Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Enterprise Security Risk Podcasts

show episodes
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Caffeinated Risk

McCreight & Leece

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
  continue reading
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst John Dilgen brings extensive expertise in cyber threat intelligence and incident response, specializing in researching threats impacting ReliaQuest customers. John and his guests provide practical perspectives on t ...
  continue reading
 
Artwork

1
Ctrl+Alt+Azure

Tobias Zimmergren, Jussi Roine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Ctrl+Alt+Azure offers weekly conversations on Microsoft Azure, cloud strategy, security, identity, and generative AI - focused on what matters for architects, developers, CIOs, and CISOs. Hosted by industry experts Tobias Zimmergren and Jussi Roine.
  continue reading
 
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
  continue reading
 
Artwork

1
Enterprise AI Defenders

The AI in Enterprise Software Podcast Series

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Enterprise AI Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. The show is hosted by Evan Reiser, the CEO & founder of Abnormal AI, and Mike Britton, the CIO of Abnormal AI.
  continue reading
 
Artwork

1
Technical Debt: Design, risk and beyond

Maxim Silaev & Nikita Golovko

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
We talk to experienced architects and technology leaders about the architectural choices they’ve made — the good, the bad, and the costly. From scaling systems to integrating legacy platforms, from misaligned domains to governance gaps, we discuss how architecture impacts technical debt. You’ll hear honest stories of architectural missteps, what teams learned from them, and how they built systems designed not just to work, but to last.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
  continue reading
 
Artwork

1
Enterprising Investor

CFA Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Enterprising Investor is the flagship podcast of CFA Institute and the definitive program for the investment management industry. As stewards of the investment industry, Enterprising Investor will feature intimate conversations with some of the most influential people from the world of finance about the topics that matter most to investment professionals.
  continue reading
 
Building AI: Securing the Future of Artificial Intelligence is the podcast for leaders navigating the security challenges of modern AI infrastructure. Host David Yacov speaks with CISOs, security engineers, and enterprise leaders building secure AI systems, from privacy-preserving synthetic data and MLOps security to AI governance, regulatory compliance, and infrastructure risk management. If you're securing AI infrastructure, managing AI compliance, or building trustworthy AI systems, this ...
  continue reading
 
Description: Creating AI Trust is a very complex and hard problem. It is not clear what it is and how it can be operationalized. We will demystify what is Trustworthy AI, efficient adoption and leveraging it for reducing risks in AI programs. McKinsey reports indicates companies seeing the biggest bottom-line returns from AI—those that attribute at least 20 percent of EBIT or profitability to their use of AI—are more likely than others to follow Trustworthy AI best practices, including expla ...
  continue reading
 
Artwork

51
Explain IT

Softcat

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
The Security Bench offers insightful discussions on the latest cybersecurity concerns, innovations, technologies and so much more. My name is Duronke and I'm a Cloud & Enterprise Security Practitioner. I help FTSE100 companies protect themselves from IT related risk.
  continue reading
 
Artwork

1
Alt Investing Made Easy

AltInvestingMadeEasy LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join attorneys Sarah Florer and Roland Roland Wiederaenders as they navigate through the maze of market jargon and reveal the secrets of diversifying your portfolio. Whether you're a seasoned investor or taking your first step toward financial freedom, we empower you with the knowledge and insights you need to thrive in the dynamic landscape of alternative assets. Get ready to transform how you invest, inspiring a new way of thinking about your finances, and discover how to make your money w ...
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
The Bare Metal Cyber CCISO Audio Course is your complete, executive-level training companion for mastering the Certified Chief Information Security Officer (CCISO) certification. Built for experienced cybersecurity professionals and strategic leaders, this Audio Course delivers over seventy focused episodes covering every domain, concept, and competency area tested on the official EC-Council exam. From governance, risk, and compliance to strategic planning, vendor oversight, and technical co ...
  continue reading
 
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
  continue reading
 
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj research staff and journalists interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
  continue reading
 
