Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

IoT Insiders Podcasts

show episodes
 
Artwork

1
IoT Unplugged

IoT insider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Tune into the Internet of Things. In this podcast IoT Insiders' editor digs into the world of IoT; an ever-changing swarth of industry experts with each episodes, IoT Unplugged promises to be an equally informative and intriguing auditory journey that will keep its listeners up to date with all the issues surrounding IoT today and tomorrow.
  continue reading
 
Artwork

751
IoT Leaders

Nick Earle, Executive Chairman, Eseye

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
IoT Leaders is a podcast from Eseye that shares real IoT stories from the field about digital transformation swings and misses, lessons learned, and innovation strategies that work.In each episode, you’ll hear our conversations with top digitization leaders on how IoT is changing the world for the better. Let IoT Leaders be your guide to IoT, digital transformation, and innovation. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

201
The IoT Podcast

The IoT Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
IoT Talks and Tales The IoT Podcast is joined by the most influential leaders in IoT every Thursday to break down the current and up & coming IoT trends, unravel the misconceptions, doubts and forecast predictions on the ongoing journey for the Internet of Things. This podcast will have something for everyone, whether you’re an entrepreneur searching for fresh ideas or the lessons learned, an engineer always looking to be one step ahead with the latest solutions, or someone with a pure enthu ...
  continue reading
 
Artwork

1
Emerging Cyber Risk

Max Aulakh & Joel Yonts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
  continue reading
 
Artwork

1
Inside Electronics

Endeavor Business Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Electronic Design has been serving the engineering community with pride for decades, providing news, commentary, and interviews about the industry. Hosted by industry veteran Alix Paultre, the Inside Electronics podcast brings you commentary, news, and interviews about the things going on in the electronic design engineering community and its surrounding business ecosystem.
  continue reading
 
Artwork
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Artwork

1
Embedded Insiders

Embedded Computing Design

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Assistant Managing Editor, and Ken Briodagh, Editor-in-Chief of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology m ...
  continue reading
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Budget overruns. Bricked devices. Data breaches. Building connected products is hard. Join us every other Thursday for unfiltered conversations with executives about their AI journeys — the mistakes they made, the lessons they learned, and what they wish they’d known when they started. In each episode of Over the Air, our expert guests will make bold predictions, reveal unpopular opinions, and share stories you won’t hear anywhere else.
  continue reading
 
Artwork

1
alphalist.CTO Podcast - For CTOs and Technical Leaders

Tobias Schlottke - alphalist CTO Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This podcast features interviews of CTOs and other technical leadership figures and topics range from technology (AI, blockchain, cyber, DevOps, Web Architecture, etc.) to management (e.g. scaling, structuring teams, mentoring, technical recruiting, product etc.). Guests from leading tech companies share their best practices and knowledge. The goal is to support other CTOs on their journey through tech and engineering, inspire and allow a sneak-peek into other successful companies to underst ...
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
The public transport industry is undergoing rapid change, from decarbonisation and sustainability goals to the fast-paced evolution of digital technology. Mobility Redefined is the podcast for senior managers, executives, and decision-makers who are leading this transformation. Hosted by Dr Kaan Yildizgöz, Executive Director at Modaxo, each episode brings expert insights on the challenges and opportunities facing the transport sector today. From digitalisation and workforce development to cu ...
  continue reading
 
At Accenture, we work at the frontier of the technology defining our lives today and tomorrow. Tune in to hear our people share opinions and perspectives on the technology trends impacting our world, their own experiences on the front line of innovation, and how Accenture is harnessing the potential of these technologies to create meaningful change.
  continue reading
 
Artwork

1
Smart People Podcast

Smart People Industries

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Smart People Podcast is a biweekly, interview-based podcast that features today's most well respected thought leaders engaging in authentic, insightful conversation for the benefit of the listener. The host, Chris Stemp, and his co-host/producer Jon Rojas, utilize their insatiable curiosity and relatable charm to provoke their guests into giving the interview of a lifetime. Every single guest has achieved a high level of recognition within their arena and in doing so has collected a wealth o ...
  continue reading
 
A monthly podcast for physical security professionals to hear from leading figures and influencers in the industry and gain valuable insight into the sector’s latest trends and initiatives, as well as the many challenges facing the profession and how they can be overcome. On the agenda will be everything from security technology, such as video surveillance and access control, through to risk management strategies and building a holistic security organisational culture – and plenty more!
  continue reading
 
The UPSTACK Podcast is an ever-evolving conversation on all things digital infrastructure, giving CTOs, CIOs, CISOs and other tech leaders "food for thought” as they push to stay ahead of the technology curve. Greg Moss, UPSTACK’s Partner and Managing Director, invites guests to talk candidly about the latest technology infrastructure topics. Co-hosted by SVP of Marketing, Alex Cole, this is sure to be a podcast worth listening to.
  continue reading
 
Loading …
show series
 
Send us a text In this episode of Embedded Insiders, the VP of Sales and Business Development at Gateworks Corporation, Kelly Peralta, joins me to discuss the trends, challenges, and innovations surrounding Wi-Fi HaLow for industrial and IoT applications. The next segment is sponsored by Analog Devices, and Contributing Editor, Rich Nass, and Analo…
  continue reading
 
Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
  continue reading
 
🌐 Business Compass LLC Language ServicesEmpowering Global Communication Through AI-Driven Language Intelligence Business Compass LLC delivers next-generation Language Services that transform the way organizations communicate, understand, and interact across languages and media. Our AI-driven platform supports text, audio, and video processing—enabl…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
On this week’s Safe Mode, Greg welcomes Jason Pufahl, VP of Security Services at Vancord. Jason shares deep insights into the evolving managed security landscape, focusing on challenges faced by small and mid-sized businesses and the practical fundamentals they need for strong cybersecurity. He also discusses the evolving role of CISA and the impor…
  continue reading
 
