Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Protection Encryption Podcasts
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading

1
Encrypted Ambition: Where Ambition Meets Encryption - Inside The Minds Of Disruptors.
Craig Petronella
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
…
continue reading
Find out how technology is reshaping our lives every day and explore the new powers of governments and companies.
…
continue reading
Welcome to Smarter Online Safety: Protect, Empower, Transform—your go-to channel for digital security, AI productivity, and digital transformation. As cyber fraud, identity theft, and AI-driven risks grow, Jocelyn King, “The Queen of Online Safety,” is here to help you stay secure and thrive. A Top 10 Woman in Cybersecurity, speaker, and educator, she has been featured on Dr. Phil, prime-time news, international radio, and top podcasts. 💡 What You’ll Learn: ✔️ Protect yourself & your family ...
…
continue reading
Scramblex.com has released a free encryption service that will protect sensitive data from unauthorised access and the potential for identity or financial theft.
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
Oblivion VPN provides top-tier online privacy and security with fast speeds, reliable encryption, and global server access. Protect your data and enjoy unrestricted browsing. Visit Oblivion VPN (https://oblivionvpn.com/) to start today! Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
HawkShield is a Singapore-based, data and network security provider. We offer AI-powered data security and privacy services to companies of different sizes and industries. Contact us today. https://www.hawkshield.ai/
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Security News Podcast features information security specialist Ira Victor and award-winning journalist Samantha Stone in a fast-paced news program about data security, the law, and the digital underworld. Your security depends on these weekly updates, with topics spanning data confidentiality, disaster recovery, encryption, open source and more.
…
continue reading
This is a podcast about innovation, game-changing, up-leveling and trailblazing business concepts and trends mostly technology focused. We discuss current events, news and provide interviews all centered on answering the crucial question, IS MY BRAND PROTECTED? Listening to this podcast is NOT to be construed as LEGAL ADVICE. Sometimes we do not discuss legal topics at all, sometimes we just chat about innovation but we are lawyers. We may help you realize that you really need to seek profes ...
…
continue reading
AppleVis is the go-to resource for blind and low vision users of Apple technologies. Our Podcast discusses the latest in Apple vision accessibility. Topics cover OS and accessibility features, apps, interviews with developers, roundtable discussions, and more - centering around accessing the maximum potential of Apple hardware, software, and services. Tune in to learn how you can get the most out of your Apple devices, hear the latest accessibility news, and more.
…
continue reading
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
…
continue reading
Bitunix Referral Code: TOPTOP – Unlock Up to 5,500 USDT Bonus + 50% Trading Fee Discount Looking for a powerful crypto trading platform that offers real rewards? Bitunix is your gateway to smart trading in 2025. Whether you're new to crypto or already trading daily, Bitunix combines speed, security, and high-value bonuses to help you get ahead. By using the exclusive Bitunix referral code: TOPTOP, you’ll unlock up to 5,500 USDT in bonuses and receive a 50% discount on trading fees—making it ...
…
continue reading
The Agenda podcast explores the promises of crypto, blockchain and Web3, and how everyday people level up and improve their lives with these new technologies. It covers everything from new blockchain tech to Bitcoin mass adoption and cultural shifts in Web3. Every two weeks, Cointelegraph’s The Agenda podcast tackles a new topic by speaking with the innovators and experts building the Web3 the world actually needs. After all, crypto is for everyone, not just rocket scientists, venture capita ...
…
continue reading

1
SN 1033: Going on the Offensive - The Digital Arms Race
3:04:57
3:04:57
Play later
Play later
Lists
Like
Liked
3:04:57Another Israeli spyware vendor surfaces. Win11 to delete restore points more quickly. The EU accelerates its plans to abandon Microsoft Azure. The EU sets timelines for Post-Quantum crypto adoption. Russia to create a massive IMEI database. Canada and the UK create the "Common Good Cyber Fund". U.S. states crack down on Bitcoin ATMs amid growing sc…
…
continue reading