Artwork

1
Risk & Repeat

Robert Wright

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
  continue reading
 
For many of us, the workplace is more than a single building or facility. That’s what makes workforce IAM so powerful. By managing security through something we all take wherever we go — our identities — it gives users the flexibility they need to stay productive and enables administrators to quickly detect and address risks. HID’s robust, flexible workforce identity and access management solutions provide your workforce with seamless access to the resources they need — no matter where they are.
  continue reading
 
Discover new opportunities and navigate the challenges of expanding your global footprint with Outside the Box with Asendia USA: The International e-Commerce Podcast. Debuted in January 2024, "Outside the Box with Asendia USA", is designed to educate U.S.-based brands, marketplaces, and e-tailers on cutting-edge global shipping strategies. With a strong emphasis on education, the podcast serves as a resource to guide e-tailers through the complexities of international logistics and evolving ...
  continue reading
 
The LiveSafe Prevention Podcast features news analysis and interviews with the leading voices in enterprise risk management, safety and security. Hosted by former intelligence officer and award-winning journalist Dan Verton, the Prevention Podcast delivers actionable insights into the real-world challenges faced by risk, safety and security professionals and how employee-sourced risk information can help improve and organization's risk profile.
  continue reading
 
Join host Chris Lindsey as he digs into the world of Application Security with experts from leading enterprises. Each episode is theme based, so it's more conversational and topic based instead of the general interview style. Our focus is growing your knowledge, providing useful tips and advice. With Chris' development background of 35 years, 15+ years of secure coding and 3+ years running an application security program for large enterprise, the conversations will be deep and provide a lot ...
  continue reading
 
Welcome to the Enterprise Influencers Podcast where we explore the inner workings of large organizations and the people and technologies that help them get things done. We’re your hosts Patrick Falgoust and Giles Hamson. We’ve both worked as consultants and within the IT departments for some of the world’s largest organizations. We’ll be bringing you candid discussions with industry leaders that are helping to shape the future of enterprise technology and exploring what influences the decisi ...
  continue reading
 
Artwork

1
Buying Tech

Richard Ellis

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Buying Tech is a show dedicated to technology and procurement professionals. Each episode will delve into the workings of different types of technology in plain English, then discuss the various benefits and pitfalls, and how small, medium and enterprise businesses or Governments can procure them to maximise value and reduce risk. Click above to Subscribe in iTunes/your Podcast app, or follow us on Twitter, Facebook or Instagram to be notified when episodes are released.
  continue reading
 
Artwork

1
Heavy Strategy

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
From technology to workplace culture, from geopolitical trends to economics, Heavy Strategy debates pivotal questions in enterprise IT. Hosts Johna Till Johnson & John Burke bring their technical expertise, analytical acumen, and contrasting viewpoints to discuss complex topics of interest to IT leaders. Frequently irreverent and always thought-provoking, these are the conversations you wish you could have at the leadership table. Tune in and join the think tank, where unanswered questions a ...
  continue reading
 
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
  continue reading
 
Artwork

1
Culture of Compliance

Frazier & Deeter Podcasts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Frazier & Deeter's Culture of Compliance podcast explores compliance as a competitive advantage in today's marketplace. Culture of Compliance was recently named #1 in "Top 25 Regulatory Compliance Podcasts You Must Follow in 2020" by Feedspot.
  continue reading
 
Artwork
 
Screaming in the Cloud with Corey Quinn features conversations with domain experts in the world of Cloud Computing. Topics discussed include AWS, GCP, Azure, Oracle Cloud, and the "why" behind how businesses are coming to think about the Cloud.
  continue reading
 
The Employee Safety Podcast is for professionals responsible for the safety and well-being of their employees. Today’s world has a wide array of threats: wildfires, hurricanes, civil unrest, acts of violence, a global pandemic. We will discuss how to protect your employees from all of these threats—whether they’re in the office, working remotely, or traveling for business. Each episode features an interview with a leader in employee safety, discussing topics such as emergency preparedness, b ...
  continue reading
 
