The Agile Wire with Jeff Bubolz and Chad Beier is focused on long-form conversations about the struggles associated with increasing agility of teams, products, and organizations around the world. As change agents, advisors, coaches, and trainers the hosts are focused on helping listeners get agile and stay agile.
…
continue reading
Safe Software Podcasts
Design Better co-hosts Eli Woolery and Aarron Walter explore the intersection of design, technology, and the creative process through conversations with guests across many creative fields, helping you hone your craft, unlock your creativity, and learn the art of collaboration. Whether you’re design curious or a design pro, Design Better is guaranteed to inspire and inform. Vanity Fair calls Design Better, “sharp, to the point, and full of incredibly valuable information for anyone looking to ...
…
continue reading
ThePrimeagen and Teej host The Standup - a podcast where we talk about software, life, memes and more. It’s fun, it can be informative and sometimes Trash is also here. Joined by regular guests like Casey Muratori, Carson Gross and more!
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
…
continue reading
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
The latest machine learning, A.I., and data career topics from across both academia and industry are brought to you by host Dr. Jon Krohn on the Super Data Science Podcast. As the quantity of data on our planet doubles every couple of years and with this trend set to continue for decades to come, there's an unprecedented opportunity for you to make a meaningful impact in your lifetime. In conversation with the biggest names in the data science industry, Jon cuts through hype to fuel that pro ...
…
continue reading
There's always a better way to work. Join the Easy Agile Podcast as we interview guests from leading companies to find out how their teams work better together.
…
continue reading
Advice. Firsthand experiences. Inspiring conversations. Fresh perspectives. You'll find it all on the SAFe Business Agility podcast—your connection to all things SAFe, and a lot more.
…
continue reading
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
The Tech+ Audio Course is your complete, on-demand study companion for mastering the CompTIA Tech+ (FC0-U71) certification exam. Designed for those beginning their journey into information technology, it guides you step by step through every domain and objective of the official exam blueprint. Each episode transforms complex IT concepts into clear, relatable lessons filled with practical examples, definitions, and real-world applications. Whether you’re learning about hardware components, so ...
…
continue reading
Best Business Podcast (Gold), British Podcast Awards 2023 How do you build a fully electric motorcycle with no compromises on performance? How can we truly experience what the virtual world feels like? What does it take to design the first commercially available flying car? And how do you build a lightsaber? These are some of the questions this podcast answers as we share the moments where digital transforms physical, and meet the brilliant minds behind some of the most innovative products a ...
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
…
continue reading
New podcast weblog
…
continue reading
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
…
continue reading
The Practical Neurology Podcast is the essential guide for the everyday life of all neurologists. Just like our journal Practical Neurology, this podcast is useful for everyone who sees neurological patients and who wants to keep up-to-date and safe in managing them. In other words, this is a podcast for jobbing neurologists who plough through the tension headaches and funny turns week in and week out. Subscribe to enjoy deep dives into each journal issue with editors Prof. Philip Smith and ...
…
continue reading
For the complete newbie or the experienced hypnotist, Brain Software with Mike Mandel is the world's most interesting, educational and fun podcast discussing hypnosis, NLP and strategies for peak performance and self improvement. Mike Mandel is a 6-time award winning hypnotist, immensely popular keynote speaker, stage performer, psychotherapist and NLP trainer. He has been doing hypnosis since he was 12 years old. Mike has an amazing ability to demystify hypnosis, teach core concepts, and te ...
…
continue reading
Security teams have their hands full. Building relationships across the entire organization is vital for success. In Champions of Security, I interview passionate individuals with unique stories. Each guest shares their honest opinions about what’s working (and what isn’t) in the security world. Tune in to learn valuable insights about keeping your customers safe.
…
continue reading
A review of Bitcoin Software updates and related topics with NVK and guests.
…
continue reading
State and local governments provide vital services to their citizens and keep them safe. They are also one of the largest employers in the country. They employ about 14 million people in the US, not including public schools and hospitals. However, they’re also wrought with antiquated systems, broken processes, paperwork overwhelm, lack of transparency, and underutilization of intelligent technologies. If you are a municipal leader, everyday citizen, or work for a state or local government ac ...
…
continue reading
Unique and bold conversations that no one is willing to have about the real day in the life Sales Engineering experience. This podcast series will expose the untold truths, opportunities, and challenges Sales Engineers experience. We will protect the identities and voices by providing an open and safe place to discuss taboo topics. Topics - Working with Account Executives, Compensation, Splits, Managing Up, and Negotiations should be spicey and exciting.
