The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Online Security Podcasts
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Just Security is an online forum for the rigorous analysis of national security, foreign policy, and rights. We aim to promote principled solutions to problems confronting decision-makers in the United States and abroad. Our expert authors are individuals with significant government experience, academics, civil society practitioners, individuals directly affected by national security policies, and other leading voices.
…
continue reading
Informational podcast on everytopic :)
…
continue reading
A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team. Join us live on YouTube, Monday's at 4:30PM ET https://www.youtube.com/@BlackHillsInformationSecurity Brought to you by Black Hills Information Security. https://www.blackhillsinfosec.com
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
…
continue reading
1
All Things Secured | Online Privacy & Security on Odysee
All Things Secured | Online Privacy & Security
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
…
continue reading
The Cybersecurity Podcast for Entrepreneurs, SMB Owners, and Decision-Makers Cyberattacks are no longer rare incidents — they’re a business risk. CybersecureGuard delivers exactly what modern leaders need: clear guidance, practical strategies, and easy-to-understand insights that can be implemented immediately, even without a technical background. From phishing and social engineering to password security, AI-driven threats, and securing remote teams — every episode focuses on actionable step ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast, and so are the conversations that shape it. Welcome to The Security Champions Podcast, the go-to resource for insights from the front lines of application security. The podcast is cohosted by Michael Burch, Director of Application Security for Security Journey, and Dustin Lehr, the Director of AppSec Advocacy. Each month, one of them shares a candid conversation with security leaders, engineering voic ...
…
continue reading
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
…
continue reading
Our online media channel The Safety Feature brings together industry experts, thought leaders, and innovators to share their insights and experiences on a variety of Security & Life Safety topics. You’ll gain valuable knowledge and perspectives on the latest trends, challenges, and best practices in the industry that can help you stay ahead of the curve.
…
continue reading
We return to places which have been in the news – often a long time ago, sometimes recently – to see how local people are rebuilding their lives. Sunday at 10:10pm. Or you can catch it online from Friday.
…
continue reading
Welcome to Smarter Online Safety: Protect, Empower, Transform—your go-to channel for digital security, AI productivity, and digital transformation. As cyber fraud, identity theft, and AI-driven risks grow, Jocelyn King, “The Queen of Online Safety,” is here to help you stay secure and thrive. A Top 10 Woman in Cybersecurity, speaker, and educator, she has been featured on Dr. Phil, prime-time news, international radio, and top podcasts. 💡 What You’ll Learn: ✔️ Protect yourself & your family ...
…
continue reading
Stories from the world of hacking, cybersecurity, and rogue AI. Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million dow ...
…
continue reading
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
…
continue reading
A non-partisan podcast brought to you by Geopolitical Futures, an online publication founded by internationally recognized geopolitical forecaster George Friedman. Geopolitical Futures tells you what matters in international affairs and what doesn't. Go to https://geopoliticalfutures.com/podcast for details.
…
continue reading
Introducing you to the world of Social Engineering Security, personal privacy, and the technology of our changing world, such as Artificial Intelligence (AI). Our goal is to provide you with the armor you need to protect yourself and the knowledge to identify the red flags of both online and offline attackers.
…
continue reading
Weekly Information Security News. Stay up to date on what’s going on in the InfoSec world in about 40 minutes. Join us for InfoSec news and stay for some friendly banter, guest interviews, gadget reviews, tech interview tips, and hilarious dad jokes! New episodes every Monday.
…
continue reading
An online forum for the rigorous analysis of law, rights, and U.S. national security policy. (Profile photo by Chip Somodevilla/Getty)
…
continue reading
This show is for female entrepreneurs and health and wellness businesses to feel less overwhelmed about their digital marketing and SEO marketing for their online business. Cinthia talks to various experts about how to best approach online marketing, Google Analytics and SEO to be successful, while still staying sane.
