This is the official Soundcloud account for IBM Research. It is managed by Chelsea Dubner and Chris Nay and follows IBM social media guidelines.
…
continue reading
IBM Research Podcasts
A Fly on the Boardroom Wall Weekly, in-depth dialogues with industry titans and top executives. From FTSE and S&P CEOs to C-suite leaders of renowned institutions, 𝙃𝙚𝙖𝙙𝙨 𝙏𝙖𝙡𝙠 offers "𝘼 𝙁𝙡𝙮 𝙤𝙣 𝙩𝙝𝙚 𝘽𝙤𝙖𝙧𝙙𝙧𝙤𝙤𝙢 𝙒𝙖𝙡𝙡" insights into the pressing topics shaping today's business, finance, and technology landscape. The Heads of the world's biggest corporations discuss current and future industry matters with 𝙃𝙚𝙖𝙙𝙨 𝙏𝙖𝙡𝙠, providing a unique perspective on the pulse of global commerce. 𝕎𝕖 𝕝𝕚𝕜𝕖 𝕥𝕠 𝕤𝕥𝕒𝕣𝕥 𝕥 ...
…
continue reading
Exo Flux is the podcast for the pioneers of technology, code, UX, start-ups, and marketing. In this podcast we interview digital piooners. You can fin amazing talks with people of Google, IBM and many more. The best way to learn is from digital pioneers. They are incredible professionals and experts. These pioneers have had a remarkable professional career in UX, design, code, marketing, and the start-up industry. This podcast is produced by Collisions Projects.
…
continue reading
This is a podcast for business and tech enthusiasts alike. Take a journey through the 'Full Stack' of the IBM ecosystem from the IBM cloud paks and applications that provide the core service infrastructure to our cross-industry Partners and finally to industry-leading clients who benefit from our world reknowned expertise. And all of this in under 15 minutes! For enquiries please email [email protected]
…
continue reading
HackrLife is a Podcast on the practical application of AI and PLG in growth and product marketing. I am @ Growth marketer for Google's AI product suite and have a decade of growth experience across Google, Linkedin, Adobe,SAP and IBM. In every episode, I share practical AI use cases, the latest in AI research along with no-code automation workflows and growth tactics which I am building in the open in my spare time. Real demos, real tear-downs of AI theory versus practical use case. Perfect ...
…
continue reading
Welcome to irResponsible AI —a series where you find out how NOT to end up on the New York Times headlines for all the wrong reasons! 💡 Why are we doing this? As experts, we are tired of the boring “mainstream corporate” RAI communication. Here, we give it to you straight. ⁉️ Why call it Irresponsible AI? Responsible AI exists because of irresponsible AI. Knowing what NOT to do can be, at times, more actionable than knowing what to do. 🎙️Who are your hosts? Why should you even bother to list ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The Optimal Path is a podcast about user research and product decision-making, brought to you by Maze. Explore how today's leading organizations leverage user research to inform better product decisions. Each episode uncovers the ideas and approaches used to unlock continuous insights—and the optimal path for product success. Subscribe to The Optimal Path newsletter to be the first to know when new episodes launch: https://maze.co/podcast/.
…
continue reading
A weekly podcast dissecting the pulse of business, technology & media in Asia. Hear our host interviewing leading journalists, senior executives, respectable authors & thinkers, entrepreneurs & thought leaders to discuss the most important issues that move and shake the business landscape in the Asia Pacific. The show is originally created and hosted by Bernard Leong.
…
continue reading
In organizations around the world, leaders are facing a deluge of urgent issues: a crisis in employee engagement, the need to make workforces more diverse, and the challenge of making workplaces feel human in an era of increasing dependence on technology and remote communication. At the NeuroLeadership Institute, we believe brain science can help provide solutions. Join us on Your Brain At Work, the official podcast of the NeuroLeadership Institute — where top researchers and thought leaders ...
…
continue reading
Analyse Asia with Bernard Leong is a weekly podcast dedicated to dissecting the pulse of technology, business and media in Asia. We interview thought leaders, and global & regional leading industry players and gain their insights into how we perceive and understand the market.
…
continue reading
The Voicebot Podcast is about the intersection of voice and artificial intelligence (AI) technologies. It is a weekly look at trends, founders and newsmakers and supplements the daily research, analysis and news found at https://voicebot.ai.
…
continue reading
Tenego provides international sales execution services, Sales Channels and Direct, to growing and established software companies. Through Tenego's Global Network covering many key markets, we provide programmes and hands-on services in Sales Channel Planning and Development, Direct Sales Execution and Sales Channel Execution. We will help you grow faster, become more scalable and enter new markets across the world through a range of services including: Sales Channel Execution (Partner Search ...
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
This was a weekly tip from Dr. Ethan Becker. Dr. Becker is a second generation executive communication coach with the 56 year old company, THE SPEECH IMPROVEMENT COMPANY INC., in Boston Ma., USA. TSIC studies, develops, coaches, and trains best practices in human communication. Since 1964 TSIC has been helping people in business, politics, and entertainment to become more comfortable and more effective as they communicate. While speech coaching is a personal experience, these tips cover comm ...
…
continue reading
How to discern what matters in business and IT and find a sense in your trade. We combine practical academic theories with concrete business. If you are a bored seasoned professional or an enterprising engineering student, listen to this show. You will discover how technology and business can be combined to bring more value and sense to society. We illustrate how to avoid out-of-touch strategies that are based on, for example, transparency and pure agility. Today, work environments are often ...
…
continue reading
Welcome to HumAIn, the top 1% global podcast shaping the future of AI and technology. Join host David Yakobovitch, a renowned AI innovator and venture capitalist, as he takes you on an exhilarating journey through the world of Artificial Intelligence, Data Science, and cutting-edge tech. Through intimate fireside chats with Chief Data Scientists, AI Advisors, and visionary leaders, we peel back the curtain on groundbreaking AI products, dissect industry trends, and explore how AI is reshapin ...
…
continue reading