1
SN 1033: Going on the Offensive - The Digital Arms Race
3:04:57
3:04:57
Play later
Play later
Lists
Like
Liked
3:04:57Another Israeli spyware vendor surfaces. Win11 to delete restore points more quickly. The EU accelerates its plans to abandon Microsoft Azure. The EU sets timelines for Post-Quantum crypto adoption. Russia to create a massive IMEI database. Canada and the UK create the "Common Good Cyber Fund". U.S. states crack down on Bitcoin ATMs amid growing sc…
…
continue reading

1
Juice‑Jacking, Tailgating & Insider Threats: Shocking Real‑World Cyber Attacks!
49:00
49:00
Play later
Play later
Lists
Like
Liked
49:00🌍✈️ Ever wondered how to truly stay cyber‑safe while traveling the world? Meet Polly Gitau — Top Cyber Security Woman of the World 2024, ethical hacker, AI ethics advocate, and VP at the Global Council for Responsible AI! In this powerful conversation with host Jocelyn King on the Smarter Online Safety Podcast, Polly reveals jaw‑dropping stories of…
…
continue reading

1
Is Your Business Data Safe? Why File Encryption Matters in Malaysia’s Digital Economy
0:51
0:51
Play later
Play later
Lists
Like
Liked
0:51As Malaysia’s digital economy rapidly grows, so do cyber threats. File encryption is vital for protecting sensitive business data against breaches, ransomware, and insider threats. It ensures compliance with the Personal Data Protection Act (PDPA), builds stakeholder trust, and secures data across remote work environments. Especially crucial for SM…
…
continue reading
In this podcast episode, host Seamus introduces the SoSecure app by ADT, a free iOS emergency assistance application designed to connect users quickly with ADT agents who can contact emergency services on their behalf. Seamus offers a detailed walkthrough of the app’s features, accessibility, and functionality, highlighting its usefulness—especiall…
…
continue reading

1
SN 1032: Pervasive Web Fingerprinting - How Websites Tracks You Despite Cookie Blocks
2:57:52
2:57:52
Play later
Play later
Lists
Like
Liked
2:57:52• Let's Encrypt drops its long-running email notifications. • Microsoft's new "Unexpected Restart Experience". • Microsoft's response to last year's massive CrowdStrike outage. • Windows 10's extended service updates will sort of be free. • Russia-sold iPhones MUST include the RuStore app. • Lyon, in France, says bye-bye to Windows. Hello to Linux.…
…
continue reading

1
SN 1032: Pervasive Web Fingerprinting - How Websites Tracks You Despite Cookie Blocks
2:57:52
2:57:52
Play later
Play later
Lists
Like
Liked
2:57:52• Let's Encrypt drops its long-running email notifications. • Microsoft's new "Unexpected Restart Experience". • Microsoft's response to last year's massive CrowdStrike outage. • Windows 10's extended service updates will sort of be free. • Russia-sold iPhones MUST include the RuStore app. • Lyon, in France, says bye-bye to Windows. Hello to Linux.…
…
continue reading

1
Are Your Kids or Parents Safe Online? The Dark Side of Digital Discourse!
52:02
52:02
Play later
Play later
Lists
Like
Liked
52:02🎙️ What really happens when cyberbullying goes too far? 🤯 Join host Jocelyn King with crime-fighting duo Art Bowker & Todd Shipley—award-winning experts in cybercrime, digital forensics, and law enforcement—as they reveal shocking truths about cyberbullying, cyberstalking, and online harassment! 🚨👀 💡 Discover how a single harmless comment can spira…
…
continue reading

1
Exploring BTEX 2025: Insights and Innovations
58:21
58:21
Play later
Play later
Lists
Like
Liked
58:21In this episode, KJ discusses the insights and experiences shared by various presenters at CDW Canada's Business Technology Expo (BTEX) 2025, highlighting the significance of the event in showcasing technological advancements and strategies for businesses. Key themes include the transition to Windows 11, the importance of cybersecurity, the evoluti…
…
continue reading