The Data Diva Talks Privacy Podcast The Debbie Reynolds “The Data Diva” Talks Privacy Podcast features thought-provoking discussions with global leaders on the most pressing data privacy challenges facing businesses today. Each episode explores emerging technologies, international laws and regulations, data ethics, individual rights, and the future of privacy in a rapidly evolving digital world. With listeners in more than 130 countries and 2,900 cities, the podcast delivers valuable insight ...
  continue reading
 
Join Prescriptive’s own Paul Di Liegro, Senior Sales Executive, as he interviews lawyers, doctors, athletes, and interesting personalities from all walks of life. Paul’s curiosity leads to the uncovering of his guests’ most impactful life stories, and Paul illuminates the connection between life’s important lessons and being a better sales rep. Business, Brains & the Bottom Line is the leading podcast by and for Enterprise IT decision-makers. Read more at https://www.prescriptive.solutions/p ...
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Artwork

1
Data Science Conversations

Damien Deighan and Philipp Diesinger

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Data Science Conversations Podcast hosted by Damien Deighan and Dr Philipp Diesinger. We bring you interesting conversations with the world’s leading Academics working on cutting edge topics with potential for real world impact. We explore how their latest research in Data Science and AI could scale into broader industry applications, so you can expand your knowledge and grow your career. Every 4 or 5 episodes we will feature an industry trailblazer from a strong academic back ...
  continue reading
 
Welcome to the podcast channel for the Scottish AI Alliance, the delivery body for Scotland’s national AI Strategy. Scotland’s AI Strategy launched on 22 March 2021 with the vision for Scotland to become a world leader in the development and use of trustworthy, ethical and inclusive AI. This podcast will feature updates on the delivery of Scotland’s AI Strategy as well as interviews and chats about all things AI in Scotland and beyond. Find us online at www.scottishai.com.
  continue reading
 
Artwork

1
The Union

Krista Software

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Union is about the intersection between people, technology, and artificial intelligence. Get ready to be inspired and challenged as we ask questions, uncover insights, and share inspiring stories about digital ecosystems and automation.
  continue reading
 
Loading …
show series
 
Corporate security risks are evolving in ways that demand new mitigation strategies. Ryan Schonfeld, Co-founder and CEO of HiveWatch, an AI-driven physical security software platform, draws on his background in law enforcement and global enterprise security to offer a new perspective on how organizations can better manage today’s challenges. From t…
  continue reading
 
Interview Segment: Tony Kelly Illuminating Data Blind Spots As data sprawls across clouds and collaboration tools, shadow data and fragmented controls have become some of the biggest blind spots in enterprise security. In this segment, we'll unpack how Data Security Posture Management (DSPM) helps organizations regain visibility and control over th…
  continue reading
 
Interview Segment: Tony Kelly Illuminating Data Blind Spots As data sprawls across clouds and collaboration tools, shadow data and fragmented controls have become some of the biggest blind spots in enterprise security. In this segment, we'll unpack how Data Security Posture Management (DSPM) helps organizations regain visibility and control over th…
  continue reading
 
Anna Martirosyan, strategy and transactions manager at EY Parthenon, speaks with guest host Lotta Moberg, CFA, about the ethical foundations of AI in finance, including fairness, transparency, model governance, and the risks that arise as firms automate more decisions. Drawing on her chapter in AI in Asset Management: Tools, Applications, and Front…
  continue reading
 
An educational resource detailing statistical concepts foundational to machine learning, including descriptive statistics (mean, median, mode, and measures of dispersion), probability theory, and methods for parameter estimation and hypothesis testing. The book covers various analytical techniques such as ANOVA, regression models (linear, logistic,…
  continue reading
 
Today's guest is Chris Joynt, Director of Product Marketing at Securiti. Securiti is a leader in AI-powered data security, privacy, and governance across hybrid and multi-cloud environments. Chris joins Emerj Editorial Director Matthew DeMello to explore why trust in data remains the defining challenge for AI in financial services, and how institut…
  continue reading
 
A critical issue is emerging as organizations embed AI agents into workflows: securing agentic AI requires a very different approach to security. In this episode, Accenture CISO Kris Burkhardt breaks down what's at stake with Daniel Kendzior who leads Security AI Reinvention for Accenture Cybersecurity and Wei Liu who leads Cyber Strategy, Risk, an…
  continue reading
 