…
continue reading
The Ambitious Bookkeeper podcast is for bookkeepers & accountants who are growing or aspiring to start their own business. Our mission is to elevate the bookkeeping profession by providing support and resources for new and experienced firm owners. We share actionable tips on running a successful bookkeeping business, tools and resources, plus guest expert interviews that will help you elevate your business. Where you can find us: Website: https://www.ambitiousbookkeeper.com BBA: https://www. ...
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
A critical look at new technologies, new approaches and new ways of thinking, from politics to media to environmental sustainability.
…
continue reading
Go in depth on the latest trends in Latin American politics, economics, and culture in this podcast series by Americas Society/Council of the Americas.
…
continue reading
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
…
continue reading
The official podcast of the Georgetown Security Studies Review (GSSR), discussing all things national security, history, military, and foreign policy. GSSR is the official flagship publication of Georgetown University's Center for Security Studies, featuring both online commentary and a biannual academic journal. Find out more about GSSR here: https://georgetownsecuritystudiesreview.org/
…
continue reading
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime. Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
…
continue reading
Internet safety, security, and digital parenting tips. You'll learn about protecting kids online (cybersafety), and general digital security and privacy (for adults as well as kids). https://DefendingDigital.com
…
continue reading
We are going to teach you how to defend yourself against cybercrime, privacy abuse, vehicle hacking, bomb drones and cyber warfare, REGARDLESS of your proficiency with computers. Because you don't have to be technical to survive the Digital Age!
…
continue reading
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
…
continue reading
Inside the FBI highlights news, cases, and people from around the Bureau—in audio form. For more information, visit fbi.gov.
…
continue reading
Channel Futures is a leading source of analysis, commentary, research, market insight, information and news in the technology and telecommunications space. The Coffee with Craig and James podcast, among others, feature interviews with big names in the indirect sales channel, along with a unique brand of humor thrown in.
…
continue reading
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
…
continue reading
This is the podcast of WAR ROOM, the official online journal of the U.S. Army War College. Join us for provocative discussions about U.S. national security and defense, featuring prominent national security and military professionals.
…
continue reading
Senior reporter Danny Palmer interviews cybersecurity experts about the latest cyber attacks, hacking trends and keeping you safe from online threats.
…
continue reading
1
STOP your Phone from Listening! (Privacy 101)
9:49
9:49
Play later
Play later
Lists
Like
Liked
9:49It's easy to cover the cameras on a phone, but what about the microphones? And are they really listening and sending data off to big tech? Here's the no-nonsense truth along with 4 levels of protection. Be sure to check out DeleteMe to learn how to protect your personal data online: https://www.joindeleteme.com/allthingssecured Here are links to so…
…
continue reading
1
Power Without Stealth: Should America Flex In Cyberspace Or Starve Cartels Online
1:13:48
1:13:48
Play later
Play later
Lists
Like
Liked
1:13:48Send us a text We trace Jake’s unlikely route from journalism to the White House, how DEF CON’s Voting Village began, and why imposter syndrome can be a secret advantage when paired with relentless learning. Then we pull apart cyber strategy, Stuxnet’s signal value, and a plan to choke fentanyl through targeted offensive operations against cartels’…
…
continue reading
1
FROM BUREAUCRACY TO BATTLEFIELD AGILITY: ARMY TRANSFORMATION
39:22
39:22
Play later
Play later
Lists
Like
Liked
39:22Army transformation is ON! Director Johnny Ives explains the shift to AI-centric warfighting & next-gen, cloud-centric C2 for lethality & agility.By Johnny Ives and Tom Spahr
…
continue reading
Don't fall for this terrible new scheme. Here's your best defense. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
I’ve had some truly amazing interviews this past year. For your listening enjoyment, I’ve curated a set of clips from some of the best shows, creating a sampler platter of stellar audio content from some amazing guests! If you’ve never listened to my podcast, this will give you a taste of what you’re missing! If you’re a regular listener, this will…