…
continue reading
Welcome to The Accountant Quits podcast, an idea born from an inquisitive attempt to find one’s calling. I’m Umar and I will be your host on this series where we look into the impact of blockchain in accounting. From topics around the accounting treatment of cryptocurrencies, the new framework of triple entry accounting, the challenges at hand for audit and tax, and many more, we will look into how the profession of accounting is evolving and how accountants should prepare themselves for the ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
My name is Bry Willis. Here you can find my thoughts on topics ranging from business transformation strategy to enterprise business architecture to transformation implementation and adoption. I view transformation through a customer experience lens to solve business challenges and leveraging technology to enable solutions. Here I share decades of my experience in corporate and management consulting contexts, from my beginnings as a technologist through to my time as a consultant and advisor. ...
…
continue reading
Founders First explores how founders got started, what they did before starting their startups, and how you can go from an idea to a venture-backed company.
…
continue reading
For construction business owners and accounting pros. In depth exploration of software and topics related to construction and accounting. A three segment podcast: 1. Tonya introduces the problem and potential solution 2. Tonya will speak with an industry expert 3. Tonya works with a real live user to help them implement the solution and answer all their questions
…
continue reading
Behind the Surface is the ultimate podcast for fabricators! From mastering the latest tools and materials to navigating business challenges and enhancing your creative process, our podcast covers it all. Join us for insightful interviews with industry leaders, expert roundtable discussions and actionable insights designed to empower fabricators at every level.
…
continue reading
life is sweeter in candy color! {www.katrinaberg.com} hi! i'm oil painter, katrina berg. welcome to my midway, utah studio, where i'll serve up a palette of support, hope and love, with a side of realness! as a mother of 5 (3 teenagers & 8-year-old twin boys), i know that life is rarely easy and jolly...but savoring the sweet moments gives us the strength we need to find peace, growth, and fulfillment along our journey. {podcasting to support women, mother artists and creative entrepreneurs! ...
…
continue reading
In an increasingly digital world that we live in, building secure software is important for us all. Just as personal safety and security are fundamental needs, we at the Purple Book Community believe digital security is a fundamental need as well. Welcome to The Purple Book Podcast. This podcast is part of the Purple Book Community, a community of some of the world’s leading security leaders. Our vision is to build a purpose driven, trusted, and safe community that equips people with the exp ...
…
continue reading
1
Video Rewind: Cassie McDaniel: How Medium eliminated its PM function and started moving faster
27:00
27:00
Play later
Play later
Lists
Like
Liked
27:00We’re taking a holiday break, so we’re rewinding to one of our favorite episodes this year with Cassie McDaniel, Medium’s head of design. We’re also including video from the episode, which you can watch here or on our YouTube channel at dbtr.co/youtube. We hope you have a lovely holiday season with your family, friends, and loved ones. —Eli & Aarro…
…
continue reading
1
The CISO Holiday Party 2025: Leadership Lessons from the Year That Was - BSW #427
49:27
49:27
Play later
Play later
Lists
Like
Liked
49:27Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes…
…
continue reading
1
Holiday Special Part 1: You’re Gonna Click the Link - Rob Allen - SWN #540
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34It’s the holidays, your defenses are down, your inbox is lying to you, and yes—you’re gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won’t save you, and why the real job is surviving after the click. From phishing and sm…
…
continue reading
1
Episode 130: Navigating the Quantum Security Landscape with Rich Campagna
39:30
39:30
Play later
Play later
Lists
Like
Liked
39:30In Episode 130, Rich Campagna from Palo Alto Networks discusses the critical importance of preparing for quantum security threats, particularly focusing on post-quantum cryptography. The conversation covers the urgency of upgrading security infrastructure, the challenges organizations face in this transition, and the concept of crypto agility to fu…
…
continue reading
