Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

IBM Research Podcasts

show episodes
 
Artwork

1
Heads Talk

Elaine Pringle Schwitter

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A Fly on the Boardroom Wall Weekly, in-depth dialogues with industry titans and top executives. From FTSE and S&P CEOs to C-suite leaders of renowned institutions, 𝙃𝙚𝙖𝙙𝙨 𝙏𝙖𝙡𝙠 offers "𝘼 𝙁𝙡𝙮 𝙤𝙣 𝙩𝙝𝙚 𝘽𝙤𝙖𝙧𝙙𝙧𝙤𝙤𝙢 𝙒𝙖𝙡𝙡" insights into the pressing topics shaping today's business, finance, and technology landscape. The Heads of the world's biggest corporations discuss current and future industry matters with 𝙃𝙚𝙖𝙙𝙨 𝙏𝙖𝙡𝙠, providing a unique perspective on the pulse of global commerce. 𝕎𝕖 𝕝𝕚𝕜𝕖 𝕥𝕠 𝕤𝕥𝕒𝕣𝕥 𝕥 ...
  continue reading
 
Artwork

1
Exo Flux

Collisions Projects

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Exo Flux is the podcast for the pioneers of technology, code, UX, start-ups, and marketing. In this podcast we interview digital piooners. You can fin amazing talks with people of Google, IBM and many more. The best way to learn is from digital pioneers. They are incredible professionals and experts. These pioneers have had a remarkable professional career in UX, design, code, marketing, and the start-up industry. This podcast is produced by Collisions Projects.
  continue reading
 
Artwork

1
IBM Full Stack

IBM Sustainability Software Team UKI

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This is a podcast for business and tech enthusiasts alike. Take a journey through the 'Full Stack' of the IBM ecosystem from the IBM cloud paks and applications that provide the core service infrastructure to our cross-industry Partners and finally to industry-leading clients who benefit from our world reknowned expertise. And all of this in under 15 minutes! For enquiries please email [email protected]
  continue reading
 
HackrLife is a Podcast on the practical application of AI and PLG in growth and product marketing. I am @ Growth marketer for Google's AI product suite and have a decade of growth experience across Google, Linkedin, Adobe,SAP and IBM. In every episode, I share practical AI use cases, the latest in AI research along with no-code automation workflows and growth tactics which I am building in the open in my spare time. Real demos, real tear-downs of AI theory versus practical use case. Perfect ...
  continue reading
 
Artwork

1
irResponsible AI

Upol Ehsan, Shea Brown

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to irResponsible AI —a series where you find out how NOT to end up on the New York Times headlines for all the wrong reasons! 💡 Why are we doing this? As experts, we are tired of the boring “mainstream corporate” RAI communication. Here, we give it to you straight. ⁉️ Why call it Irresponsible AI? Responsible AI exists because of irresponsible AI. Knowing what NOT to do can be, at times, more actionable than knowing what to do. 🎙️Who are your hosts? Why should you even bother to list ...
  continue reading
 
The Optimal Path is a podcast about user research and product decision-making, brought to you by Maze. Explore how today's leading organizations leverage user research to inform better product decisions. Each episode uncovers the ideas and approaches used to unlock continuous insights—and the optimal path for product success. Subscribe to The Optimal Path newsletter to be the first to know when new episodes launch: https://maze.co/podcast/.
  continue reading
 
Artwork
 
A weekly podcast dissecting the pulse of business, technology & media in Asia. Hear our host interviewing leading journalists, senior executives, respectable authors & thinkers, entrepreneurs & thought leaders to discuss the most important issues that move and shake the business landscape in the Asia Pacific. The show is originally created and hosted by Bernard Leong.
  continue reading
 
Artwork

51
Your Brain at Work

Neuroleadership Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
In organizations around the world, leaders are facing a deluge of urgent issues: a crisis in employee engagement, the need to make workforces more diverse, and the challenge of making workplaces feel human in an era of increasing dependence on technology and remote communication. At the NeuroLeadership Institute, we believe brain science can help provide solutions. Join us on Your Brain At Work, the official podcast of the NeuroLeadership Institute — where top researchers and thought leaders ...
  continue reading
 
Analyse Asia with Bernard Leong is a weekly podcast dedicated to dissecting the pulse of technology, business and media in Asia. We interview thought leaders, and global & regional leading industry players and gain their insights into how we perceive and understand the market.
  continue reading
 
Artwork
 
The Voicebot Podcast is about the intersection of voice and artificial intelligence (AI) technologies. It is a weekly look at trends, founders and newsmakers and supplements the daily research, analysis and news found at https://voicebot.ai.
  continue reading
 
Tenego provides international sales execution services, Sales Channels and Direct, to growing and established software companies. Through Tenego's Global Network covering many key markets, we provide programmes and hands-on services in Sales Channel Planning and Development, Direct Sales Execution and Sales Channel Execution. We will help you grow faster, become more scalable and enter new markets across the world through a range of services including: Sales Channel Execution (Partner Search ...
  continue reading
 
