DM Radio is the world's longest-running show about data! Since 2008, we've interviewed the industry's brightest minds about AI, analytics, big data, cloud, data warehousing, digital transformation, Internet of Things (IoT), streaming and many other topics. Now broadcasting coast-to-coast, we're always looking for new voices. Send an email to [email protected]!
…
continue reading
Speaking of Service uncovers practical ways to grow service revenue, control costs, and improve customer satisfaction. If you’re looking to innovate, gain a competitive edge, or just learn about the latest service trends, you’ve come to the right place! Also check: www.ptc.com/speakingofservice
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
The Industrial IoT Spotlight Podcast shines a light on digital solutions that are impacting businesses today. Our mission is to feature the companies that are building the next generation of enterprise technologies, from architecture design to data management to business model innovation. Our hosts, Peter Rohde-Chen and Erik Walenza, are friends and entrepreneurs based in Shanghai, China. The Industrial IoT Spotlight is produced by Asia Growth Partners, a group of technology experts and busi ...
…
continue reading
The We talk IoT podcast keeps you up to date with major developments in the world of the internet of things, IIoT, artificial intelligence, and cognitive computing. Our guests are leading industry experts, business professionals, and experienced journalists as they discuss some of today’s hottest tech topics and how they can help boost your bottom line. You can follow We talk IoT – the Internet of Things Business podcast anywhere you get your podcasts. About the host: Stefanie Ruth Heyduck i ...
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
The UPSTACK Podcast is an ever-evolving conversation on all things digital infrastructure, giving CTOs, CIOs, CISOs and other tech leaders "food for thought” as they push to stay ahead of the technology curve. Greg Moss, UPSTACK’s Partner and Managing Director, invites guests to talk candidly about the latest technology infrastructure topics. Co-hosted by SVP of Marketing, Alex Cole, this is sure to be a podcast worth listening to.
…
continue reading
EE Journal's Amelia Dalton breaks down each week's EE news in an informative, fun and engaging style.
…
continue reading
Over The Edge is a podcast about edge computing and those in the industry who are creating the future of the internet. On the show we talk to corporate leaders, open-source experts, technologists, journalists, analysts, and the community at large, to discuss technological innovations, trends, practical applications, business models, and the occasional far-flung theory. Over the Edge is brought to you by the generous sponsorship of Dell Technologies.
…
continue reading
Move faster. Grow smarter. Explore how you make it happen with 5g, IoT, Edge, AI, and Cloud; and the role of the ecosystem. Join our Beyond Accelerators – dynamic interviews with leaders and innovators who are driving change in the B2B CSP landscape. Learn how, why, when and what’s next. Further. Faster. Beyond.
…
continue reading
Budget overruns. Bricked devices. Data breaches. Building connected products is hard. Join us every other Thursday for unfiltered conversations with executives about their AI journeys — the mistakes they made, the lessons they learned, and what they wish they’d known when they started. In each episode of Over the Air, our expert guests will make bold predictions, reveal unpopular opinions, and share stories you won’t hear anywhere else.
…
continue reading
The future of insurance is a priority for everyone, especially for those within the insurance industry. How do you assess risk in the 21st century? How do you stay ahead of trends in order to ensure optimal coverage for our clients? Argo Group tackles these questions and many more in our new podcast series, The Future of Insurance. Subscribe now and tune in to hear about pertinent topics, such as how big data and IoT impact the insurance landscape.
…
continue reading
Techrap is an enthusiastic podcast on technology advancements especially within the field of data, AI and new business models. Since I am also an entrepreneur I try to keep track on my thoughts with this podcast as well. Hope it is entertaining and that you get something out of it.
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
Bringing you the latest news, views and experiences in Technology, Talent and Transformational change hosted by CTO, Author and leading Tech For Good advocate Prof. Sally Eaves @sallyeaves. With weekly episodes and an inspiring diversity of guests from some of the most pioneering organisations, projects and people of our time, this is Your engaging space to learn from C-Suite to Student, CIO to Academic and Enterprise to SME. Our shows focus on the latest innovations in emergent technology i ...
…
continue reading
Podcast by The IT Insider
…
continue reading

1
DigitalituM Podcast - At the Intersection of Manufacturing and Digital Transformation
DigitalituM - Digitalization tools for Manufacturing
Manufacturing has its challenges. Digital Transformation has its challenges. Welcome to the DigitalituM Podcast, where we delve into the intersection of manufacturing and digital transformation. Manufacturing, a cornerstone of our global economy, faces various challenges—from optimizing production processes to ensuring quality control and maintaining a skilled workforce. In parallel, the digital transformation journey presents its own set of hurdles. Integrating new technologies, managing da ...
…
continue reading
Strategy and Architecture, Leadership and Mentoring, Thought Leadership
…
continue reading

