After his fifth felony, Adam Martin thought, “There must be more to life than this.” That was the beginning of pursuing change in his own life. Because of his shared experiences, he became a resource for other individuals coming out of jail by providing personalized support to incarcerated individuals to deter repeat offenses. F5 Project Recovery podcast Kirsten, Ricky and Adam launch a new radio show wrapped around recovery, mental health, politics, much much more.
…
continue reading
F5 Project Podcasts
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
In 10 minutes daily, The Business of Tech delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering 'Why Do We Care?', channel veteran Dave Sobel brings you up to speed and provides resources to go deeper. With insights and analysis, this focused podcast focuses on the knowledge you need to be effective, profitable, and relevant.
…
continue reading
1
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359
59:02
59:02
Play later
Play later
Lists
Like
Liked
59:02For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-2…
…
continue reading
1
MSP Cybersecurity: Addressing Rising Costs and Job Losses in Small Businesses
16:15
16:15
Play later
Play later
Lists
Like
Liked
16:15Small businesses in the U.S. are facing rising costs and job losses, with 70% of owners citing inflation as their primary concern, according to a recent Bank of America study. Despite this, 75% of small business owners remain optimistic about revenue growth in the coming year. However, the disparity in employment trends is stark, as small firms she…
…
continue reading
1
From Misconfigurations to Mission Control: Lessons from InfoSec World 2025 - Marene Allison, Dr. Ron Ross, Ryan Heritage, Patricia Titus, Perry Schumacher, Rob Allen - ESW #435
1:43:23
1:43:23
Play later
Play later
Lists
Like
Liked
1:43:23Live from InfoSec World 2025, this episode of Enterprise Security Weekly features six in-depth conversations with leading voices in cybersecurity, exploring the tools, strategies, and leadership approaches driving the future of enterprise defense. From configuration management and AI-generated threats to emerging frameworks and national standards, …
…
continue reading
1
Navigating Endpoint Security: Tackling Shadow IT, Tool Sprawl, and Human Factors in Cybersecurity
1:00:39
1:00:39
Play later
Play later
Lists
Like
Liked
1:00:39The episode discusses the increasing complexity of endpoint security, driven by the rapid proliferation of devices due to remote work, BYOD policies, and the rise of shadow IT. Data indicates that shadow IT has surged by 59% since remote work became mainstream, with nearly half of cyberattacks linked to these unauthorized applications. Managed Serv…
…
continue reading
1
Dealing with loss, phone loss with Aaran, Doug, and Josh. - SWN #533
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44Are you walking around with a phone in your hand? Probably, are ready for the day when it gets grabbed and disappears. Aaran, Doug, and Josh talk about phone strategies on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-533…
…
continue reading
1
Vibe Coding For Success and Failure - PSW #902
1:06:52
1:06:52
Play later
Play later
Lists
Like
Liked
1:06:52Tune in for some hands-on tips on how to use Claude code to create some amazing and not-so-amazing software. Paul will walk you through what worked and what didn't as he 100% vibe-coded a Python Flask application. The discussion continues with the crew discussing the future of vibe coding and how AI may better help in creating and securing software…
…
continue reading
1
AI Transparency Regulations Impacting MSPs: German Court Ruling on OpenAI Training Data
19:34
19:34
Play later
Play later
Lists
Like
Liked
19:34A German court has ruled that OpenAI's training of its GPT-4 and GPT-4.0 models involved copyright infringement, requiring the company to disclose the frequency of usage of specific song lyrics in its training data. This ruling, initiated by GEMA, a German copyright collective, has significant implications for copyright holders, particularly in the…
…
continue reading
1
Security Money: The Index is Back Near Highs as AI Leads the Discussion - BSW #423
1:03:20
1:03:20
Play later
Play later
Lists
Like
Liked
1:03:20The Security Weekly 25 index is back near all time highs as the NASDAQ hits another record high. Funding and acquisitions have shifted to AI as the security industry continues to evolve. We also had a new IPO, Netskope. They will replace CyberArk once the Palo Alto Networks acquisition closes, allowing the index to survive another public company ac…
…
continue reading
1
MSP Cybersecurity: Governments Target Russian Cybercrime and New Offensive Strategies
13:50
13:50
Play later
Play later
Lists
Like
Liked
13:50The United States, United Kingdom, and Australia have imposed sanctions on the Russian hosting provider MediaLand due to its facilitation of ransomware operations. MediaLand has been linked to various cybercrime activities, including support for groups like LockBit and BlackSuit, and has been identified as a provider for cybercrime marketplaces. Th…
…
continue reading
1
AI with Dr. Shakour Abuzneid - Shakour Abuzneid - SWN #532