A comprehensive guide for learning iOS app development, starting with the fundamentals of the Swift programming language, including variables, control flow, and collections. The book thoroughly explains the use of Apple's development tools, such as Xcode and Playgrounds, and covers key application architecture concepts like Model-View-Controller (M…
  continue reading
 
A book about building scalable data streaming solutions using various Amazon Web Services (AWS) tools, primarily focusing on the Amazon Kinesis family of services (Data Streams, Firehose, Data Analytics, and Video Streams). The content explains the core concepts of data streaming and distributed systems, detailing how to produce and consume data us…
  continue reading
 
Explores several critical areas concerning the security and privacy of online platforms. The chapters discuss privacy-preserving analytics techniques for social network data, including methods like k-anonymity and differential privacy, to protect user information from breaches such as the Cambridge Analytica incident. Several sections are dedicated…
  continue reading
 
This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
  continue reading
 
This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
  continue reading
 
Corey Quinn reconnects with Keith Townsend, founder of The CTO Advisor, for a candid conversation about the massive gap between AI hype and enterprise reality. Keith shares why a biopharma company gave Microsoft Copilot a hard no, and why AI has genuinely 10x’d his personal productivity while Fortune 500 companies treat it like radioactive material…
  continue reading
 
An extensive overview of security in telecommunications networks, particularly focusing on cellular systems and their convergence with the Internet. The text first establishes core security concepts and cryptographic principles before thoroughly examining vulnerabilities in both traditional voice networks and modern cellular data services like GSM …
  continue reading
 
What happens when geopolitical competition shapes where you can build AI teams and which infrastructure you can access? Alessandro Aresu, Geopolitical Analyst and Scientific Advisor at Limes, has spent over a decade analyzing US-China technological competition and advising Italian government institutions, including the Prime Minister's office, on s…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John along with systems security engineer Corey and intelligence analyst Hayden as they discuss: Chinese Threat Groups Exploiting the React2Shell Vulnerability (1:18) CISA Issues Alert on Persistent Brickstorm Backdoor Attacks (9:05) ShadyPanda Hackers Turn Millions of Browsers into Weapon…
  continue reading
 
In this week's episode, we look at recent Microsoft Tech updates. By popular request, we're expanding the scope beyond just Azure to include Microsoft 365, Power Platform, and similar Microsoft platforms and capabilities. What's new? What's interesting? What's retiring? (00:00) - Intro and catching up. (04:25) - Show content starts. Show links - Ag…
  continue reading
 
On the 35th episode of Enterprise AI Defenders, hosts Evan Reiser (co-founder and CEO, Abnormal AI) and Mike Britton (CIO, Abnormal AI) talk with Adam Keown, Chief Information Security Officer at Eastman Chemical Company. Adam draws on a career in law enforcement and global enterprise security to explain how Eastman is safeguarding life-critical ma…
  continue reading
 
Cast your vote for Cyber Sentries as Best Technology Podcast here! Bridging the AI Security Gap—Inside the Rise of Non‑Human Identities In this episode of Cyber Sentries from CyberProof, host John Richards sits down with Idan Gour, co-founder and president of Astrix Security, to unpack one of today’s fastest-emerging challenges: securing AI agents …
  continue reading
 
In Part 2 of this 2-part miniseries, our co-hosts, Jason Rowland and Nick Agnetti continued the conversation with Gerry McGowan, Executive Director US Network for Asendia, further diving into Asendia’s new domestic U.S. network, highlighting how it complements their international solutions. This network supports inbound shipments from Asendia globa…
  continue reading
 
Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins …
  continue reading
 
Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins …
  continue reading
 
An extensive overview of enterprise security architecture, emphasizing a business-driven approach. It introduces the SABSA Model, a six-layer framework for developing security architectures, and explains how it guides the entire process from contextual business requirements to operational security. The text covers critical concepts like risk manage…
  continue reading
 