…
continue reading
The free-for-all is over. Disney has officially partnered with OpenAI and is suing Google for billions over copyright infringement. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
Master The Fundamentals, Then Change The System
57:21
57:21
Play later
Play later
Lists
Like
Liked
57:21Send us a text We trace a journey from a teenage online threat to security engineering at global scale, exploring how deep fundamentals and distributed thinking shape reliable defenses. Along the way, we unpack certifications, teaching at scale, and building a practical path for learners worldwide. • curiosity-driven path from fear to purpose • fou…
…
continue reading
1
Cybersecurity Today: Apple Security Updates, AI Search Engine Scams, Torrent Malware, and Stanford's AI Penetration Testing
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48In this episode of Cybersecurity Today, host David Shipley discusses significant developments in the cybersecurity landscape. Apple releases security updates to address two actively exploited WebKit vulnerabilities. Scammers manipulate AI-powered search tools to recommend fake support numbers, reflecting a growing security risk. Bitdefender uncover…
…
continue reading
1
The Hidden Threat in Your Holiday Emails: Tracking Pixels and Privacy Concerns
18:47
18:47
Play later
Play later
Lists
Like
Liked
18:47Join us in the midst of the holiday shopping season as we discuss a growing privacy problem: tracking pixels embedded in marketing emails. According to Proton's latest Spam Watch 2025 report, nearly 80% of promotional emails now contain trackers that report back your email activity. We discuss how these trackers work, why they become more aggressiv…
…
continue reading
Most people never lose that one pound of holiday weight. Kim shares a simple strategy to stop it before it starts. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
Google’s 2025 Year in Search: Elon, eggs, and AI
8:18
8:18
Play later
Play later
Lists
Like
Liked
8:18What was the world obsessed with this year? Google pulled back the curtain on our search habits. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
You think you’re slick hiding gifts in the trunk of the car? Please. The modern snoop is high tech. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Time honors the architects of AI with a cover photo that proves the magazine has no idea how to actually use it. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
The Hidden Danger of Storing Secrets Online | Interview with Jake Knott from Watchtower
38:16
38:16
Play later
Play later
Lists
Like
Liked
38:16In this episode of Cybersecurity Today, host Jim Love discusses the shocking discovery of over 80,000 leaked credentials and secrets in online code formatting tools with Jake Knott, a principal security researcher from Watchtower. They delve into the vulnerabilities exposed by these tools, the inadvertent leaking of sensitive information, and how a…
…
continue reading
In this powerful episode of Smarter Online Safety, Jocelyn King talks with Roger Canaff — former New York City special victims prosecutor, survivor advocate, and legal thriller author — about how predators operate online, the rise of AI “nudify” tools, and concrete steps parents and caregivers can take to protect kids and support survivors. What yo…
…
continue reading
Just like milk or eggs, your devices can go bad. Here's how to tell in this short podcast. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
AI Hackers Are Now COMPLETELY UNSTOPPABLE
17:02
17:02
Play later
Play later
Lists
Like
Liked
17:02Question? Text our Studio direct. Today we’re talking about AI-powered cybercrime—a phrase that sounds like a marketing stunt but is, unfortunately, very real. Cybercriminals basically got a software update, and now they’re running their operations with more automation, more scale, and — let’s just say it — better customer service than half the ven…
…
continue reading
Cybersecurity Today: Spider-Man Phishing Kit, Gogs Zero-Day Exploits, and Recent Patches In this episode, host Jim Love discusses recent cybersecurity issues including the Spider-Man phishing kit targeting European banks and cryptocurrency users, a zero-day vulnerability in the self-hosted Git service Gogs, and various security updates. The Spider-…
…
continue reading
On this episode of the Inside the FBI Podcast, we’ll break down the threat posed by violent online networks, tell you how to recognize the signs that a you or a loved one may be one of their targets, and teach you how to report this crime to the proper authorities. For a full transcript and additional resources, visit fbi.gov/podcasts. And if you'r…