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
  continue reading
 
Artwork

1
Dr. Ethan Becker, speech coach

Dr. Ethan F. Becker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This was a weekly tip from Dr. Ethan Becker. Dr. Becker is a second generation executive communication coach with the 56 year old company, THE SPEECH IMPROVEMENT COMPANY INC., in Boston Ma., USA. TSIC studies, develops, coaches, and trains best practices in human communication. Since 1964 TSIC has been helping people in business, politics, and entertainment to become more comfortable and more effective as they communicate. While speech coaching is a personal experience, these tips cover comm ...
  continue reading
 
Artwork
 
How to discern what matters in business and IT and find a sense in your trade. We combine practical academic theories with concrete business. If you are a bored seasoned professional or an enterprising engineering student, listen to this show. You will discover how technology and business can be combined to bring more value and sense to society. We illustrate how to avoid out-of-touch strategies that are based on, for example, transparency and pure agility. Today, work environments are often ...
  continue reading
 
Artwork

1
HumAIn Podcast

David Yakobovitch

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to HumAIn, the top 1% global podcast shaping the future of AI and technology. Join host David Yakobovitch, a renowned AI innovator and venture capitalist, as he takes you on an exhilarating journey through the world of Artificial Intelligence, Data Science, and cutting-edge tech. Through intimate fireside chats with Chief Data Scientists, AI Advisors, and visionary leaders, we peel back the curtain on groundbreaking AI products, dissect industry trends, and explore how AI is reshapin ...
  continue reading
 
Loading …
show series
 
Unauthorized Issuance of Certificate for 1.1.1.1 Cloudflare published a blog post with more details regarding the bad 1.1.1.1 certificate that was issued by Fina. https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/ AI Model Namespace Reuse Deleted accounts on Huggingface can be taken over by other entities unrelated to th…
  continue reading
 
Exploit Attempts for Dassault DELMIA Apriso. CVE-2025-5086 Our honeypots detected attacks against the manufacturing management system DELMIA Apriso. The deserialization vulnerability was patched in June and is one of a few critical vulnerabilities patched in recent months. https://isc.sans.edu/diary/Exploit%20Attempts%20for%20Dassault%20DELMIA%20Ap…
  continue reading
 
Reuniting after more than a decade since their days in This Week in Asia Podcast from 2009, Michael Smith Jr., co-host of The Generalist podcast, and Daniel Cerventus Lim, semi-retired entrepreneur and community builder in Malaysia, join us for a candid assessment of Southeast Asia's tech ecosystem evolution. In this raw conversation, Michael offer…
  continue reading
 
Reuniting after more than a decade since their days in This Week in Asia Podcast from 2009, Michael Smith Jr., co-host of The Generalist podcast, and Daniel Cerventus Lim, semi-retired entrepreneur and community builder in Malaysia, join us for a candid assessment of Southeast Asia's tech ecosystem evolution. In this raw conversation, Michael offer…
  continue reading
 
A Quick Look at Sextortion at Scale Jan analyzed 1900 different sextortion messages using 205 different Bitcoin addresses to look at the success rate, lifetime, and other metrics defining these campaigns. https://isc.sans.edu/diary/A%20quick%20look%20at%20sextortion%20at%20scale%3A%201%2C900%20messages%20and%20205%20Bitcoin%20addresses%20spanning%2…
  continue reading
 
pdf-parser: All Streams Didier released a new version of pdf-parser.py. This version fixes a problem with dumping all filtered streams. https://isc.sans.edu/diary/pdf-parser%3A%20All%20Streams/32248 Salesloft Drift Putting OAuth Tokens at Risk OAuth tokens used by Salesloft Drift users to provide access to integrations with Salesforce, Google Works…
  continue reading
 
Let us know your thoughts. Send us a Text Message. Follow me to see #HeadsTalk Podcast Audiograms every Monday on LinkedIn Episode Title: 🇿🇦African Women: Architect of Trade “A Miracle Built On Unity"🇮🇳 We continue the #HTBRICSSeries on Heads Talk with a formidable business leader whose influence spans construction, manufacturing, energy, and inter…
  continue reading
 
Increasing Searches for ZIP Files Attackers are scanning our honeypots more and more for .zip files. They are looking for backups of credential files and the like left behind by careless administrators and developers. https://isc.sans.edu/diary/Increasing%20Searches%20for%20ZIP%20Files/32242 FreePBX Vulnerability An upatched vulnerability in FreePB…
  continue reading
 
Interesting Technique to Launch a Shellcode Xavier came across malware that PowerShell and the CallWindowProcA() API to launch code. https://isc.sans.edu/diary/Interesting%20Technique%20to%20Launch%20a%20Shellcode/32238 NX Compromised to Steal Wallets and Credentials The popular open source NX build package was compromised. Code was added that uses…
  continue reading
 
Getting a Better Handle on International Domain Names and Punycode International Domain names can be used for phishing and other attacks. One way to identify suspect names is to look for mixed script use. https://isc.sans.edu/diary/Getting%20a%20Better%20Handle%20on%20International%20Domain%20Names%20and%20Punycode/32234 Citrix Netscaler Vulnerabil…
  continue reading
 