32:17
32:17
Play later
Play later
Lists
Like
Liked
32:17Doug talks about AI with Cybersecurity Expert Dr. Shakour Abuzneid from Roger Williams University. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-532
…
continue reading
1
Figuring Out Where to Start with Secure Code - ASW #358
46:23
46:23
Play later
Play later
Lists
Like
Liked
46:23What are your favorite resources for secure code? Co-hosts John Kinsella and Kalyani Pawar talk about the reality of bringing security into a business. We talk about the role of the OWASP Top 10 and the OWASP ASVS in crafting security programs. And balance that with a discussion in what's the best use of everyone's time -- developers and appsec fol…
…
continue reading
1
AI for MSPs: Bridging the Skills Gap and Enhancing Cloud Managed Services Profitability
14:16
14:16
Play later
Play later
Lists
Like
Liked
14:16Cloud managed services are experiencing rapid growth, with the market projected to expand from approximately $50.62 billion in 2025 to $120 billion by 2035, reflecting a compound annual growth rate of 8.16%. This growth is driven by organizations across various sectors, including finance and healthcare, seeking to enhance their cloud operations and…
…
continue reading
1
Aligning teams for effective remediation, Anthropic's latest report, and the news - Ravid Circus - ESW #434
1:38:56
1:38:56
Play later
Play later
Lists
Like
Liked
1:38:56Interview with Ravid Circus Ravid will discuss why security and engineering misalignment is the biggest barrier to fast, effective remediation, using data from Seemplicity’s 2025 Remediation Operations Report. This is costing some teams days of unnecessary exposure, which can lead to major security implications for organizations. Segment Resources:…
…
continue reading
1
AI Governance: Balancing Power, Bias, and Transparency in Democracy and Business
20:33
20:33
Play later
Play later
Lists
Like
Liked
20:33The discussion centers on the book "Rewiring Democracy," authored by Bruce Schneier and Nathan E. Sanders, which explores the implications of artificial intelligence (AI) on governance, power distribution, and democratic principles. The authors highlight the risks associated with AI, particularly the concentration of power among a few corporations,…
…
continue reading
1
MSP Events Shift: From Mega Conferences to Micro Communities and the Rise of Cybersecurity Focus
44:02
44:02
Play later
Play later
Lists
Like
Liked
44:02MSP events are experiencing a notable shift, with a growing preference for smaller, localized gatherings over traditional mega-conferences. Jessica Davis, Principal Analyst at Omdia, highlights that this trend is driven by factors such as increased travel costs and a desire for more meaningful community interactions. Research indicates that MSPs ar…
…
continue reading
1
Cyberattacks Surge 85% During Shutdown; Telecom Security Regulations Weaken Amid AI Evolution
15:53
15:53
Play later
Play later
Lists
Like
Liked
15:53Cyberattacks against U.S. government employees surged by 85% during the recent government shutdown, with projections estimating over 555 million attacks by the end of November 2025. These attacks, characterized as targeted digital assaults rather than generic phishing attempts, exploit vulnerabilities during periods of financial stress, particularl…
…
continue reading
1
Emoticons, Sonicwall, Global Protect, Pop ups, WhatsApp, 7Zip, Roblox, Josh Marpet... - SWN #531
33:56
33:56
Play later
Play later
Lists
Like
Liked
33:56Emoticons, Sonicwall, Global Protect, Pop-ups, WhatsApp, 7Zip, Roblox, Josh Marpet, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-531
…
continue reading
1
AI Race Heats Up: Google Gemini 3, Intuit ChatGPT, OpenAI Codex MAX, and EU GDPR Changes
18:52
18:52
Play later
Play later
Lists
Like
Liked
18:52Google has launched its latest AI model, Gemini 3, which is designed to enhance multimodal processing capabilities by simultaneously handling text, images, and audio. This model, particularly the Gemini 3 Pro version, aims to improve the accuracy and reasoning capabilities of AI systems, positioning Google to compete more effectively with OpenAI in…
…
continue reading
1
Give Me Liberty or Linux, Badge Hacking Interview - Bryce Owen - PSW #901
2:09:41
2:09:41
Play later
Play later
Lists
Like
Liked
2:09:41In the security news: Cloudflare was down, it was not good Logitech breached The largest data breach in history? Fortinet Fortiweb - the saga continues Hacking Linux through your malware scanner, oh the irony I never stopped hating systemd The ASUS exploit that never existed If iRobot fails, can we deploy our own hacker bot army? Firmware encryptio…
…
continue reading
1
Microsoft's AI Agent 365 Launch, Vendor Integrations, and Cybersecurity Media Consolidation
17:24
17:24
Play later
Play later
Lists
Like
Liked
17:24Microsoft has launched Agent 365, a management platform designed for overseeing AI agents within enterprise environments. This platform, now available in early access, includes features such as the Microsoft Entra Registry for managing agent identities, risk-based access policies, and performance measurement tools. The introduction of Agent 365 sig…
…
continue reading
1