1
GTIG 2024 Zero-Days: Espionage, Enterprise, and the Shifting Landscape
13:16
13:16
Play later
Play later
Lists
Like
Liked
13:16Join us as we dive into Google Threat Intelligence Group's (GTIG) comprehensive analysis of zero-day exploitation in 2024. Drawing directly from the latest research, this episode explores the 75 zero-day vulnerabilities tracked in the wild. While the overall number saw a slight decrease from 2023, the analysis reveals a steady upward trend over the…
…
continue reading

1
Verizon DBIR 2025: Navigating Third-Party Risk and the Human Factor
12:11
12:11
Play later
Play later
Lists
Like
Liked
12:11Join us as we unpack the critical insights from the Verizon 2025 Data Breach Investigations Report. This episode dives deep into the report's most prominent themes, highlighting the ever-increasing involvement of third parties in data breaches and the persistent influence of the human element, which was involved in 60% of breaches this year. We exp…
…
continue reading

1
The State of EU Cybersecurity: Threats, Trends, and the Evolving Landscape
16:21
16:21
Play later
Play later
Lists
Like
Liked
16:21Explore the complex and widespread cybersecurity threat landscape currently facing the European Union. This episode delves into the findings of recent reports, highlighting how geopolitical tensions and the rapid pace of digitisation are fueling a surge in malicious cyber activity. We discuss the substantial threat level assessed for the EU, meanin…
…
continue reading

1
Integrating Incident Response: A NIST SP 800-61r3 Guide to Cyber Risk Management
16:55
16:55
Play later
Play later
Lists
Like
Liked
16:55Incident response is a critical part of cybersecurity risk management and should be integrated across organizational operations. This episode explores the recommendations and considerations for incorporating cybersecurity incident response throughout an organization’s cybersecurity risk management activities, as described by the new NIST Special Pu…
…
continue reading

1
Beyond the Blueprint: Learning Cyber Resilience Together
20:26
20:26
Play later
Play later
Lists
Like
Liked
20:26Achieving cyber resilience is a complex and dynamic journey with no one-size-fits-all solution. This episode explores how organizations can significantly improve their cyber resilience posture by leveraging the shared experiences, insights, and front-line practices of their peers and the wider ecosystem. Drawing on insights from the Cyber Resilienc…
…
continue reading

1
EDPB 2024: Guarding EU Data Privacy in a Rapidly Changing Digital World
15:35
15:35
Play later
Play later
Lists
Like
Liked
15:35Join us as we delve into the European Data Protection Board's (EDPB) 2024 Annual Report to understand how they championed data protection in a year marked by significant technological and regulatory shifts. This episode will cover the key milestones and priorities outlined in the EDPB's 2024-2027 Strategy, designed to strengthen, modernise, and har…
…
continue reading

1
Embedded Software Academy: How Beningo is Educating the Next Generation of Embedded Developers
15:42
15:42
Play later
Play later
Lists
Like
Liked
15:42Embedded Software is the name of the game this week my friends! My podcast guest is Jacob Beningo of the Beningo Embedded Group. Jacob and I chat about what the three elements of embedded software Jacob believes everyone should know and how each of these elements can affect development. We also explore what motivated Jacob to develop the Embedded S…
…
continue reading

1
The 2024 IC3 Report: Unpacking Record Cybercrime Losses
14:02
14:02
Play later
Play later
Lists
Like
Liked
14:02Join us as we delve into the key findings of the FBI's 2024 Internet Crime Complaint Center (IC3) Annual Report. This year marks the 25th anniversary of IC3, which serves as the primary destination for the public to report cyber-enabled crime and fraud. The report reveals a staggering new record for losses reported to IC3, totaling $16.6 billion in…
…
continue reading

1
Orit Benvenisti partner & CEO @Tigbur Group about how to build cyber culture & "raise the walls"
59:12
59:12
Play later
Play later
Lists
Like
Liked
59:12לאורך כל הריאיון היה ברור שמדובר בזן אחר של מנכ"ל עם גישה שונה, ניהול חברה המעסיקה עשרות אלפי מועסקים, כ-700 עובדי מנהלה ב-40 סניפים מחד, והרצון להבין מאידך, יוצרים תמהיל לא פשוט לכול הנהלה והעומדת בראשה. עו"ד הדס תמם בן אברהם סגנית הדיקן בקריה האקדמית אונו ונחשון פינקו אוונגליסט סייבר מארחים את אורית בנבנישתי שותפה ומנכ"ל קבוצת תיגבור בשיחה על ראי…
…
continue reading

