the same energy, we can deliver four times the output of a Blackwell,” says SambaNova CEO Rodrigo Liang. Liang joins Bloomberg Intelligence’s Kunjan Sobhani in this episode of the Tech Disruptors podcast to explain how SambaNova’s air-cooled, 10-kilowatt racks and “data-center-…
…
continue reading
1
If Identity Becomes Portable, Does Trust Become Universal?
27:10
27:10
Play later
Play later
Lists
Like
Liked
27:10Interested in being a guest? Email us at [email protected] Trust has become the entry ticket to the internet, and users are now choosing safety over price and speed. We sit down with Raj from Trua to dig into the 2025 Trust Survey and why verification has shifted from a nice-to-have to a must-have. From shocking stats on consumer expectations t…
…
continue reading
1
EP252 The Agentic SOC Reality: Governing AI Agents, Data Fidelity, and Measuring Success
35:53
35:53
Play later
Play later
Lists
Like
Liked
35:53Guests: Alexander Pabst, Deputy Group CISO, Allianz Lars Koenig, Global Head of D&R, Allianz Topics: Moving from traditional SIEM to an agentic SOC model, especially in a heavily regulated insurer, is a massive undertaking. What did the collaboration model with your vendor look like? Agentic AI introduces a new layer of risk - that of unconstrained…
…
continue reading
1
When IT Meets OT, Can Endpoint Security Hold The Line
23:35
23:35
Play later
Play later
Lists
Like
Liked
23:35How do you protect factory floors, utilities, and critical infrastructure when IT and OT finally run on the same nervous system? That is the challenge at the heart of my latest conversation with John Walsh, Field CTO at IGEL Technology, recorded live at the IGEL Now and Next event in Frankfurt. Back in March in Miami, John and I talked about zero t…
…
continue reading
1
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433
1:56:49
1:56:49
Play later
Play later
Lists
Like
Liked
1:56:49Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
…
continue reading
1
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433
1:56:50
1:56:50
Play later
Play later
Lists
Like
Liked
1:56:50Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
…
continue reading
1
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433
1:56:49
1:56:49
Play later
Play later
Lists
Like
Liked
1:56:49Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
…
continue reading
1
Hands-on Penetration Testing for Web Applications: Run Web Security Testing on Modern Applications Using Nmap, Burp Suite and Wireshark
14:35
14:35
Play later
Play later
Lists
Like
Liked
14:35A comprehensive guide for security professionals and testers, detailing methodologies for identifying and exploiting numerous web application vulnerabilities. It extensively covers topics like authentication flaws, session management issues, access controls, injection attacks (such as SQL and XML injection), and Cross-Site Scripting (XSS), using to…
…
continue reading
1
3488: How Akeneo Sees the Future of Product Experience in an AI First Retail World
25:57
25:57
Play later
Play later
Lists
Like
Liked
25:57What happens when AI becomes the centre of how we shop, yet trust still determines whether any of it works? That question shaped my conversation with Romain Fouache, CEO of Akeneo, who joined me to unpack the latest consumer data on AI driven shopping experiences. Retail giants might be setting the pace, but the real story sits in how everyday shop…
…
continue reading
1
3487: vFairs Explains the Next Chapter of Event Tech
26:06
26:06
Play later
Play later
Lists
Like
Liked
26:06What happens when events become the most human channel in a world increasingly shaped by AI? That thought set the tone for my conversation with Muhammad Younas, founder and CEO of vFairs, who has spent years helping organisations design in-person, virtual, and hybrid experiences at a remarkable scale. With more than fifty thousand events delivered …
…
continue reading
1
IBM Watson Solutions for Machine Learning: Achieving Successful Results Across Computer Vision, Natural Language Processing and AI Projects
19:23
19:23
Play later
Play later
Lists
Like
Liked
19:23Provides comprehensive instruction on IBM Watson Solutions for Machine Learning, covering various aspects of Artificial Intelligence (AI) and cognitive tools. The text is structured as a book, detailing concepts from foundational machine learning (ML) and deep learning algorithms, such as linear regression and neural networks, to practical implemen…
…
continue reading
1
From Career Break to COO: How Jennifer Yeh Built the Systems Behind a $10M Photography Startup
13:33
13:33
Play later
Play later
Lists
Like
Liked
13:33Jennifer Yeh, Co-Founder & COO of Shoott, the women-led photography platform operating in 60+ U.S. cities joins Enterprise Radio. Listen to host Eric Dye… Read more The post From Career Break to COO: How Jennifer Yeh Built the Systems Behind a $10M Photography Startup appeared first on Top Entrepreneurs Podcast | Enterprise Podcast Network.…
…
continue reading