Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
IoT Security Podcast

Phosphorus Cybersecurity

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join one of our hosts, Alex Nehmy, Eric Johansen, and James McCarthy, each month as they speak with the biggest names and the biggest brains in cybersecurity, including CISOs, analysts, security researchers, and other industry thought lea ...
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
  continue reading
 
Artwork

1
IoT Unplugged

IoT insider

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Tune into the Internet of Things. In this podcast IoT Insiders' editor digs into the world of IoT; an ever-changing swarth of industry experts with each episodes, IoT Unplugged promises to be an equally informative and intriguing auditory journey that will keep its listeners up to date with all the issues surrounding IoT today and tomorrow.
  continue reading
 
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
  continue reading
 
Artwork

1
Next in Tech

S&P Global Market Intelligence

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what’s new and what’s next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
  continue reading
 
Artwork

1
IoT Leaders

Nick Earle, CEO Eseye

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
IoT Leaders is a podcast from Eseye that shares real IoT stories from the field about digital transformation swings and misses, lessons learned, and innovation strategies that work.In each episode, you’ll hear our conversations with top digitization leaders on how IoT is changing the world for the better. Let IoT Leaders be your guide to IoT, digital transformation, and innovation. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Connect

Axis Communications

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
  continue reading
 
Artwork
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep ​network visibility to not only protect against sophisticated cyber- ...
  continue reading
 
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
  continue reading
 
Welcome to "Analyze Happy: Crafting Your Data Estate", the podcast where data meets delight! Dive into the world of modern data estate tools and discover how to harness advanced analytics, data governance, and AI transformation to accelerate growth in your organization. With a spotlight on the Microsoft ecosystem—think Fabric, Azure Databricks, Power Platform, IoT Edge, and Real-Time Intelligence—we’ll explore best practices, actionable insights, and the latest innovations to build a data st ...
  continue reading
 
Artwork

1
The IOT Review

Industrial IOT Podcast by IrecaMedia

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
We live in an era where businesses are digitally disrupted almost on a daily basis. The Industrial Internet of Things (IoT) is a unique framework to enable businesses exploit the power of digital innovations and emerge as disruptors (and winners). The IOT Review is a podcast specifically designed to empower business decision makers and IT practitioners with highly relevant technology and strategic insights that's needed to integrate IoT in their business models... to gain in-depth know-how o ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
Emerging Cyber Risk

Max Aulakh & Joel Yonts

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
  continue reading
 
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
  continue reading
 
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments. Nexus is formerly known as Aperture.
  continue reading
 
Artwork
 
The Conversations of Things podcast series is hosted by Joe Dugandzic and features interesting guests from inside and outside the technology world, discussing everything from the smart home to general tech to all of the connected gadgets in our lives. Where is all of this technology taking us? Is it helpful or harmful in the long run? And, of course, discussions on recent tech news and the latest must-have devices.
  continue reading
 
Artwork

1
Embedded Executive Podcast

Rich Nass, Embedded Computing Design

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
  continue reading
 
Artwork
 
Nerding Out With Viktor is a podcast about tech, startups, and everything in between. Hosted by Viktor, a lifelong nerd and seasoned entrepreneur, the show features real conversations with builders, hackers, and technologists. Viktor got his start in Silicon Valley with YippieMove, an early email migration tool, and later created Blotter, a top-ranked productivity app for macOS. He now runs Screenly — the first developer-friendly digital signage platform — and built its open-source sibling, ...
  continue reading
 
Artwork
 
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
  continue reading
 
Artwork

1
IoT on Tap

Randy Pitcher, Chris Herrera

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
IoT on Tap is a weekly podcast focusing on the Internet of Things from a developers perspective. Chris Herrera and Randy Pitcher from Hashmap, Inc will be talking about how someone can reasonably go from the "hello world" of IoT to actually doing advanced analytics and machine learning on their device data. Music: https://www.bensound.com
  continue reading
 
Artwork

1
DM Radio

Eric Kavanagh

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
DM Radio is the world's longest-running show about data! Since 2008, we've interviewed the industry's brightest minds about AI, analytics, big data, cloud, data warehousing, digital transformation, Internet of Things (IoT), streaming and many other topics. Now broadcasting coast-to-coast, we're always looking for new voices. Send an email to [email protected]!
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
A monthly podcast for physical security professionals to hear from leading figures and influencers in the industry and gain valuable insight into the sector’s latest trends and initiatives, as well as the many challenges facing the profession and how they can be overcome. On the agenda will be everything from security technology, such as video surveillance and access control, through to risk management strategies and building a holistic security organisational culture – and plenty more!
  continue reading
 