Love a hot take? 🔥 You’re in luck! We’re back with a special end-of-year treat: a rapid-fire round of cybersecurity hot takes guaranteed to start arguments in your group chats and hijack at least one Slack thread. 💬 The team weighs in on bold claims like “Passwords will finally die in 2026” and “AI will solve more cybersecurity problems than it cau…
…
continue reading
1
951: Context Engineering, Multiplayer AI and Effective Search, with Dropbox’s Josh Clemm
1:00:04
1:00:04
Play later
Play later
Lists
Like
Liked
1:00:04VP of Engineering at Dropbox Josh Clemm speaks to Jon Krohn about consolidating search tools across apps with the AI-powered workspace, Dropbox Dash, the new collaborative AI systems that enhance interoperability between team members and their projects, and how to avoid “context rot”. Dropbox Dash gives users the best of Dropbox’s cloud storage and…
…
continue reading
1
Modern AppSec: OWASP SAMM, AI Secure Coding, Threat Modeling & Champions - Sebastian Deleersnyder, Dustin Lehr, James Manico, Adam Shostack - ASW #362
1:07:52
1:07:52
Play later
Play later
Lists
Like
Liked
1:07:52Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
…
continue reading
1
Internal threats are the hole in Cybersecurity’s donut - Frank Vukovits - ESW #438
1:57:05
1:57:05
Play later
Play later
Lists
Like
Liked
1:57:05Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There’s a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn’t infringe on any individual organization’s privacy. That’s why we hear the i…
…
continue reading
1
Auld Lang Syne, Ghostpairing, Centerstack, WAFS, React2Shell, Crypto, Josh Marpet... - SWN #539
32:10
32:10
Play later
Play later
Lists
Like
Liked
32:10Auld Lang Syne, Ghostpairing, Centerstack, OneView, WAFS, React2Shell Redux, Crypto, Josh Marpet, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-539
…
continue reading
The gang talks about the craziest onboarding ever… and why Tom is a Genius! If you're on Mac or Windows, check out tuple today! And if you're on Linux, let's just say come back and check soon 🙂 Say thanks to our sponsor by checking out https://tuple.app/prime CODE: PRIME
…
continue reading
1
950: Happy Holidays from All of Us at the SuperDataScience Podcast
1:59
1:59
Play later
Play later
Lists
Like
Liked
1:59In this special holiday episode, the SuperDataScience Podcast team comes together to wish you happy holidays and thank you for listening throughout the year. Team members from around the world share warm greetings in their own voices and languages as we reflect on another year of learning, curiosity, and community. From all of us at SDS, we wish yo…
…
continue reading
This week in the security news: Linux process injection Threat actors need training too A Linux device "capable of practically anything" The Internet of webcams Hacking cheap devices Automating exploitation with local AI models Lame C2 Smallest SSH backdoor Your RDP is on the Internet These are not the high severity bugs you were looking for Low ha…
…
continue reading
This week in the security news: Linux process injection Threat actors need training too A Linux device "capable of practically anything" The Internet of webcams Hacking cheap devices Automating exploitation with local AI models Lame C2 Smallest SSH backdoor Your RDP is on the Internet These are not the high severity bugs you were looking for Low ha…
…
continue reading
1
Vaporware Traps: Why Government Keeps Falling for Software Demos
11:13
11:13
Play later
Play later
Lists
Like
Liked
11:13Software demos are built to sell you a story — not to show you what a product can actually do. And in government, that story can cost millions. Vendors walk in with polished screens, AI “prototypes,” and roadmap features presented as if they’re ready to deploy. But once the contract is signed, the reality looks very different. In this episode, we u…
…
continue reading
1
Aaron Draplin: Field Notes co-founder on what skate culture taught him about design
27:14
27:14
Play later
Play later
Lists
Like
Liked
27:14A larger than life figure in the creative world, Aaron Draplin has been designing everything from logos to posters since 1995. Few designers are as prolific as Aaron. He’s the founder of Draplin Design Co. (DDC). Priding himself on craftsmanship and quality, the DDC has made stuff for Field Notes, Esquire, Nike, Red Wing, Burton Snowboards, Ford, a…
…
continue reading
1
Cybersecurity Hiring Trends as Boards Bridge Confidence Gap and Build Strategic Lever - Jim McCoy - BSW #426
54:36
54:36
Play later
Play later
Lists
Like
Liked
54:36Business Security Weekly is well aware of the cybersecurity hiring challenges. From hiring CISOs to finding the right skills to developing your employees, we cover it weekly in the leadership and communications segment. But this week, our guest interview digs into the global cybersecurity hiring trends. Jim McCoy, CEO at Atlas, joins Business Secur…
…
continue reading
1