1
SANS Stormcast Friday, September 5th, 2025: Cloudflare Response to 1.1.1.1 Certificate; AI Modem Namespace Reuse; macOS Vulnerability Allowed Keychain Decryption
8:18
8:18
Play later
Play later
Lists
Like
Liked
8:18Unauthorized Issuance of Certificate for 1.1.1.1 Cloudflare published a blog post with more details regarding the bad 1.1.1.1 certificate that was issued by Fina. https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/ AI Model Namespace Reuse Deleted accounts on Huggingface can be taken over by other entities unrelated to th…
…
continue reading

1
SANS Stormcast Thursday, September 4th, 2025: Dassault DELMIA Apriso Exploit Attempts; Android Updates; 1.1.1.1 Certificate Issued
6:22
6:22
Play later
Play later
Lists
Like
Liked
6:22Exploit Attempts for Dassault DELMIA Apriso. CVE-2025-5086 Our honeypots detected attacks against the manufacturing management system DELMIA Apriso. The deserialization vulnerability was patched in June and is one of a few critical vulnerabilities patched in recent months. https://isc.sans.edu/diary/Exploit%20Attempts%20for%20Dassault%20DELMIA%20Ap…
…
continue reading

1
Southeast Asia 16 Years Later with Michael Smith Jr & Daniel Cerventus Lim
1:02:19
1:02:19
Play later
Play later
Lists
Like
Liked
1:02:19Reuniting after more than a decade since their days in This Week in Asia Podcast from 2009, Michael Smith Jr., co-host of The Generalist podcast, and Daniel Cerventus Lim, semi-retired entrepreneur and community builder in Malaysia, join us for a candid assessment of Southeast Asia's tech ecosystem evolution. In this raw conversation, Michael offer…
…
continue reading

1
Southeast Asia 16 Years Later with Michael Smith Jr & Daniel Cerventus Lim
1:02:19
1:02:19
Play later
Play later
Lists
Like
Liked
1:02:19Reuniting after more than a decade since their days in This Week in Asia Podcast from 2009, Michael Smith Jr., co-host of The Generalist podcast, and Daniel Cerventus Lim, semi-retired entrepreneur and community builder in Malaysia, join us for a candid assessment of Southeast Asia's tech ecosystem evolution. In this raw conversation, Michael offer…
…
continue reading