Did you know college students are snooping on satellite transmissions? On today’s news roundup we discuss new research in which university investigators use off-the-shelf equipment to intercept traffic from geostationary satellites and discover that a lot of it is unencrypted. We also dig into the credential hygiene lessons we can learn from a corp…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
Smart cities are making headlines—but what’s driving real ROI behind the scenes? In this episode, we explore how consultative IoT strategies, not just new tech, are reshaping urban infrastructure and logistics. The conversation centers on smart labels, AI, and sensor-driven solutions that turn everyday operations into measurable value. You’ll hear …
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Wide-bandgap semiconductors like silicon carbide (SiC) have changed the landscape of electronics and have fomented a revolution in power conversion. In this podcast, we talk to Adam Barkley, VP, Power Technology Development at Wolfspeed, about the state of the industry in silicon carbide and where the industry is going.…
  continue reading
 
What if there really was an owner’s manual for being human? In this episode, Chris sits down with one of the top executive coaches in the country Shaun Dyke, to reveal the models that billion-dollar leaders use to understand people, motivate change, and create results. They unpack the hidden psychology behind your reactions, relationships, and resu…
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
As Mobility Redefined marks its first anniversary, host Dr. Kaan Yildizgoz takes a moment to reflect on the journey so far — from thought-provoking conversations with leaders across continents to growing a community passionate about the future of transport. Kaan reviews the highlights from the past year, including global CEO roundtables, interviews…
  continue reading
 
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
  continue reading
 
Send us a text On this episode of Embedded Insiders, Ken is joined by Alif Semiconductor's founder and president, Reza Kazerounian. The two discuss an ensemble of small-footprint, power-efficient solutions capable of running fast AI. In addition to being secure and integrated, the MCUs and fusion processors leverage hardware acceleration for transf…
  continue reading
 
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
  continue reading
 
In this episode of Safe Mode, Betsy Cooper, founding director of the Aspen Institute’s Policy Academy, details a new initiative designed to mobilize ordinary citizens as cybersecurity policy advocates. The Cyber Civic Engagement program, supported by Craig Newmark Philanthropies’ Take9 campaign, offers virtual training sessions to equip participant…
  continue reading
 
CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some serious organizational infrastructure to function. On today’s Packet Protector, sponsored by Cisco, we talk about the organizations and processes that…
  continue reading
 
Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
  continue reading
 
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
  continue reading
 
We can simulate everything very exactly, but when it comes to that analog interface between the system and reality, you must be very careful because sometimes things don't behave in the analog realm the way they're predicted to. In this episode, we talk to Dermot O'Shea, CEO of Taoglas, about the state of the cloud and IoT and the challenges in dev…
  continue reading
 
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
  continue reading
 
Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
  continue reading
 
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
  continue reading
 
Kevin Greene, chief cybersecurity technologist for the public sector at BeyondTrust, joins Greg to unpack the fallout from the recent lapse of the CISA information sharing bill and what it means for both public and private sector cyber defenses. The conversation dives into how the threat landscape has shifted since the bill’s original passage, the …
  continue reading
 
As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
  continue reading
 
The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn mor…
  continue reading
 
Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and outside of enterprise borders. As organizations dive head-first into AI projects, MCP and other agentic protocols are being quickly adopted. And that means security and network teams need to understan…
  continue reading
 
Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
  continue reading
 
The world of test and measurement is getting more complex and challenging in many ways. There are multiple factors impacting the T&M industry, from materials to new topologies to smaller form factors with even higher levels of integration and power density. In this episode, we talk to the CEO of Liquid Instruments, Daniel Shaddock, about the curren…
  continue reading
 
Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost cause. And many developers inadvertently introduce serious threat vectors into their applications – risks they must later eliminate before they become ingrained across application stacks. NCC Group’s …
  continue reading
 
Your smartphone, Tesla, and the wind turbines dotting the horizon all share something in common: they’re hungry for rare earth elements. These critical minerals supply chain bottlenecks are creating a perfect storm that’s reshaping everything from electric vehicle batteries to the future of clean energy materials. This deep dive is for business lea…
  continue reading
 
Creating a successful online marketplace means getting payments right from day one. Stripe Connect marketplace solutions handle the complex world of multi-party payments, letting you focus on growing your platform instead of wrestling with payment infrastructure. This guide is for marketplace founders, developers, and product managers who want to b…
  continue reading
 
First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
  continue reading
 
This episode of Safe Mode features a nuanced conversation with Ben Harris, CEO of Watchtower, who delves into the complexities of vulnerability management in today’s threat landscape. Harris discusses why traditional patching is no longer a guarantee of security, revealing how sophisticated attackers are staying persistent even after organizations …
  continue reading
 
Send us a text In this episode of Embedded Insiders, we’re joined by embedded systems veteran Steve Yates, founder of ADI Engineering and now Founder & CEO of StellarIoT. Steve dives into his latest venture, a platform designed to support rugged, AI-powered digital transformation in remote industries—combining open software, rugged hardware, satell…
  continue reading
 
How single-node performance and embedded analytics are revolutionizing database architecture for modern applications Tradegate Direct: Europe's most direct online broker – trade for free, efficiently, and directly on the stock exchange. Trade directly here In this episode, we dive deep into the world of analytical databases with Mark Raasveldt, the…
  continue reading
 
Hospitals don’t run on hope—they run on data. Today’s healthcare systems are under pressure to do more with less. From equipment shortages to long wait times, inefficiencies are everywhere. But what if AI agents could fix them in real time? In this episode, we explore how a new class of IoT-driven intelligence is transforming hospital operations fr…
  continue reading
 
Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play