Pornhub, WSL, Santastealer, Geoserver, Webkit, Fortiyomama, Dad's pix, Aaran Leyland. - SWN #538
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36Pornhub, WSL, Santastealer, Geoserver, Webkit, Fortiyomama, Dad's Pix, Aaran Leyland, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-538
…
continue reading
1
The Hidden Risk Inside Your Build Pipeline: When Open Source Becomes an Attack Vector | A Conversation with Paul McCarty | Redefining CyberSecurity with Sean Martin
40:14
40:14
Play later
Play later
Lists
Like
Liked
40:14⬥EPISODE NOTES⬥ Modern application development depends on open source packages moving at extraordinary speed. Paul McCarty, Offensive Security Specialist focused on software supply chain threats, explains why that speed has quietly reshaped risk across development pipelines, developer laptops, and CI environments. JavaScript dominates modern softwa…
…
continue reading
1
949: Why AI Keeps Failing Society, with Stanford professor Alex “Sandy” Pentland
55:28
55:28
Play later
Play later
Lists
Like
Liked
55:28Alex “Sandy” Pentland, Toshiba Professor of Media Arts & Science at MIT and Fellow at Stanford, speaks to Jon Krohn about his new book, Shared Wisdom, why he attributes AI to the collapse of the Soviet Union, and why those risks to society could still be relevant today. We can only achieve better system performance, Alex says, when we build tools t…
…
continue reading
1
Developing Open Source Skills for Maintaining Projects - Kat Cosgrove - ASW #361
1:03:55
1:03:55
Play later
Play later
Lists
Like
Liked
1:03:55Open source projects benefit from support that takes many shapes. Kat Cosgrove shares her experience across the Kubernetes project and the different ways people can make meaningful contributions to it. One of the underlying themes is that code is written for other people. That means PRs need to be understandable, discussions need to be enlightening…
…
continue reading
1
Gunboat: Engineering Luxury Catamarans That Sail Faster Than the Wind
19:16
19:16
Play later
Play later
Lists
Like
Liked
19:16What if you could build a yacht that combined the speed and efficiency of a racing craft with the grandeur of a floating villa? That was the vision founder Peter Johnstone brought to life when he launched Gunboat in 2002, creating an entirely new category of high-performance cruising catamaran. Gunboat's twin-hull design provides remarkable stabili…
…
continue reading
1
Unusual emboli, and software versus hardware - Case Reports December 2025
41:13
41:13
Play later
Play later
Lists
Like
Liked
41:13Another set of intriguing cases from the latest issue of the journal, pored over by the Case Reports team. In the first case, a 24-yo man presents acutely with reduced consciousness, following 3 days of right-sided headache. His mother reports sudden behavioural changes with jerky movements and enlarged pupils. He is agitated, not obeying commands …
…
continue reading
1
Illuminating Data Blind Spots, Topic, Enterprise News - Tony Kelly - ESW #437
1:49:42
1:49:42
Play later
Play later
Lists
Like
Liked
1:49:42Interview Segment: Tony Kelly Illuminating Data Blind Spots As data sprawls across clouds and collaboration tools, shadow data and fragmented controls have become some of the biggest blind spots in enterprise security. In this segment, we’ll unpack how Data Security Posture Management (DSPM) helps organizations regain visibility and control over th…
…
continue reading
1
Disney Gone Wild, Docker, AIs, Passkeys, Gogs, React2Shell, Notepad++, Josh Marpet... - SWN #537
30:38
30:38
Play later
Play later
Lists
Like
Liked
30:38Disney Gone Wild, Docker, AIs, Passkeys, Gogs, React2Shell, Notepad++, Josh Marpet, and More Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-537
…
continue reading
1
Session 295: 13 Years of Personal Growth: Health, Relationships & Life Mastery
46:51
46:51
Play later
Play later
Lists
Like
Liked
46:51For show notes, visit https://mikemandelhypnosis.com/podcast/295/
…
continue reading
1
948: In Case You Missed It in November 2025
29:07
29:07
Play later
Play later
Lists
Like
Liked
29:07In this November episode of “In Case You Missed It” series, Jon Krohn selects his favorite clips from the month. Hear from Shirish Gupta and Tyler Cox (Episode 939), Vikoy Pandey (Episode 941), Marc Dupuis (Episode 937), and Maya Ackerman (Episode 943) on getting back to human motivation and the importance of evaluating the tools and data we use. A…
…
continue reading
1
Tech Segment: MITM Automation + Security News - Josh Bressers - PSW #904
2:07:47
2:07:47
Play later
Play later
Lists
Like
Liked
2:07:47This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
…
continue reading
1
Tech Segment: MITM Automation + Security News - Josh Bressers - PSW #904
2:07:47
2:07:47
Play later
Play later
Lists
Like
Liked