1
SANS Stormcast Wednesday, September 3rd, 2025: Sextortiion Analysis; Covert Channel DNS/ICMP; Azure AD Secret Theft; Official FreePBX Patches
5:29
5:29
Play later
Play later
Lists
Like
Liked
5:29A Quick Look at Sextortion at Scale Jan analyzed 1900 different sextortion messages using 205 different Bitcoin addresses to look at the success rate, lifetime, and other metrics defining these campaigns. https://isc.sans.edu/diary/A%20quick%20look%20at%20sextortion%20at%20scale%3A%201%2C900%20messages%20and%20205%20Bitcoin%20addresses%20spanning%2…
…
continue reading

1
SANS Stormcast Tuesday, September 2nd, 2025: pdf-parser Patch; Salesloft Compromise; Velociraptor Abuse; NeuVector Default Password
5:39
5:39
Play later
Play later
Lists
Like
Liked
5:39pdf-parser: All Streams Didier released a new version of pdf-parser.py. This version fixes a problem with dumping all filtered streams. https://isc.sans.edu/diary/pdf-parser%3A%20All%20Streams/32248 Salesloft Drift Putting OAuth Tokens at Risk OAuth tokens used by Salesloft Drift users to provide access to integrations with Salesforce, Google Works…
…
continue reading

1
267 - HRH Princess Lebogang Zulu, President: BRICS Series, India–South Africa Chamber of Commerce, BRICS Women’s Business Alliance - African Women: Architect of Trade “A miracle built on unity”
38:59
38:59
Play later
Play later
Lists
Like
Liked
38:59Let us know your thoughts. Send us a Text Message. Follow me to see #HeadsTalk Podcast Audiograms every Monday on LinkedIn Episode Title: 🇿🇦African Women: Architect of Trade “A Miracle Built On Unity"🇮🇳 We continue the #HTBRICSSeries on Heads Talk with a formidable business leader whose influence spans construction, manufacturing, energy, and inter…
…
continue reading

1
SANS Stormcast Friday, August 29th, 2025: Scans for ZIP Files; FreePBX 0-Day; Passwordstate Patch
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45Increasing Searches for ZIP Files Attackers are scanning our honeypots more and more for .zip files. They are looking for backups of credential files and the like left behind by careless administrators and developers. https://isc.sans.edu/diary/Increasing%20Searches%20for%20ZIP%20Files/32242 FreePBX Vulnerability An upatched vulnerability in FreePB…
…
continue reading

1
SANS Stormcast Thursday, August 28th, 2025: Launching Shellcode; NX Compromise; Volt Typhoon Report
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39Interesting Technique to Launch a Shellcode Xavier came across malware that PowerShell and the CallWindowProcA() API to launch code. https://isc.sans.edu/diary/Interesting%20Technique%20to%20Launch%20a%20Shellcode/32238 NX Compromised to Steal Wallets and Credentials The popular open source NX build package was compromised. Code was added that uses…
…
continue reading

1
SANS Stormcast Wednesday, August 27th, 2025: Analyzing IDNs; Netscaler 0-Day Vuln; Git Vuln Exploited;
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Getting a Better Handle on International Domain Names and Punycode International Domain names can be used for phishing and other attacks. One way to identify suspect names is to look for mixed script use. https://isc.sans.edu/diary/Getting%20a%20Better%20Handle%20on%20International%20Domain%20Names%20and%20Punycode/32234 Citrix Netscaler Vulnerabil…
…
continue reading

1
SANS Stormcast Tuesday, August 26th, 2025: Decoding Word Reading Location; Image Downscaling AI Vulnerability; IBM Jazz Team Server Vuln
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01Reading Location Position Value in Microsoft Word Documents Jessy investigated how Word documents store the last visited document location in the registry. https://isc.sans.edu/diary/Reading%20Location%20Position%20Value%20in%20Microsoft%20Word%20Documents/32224 Weaponizing image scaling against production AI systems AI systems often downscale imag…
…
continue reading