Speaking of Service uncovers practical ways to grow service revenue, control costs, and improve customer satisfaction. If you’re looking to innovate, gain a competitive edge, or just learn about the latest service trends, you’ve come to the right place! Also check: www.ptc.com/speakingofservice
  continue reading
 
Artwork

1
The BLC Connection

Ben Lomand Connect

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The BLC Connection Podcast is a fun and informative show from Ben Lomand Connect that answers your questions about the internet, Wi-Fi, home security and more, and brings you information on the stories and events in “Ben Lomand Country.” Bryan, Karen and Micah take you behind the scenes of Ben Lomand Connect, where the cooperative connects Middle Tennessee with the latest in communications technology and with businesses that are making a difference in our service territory. The BLC Connectio ...
  continue reading
 
Artwork

1
BlockHash

BlockHash LLC

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Welcome to the most electrifying technology podcast on the planet! Buckle up as we dive headfirst into the thrilling world of Blockchain, Bitcoin, Crypto, DeFi, Web3, Artificial Intelligence, IoT, and the Metaverse. We've got the hottest tech startups, the coolest CEOs, the most innovative founders, the most influential influencers and the savviest investors, all sharing their wisdom with us every single week. So buckle up and join your host Brandon Zemp for a technology deep-dive. Ready to ...
  continue reading
 
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
  continue reading
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Artwork

1
Elevate the Edge

Maribel Lopez & Jo Peterson

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Elevate the Edge helps companies understand what edge computing is and how the market will evolve. The podcast will help technology leaders build successful strategies that deliver business value by learning what works from the masters and how to avoid pitfalls. ElevateTheEdge.com
  continue reading
 
Artwork
 
Hacked Off demystifies the world of cybersecurity. Hosted by Secarma's Managing Director, Holly Grace Williams, it features weekly interviews delving beneath the headlines of the latest hacks, breaches and vulnerabilities, providing expert advice on how to stay safe online. This podcast is brought to you by global cybersecurity and penetration testing company, Secarma.
  continue reading
 
D-Ron provides comprehensive CCTV security cameras and video surveillance systems to secure facilities. For two decades, we have been a trusted specialist, delivering tailored CCTV camera solutions in Singapore. Our CCTV for offices packages feature scalable video management software, analytics, and the networking equipment needed.
  continue reading
 
Artwork

1
City of Tomorrow

We Empower Innovators

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Going “smart” is an aspiration of many cities around the world. Today, smart technology solutions are connecting citizens to their communities in new ways, solving issues to do with efficiency, sustainability and security. The City of Tomorrow Podcast series explores how different stakeholders in the Smart City ecosystem can come together to build safer, more efficient and sustainable cities of the future. Led by Digital Transformation Expert, Manuela Krull, who is also the Managing Director ...
  continue reading
 
Artwork

1
EngCast

Enghouse Networks

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
EngCast delivers the latest tips and insight into the telecommunication sector. With guest hosts and contributions from the Enghouse Networks team, EngCast is designed to help you keep your business at the cutting edge. For more information on Enghouse Networks visit https://enghousenetworks.com/
  continue reading
 
Artwork

1
Heavy Wireless

Packet Pushers

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Heavy Wireless is a deep dive into Wi-Fi, IoT, wireless security, and more. Host Keith Parsons, CWNE#3, draws on his decades of experience to educate, entertain, and inspire those working in the WLAN industry. Each twice-monthly episode explores an aspect of wireless technology with guests including Wi-Fi engineers, industry experts, and vendors. Whether you're already a WLAN specialist or looking to expand your skills in this high-demand sector of IT, Heavy Wireless gives you the technical ...
  continue reading
 
Artwork

1
Zero To Exit

Ankur Shah & Neelima Rustagi

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Want to know how to build market-leading technology products? Want to know how to take a startup from nothing multi-billion dollar exit? Zero To Exit is the best business and technology podcast series that will share deep insights from industry leaders on how they successfully led multiple products and companies to critical success. We will invite guests who have been on the battlefield for many years and can share their unique insights on building products, sales machines, company culture, ...
  continue reading
 