2:07:47This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
…
continue reading
1
Conviction. Resiliency. Consistency. with Isaiah Ness
43:14
43:14
Play later
Play later
Lists
Like
Liked
43:1400:00 Intro 06:00 Conviction, Resiliency, Consistency 09:50 Critic and Supporter 12:45 Habits of an Entrepreneur 14:00 Thinking time 17:30 Slowing down 24:22 Balancing scale with operations 28:50 AI as a team member (not a tool) 30:20 Celebrating not winning 37:00 Starting a company (planning vs experimenting) 42:00 The power of listening Isaiah's …
…
continue reading
1
#101: Web3 Fundraising with Max Torres (SAFE, SAFT)
44:44
44:44
Play later
Play later
Lists
Like
Liked
44:44Fundraising in web3 isn’t just web2 with a token attached. On Episode 101, we break down what actually changes when you introduce tokens, interoperability, decentralization, and community ownership into the funding model. I’m joined by Max Torres, Managing Partner at Taco3 Ventures and former Head of Finance at 0x Labs, where he helped raise $85M a…
…
continue reading
1
From Practitioner to CIO: The Leadership Evolution No One Talks About
38:12
38:12
Play later
Play later
Lists
Like
Liked
38:12A lot of government CIOs step into the role carrying years of technical experience — but almost no preparation for the executive expectations that come with it. The shift from practitioner to CIO is bigger than most people realize, and it has very little to do with technology. In this Untangled episode, AV and former CIO Robert Kornovich unpack wha…
…
continue reading
1
Salesforce Security Risks, Boards Duty of Care, and Managing CISO Risks - Justin Hazard - BSW #425
52:57
52:57
Play later
Play later
Lists
Like
Liked
52:57Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins …
…
continue reading
1
Hypnotoad, AI Galore, Storm-0249, DocuSign, Broadside, Goldblade, Aaran Leyland... - SWN #536
34:50
34:50
Play later
Play later
Lists
Like
Liked
34:50We've got: Hypnotoad, AI Galore, Storm-0249, DocuSign, Broadside, Goldblade, Ships at Sea, Sora, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-536
…
continue reading
1
Rethinking Public Health Workflows Through Automation and Governance: Why Data Modernization May Be The Key | A Conversation with Jim St. Clair | Redefining CyberSecurity with Sean Martin
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06⬥EPISODE NOTES⬥ Artificial intelligence is reshaping how public health organizations manage data, interpret trends, and support decision-making. In this episode, Sean Martin talks with Jim St. Clair, Vice President of Public Health Systems at a major public health research institute, Altarum, about what AI adoption really looks like across federal,…
…
continue reading
1
Jessica Hische and Chris Shiflett: Designing business tools that support how creatives actually work
1:08:48
1:08:48
Play later
Play later
Lists
Like
Liked
1:08:48Jessica Hische and Chris Shiflett first crossed paths at Studiomates, a Brooklyn based co-working space where some of New York’s most talented designers built businesses and influential organizations. Visit our Substack for bonus content and more: https://designbetterpodcast.com/p/jessica-hische-and-chris-shiflett Jessica, known for her lettering a…
…
continue reading
It’s our annual festive special! 🎄✨We’re wrapping up 2025 with a holiday extravaganza packed tighter than a Christmas turkey — complete with games, AI shenanigans, and some truly unhinged cybersecurity headlines. From celebrity deepfakes to record-breaking hacks, we’re revisiting the wildest moments of the year in tech. In “Real or AI?!”, the team …
…
continue reading
1
Episode 129: Toby Cubitt on Opportunities and Challenges
41:18
41:18
Play later
Play later
Lists
Like
Liked
41:18In Episode 129, Toby Cubitt, co-founder and CTO of Phasecraft, discusses the evolution and future of quantum computing. He emphasizes the importance of hybrid algorithms, the challenges in material science, and the need for efficient quantum algorithms. The discussion also highlights the significance of diverse educational backgrounds in the field …
…
continue reading
1
947: How to Get Hired at Top Firms like Netflix and Spotify, with Jeff Li
1:09:32
1:09:32
Play later
Play later
Lists
Like
Liked
1:09:32Jeff Li tells Jon Krohn what it's like to work at scale as a data scientist and a machine learning engineer at Netflix, Spotify and DoorDash, as well as how to get a foot in the door at these companies. Jeff also discusses how to run forecasts and trends, and how to read their results. Listen to hear Jeff Li discuss how Spotify became a podcast pow…
…
continue reading
1
Making OAuth Scale Securely for MCPs - Aaron Parecki - ASW #360
1:07:43
1:07:43
Play later
Play later
Lists
Like
Liked