1
Asian Economies & Why Geography and History Matter More Than Economics Models with Jamus Lim
1:00:19
1:00:19
Play later
Play later
Lists
Like
Liked
1:00:19"The way that institutions emerge and entrench themselves and become a part of the functioning of an economy and society is because they solve some problems. So they're usually a non-market solution toward solving some problem that the economy, that the market system couldn't necessarily solve. Of course the most prominent example of an institution…
…
continue reading

1
Asian Economies & Why Geography and History Matter More Than Economics Models with Jamus Lim
1:00:19
1:00:19
Play later
Play later
Lists
Like
Liked
1:00:19"The way that institutions emerge and entrench themselves and become a part of the functioning of an economy and society is because they solve some problems. So they're usually a non-market solution toward solving some problem that the economy, that the market system couldn't necessarily solve. Of course the most prominent example of an institution…
…
continue reading

1
SANS Stormcast Monday, August 25th, 2025: IP Cleanup; Linux Desktop Attacks; Malicious Go SSH Brute Forcer; Onmicrosoft Domain Restrictions
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were zero padded , an unfortunate choice. As of this week, datafeeds should no longer be zero padded . https://isc.sans.edu/diary/The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data./32228 .d…
…
continue reading

1
266 - David Sime, CTO, CIO: BRICS Series, Invantage Ltd - Geopolitical Tortoise and the Hare Race
57:17
57:17
Play later
Play later
Lists
Like
Liked
57:17Let us know your thoughts. Send us a Text Message. Follow me to see #HeadsTalk Podcast Audiograms every Monday on LinkedIn Episode Title:🏴Geopolitical Tortoise and Hare Race🏴 Another captivating episode in the BRICS & Geopolitics Series (#HTBRICSSeries) on Heads Talk where we explore the shifting landscape of money, trade, politics, conflict, and t…
…
continue reading

1
SANS Stormcast Friday, August 22nd, 2025: The -n switch; Commvault Exploit; Docker Desktop Escape Vuln;
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Don't Forget The "-n" Command Line Switch Disabling reverse DNS lookups for IP addresses is important not just for performance, but also for opsec. Xavier is explaining some of the risks. https://isc.sans.edu/diary/Don%27t%20Forget%20The%20%22-n%22%20Command%20Line%20Switch/32220 watchTowr releases details about recent Commvault flaws Users of the …
…
continue reading

1
SANS Stormcast Thursday, August 21st, 2025: Airtel Scans; Apple Patch; Microsoft Copilot Audit Log Issue; Password Manager Clickjacking
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerabilit…
…
continue reading

1
SANS Stormcast Wednesday, August 20th, 2025: Increased Elasticsearch Scans; MSFT Patch Issues
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
…
continue reading

1
Transforming Asia's Financial Infrastructure: Stripe's AI and Stablecoin Strategy with Paul Harapin
42:02
42:02
Play later
Play later
Lists
Like
Liked
42:02"APAC represents 40% of global GDP. So you can see that there's huge opportunity in a very, very diverse region. The needs of Japan are different to the needs of China. India is exploding with SaaS, software, AI. Australia one of our larger markets, again, very different. And so Southeast Asia, the complexities of Asia make it a joy to work in." - …
…
continue reading

1
Transforming Asia's Financial Infrastructure: Stripe's AI and Stablecoin Strategy with Paul Harapin
42:02
42:02
Play later
Play later
Lists
Like
Liked
42:02"APAC represents 40% of global GDP. So you can see that there's huge opportunity in a very, very diverse region. The needs of Japan are different to the needs of China. India is exploding with SaaS, software, AI. Australia one of our larger markets, again, very different. And so Southeast Asia, the complexities of Asia make it a joy to work in." - …
…
continue reading