Health and Wellness of the CISO as They Crack Under Pressure and Need a BISO to Scale - Dr. Yonesy Núñez - BSW #422
56:46
56:46
Play later
Play later
Lists
Like
Liked
56:46It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
…
continue reading
1
AI-Driven Cyber Threats Surge: SMBs Embrace MDR, Shadow AI, and Evolving Malware Tactics
14:56
14:56
Play later
Play later
Lists
Like
Liked
14:56The rise of artificial intelligence (AI) in cyber attacks is prompting small and medium-sized businesses (SMBs) to adopt managed detection and response (MDR) services and explore autonomous security operations centers (SOCs). Research from TechAisle indicates that awareness of MDR among SMBs increased from 39% in 2023 to 61% in 2025, with 89% of mi…
…
continue reading
1
Cloudflare, Gh0stRAT, npm, North Koreans, Arch, Steam, Documentaries, Aaran Leyland.. - SWN #530
35:24
35:24
Play later
Play later
Lists
Like
Liked
35:24Cloudflare, Gh0stRAT, npm, North Korean Employees, Arch Linux Steam Machine, Documentaries, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-530
…
continue reading
1
Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
…
continue reading
1
IT Budgets Surge as AI Reshapes Roles; VMware Disruption Sparks Modernization Opportunities
17:55
17:55
Play later
Play later
Lists
Like
Liked
17:55The recent partnership between OpenAI and Search Kings, a digital marketing firm, aims to provide ChatGPT services to small and medium-sized businesses (SMBs), particularly in the home services sector. This collaboration is designed to facilitate the integration of artificial intelligence into SMB operations, addressing the challenges these busines…
…
continue reading
1
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433
1:56:49
1:56:49
Play later
Play later
Lists
Like
Liked
1:56:49Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
…
continue reading
1
Building AI-First SaaS in a Weekend: Richardson Dackam's Rapid Prototyping Secrets
19:07
19:07
Play later
Play later
Lists
Like
Liked
19:07Richardson Dackam, a solo developer known for rapidly creating AI-first SaaS products, shared insights into his development process during a recent episode of the Business of Tech. Dackam emphasizes the importance of identifying manageable problems that can be solved quickly, which he refers to as "done for you ideas." His approach involves extensi…
…
continue reading
1
AI Project Failures: Companies Struggle to Define Problems Amid Talent Gaps and Tech Consolidation
18:37
18:37
Play later
Play later
Lists
Like
Liked
18:37AI proof-of-concept projects are facing high failure rates, with a recent Omdia survey indicating that nearly one-third of companies report complete failures in these initiatives. Only 9% of firms successfully transition more than half of their AI projects into operational use, while 46% manage to move over 10% into production. The primary reason f…
…
continue reading
1
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, More... - SWN #529
28:45
28:45
Play later
Play later
Lists
Like
Liked
28:45Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-529
…
continue reading
1
AI Use Surges Beyond Guardrails: IT Leaders Face Challenges Amid Shadow AI and New Models
18:08
18:08
Play later
Play later
Lists
Like
Liked
18:08New research indicates that the use of artificial intelligence (AI) is expanding beyond established guidelines, with significant implications for IT leadership and security. A study from UpGuard reveals that over 80% of employees in sectors like finance and healthcare are utilizing unauthorized AI tools, often referred to as shadow AI. This trend r…
…
continue reading
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
…
continue reading
1
U.S. Cyber Defense Weakens as CISA Faces Cuts; EU Eases GDPR for AI; UK Tightens Cybersecurity Laws
15:15
15:15
Play later
Play later
Lists
Like
Liked
15:15The expiration of the Cybersecurity Information Sharing Act (CISA) on September 30, 2025, has resulted in a notable decline in U.S. cyber defense capabilities, with a reported drop of over 70% in the sharing of threat indicators. This lapse has created a legal and operational vacuum, leading to increased delays in alert dissemination and a rise in …
…
continue reading
1
Securing Model Context Protocol as Companies Plan to Replace Entry Roles with AI - Rahul Parwani - BSW #421
58:59
58:59
Play later
Play later
Lists
Like
Liked
58:59As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
…
continue reading
1
AI Adoption Soars: ChatGPT & CoPilot Lead, Trust Issues Persist, and China's KimiK2 Emerges
16:00
16:00
Play later
Play later
Lists
Like
Liked
16:00ChatGPT and Microsoft CoPilot are leading the enterprise AI adoption race, with 67% and 58% of businesses utilizing these tools, respectively, according to a study by the Wharton Human AI Research Program. This trend highlights a significant gap between these dominant players and competitors like Claude, Perplexity, and DeepSeek, which have much lo…
…
continue reading
1
Miles, 10/8 time, Lost Phones, Whisper Leak, Quantum Route, AI Galore, Rob Allen... - Rob Allen - SWN #528
39:46
39:46
Play later
Play later
Lists
Like
Liked
39:46Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
…
continue reading