Loading …
show series
 
Navigate the complex cybersecurity landscape of Q2 and Summer 2025 as we delve into the escalating convergence of AI-driven cyberattacks, the persistent vulnerabilities of the expanding Internet of Things (IoT), and the challenges of establishing robust security and governance frameworks. Based on recent Q1 2025 incident data and expert projections…
  continue reading
 
האם מכשירי האיי.או.טי שלך מאובטחים? אכיפה אוטומטית עם למידת מכונה מרצה: מתי אפשטיין, ראש מכירות טכנולוגיות האיי.או.טי ואיי.סי.אס , צ'ק פוינט ההרצאה זו מתמקדת באבטחת "מכשירים מחוברים" - אכיפה! בהנחה שמכשירי האיי.או.טי ואיי.סי.אס פגיעים, קלים לפריצה ומקור לתנועה רוחבית זדונית ברשתות איי.טי ואוו.טי, צ'ק פוינט יוצרת באופן אוטונומי (ואוטומטי) מדיניות אב…
  continue reading
 
Healthcare IoT systems are increasingly targeted by cyber threats, necessitating a shift in strategy from isolated, organization-specific responses to a collaborative, ecosystem-wide approach. James McCarthy sits down with vCISO and 30-year information assurance and cybersecurity veteran Jason Taule. Taule brings important insights into the challen…
  continue reading
 
Send us a text This episode explores the crucial steps involved in securely connecting PTC/Kepware's KEPServerEX, a leader in industrial connectivity, to Microsoft Azure IoT Hub through Azure IoT Edge. Learn how leveraging Azure IoT Edge as a gateway enhances security by isolating KEPServerEX from the internet and enables powerful edge processing c…
  continue reading
 
Canon printer driver vulnerabilities enable Windows kernel exploitation. Astonishing cyber-security awareness from a household appliance manufacturer. France tries to hook 2.5 million school children with a Phishing test. Wordpress added an abuse prone feature in 2022. Guess what happened? Oracle? Is there something you'd like to tell us? Utah's go…
  continue reading
 
For episode 513, Brandon Zemp is joined by Clayton Menzel, the Head of Business Development at Babylon, an ecosystem of developers, finality providers, and technology providers committed to building native use-cases for Bitcoin. Previously, he was Head of Strategy at Rio Foundation, where he led strategic initiatives before the organization was acq…
  continue reading
 
Secure Your Spring Boot App: Spring Security, CORS, CSRF and Method-Level Annotations https://knowledge.businesscompassllc.com/secure-your-spring-boot-app-spring-security-cors-csrf-method-level-annotations/ Are you tired of sleepless nights worrying about the security of your Spring Boot application? 😰 In today’s digital landscape, protecting your …
  continue reading
 
Unlock High-Performance Apps: Fix Slow I/O with Event Demultiplexers https://knowledge.businesscompassllc.com/unlock-high-performance-apps-fix-slow-i-o-with-event-demultiplexers/ Is your high-performance app crawling at a snail’s pace? 🐌 You’re not alone. Many developers face the frustrating challenge of slow I/O operations hampering their applicat…
  continue reading
 
MCP Explained: Powering Smarter, Context-Aware AI Agents https://knowledge.businesscompassllc.com/mcp-explained-powering-smarter-context-aware-ai-agents/ Have you ever wished for an AI assistant that truly understands you and your needs? One that doesn’t just respond to commands, but anticipates your desires and adapts to your unique situation? Ent…
  continue reading
 
How Bounded Contexts Solve Chaos in Software Architecture: A Domain-Driven Design Deep Dive https://knowledge.businesscompassllc.com/how-bounded-contexts-solve-chaos-in-software-architecture-a-domain-driven-design-deep-dive/ Imagine a bustling city without borders, where buildings overlap, streets intertwine chaotically, and residents struggle to n…
  continue reading
 
Master SQL Joins: Link Customers to Orders and Build High-Performance Databases https://knowledge.businesscompassllc.com/master-sql-joins-link-customers-to-orders-and-build-high-performance-databases/ Are you tired of struggling with complex database relationships? 🤔 Do you find yourself getting lost in a sea of tables, unsure how to connect custom…
  continue reading
 
REST or gRPC? The Ultimate Guide to Microservices Communication and System Design https://knowledge.businesscompassllc.com/rest-or-grpc-the-ultimate-guide-to-microservices-communication-and-system-design/ 🔍 Are you grappling with the complexities of microservices communication? You’re not alone. In today’s rapidly evolving tech landscape, choosing …
  continue reading
 