Reading Location Position Value in Microsoft Word Documents Jessy investigated how Word documents store the last visited document location in the registry. https://isc.sans.edu/diary/Reading%20Location%20Position%20Value%20in%20Microsoft%20Word%20Documents/32224 Weaponizing image scaling against production AI systems AI systems often downscale imag…
  continue reading
 
"The way that institutions emerge and entrench themselves and become a part of the functioning of an economy and society is because they solve some problems. So they're usually a non-market solution toward solving some problem that the economy, that the market system couldn't necessarily solve. Of course the most prominent example of an institution…
  continue reading
 
"The way that institutions emerge and entrench themselves and become a part of the functioning of an economy and society is because they solve some problems. So they're usually a non-market solution toward solving some problem that the economy, that the market system couldn't necessarily solve. Of course the most prominent example of an institution…
  continue reading
 
The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were zero padded , an unfortunate choice. As of this week, datafeeds should no longer be zero padded . https://isc.sans.edu/diary/The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data./32228 .d…
  continue reading
 
Let us know your thoughts. Send us a Text Message. Follow me to see #HeadsTalk Podcast Audiograms every Monday on LinkedIn Episode Title:🏴Geopolitical Tortoise and Hare Race🏴 Another captivating episode in the BRICS & Geopolitics Series (#HTBRICSSeries) on Heads Talk where we explore the shifting landscape of money, trade, politics, conflict, and t…
  continue reading
 
Don't Forget The "-n" Command Line Switch Disabling reverse DNS lookups for IP addresses is important not just for performance, but also for opsec. Xavier is explaining some of the risks. https://isc.sans.edu/diary/Don%27t%20Forget%20The%20%22-n%22%20Command%20Line%20Switch/32220 watchTowr releases details about recent Commvault flaws Users of the …
  continue reading
 
Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerabilit…
  continue reading
 
Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
  continue reading
 
"APAC represents 40% of global GDP. So you can see that there's huge opportunity in a very, very diverse region. The needs of Japan are different to the needs of China. India is exploding with SaaS, software, AI. Australia one of our larger markets, again, very different. And so Southeast Asia, the complexities of Asia make it a joy to work in." - …
  continue reading
 
"APAC represents 40% of global GDP. So you can see that there's huge opportunity in a very, very diverse region. The needs of Japan are different to the needs of China. India is exploding with SaaS, software, AI. Australia one of our larger markets, again, very different. And so Southeast Asia, the complexities of Asia make it a joy to work in." - …
  continue reading
 
Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Ce…
  continue reading
 
SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%20…
  continue reading
 
Let us know your thoughts. Send us a Text Message. Follow me to see #HeadsTalk Podcast Audiograms every Monday on LinkedIn Episode Title: 🇿🇦Capital Security to Capital Growth: Africa’s Bankable-to-Investable Journey🇿🇦 We continue the #HTBRICSSeries on Heads Talk with a dynamic C-suite leader, investor, and influential figure in Africa’s tech, finan…
  continue reading
 
In this episode of HackrLife, you’ll discover why the way we measure AI performance might be misleading . A recent study that examined 23 major Large Language Model (LLM) benchmarks has found that small changes in formatting, prompt style, and test conditions can swing results dramatically. T he episode reveals how this fragility challenges the acc…
  continue reading
 
AI and Faster Attack Analysis A few use cases for LLMs to speed up analysis https://isc.sans.edu/diary/AI%20and%20Faster%20Attack%20Analysis%20%5BGuest%20Diary%5D/32198 Proxyware Malware Being Distributed on YouTube Video Download Site Popular YouTube download sites will attempt to infect users with proxyware. https://asec.ahnlab.com/en/89574/ Xero…
  continue reading
 
CVE-2017-11882 Will Never Die The (very) old equation editor vulnerability is still being exploited, as this recent sample analyzed by Xavier shows. The payload of the Excel file attempts to download and execute an infostealer to exfiltrate passwords via email. https://isc.sans.edu/diary/CVE-2017-11882%20Will%20Never%20Die/32196 Windows Kerberos El…
  continue reading
 
In this episode of HackrlIfe I take as a critical look at Samsung's research on building "multimodal AI agents" using no-code platforms like Flowise. While the paper sounds impressive with terms like "multimodal LLM-based Multi-Agent Systems," I dug into what these tools actually do versus the marketing hype. What I Found It Really Is: API orchestr…
  continue reading
 
Microsoft Patch Tuesday https://isc.sans.edu/diary/Microsoft%20August%202025%20Patch%20Tuesday/32192 https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/ libarchive Vulnerability A libarchive vulnerability patched in June was upgraded from a low CVSS score to a critical one. Libarchive is used by compression…
  continue reading
 
Those "reasoning" AI models everyone's raving about? Apple's research suggests they're not actually thinking—they're just really good at pattern matching. In my latest HackrLife episode, I break down why this is EXACTLY why AI can help you think better, but cannot really think on your behalf. Key insights:✅ Why reasoning models fail completely past…
  continue reading
 
Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play