…
continue reading
1
Oxford's word of the year 2025 is 'rage bait'
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45Scroll. Get mad. Leave a comment. Repeat. If you’ve ever felt manipulated into arguing with a stranger online, you’ve fallen for the trap. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
The algorithm will see you now - AI and psychiatry
15:04
15:04
Play later
Play later
Lists
Like
Liked
15:04We return to a conversation we had with Dr. Stephen Xenakis, a psychiatrist and retired Army brigadier general. He's has always had an open mind when it comes to cutting-edge technology. Now he’s looking at AI to see if it can help doctors treat veterans struggling with mental health. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading
1
A Live Stream From inside Lazarus Group – 2025-12-08
1:03:30
1:03:30
Play later
Play later
Lists
Like
Liked
1:03:30🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com Join us LIVE on Mondays, 4:30pm EST. A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team. https://www.youtube.com/@BlackHillsInformationSecurity Chat with us on Discord! https:/…
…
continue reading
This is the program’s final episode and, as such, we look back over the past 17 years. What did the future look like back in 2009 when the show first aired? What have been the major trends during that time? Which predictions came to fruition and which didn’t? And what cautions do our guests have as we look ahead? Guests Mica Sifry – US-based writer…
…
continue reading
Flying soon? Look at your boarding pass. Spot these codes and you could get bumped off your flight. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
The end of anxiety? Why Australia's social media ban might not work. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
Best AI Security Certification Courses & Earn $280K Salary Premium in 2026
14:37
14:37
Play later
Play later
Lists
Like
Liked
14:37The cybersecurity market is currently experiencing a massive talent shortfall in the emerging field of Artificial Intelligence security, driving compensation for specialized roles to unprecedented heights. AI security roles are projected to pay between 180K–280K in 2026, but the majority of cybersecurity professionals lack the necessary qualificati…
…
continue reading
1
Grok the stalker, the Louvre heist, and Microsoft 365 mayhem
55:38
55:38
Play later
Play later
Lists
Like
Liked
55:38On this week's show we learn that AI really can be a stalker’s best friend, as we explore a strange tale that starts with a manatee-shaped mailbox on a millionaire's lawn and ends with Grok happily doxxing real people, mapping out stalking "strategies," and handing out revenge-porn tips. Then we go inside the Louvre heist, where thieves in hi-vis a…
…
continue reading
51
George Friedman on Why Trump's New National Security Strategy is Here to Stay
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49America's new National Security Strategy reflects a fundamental change in U.S. strategy. The policy, published at the end of last week, prioritizes America maintaining its preeminence in the Western Hemisphere, avoiding military competition with China and asking Europe to stand on its own feet. Many of these policies are not surprising. But the Whi…
…
continue reading
Socks and sweaters are out. This year, the kids want crypto. Here's how. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
8 Real Cyberattack Stories from Germany That Almost Destroyed Businesses
4:57
4:57
Play later
Play later
Lists
Like
Liked
4:57In this episode, AI Jessica takes you inside eight real cyberattacks that struck Germany in recent years — from supermarket chains and engineering firms to municipal utilities, political parties, and even a natural history museum. These incidents are more than isolated events. They reveal a dangerous pattern: the same weaknesses that allowed attack…
…
continue reading
1
Holiday Hackers: Why Cybercrime Spikes in December, And How to Stay Safe
13:23
13:23
Play later
Play later
Lists
Like
Liked
13:23Cybercrime doesn’t take holidays off. December is one of the busiest months for hackers. In this festive special of Darnley’s Cyber Café, we dig into why cyberattacks surge during the holidays, how scammers exploit online shopping hype, and why distracted employees and understaffed IT teams make the perfect storm for breaches. We also unpack the ps…
…
continue reading
Question? Text our Studio direct. From Rupert Murdoch's global entertainment ambition to a dead hacker found hanging from a tree in a park in Germany, this true cyber crime story spans over a decade in the cut-throat Satellite TV wars, involving colorful characters, pirates, big business, technology advances and failures and those who entered the d…