#PlannedGiving isn’t just about generosity, it’s a way for #HighNetWorth investors to align #CapitalAllocation, #TaxStrategy, #WealthPlanning, and #LegacyInvesting. In this episode of #AltInvesting Made Easy, attorney and entrepreneur Barry Resnick demystifies how charitable strategies, donor-advised funds, and #EstatePlanning tools help mid-stage …
  continue reading
 
As you wind down 2025, what should you be planning to do for 2026? The Heavy Strategy team breaks it down for you with eight resolutions for the new year. From setting an AI strategy to cloud optimization, Johna and John can help you enter the new year prepared for what’s next. Other resolutions include... Read more »…
  continue reading
 
TL;DR: On this episode, it's just Jim and Rafal talking about how sometimes you just need to take a big step back from your day job and touch some grass. Our chosen profession is, demanding, to say the least. So let's take a minute to acknowledge what we're really thinking. Unfiltered, raw, and straight from our heads to your ears, enjoy. YouTube v…
  continue reading
 
The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to APIs, data, and local systems. Aaron Parecki explains how OAuth's new Client ID Metadata Documents spec provides more security for MCPs and the reasons why the behavior and design of MCPs required a new…
  continue reading
 
The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to APIs, data, and local systems. Aaron Parecki explains how OAuth's new Client ID Metadata Documents spec provides more security for MCPs and the reasons why the behavior and design of MCPs required a new…
  continue reading
 
Shefali Kakar, Global Head of PK Sciences and Oncology at Novartis, returns to the AI in Business podcast to discuss how AI is reshaping the earliest and most critical phases of drug development—where strategic investment decisions are made long before a clinical trial begins. Together with Emerj Editorial Director Matthew DeMello, Shefali explores…
  continue reading
 
An extensive overview of digital literacy and technology, covering a broad range of topics from basic computer and smartphone functionality to advanced internet applications. It introduces fundamental concepts of hardware and software, then expands into practical usage of online services like email, social media, digital maps, and e-commerce. The t…
  continue reading
 
Today's guest is Umesh Rustogi, General Manager of Dragon for Nursing, Microsoft Health & Life Sciences. Umesh joins Emerj Editorial Director Matthew DeMello to explore how nursing workflows are straining under documentation burden, and how ambient AI is being built — not repurposed — to fit the realities of frontline care. The conversation also ex…
  continue reading
 
Send us a text In Episode 266 of The Data Diva Talks Privacy Podcast, Debbie Reynolds, The Data Diva, talks to Matthew Kay, Group Data Protection Officer at Shawbrook. Their discussion centers on pragmatic data protection, responsible governance, and the realities of advising organizations that are rapidly scaling or adopting emerging technologies.…
  continue reading
 
Interview with Danny Jenkins: How badly configured are your endpoints? Misconfigurations are one of the most overlooked areas in terms of security program quick wins. Everyone freaks out about vulnerabilities, patching, and exploits. Meanwhile, security tools are misconfigured. Thousands of unused software packages increase remediation effort and a…
  continue reading
 
Interview with Danny Jenkins: How badly configured are your endpoints? Misconfigurations are one of the most overlooked areas in terms of security program quick wins. Everyone freaks out about vulnerabilities, patching, and exploits. Meanwhile, security tools are misconfigured. Thousands of unused software packages increase remediation effort and a…
  continue reading
 
In this Scottish AI Playbook webinar we explored what AI adoption really looks like for charities and social enterprises working across Scotland. John Fitzgerald, Digital Evolution Manager at SCVO, shared insights into where the sector currently stands with AI, moving beyond the headlines to examine the practical applications, challenges, and oppor…
  continue reading
 
A pocket guide offering a comprehensive overview of over 600 concepts, terminologies, and processes in the fields of machine learning and deep learning. Published in 2021, it aims to clarify the logic and mechanisms behind these concepts for data scientists, acting as a non-linear reference for both beginners and experienced practitioners. The guid…
  continue reading
 
A structured approach to managing third-party risk. The book covers fundamental concepts such as the CIA Triad (Confidentiality, Integrity, Availability), various cybercrime types (phishing, ransomware), and the five phases of a breach (research, intrusion, lateral movement, privilege escalation, exfiltration). It further explores the impact of the…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play