1
The 2025 Cyber Crossroads: Balancing AI Innovation with IoT Security and Evolving Threats
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37Navigate the complex cybersecurity landscape of Q2 and Summer 2025 as we delve into the escalating convergence of AI-driven cyberattacks, the persistent vulnerabilities of the expanding Internet of Things (IoT), and the challenges of establishing robust security and governance frameworks. Based on recent Q1 2025 incident data and expert projections…
…
continue reading

1
EP 218 - Innovating Urban Living: Lawrence Eta on Digital Solutions for Modern Cities
50:40
50:40
Play later
Play later
Lists
Like
Liked
50:40In this episode, we spoke with Lawrence Eta, former CTO of the City of Toronto and a global digital transformation leader. Now advising the Royal Commission for AlUla, Lawrence shares lessons from leading large-scale public sector innovation and shaping inclusive, future-ready smart cities. Key Insights: • Smart governance enables smart cities: Suc…
…
continue reading

1
2025 Q1 Cyber Shockwave: Ransomware Records, AI Threats, and the Regulatory Reckoning
21:31
21:31
Play later
Play later
Lists
Like
Liked
21:31The first four months of 2025 witnessed an alarming surge in global cybersecurity incidents, with ransomware attacks reaching unprecedented levels. Join us as we dissect the key trends, including the evolution of ransomware tactics like double extortion, the increasing sophistication of social engineering fueled by AI and deepfakes, and the persist…
…
continue reading

1
Navigating Privacy Risks with the NIST Privacy Framework 1.1
16:59
16:59
Play later
Play later
Lists
Like
Liked
16:59This podcast delves into the NIST Privacy Framework 1.1, a voluntary tool developed to help organizations identify and manage privacy risk while fostering innovation and protecting individuals' privacy. We explore its three core components: Core, Organizational Profiles, and Tiers, and how they enable organizations to understand, assess, prioritize…
…
continue reading

1
Beyond the Firewall: The Offensive Cybersecurity Edge
13:24
13:24
Play later
Play later
Lists
Like
Liked
13:24Dive into the dynamic world of offensive cybersecurity with insights from leading experts and real-world scenarios. We explore the critical role of techniques like penetration testing, adversary simulation, and red team exercises in proactively identifying vulnerabilities and strengthening defenses against evolving cyber threats. Understand how ado…
…
continue reading

1
AI on Trial: Decoding the Intersection of Artificial Intelligence and Harm
21:17
21:17
Play later
Play later
Lists
Like
Liked
21:17Explore the rapidly evolving landscape where artificial intelligence intersects with criminality and societal risks. Drawing on expert research, this podcast delves into the transformative potential of AI-enabled crime, from sophisticated financial fraud using deepfakes to the generation of child sexual abuse material, and the challenges this poses…
…
continue reading

1
Quantum Leap Security: Navigating the Post-Quantum Cryptography Era
9:45
9:45
Play later
Play later
Lists
Like
Liked
9:45We delve into the urgent need for organizations to prepare for the era of quantum computing, which threatens to break today's standard encryption methods. We examine the "harvest now, break later" (HNDL) threat, where malicious actors are already collecting encrypted data for future decryption by quantum computers. Drawing upon information from sou…
…
continue reading

1
DigitalituM Podcast Episode 16 - Ed Marsh - Ed Marsh Consulting - Rethinking B2B Sales in Manufacturing with Ed Marsh
39:04
39:04
Play later
Play later
Lists
Like
Liked
39:04Send us a text Beyond Specs: Rethinking B2B Sales in Manufacturing with Ed Marsh 🔧 Episode Summary: In this episode of the DigitalituM Podcast – at the intersection of Manufacturing and Digital Transformation, host Markus Rimmele welcomes Ed Marsh, an expert in B2B industrial sales and global market strategy. Together, they explore how traditional …
…
continue reading