1
Ransomware, Defaults, and Proactive Defenses - Rob Allen - ASW #356
1:11:26
1:11:26
Play later
Play later
Lists
Like
Liked
1:11:26Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
…
continue reading
1
Job Market Slows Amid Layoffs; Trust in AI Grows Despite Governance Gaps and SMBs Seek Performance
17:31
17:31
Play later
Play later
Lists
Like
Liked
17:31The U.S. job market is experiencing a gradual slowdown, with the unemployment rate rising to 4.36% in October 2025, according to estimates from the Chicago Federal Reserve. Despite an increase in layoff announcements, initial unemployment claims remain low at 229,000, indicating some stability. Major companies like Amazon, UPS, and Target have anno…
…
continue reading
1
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432
1:38:17
1:38:17
Play later
Play later
Lists
Like
Liked
1:38:17Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
…
continue reading
1
Navigating MSP Growth: Compliance, Workflow Automation, and Co-Managed IT Insights with Brentley Pearce
22:06
22:06
Play later
Play later
Lists
Like
Liked
22:06Brantley Pearce, Chief Technology Officer at RJ Young, discussed the integration of IT services, workflow automation, and workplace technology within the managed services sector. RJ Young, a 70-year-old organization with approximately 700 employees, has been providing managed services since 2012 and has seen significant growth, now generating $12 b…
…
continue reading
1
AI Adoption Grows, But SMBs Struggle with Readiness and ROI Amid Platform Inshittification
43:36
43:36
Play later
Play later
Lists
Like
Liked
43:36AI adoption is accelerating among small and mid-sized businesses (SMBs), with 87% of executives believing it will transform their operations within a year. However, only 29% feel their teams are prepared to implement AI effectively. This gap highlights a significant challenge for organizations that have invested in AI without seeing tangible return…
…
continue reading
1
ConnectWise Enhances ASIO, ESET Integrates AI, OpenAI Hits 1M Customers, Trust as a KPI?
16:15
16:15
Play later
Play later
Lists
Like
Liked
16:15ConnectWise has announced enhancements to its Ozzio platform, which now includes expanded third-party patching for over 7,000 applications, improvements to the professional services automation (PSA) user experience, and advanced robotic process automation (RPA) capabilities. These updates aim to address security vulnerabilities in widely exploited …
…
continue reading
1
AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune and Jason Wood - SWN #527
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40This week we have AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune, Jason Wood, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-527
…
continue reading
1
Amazon's Legal Battle with Perplexity AI, Microsoft’s AI Agent Flaws, and Netrix's Ricoh Acquisition
15:19
15:19
Play later
Play later
Lists
Like
Liked
15:19Amazon has initiated legal action against Perplexity AI, alleging that the startup's AI browser improperly accesses Amazon customer accounts by mimicking human browsing behavior. The lawsuit, filed in the U.S. District Court for the Northern District of California, raises concerns about security risks associated with Perplexity's Comet browser. Ama…
…
continue reading
1
Turning To The Darkside & AI Cyberslop - PSW #899
2:07:54
2:07:54
Play later
Play later
Lists
Like
Liked
2:07:54This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
…
continue reading
1
AI Hype vs. Reality: Cybersecurity Threats Rise, MIT Study Withdrawn, and CMMC Compliance Looms
15:16
15:16
Play later
Play later
Lists
Like
Liked
15:16The Pentagon is preparing to enforce the Cybersecurity Maturity Model Certification (CMMC) requirements for small businesses, with compliance becoming mandatory in contracts starting November 10, 2025. Nearly 500 organizations have already achieved Level 2 certification, and the Defense Department is actively surveying small businesses to assess th…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
MSP Market Surges to $300B, AI Struggles to Scale, and New Tools Transform Business Operations
14:34
14:34
Play later
Play later
Lists
Like
Liked
14:34The managed service provider (MSP) market has surpassed $305 billion and is projected to reach $571 billion by 2033, indicating a strong trend toward consolidation within the sector. In the second quarter of 2025 alone, there were 92 announced mergers and acquisitions, as companies aim to enhance their cybersecurity capabilities and automate operat…
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-526
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
AI Spending Surges to $300B; Small Business Sales Rise 8% Amid Inflation and Tariff Pressures
14:35
14:35
Play later
Play later
Lists
Like
Liked
14:35AI infrastructure spending is rapidly increasing, with major technology companies such as Google, Microsoft, and Amazon projected to invest over $300 billion by the end of 2025. This surge is primarily driven by the demand for data centers and GPU capacity to support artificial intelligence initiatives. While the Federal Reserve indicates that curr…
…
continue reading