How Hackers Use XSS to Steal Sessions & Inject Code — and How YOU Can Stop Them https://knowledge.businesscompassllc.com/how-hackers-use-xss-to-steal-sessions-inject-code-and-how-you-can-stop-them/ Have you ever felt uneasy about entering your personal information on a website? You’re not alone. In today’s digital world, cyber threats are lurking a…
  continue reading
 
AWS Amplify Gen 2: Top 7 Upgrades You Need to Know https://knowledge.businesscompassllc.com/building-serverless-web-and-mobile-apps-with-aws-amplify-gen-2/ Are you tired of wrestling with complex backend infrastructure for your web and mobile apps? 🤔 Enter AWS Amplify Gen 2 – a game-changing solution that’s revolutionizing the way developers build …
  continue reading
 
Compare and Contrast as well as Best Practices of Popular API Protocols - HTTP/HTTPS, REST API, GraphQL, Websocket, Webhook, MQTT, Soap, GRPC and Outro https://knowledge.businesscompassllc.com/compare-and-contrast-as-well-as-best-practices-of-popular-api-protocols-http-https-rest-api-graphql-websocket-webhook-mqtt-soap-grpc-and-outro/ 🌐 In the ever…
  continue reading
 
Compare and Contrast Web Servers - Apache, Nginx, TomCat, IIS, Websphere, and Open Light Speed https://knowledge.businesscompassllc.com/compare-and-contrast-web-servers-apache-nginx-tomcat-iis-websphere-and-open-light-speed/ Have you ever wondered why some websites load faster than others? 🚀 Or why certain web applications seem more secure and reli…
  continue reading
 
Explore the complex and widespread cybersecurity threat landscape currently facing the European Union. This episode delves into the findings of recent reports, highlighting how geopolitical tensions and the rapid pace of digitisation are fueling a surge in malicious cyber activity. We discuss the substantial threat level assessed for the EU, meanin…
  continue reading
 
How to design and implement in-app purchases with iOS Apps https://knowledge.businesscompassllc.com/how-to-design-and-implement-in-app-purchase-with-ios-apps/ 💡 Have you ever wondered how those little “Buy Now” buttons in your favorite iOS apps actually work? In-app purchases have revolutionized the way we interact with mobile applications, offerin…
  continue reading
 
Compare and contrast different APIs - HTTP, REST, and WebSocket https://knowledge.businesscompassllc.com/compare-and-contract-different-apis-http-rest-and-websocket/ Have you ever found yourself lost in the sea of API options, unsure which one to choose for your project? You’re not alone. In today’s digital landscape, APIs are the backbone of moder…
  continue reading
 
Build automated data pipeline in AWS using S3, Lambda, Glue Crawler, Glue ETL, Glue Workflow, RedShift, Aurora, DynamoDB, etc. https://knowledge.businesscompassllc.com/build-automated-data-pipeline-in-aws-using-s3-lambda-glue-crawler-glue-etl-glue-workflow-redshift-aurora-dynamodb-etc/ 🚀 Data pipelines are the unsung heroes of modern business intel…
  continue reading
 
API Best Practices https://knowledge.businesscompassllc.com/best-practices-for-api-security/ In an era where APIs form the backbone of modern software applications, ensuring their security is paramount. With cyber threats evolving at an alarming rate, organizations can’t afford to leave their APIs vulnerable. But how can you fortify your APIs again…
  continue reading
 
Comparison of AWS, Azure, and GCP Services https://knowledge.businesscompassllc.com/comparison-of-aws-azure-and-gcp-services/ Are you overwhelmed by the myriad of cloud service providers available today? 🤔 With tech giants like Amazon, Microsoft, and Google all vying for your attention, choosing the right cloud platform can feel like navigating a l…
  continue reading
 
Webhooks Explained with GitHub and AWS: Build Real-Time Event-Driven Systems https://knowledge.businesscompassllc.com/webhooks-explained-with-github-aws-build-real-time-event-driven-systems/ Have you ever wished your applications could instantly react to changes in other systems? 🚀 Imagine a world where your software automatically updates, notifies…
  continue reading
 
Semantic Versioning Explained: MAJOR.MINOR.PATCH and How to Version Your Code Right https://knowledge.businesscompassllc.com/semantic-versioning-explained-major-minor-patch-how-to-version-your-code-right/ Have you ever found yourself drowning in a sea of version numbers, unsure which update to use or how to properly label your own software releases…
  continue reading
 