1
Programmable PMICs and Cutting Edge Power Management with AnDAPT
13:04
13:04
Play later
Play later
Lists
Like
Liked
13:04This week my podcast guest is Giovanni Garcea, President of AnDAPT. Giovanni and I discuss the details of AnDAPT’s field programmable PMIC and how engineers can take advantage of AnDAPT’s programmable power solution that it designed with AI called PMIC.AI. Also this week, I check out a new fluid battery that can take any shape developed by research…
…
continue reading
Join this episode of DMRadio as host Eric Kavanagh welcomes cloud strategist David Linthicum to explore the fascinating world of large language models—a "very efficient rabbit hole" of information consumption. Dive into the evolving role of the cloud, the promise of Augentic AI, and how LLMs are reshaping enterprise technology with unprecedented ef…
…
continue reading

1
The AI and Influence Front - (dis/mis)Information
23:04
23:04
Play later
Play later
Lists
Like
Liked
23:04Explore the escalating threats posed by artificial intelligence incidents, sophisticated disinformation campaigns like the Doppelgänger network targeting nations from France to Israel, and the cyber espionage activities of threat actors such as UAC-0050 and UAC-0006 as revealed by Intrinsec's analysis. We delve into the tactics, infrastructure, and…
…
continue reading

1
Sensors and Cents: The Real ROI of a Data-Powered Workplace – We talk IoT #65
39:00
39:00
Play later
Play later
Lists
Like
Liked
39:00Join host Stefanie Ruth Heyduck as she sits down with Phil Bell and Josh Jackman from ART Health Solutions to explore the cutting-edge intersection of technology and workplace wellbeing. Discover how real-world data from wearables, smartphone apps, and environmental sensors can enhance productivity and employee experience. Learn about the tangible …
…
continue reading
This podcast we are exploring the critical cybersecurity challenges facing today's interconnected urban environments. We delve into the evolving threats arising from smart city infrastructure and the Internet of Things (IoT), including ransomware attacks on critical infrastructure, the expanded attack surface created by interconnected devices, and …
…
continue reading

1
IoT Meetup #4: Mati Epstein Head of IoT & ICS Tech Sales @Checkpoint on IoT Security and Enforcement
54:17
54:17
Play later
Play later
Lists
Like
Liked
54:17האם מכשירי האיי.או.טי שלך מאובטחים? אכיפה אוטומטית עם למידת מכונה מרצה: מתי אפשטיין, ראש מכירות טכנולוגיות האיי.או.טי ואיי.סי.אס , צ'ק פוינט ההרצאה זו מתמקדת באבטחת "מכשירים מחוברים" - אכיפה! בהנחה שמכשירי האיי.או.טי ואיי.סי.אס פגיעים, קלים לפריצה ומקור לתנועה רוחבית זדונית ברשתות איי.טי ואוו.טי, צ'ק פוינט יוצרת באופן אוטונומי (ואוטומטי) מדיניות אב…
…
continue reading

1
AI vs. the Expanding Attack Surface: Proactive Defense Strategies
18:07
18:07
Play later
Play later
Lists
Like
Liked
18:07Is your attack surface spiraling out of control with multi-cloud, SaaS, and third-party integrations? Join us as we delve into how AI-powered automation is becoming critical for modern Attack Surface Management (ASM). We'll explore the challenges organizations face in achieving comprehensive visibility and how AI provides viable solutions for enhan…
…
continue reading

1
Deep Dive into Deepfakes: Unmasking the AI Illusion
19:16
19:16
Play later
Play later
Lists
Like
Liked
19:16Welcome to Deep Dive, where we tackle complex topics head-on. In this episode, we delve into the fascinating and increasingly concerning world of deepfakes: AI-generated audio and visual content designed to deceive. We'll explore the technology behind deepfakes, from face-swapping to voice cloning the threats they pose to individuals, organizations…
…
continue reading

1
Scam Savvy: Navigating the Digital Deception
15:16
15:16
Play later
Play later
Lists
Like
Liked
15:16In a world increasingly shaped by digital interactions and artificial intelligence, online scams are becoming more sophisticated and pervasive. Scam Savvy delves into the tactics employed by fraudsters, from exploiting emotions in charity and romance scams to leveraging AI for deepfakes and personalized phishing attacks. We unmask these deceptive p…
…
continue reading

1
Coordinated Cyber Defense: Inside Vulnerability Disclosure Programs (VDP)
23:17
23:17
Play later
Play later
Lists
Like
Liked
23:17This podcast dives into the critical world of vulnerability disclosure programs (VDPs), exploring how organizations and security researchers work together to identify and address security weaknesses. We'll examine the core principles that underpin effective VDPs, including establishing clear reporting channels and defined scopes, the importance of …
…
continue reading