1
SANS Stormcast Tuesday, August 19th, 2025: MFA Bombing; Cisco Firewall Management Vuln; F5 Access for Android Vuln;
5:10
5:10
Play later
Play later
Lists
Like
Liked
5:10Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Ce…
…
continue reading

251
SANS Stormcast Monday, August 18th, 2025: 5G Attack Framework; Plex Vulnerability; Fortiweb Exploit; Flowise Vuln
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%20…
…
continue reading

1
265 - Dr. Frank Aswani, CEO: BRICS Series, African Venture Philanthropy Alliance (AVPA) - Capital Security to Capital Growth: Africa’s Bankable-to-Investable Journey
1:00:59
1:00:59
Play later
Play later
Lists
Like
Liked
1:00:59Let us know your thoughts. Send us a Text Message. Follow me to see #HeadsTalk Podcast Audiograms every Monday on LinkedIn Episode Title: 🇿🇦Capital Security to Capital Growth: Africa’s Bankable-to-Investable Journey🇿🇦 We continue the #HTBRICSSeries on Heads Talk with a dynamic C-suite leader, investor, and influential figure in Africa’s tech, finan…
…
continue reading
In this episode of HackrLife, you’ll discover why the way we measure AI performance might be misleading . A recent study that examined 23 major Large Language Model (LLM) benchmarks has found that small changes in formatting, prompt style, and test conditions can swing results dramatically. T he episode reveals how this fragility challenges the acc…
…
continue reading

1
SANS Stormcast Friday, August 15th, 2025: Analysing Attack with AI; Proxyware via YouTube; Xerox FreeFlow Vuln; Evaluating Zero Trust @SANS_edu
15:12
15:12
Play later
Play later
Lists
Like
Liked
15:12AI and Faster Attack Analysis A few use cases for LLMs to speed up analysis https://isc.sans.edu/diary/AI%20and%20Faster%20Attack%20Analysis%20%5BGuest%20Diary%5D/32198 Proxyware Malware Being Distributed on YouTube Video Download Site Popular YouTube download sites will attempt to infect users with proxyware. https://asec.ahnlab.com/en/89574/ Xero…
…
continue reading

1
SANS Stormcast Thursday, August 14th, 2025: Equation Editor; Kerberos Patch; XZ-Utils Backdoor; ForitSIEM/FortiWeb patches
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16CVE-2017-11882 Will Never Die The (very) old equation editor vulnerability is still being exploited, as this recent sample analyzed by Xavier shows. The payload of the Excel file attempts to download and execute an infostealer to exfiltrate passwords via email. https://isc.sans.edu/diary/CVE-2017-11882%20Will%20Never%20Die/32196 Windows Kerberos El…
…
continue reading
In this episode of HackrlIfe I take as a critical look at Samsung's research on building "multimodal AI agents" using no-code platforms like Flowise. While the paper sounds impressive with terms like "multimodal LLM-based Multi-Agent Systems," I dug into what these tools actually do versus the marketing hype. What I Found It Really Is: API orchestr…
…
continue reading

1
SANS Stormcast Wednesday, August 13th, 2025: Microsoft Patch Tuesday; libarchive vulnerability upgrade; Adobe Patches
8:55
8:55
Play later
Play later
Lists
Like
Liked
8:55Microsoft Patch Tuesday https://isc.sans.edu/diary/Microsoft%20August%202025%20Patch%20Tuesday/32192 https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/ libarchive Vulnerability A libarchive vulnerability patched in June was upgraded from a low CVSS score to a critical one. Libarchive is used by compression…
…
continue reading
Those "reasoning" AI models everyone's raving about? Apple's research suggests they're not actually thinking—they're just really good at pattern matching. In my latest HackrLife episode, I break down why this is EXACTLY why AI can help you think better, but cannot really think on your behalf. Key insights:✅ Why reasoning models fail completely past…
…
continue reading

1
SANS Stormcast Tuesday, August 12th, 2025: Erlang OTP SSH Exploits (Palo Alto Networks); Winrar Exploits; Netscaler Exploits; OpenSSH Pushing PQ Crypto;
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of…
…
continue reading