SMTP, IMAP & Spam Filters Explained: Mail Server Architecture for System Designers https://knowledge.businesscompassllc.com/smtp-imap-spam-filters-explained-mail-server-architecture-for-system-designers/ Have you ever wondered how your emails magically appear in your inbox, accessible from any device, while spam stays mysteriously at bay? 🤔 Welcome…
  continue reading
 
Erasure Coding for Distributed Systems: Efficient, Reliable Storage at Scale https://knowledge.businesscompassllc.com/erasure-coding-for-distributed-systems-efficient-reliable-storage-at-scale/ Imagine a world where data loss is a thing of the past, and storage efficiency reaches unprecedented levels. 🚀 Welcome to the realm of Erasure Coding in Dis…
  continue reading
 
Optimize REST APIs Like a Pro: Rate Limiting & Throttling Demystified https://knowledge.businesscompassllc.com/optimize-rest-apis-like-a-pro-rate-limiting-throttling-demystified/ Have you ever wondered why your API requests suddenly start failing after a certain number of calls? 🤔 Or perhaps you’ve experienced the frustration of your application sl…
  continue reading
 
The annual RSA Conference on information security is coming up and it arrives during a very active security market. Analysts Garrett Bekker, Dan Kennedy and research director Scott Crawford return to the podcast to discuss what they expect to see in San Franscisco with host Eric Hanselman. The largest transaction ever in the information security wo…
  continue reading
 
Incident response is a critical part of cybersecurity risk management and should be integrated across organizational operations. This episode explores the recommendations and considerations for incorporating cybersecurity incident response throughout an organization’s cybersecurity risk management activities, as described by the new NIST Special Pu…
  continue reading
 
Achieving cyber resilience is a complex and dynamic journey with no one-size-fits-all solution. This episode explores how organizations can significantly improve their cyber resilience posture by leveraging the shared experiences, insights, and front-line practices of their peers and the wider ecosystem. Drawing on insights from the Cyber Resilienc…
  continue reading
 
Join us as we delve into the European Data Protection Board's (EDPB) 2024 Annual Report to understand how they championed data protection in a year marked by significant technological and regulatory shifts. This episode will cover the key milestones and priorities outlined in the EDPB's 2024-2027 Strategy, designed to strengthen, modernise, and har…
  continue reading
 
For episode 512, Brandon Zemp is joined by Theodore Agranat of Gunzilla Games, a game developer founded on the desire to innovate, break down technological boundaries, and create gaming experiences that players will remember forever. In Early 2024, they will launch Off The Grid (OTG), a next-gen cyberpunk Battle Royale for PC, PS5 and Xbox Series. …
  continue reading
 
When transporting refrigerated goods across South America, it is essential to have a reliable cold chain management solution. In Brazil, where 30% of transported cargo requires precise temperature control, a single point of failure can result in losses worth millions. Neokohm CTO Luis Lorenzi joins this Portuguese podcast special to explain how his…
  continue reading
 
From Backup to Hot Standby: Mastering Cloud Disaster Recovery (AWS, Azure, GCP) https://knowledge.businesscompassllc.com/from-backup-to-hot-standby-mastering-cloud-disaster-recovery-aws-azure-gcp/ 📊 In today’s digital landscape, data is the lifeblood of businesses. But what happens when disaster strikes? From natural calamities to cyber-attacks, th…
  continue reading
 
The Algorithm Behind Big Data Giants: HyperLogLog Step-by-Step with Code https://knowledge.businesscompassllc.com/the-algorithm-behind-big-data-giants-hyperloglog-step-by-step-with-code/ 🔍 Ever wondered how tech giants like Google, Facebook, and Amazon handle the mind-boggling task of counting unique visitors across their vast platforms? Enter Hype…
  continue reading
 
Decentralized & Smart: The Future of Blockchain with AI & Real Code Examples https://knowledge.businesscompassllc.com/decentralized-smart-the-future-of-blockchain-with-ai-real-code-examples/ 🚀 Blockchain and Artificial Intelligence are two of the most groundbreaking technologies of our time. But what happens when these titans join forces? Imagine a…
  continue reading
 
Think Binary: How This Classic Algorithm Supercharges Modern Systems https://knowledge.businesscompassllc.com/think-binary-how-this-classic-algorithm-supercharges-modern-systems/ Have you ever wondered how your smartphone can search through thousands of contacts in the blink of an eye? Or how search engines sift through billions of web pages almost…
  continue reading
 