1
The Future of Retail Customer Engagement: Personalization, Loyalty, and AI
1:00
1:00
Play later
Play later
Lists
Like
Liked
1:00Retail engagement has transformed, shifting power to consumers who now demand instant, personalized experiences. Traditional mass marketing no longer works—AI, data analytics, and hyper-personalization are essential for survival and growth. Platforms like AIngage enable real-time personalization, smart segmentation, predictive analytics, and omnich…
…
continue reading
In this episode of Apple Crunch, Thomas Domville, John Gassman, Marty Sobo, and Desiree Renae discuss recent Apple news and other topics of interest. Chapters: Opening After thoughts of the Apple WWDC Keynote Hands-on and Thoughts of iOS 26 Closing Resources: WWDC 2025 Keynote: The AppleVis Recap Apple Previews New Accessibility Features Coming Lat…
…
continue reading

1
SN 1031: How Salt Typhoon Gets In - What "AI" Really Means
3:01:01
3:01:01
Play later
Play later
Lists
Like
Liked
3:01:01China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwante…
…
continue reading

1
SN 1031: How Salt Typhoon Gets In - What "AI" Really Means
3:00:38
3:00:38
Play later
Play later
Lists
Like
Liked
3:00:38China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwante…
…
continue reading

1
Data Risk Assessment Mistakes You're Probably Making for Your Business
0:58
0:58
Play later
Play later
Lists
Like
Liked
0:58Businesses often overlook critical mistakes in their risk assessment processes, exposing themselves to serious threats. Common errors include treating assessments as one-time exercises, focusing only on external risks, ignoring internal and third-party risks, and failing to involve diverse teams. Poor prioritization, neglecting compliance requireme…
…
continue reading

1
Is Your AI-Generated Book Really Yours? (The Truth About Copyright & AI)
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42Are you using ChatGPT, Claude, Gemini, or any Generative AI to write books, create business plans, or invent new products? STOP and watch this before you risk your ideas, your business, or your reputation! In this eye-opening episode, top cybersecurity expert and attorney Abraham Kang, Esq., reveals the shocking legal risks and copyright traps that…
…
continue reading

1
SN 1030: Internet Foreground Radiation - The NPM Repository is Under Siege
2:48:29
2:48:29
Play later
Play later
Lists
Like
Liked
2:48:29An exploited iOS iMessage vulnerability Apple denies? The NPM repository is under siege with no end in sight. Were Comcast and Digital Realty compromised? Don't ask them. Matthew Green agrees: XChat does not offer true security. We may know how Russia is convicting Telegram users. Microsoft finally decides to block two insane Outlook file types. 40…
…
continue reading

1
SN 1030: Internet Foreground Radiation - The NPM Repository is Under Siege
2:48:29
2:48:29
Play later
Play later
Lists
Like
Liked
2:48:29An exploited iOS iMessage vulnerability Apple denies? The NPM repository is under siege with no end in sight. Were Comcast and Digital Realty compromised? Don't ask them. Matthew Green agrees: XChat does not offer true security. We may know how Russia is convicting Telegram users. Microsoft finally decides to block two insane Outlook file types. 40…
…
continue reading

1
AI-Powered Enterprise Data Protection Solutions: Smarter, Faster, Safer
0:54
0:54
Play later
Play later
Lists
Like
Liked
0:54As cyber threats grow more advanced, traditional security methods are no longer sufficient. AI-powered enterprise data protection solutions offer smarter, faster, and safer defense by continuously monitoring activity, predicting threats, and automating responses. Singapore-based HawkShield leads in this space with its AI-driven platform that protec…
…
continue reading
In this episode, Tunmi offers an in-depth review of µBrowser: Watch Web Browser, a lightweight and efficient web browser designed specifically for the Apple Watch. Ideal for quick web searches and browsing simple websites on the go, µBrowser focuses on speed and ease of use rather than heavy browsing tasks like social media or account management. W…
…
continue reading