1
DigitalituM Podcast Episode 15 - Mark Winker - replique - Additive Manufacturing as a Service
44:15
44:15
Play later
Play later
Lists
Like
Liked
44:15Send us a text Manufacturing Without Warehouses – Additive Manufacturing as a Service with Replique’s Mark Winker 🔧 Episode Summary: In this episode of the DigitalituM Podcast – At the Intersection of Manufacturing and Digital Transformation, host Markus Rimmele speaks with Mark Winker, business leader at Replique, a German startup revolutionizing …
…
continue reading
Navigating the complex landscape of U.S. state data privacy laws can be challenging. Join us as we break down the key aspects of these regulations, including consumer rights, business obligations, data breach notification requirements, and enforcement trends. We'll explore the nuances of laws like the California Consumer Privacy Act (CCPA), the Vir…
…
continue reading

1
Concurrent Technologies Ushers In the Next Generation of Mission-Critical Applications
21:38
21:38
Play later
Play later
Lists
Like
Liked
21:38My podcast guests this week are longtime friend of the show Nigel Forrester and Victoria Middleton from Concurrent Technologies. Nigel, Victoria and I chat about the importance of rigorous testing in mission-critical systems, the details of Concurrent’s mission-critical embedded computing solutions, and how Concurrent can help engineers determine w…
…
continue reading
Join this episode of DMRadio as host Eric Kavanagh talks with Brooke Hartley Moy of InFactory about the critical importance of grounding large language models (LLMs) to improve their accuracy and reliability. Explore real-world strategies for reducing hallucinations, the role of context-rich data, and how businesses can ensure trustworthy AI output…
…
continue reading
Explore the exciting future of cryptocurrency payments through the lens of cybersecurity and privacy. We delve into the potential benefits and significant risks, offering insights into best practices and the crucial role of regulation in this evolving landscape. www.myprivacy.blog/navigating-the-crypto-landscape-an-in-depth-look-at-privacy-in-the-f…
…
continue reading

1
Aviv Madmon Founder and CEO @Experda about Data/AI/Cyber and everything in-between & mindset change
58:09
58:09
Play later
Play later
Lists
Like
Liked
58:09דאטה, בעולם שבו כמויות המידע מכפילות את עצמן כמעט על בסיס יומי ומשמשות אבן יסוד בהתנהלות הארגונית הצורך בכלי ניתוח הולך וגובר ומהווה לעיתים נקודת חולשה בהגנת הסייבר של הארגון. נחשון פינקו מארח את אביב מדמון מקים שותף ומנכ"ל אקספרדה בשיחה על דאטה, מאגרי מידע, כלי ניתוח ואיך לצמצם סיכונים ומשטחי תקיפה לנכס החשוב ביותר בארגון. עד כמה אנחנו מבינים את ח…
…
continue reading

1
AI's Elevation of Customer and Employee Experience
46:56
46:56
Play later
Play later
Lists
Like
Liked
46:56Co-hosts Alex Cole and Greg Moss are joined by Adam Gottfried, Director of Advisory Services for Customer Experience Solutions at UPSTACK. Adam shares the inside track on how businesses and enterprises are leveraging AI to remake their CX offerings, and how the AI hype cycle has impacted the CX solutions marketplace. Adam specializes in guiding cli…
…
continue reading

1
Secure Digital Retail: Navigating Privacy and Compliance
16:23
16:23
Play later
Play later
Lists
Like
Liked
16:23This podcast delves into the critical aspects of data privacy laws like GDPR and the Connecticut Data Privacy Law, alongside the essential Payment Card Industry Data Security Standard (PCI DSS) compliance for e-commerce success. We explore how retailers can craft clear privacy policies, manage user consent effectively, and implement stringent secur…
…
continue reading

1
AI's Cyber Shadow: Unpacking the Emerging Threat
18:16
18:16
Play later
Play later
Lists
Like
Liked
18:16Dive deep into the rapidly evolving landscape of AI-powered cyberattacks with insights from cutting-edge research, including the framework for evaluating AI cyber capabilities developed by Google DeepMind. Explore how AI is shifting the balance between offense and defense in cybersecurity, potentially lowering the cost and complexity of sophisticat…
…
continue reading

1
Never Trust, Always Verify: Exploring Zero Trust Architecture
22:43
22:43
Play later
Play later
Lists
Like
Liked
22:43Delve into the principles and practical applications of Zero Trust Architecture (ZTA), a modern cybersecurity paradigm that moves away from traditional perimeter-based security by embracing the core tenet of "never trust, always verify". Learn about the key components, tenets, and benefits of ZTA, as well as strategies for implementation in today's…
…
continue reading