Spring MVC Made Simple: Build Scalable Java Apps with IoC, DI & Annotations https://knowledge.businesscompassllc.com/spring-mvc-made-simple-build-scalable-java-apps-with-ioc-di-annotations/ 🌱 Are you tired of wrestling with complex Java web applications? Do you find yourself drowning in a sea of code, struggling to create scalable and maintainable …
  continue reading
 
Embedded Software is the name of the game this week my friends! My podcast guest is Jacob Beningo of the Beningo Embedded Group. Jacob and I chat about what the three elements of embedded software Jacob believes everyone should know and how each of these elements can affect development. We also explore what motivated Jacob to develop the Embedded S…
  continue reading
 
Reverse Proxy vs Forward Proxy: How Tech Giants Manage Global Traffic https://knowledge.businesscompassllc.com/reverse-proxy-vs-forward-proxy-how-tech-giants-manage-global-traffic/ Have you ever wondered how tech giants like Google, Amazon, and Facebook manage the colossal amount of global traffic flowing through their networks? 🌐 The secret lies i…
  continue reading
 
The System Design Behind Global Payments: Scale, Security & Speed Explained https://knowledge.businesscompassllc.com/the-system-design-behind-global-payments-scale-security-speed-explained/ Picture this: millions of transactions happening every second, money zipping across borders at lightning speed, and a complex web of systems working tirelessly …
  continue reading
 
Crush Latency in Node.js & Java: A Deep Dive into Non-Blocking I/O https://knowledge.businesscompassllc.com/crush-latency-in-node-js-java-a-deep-dive-into-non-blocking-i-o/ Are you tired of your Node.js and Java applications crawling at a snail’s pace? 🐌 Latency can be the silent killer of performance, frustrating users and hampering your system’s …
  continue reading
 
Implementing Automated Code Build, Test, and Deployment Using AWS CI/CD Services https://knowledge.businesscompassllc.com/implementing-automated-code-build-test-and-deployment-using-aws-ci-cd-services/ Are you tired of manual code deployments that eat up your time and introduce errors? 🤔 Imagine a world where your code flows seamlessly from develop…
  continue reading
 
Session vs. Token Authentication: What’s Best for Securing Your Web App? https://knowledge.businesscompassllc.com/session-vs-token-authentication-whats-best-for-securing-your-web-app/ 🔐 In the ever-evolving landscape of web security, choosing the right authentication method can make or break your application’s defenses. Are you grappling with the d…
  continue reading
 
Join us as we delve into the key findings of the FBI's 2024 Internet Crime Complaint Center (IC3) Annual Report. This year marks the 25th anniversary of IC3, which serves as the primary destination for the public to report cyber-enabled crime and fraud. The report reveals a staggering new record for losses reported to IC3, totaling $16.6 billion in…
  continue reading
 
For episode 511, Head of Marketing Neil Fitzhugh joins Brandon Zemp to discuss TAP Protocol, which is enabling advanced programmability, bringing DeFi, smart contracts, and decentralized applications directly to the Bitcoin network. Its mission is to create the most secure and programmable infrastructure on Bitcoin, transforming it from a static st…
  continue reading
 
Single Thread, Massive Power: How Node.js Handles Async Like a Champ 💪 https://knowledge.businesscompassllc.com/single-thread-massive-power-how-node-js-handles-async-like-a-champ-%f0%9f%92%aa/ Have you ever wondered how Node.js manages to handle thousands of concurrent connections with just a single thread? 🤔 It’s like watching a master juggler kee…
  continue reading
 
Unlock True Parallelism in Node.js with Worker Threads 🚀 | Fix CPU Bottlenecks Fast https://knowledge.businesscompassllc.com/unlock-true-parallelism-in-node-js-with-worker-threads-%f0%9f%9a%80-fix-cpu-bottlenecks-fast/ Are you tired of your Node.js applications hitting a performance wall? 🛑 Despite its efficiency in handling I/O operations, Node.js…
  continue reading
 
SQL Injection EXPLAINED: How Hackers Steal Data—and How to Stop Them 🛡️ https://knowledge.businesscompassllc.com/sql-injection-explained-how-hackers-steal-data-and-how-to-stop-them-%f0%9f%9b%a1%ef%b8%8f/ Imagine a world where your sensitive data—credit card numbers, personal information, and confidential business details—are all up for grabs. 😱 Thi…
  continue reading
 
Loading …
Listen to this show while you explore
Play