1
Learning about learners: Protecting Children's Data
56:59
56:59
Play later
Play later
Lists
Like
Liked
56:59This week we speak to Jen Persson, Director of Defend Digital Me, about the technologies being deployed in schools in England and Wales. Links: Read more from Defend Digital Me: https://defenddigitalme.org/research/ PI's work on Securitising Education: https://privacyinternational.org/campaigns/securitising-education 25 Years old - The Database Sta…
…
continue reading
In this episode of the AppleVis Extra podcast, host David Nason is joined by Thomas Domville, Tyler Stephen, and newcomer Levi Gobin to unpack everything announced at Apple’s Worldwide Developers Conference (WWDC). The team dives deep into the new features coming to iOS, watchOS, macOS, and iPadOS, sharing their first impressions and early experien…
…
continue reading

1
Can YOU Spot the Scam? DMV Text Message Exposed!
10:31
10:31
Play later
Play later
Lists
Like
Liked
10:31Are you SURE that text from the DMV is real? Scammers are getting smarter—can you keep up? In this special episode of the Smarter Online Safety Podcast, host Jocelyn King breaks down a real scam text targeting California drivers (and people everywhere!). Learn exactly how hackers use panic tactics, fake logos, and realistic websites to steal your i…
…
continue reading

1
SN 1029: The Illusion of Thinking - Meta Apps and JavaScript Collusion
2:45:36
2:45:36
Play later
Play later
Lists
Like
Liked
2:45:36In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0…
…
continue reading

1
SN 1029: The Illusion of Thinking - Meta Apps and JavaScript Collusion
2:45:36
2:45:36
Play later
Play later
Lists
Like
Liked
2:45:36In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0…
…
continue reading

1
Inside the Secret World of Encrypted Messaging—What You’re Not Being Told!
31:57
31:57
Play later
Play later
Lists
Like
Liked
31:57🚨 STOP Sending Texts Until You Watch This! 🚨 How safe are your private messages REALLY? In this explosive episode of the Smarter Online Safety Podcast, cybersecurity legend Dan Tentler (CTO of FOBOS Group, ethical hacker, IMDB-credited Watch Dogs 2 consultant) joins host Jocelyn King to unmask the truth about Signal, Wire, and modern secure messagi…
…
continue reading

1
Retrieving data. Wait a few seconds and try to cut or copy again.
0:59
0:59
Play later
Play later
Lists
Like
Liked
0:59ChatGPT said: Cyber attacks are growing in complexity, making a robust cyber risk analysis framework essential. This framework helps organizations identify assets, assess vulnerabilities, and prioritize threats. Key steps include mapping risks, establishing controls, and ongoing monitoring. Best practices involve automation, cross-department collab…
…
continue reading

1
SN 1028: AI Vulnerability Hunting - The End of Jailbreaking
3:08:02
3:08:02
Play later
Play later
Lists
Like
Liked
3:08:02Pwn2Own 2025, Berlin results. PayPal seeks a "newly registered domains" patent. An expert iOS jailbreak developer gives up. The rising abuse of SVG images, via JavaScript. Interesting feedback from our listeners. Four classic science fiction movies not to miss. How OpenAI's o3 model discovered a 0-day in the Linux kernel Show Notes - https://www.gr…
…
continue reading

1
SN 1028: AI Vulnerability Hunting - The End of Jailbreaking
3:08:02
3:08:02
Play later
Play later
Lists
Like
Liked
3:08:02Pwn2Own 2025, Berlin results. PayPal seeks a "newly registered domains" patent. An expert iOS jailbreak developer gives up. The rising abuse of SVG images, via JavaScript. Interesting feedback from our listeners. Four classic science fiction movies not to miss. How OpenAI's o3 model discovered a 0-day in the Linux kernel Show Notes - https://www.gr…
…
continue reading