1
Decoding Digital Finance: Navigating Cyber Threats with Innovative Solutions
16:23
16:23
Play later
Play later
Lists
Like
Liked
16:23Explore the critical cybersecurity challenges facing the financial services industry today, from the increased risk of data breaches and sophisticated cyber attacks to emerging threats like quantum computing and client-side vulnerabilities. Drawing insights from the cutting-edge solutions featured in the CYBERTECH100, we delve into innovative techn…
…
continue reading

1
HIPAA Security Hub: Protecting Your Digital Health Information
13:36
13:36
Play later
Play later
Lists
Like
Liked
13:36Navigating the complex world of healthcare cybersecurity. Join us as we delve into the HIPAA Security Rule, its purpose in safeguarding electronic Protected Health Information (ePHI), and the latest updates addressing evolving threats like AI and quantum computing. We'll break down compliance requirements, explore the impact of the HIPAA Omnibus Ru…
…
continue reading

1
SOC Insights: Navigating the Cyber Security Operations Center
25:10
25:10
Play later
Play later
Lists
Like
Liked
25:10Join us for SOC Insights, the podcast dedicated to demystifying the world of the Security Operations Center. We delve into the core functions of a SOC including collection, detection, triage, investigation, and incident response. Explore essential SOC tools like SIEMs, Threat Intelligence Platforms, and Incident Management Systems. Understand the c…
…
continue reading

1
Secure-by-Design, Secure-by-Default: How SpiderOak is Protecting Data at the Edge
14:57
14:57
Play later
Play later
Lists
Like
Liked
14:57This week we are talking all about edge cyber security with David Pearah, CEO of SpiderOak. David and I explore why traditional cyber security solutions do not properly protect edge devices, how SpiderOak is empowering developers to protect their edge applications, and why they are also offering their technology platform as open source software.…
…
continue reading

1
Digital Forensics Evolved: Navigating New Tech Threats
25:35
25:35
Play later
Play later
Lists
Like
Liked
25:35Explore the dynamic landscape of digital forensics in the face of rapidly evolving technologies. We delve into the impact of trends like IoT, 5G networks, AI-driven attacks, advanced file systems (APFS, NTFS), cloud integration, and sophisticated anti-forensic techniques across Mac OS, network infrastructures, and Windows platforms. Join us as we u…
…
continue reading

1
Quantum Computing, Data Management, and the Future of Secure Systems
53:17
53:17
Play later
Play later
Lists
Like
Liked
53:17Tune in to this episode of DMRadio with host Eric Kavanagh and Sean Michael Brehm of Spectral Capital discussing the evolution of data management and the transformative power of quantum computing. Learn insights on decentralized data, the need for modern data centers, and the role of qubits in advancing computing capabilities. Explore the future of…
…
continue reading

1
Guy Hochman CEO @Genie computing Services on October 7th: a scenario no Risk Management expected
59:23
59:23
Play later
Play later
Lists
Like
Liked
59:23פרק חובה לכול מנהל ואיש מקצוע בתחום מערכות המידע השביעי באוקטובר הוא הטראומה הגדולה ביותר שחוותה מדינת ישראל מאז היוסדה, רבות דובר וידובר בנושא אך יש זווית שונה של התמודדות מקצועית של חברת אינטגרציה שלקוחותיה היו הקיבוצים והתעשייה שהותקפה בעוטף עזה. איך מתמודדים עם תרחיש שלא נלקח בחשבון בשום ניהול סיכונים נחשון פינקו מארח את גיא הוכמן המנכ"ל של ג'י…
…
continue reading

1
AI Unlocked: The Prompt Hacking Threat Landscape
21:53
21:53
Play later
Play later
Lists
Like
Liked
21:53Delve into the critical security vulnerabilities of Artificial Intelligence, exploring the dangerous world of prompt injection, leaking, and jailbreaking as highlighted in SANS' Critical AI Security Controls and real-world adversarial misuse of generative AI like Gemini by government-backed actors. Understand how malicious actors attempt to bypass …
…
continue reading

1
AI in Cyber and Strategy: Threats, Defenses, and Geopolitical Shifts
27:09
27:09
Play later
Play later
Lists
Like
Liked
27:09This podcast explores the multifaceted impact of artificial intelligence on the landscape of cybersecurity and military strategy. We delve into how AI is being leveraged for advanced cyber defense, including identifying vulnerabilities and accelerating incident response. while also examining the emerging cyberattack capabilities that AI can enable.…
…
continue reading