1:07:43The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to APIs, data, and local systems. Aaron Parecki explains how OAuth's new Client ID Metadata Documents spec provides more security for MCPs and the reasons why the behavior and design of MCPs required a new…
…
continue reading
1
Fix your dumb misconfigurations, AI isn't people, and the weekly news - Wendy Nather, Danny Jenkins - ESW #436
1:34:58
1:34:58
Play later
Play later
Lists
Like
Liked
1:34:58Interview with Danny Jenkins: How badly configured are your endpoints? Misconfigurations are one of the most overlooked areas in terms of security program quick wins. Everyone freaks out about vulnerabilities, patching, and exploits. Meanwhile, security tools are misconfigured. Thousands of unused software packages increase remediation effort and a…
…
continue reading
1
Toilet Cams, N. Korea, Brickstorm, MCP, React2Shell, Proxmox, Metaverse, Josh Marpet - SWN #535
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08Toilet Cams, North Korea, Brickstorm, MCP, India, React2Shell, Proxmox, Metaverse, Josh Marpet, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-535
…
continue reading
Jon Krohn looks into the benefits of robotaxis, from safety to affordability, in this Five-Minute Friday. Hear about Waymo’s partnership with Jaguar Land Rover, the latest safety studies concerning driverless vehicles, and a case for robotaxis becoming the preferred method of transport in the US, where households spend roughly 15% of their budget o…
…
continue reading
1
Holiday Hack Challenge, AI, Internet of Trash - Ed Skoudis - PSW #903
2:10:41
2:10:41
Play later
Play later
Lists
Like
Liked
2:10:41This week we welcome Ed Skoudis to talk about the holiday hack challenge (https://sans.org/HolidayHack). In the security news: Oh Asus Dashcam botnets Weird CVEs being issued CodeRED, but not the worm Free IP checking Internet space junk and IoT Decade old Linux kernel vulnerabilities Breaking out of Claude code Malicious LLMs Hacker on a plan gets…
…
continue reading
1
Holiday Hack Challenge, AI, Internet of Trash - Ed Skoudis - PSW #903
2:10:41
2:10:41
Play later
Play later
Lists
Like
Liked
2:10:41This week we welcome Ed Skoudis to talk about the holiday hack challenge (https://sans.org/HolidayHack). In the security news: Oh Asus Dashcam botnets Weird CVEs being issued CodeRED, but not the worm Free IP checking Internet space junk and IoT Decade old Linux kernel vulnerabilities Breaking out of Claude code Malicious LLMs Hacker on a plan gets…
…
continue reading
1
Why Avero Isn’t a “Tech Firm” — And What Modernization Actually Requires
41:50
41:50
Play later
Play later
Lists
Like
Liked
41:50Avero gets labeled a “tech firm” all the time — but that’s exactly what we are not. In this episode, we break down why being vendor-agnostic matters, why we refuse to sell software, and why true modernization has far more to do with vision, culture, governance, and sustainability than technology alone. We revisit what organizations miss when they r…
…
continue reading
It’s that time of year again—our favorite episode to put together. A moment to look back at the objects, experiences, and ideas that sparked creativity for us this year. From books that moved us to tools that surprised us to experiences we can’t stop recommending, we’ve gathered a set of gift ideas for the designers, makers, and curious people in y…
…
continue reading
1
Shadow Risks in SaaS, Cybersecurity Market Has Lost Its Mind, and Rise of the CTrO - Mike Puglia - BSW #424
1:06:01
1:06:01
Play later
Play later
Lists
Like
Liked
1:06:01While many businesses rely on Microsoft 365, Salesforce and Google Workspace security features, critical blind spots remain—the recent series of high profile SaaS breaches demonstrate this. So what should you do? Mike Puglia, General Manager of Kaseya Labs, joins Business Security Weekly to discuss the risks in SaaS applications. In this segment, M…
…
continue reading
1
AI, Quantum, and the Changing Role of Cybersecurity | ISC2 Security Congress 2025 Coverage with Jon France, Chief Information Security Officer at ISC2 | On Location with Sean Martin and Marco Ciappelli ...
26:22
26:22
Play later
Play later
Lists
Like
Liked
26:22What Security Congress Reveals About the State of Cybersecurity This discussion focuses on what ISC2 Security Congress represents for practitioners, leaders, and organizations navigating constant technological change. Jon France, Chief Information Security Officer at ISC2, shares how the event brings together thousands of cybersecurity practitioner…
…
continue reading
1
AI semantics, Calendly, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland... - SWN #534
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15AI semantics, Calendly, GreyNoise, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland, and More... Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-534
…
continue reading