…
continue reading
1
Dustin Lehr & Michael Burch - End of Year Recap 2025
1:06:04
1:06:04
Play later
Play later
Lists
Like
Liked
1:06:04It’s been a momentous year for security champions, developer empowerment, and cultivating security culture. In this special year-in-review episode, hosts Dustin Lehr and Michael Burch look back on the standout conversations and greatest moments from The Security Champions Podcast throughout 2025. Whether you're building a champion program, supporti…
…
continue reading
1
Episode 165: An In-Depth Look at CIS Controls Implementation
51:31
51:31
Play later
Play later
Lists
Like
Liked
51:31In Episode 165 of Cybersecurity Where You Are, Tony Sager sits down with Valecia Stocchetti, Senior Cybersecurity Engineer at the Center for Internet Security® (CIS®), and Charity Otwell, Director of Critical Security Controls at CIS. Together, they take an in-depth look at implementing the CIS Critical Security Controls® (CIS Controls®), including…
…
continue reading
The days of paying $500 an hour for a lawyer to read an email are over. Here is how AI is forcing firms to pivot. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
224 | Using Human-First AI for Visibility with Kelly Sinclair
43:46
43:46
Play later
Play later
Lists
Like
Liked
43:46Send us a text I had the best conversation with Kelly Sinclair about something that's been on my mind (and probably yours too): how to actually use AI without losing the human connection that makes your business YOU. We dive deep into why social media might not be the lead generator you think it is, how to build visibility strategies that don't rel…
…
continue reading
1
Andrés Velasco on How Latin America Can Reboot Its Economic Rules
41:18
41:18
Play later
Play later
Lists
Like
Liked
41:18Thirty-five years after the Washington Consensus, a group of the world’s leading economists have assembled a new book formulating an alternative road map for developing economies, The London Consensus: Economic Principles for the 21st Century. One of the books co-editors, prominent Chilean economist Andrés Velasco, recently stopped by the New York …
…
continue reading
Cybersecurity Today: Google Chrome's AI Safety Plan, React2Shell Fixes, & New Ransomware Tactics In this episode of Cybersecurity Today, host Jim Love discusses Google's new security blueprint for AI-powered Chrome agents, highlighting measures against indirect prompt injections and model errors. Learn about Next JS's new tool for addressing the cr…
…
continue reading
Are you overpaying for your ride home? Probably. Here's how to beat the ride share apps. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
It’s our annual festive special! 🎄✨We’re wrapping up 2025 with a holiday extravaganza packed tighter than a Christmas turkey — complete with games, AI shenanigans, and some truly unhinged cybersecurity headlines. From celebrity deepfakes to record-breaking hacks, we’re revisiting the wildest moments of the year in tech. In “Real or AI?!”, the team …
…
continue reading
1
Exploring Premium Living at Dubai Hills Estate – A Modern Community of Luxury and Nature
2:24
2:24
Play later
Play later
Lists
Like
Liked
2:24Dubai has long been recognized for its majestic skyline, luxury developments, and ambitious vision. Among its finest residential communities, Dubai Hills Estate stands out for offering a lifestyle that blends modern living with natural beauty. The development is part of the expansive Mohammed Bin Rashid City and has quickly become a preferred locat…
…
continue reading
1
The Rise of Swedish Candy in America: A Cultural and Commercial Boom
2:45
2:45
Play later
Play later
Lists
Like
Liked
2:45Over the past few years, something unexpected has been happening in the American snack industry: Swedish candy has begun securing shelf space, online demand, and devoted fans across the United States. What was once a niche curiosity found mainly in Scandinavian specialty stores is now becoming a mainstream trend. This growing fascination highlights…
…
continue reading
Waiting to buy one? It could cost you $200. Hear why tech prices are about to leap and why buying now is your best move. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
An episode from The Homework Machine: Three years after ChatGPT landed in classrooms, schools are still sorting out what comes next. What counts as cheating when AI can do your homework? How should teachers use it, or not? And how do students feel about learning alongside a machine? The Homework Machine explores the promises and pitfalls of AI in e…
…
continue reading