Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Security Engineers Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Technical interviews about software topics.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading

1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
News and interviews covering all corners of infrastructure, from rail to roads to energy to tunnels and much more, with guests from all around the wide world of civil engineering chatting with NCE news editor Rob Hakimian and the rest of the NCE team
…
continue reading
A weekly podcast about the electronics industry. Occasional guests. Lots of laughs.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Join Senator Ted Cruz and co-host Ben Ferguson as they break down the most important news stories of the day and reveal what they mean for you. On "Verdict with Ted Cruz,” you will go behind the scenes of the political debates that define our country. "Verdict with Ted Cruz" is being brought to you by Jobs, Freedom, and Security PAC, a political action committee dedicated to supporting conservative causes, organizations, and candidates across the country. In 2022, Jobs, Freedom, and Security ...
…
continue reading
An off-the-cuff radio show and podcast for electronics enthusiasts and professionals. Note: this is the "show only" version of the feed. To see the show notes, check out the main podcast feed: https://theamphour.com/feed/
…
continue reading
Tech Takes podcast knows what matters to you. Thought-provoking interviews with industry leaders, government officials, academia and influencers on hot topics relevant to the engineering and applied science profession and the technologies that shape the world around us.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Your exploration inside Lawrence Livermore National Laboratory. Hear untold stories, meet boundary-pushing pioneers and get unparalleled access to groundbreaking science and technology. From national security challenges to computing revolutions, discover the innovations that are shaping tomorrow, today.
…
continue reading
The United States is in the midst of a dramatic political realignment with shifting views on national security, economics, technology, and the role of government in our lives. Saagar Enjeti and Marshall Kosloff explore this with thinkers, policymakers, and more.
…
continue reading
We share the most critical perspectives, habits & examples of great software engineering leaders to help evolve leadership in the tech industry. Join our community of software engineering leaders @ www.sfelc.com!
…
continue reading
A podcast that helps us understand human vulnerability and how we can defend against the attacks that exploit us.
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Assistant Managing Editor, and Ken Briodagh, Editor-in-Chief of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology m ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
An improved audio format version of our written content. Get your defence and security perspectives now through this podcast.
…
continue reading
Join Scott Hanselman every Friday as he engages one-on-one with the engineers who build the services that power Microsoft Azure as they demo capabilities, answer Scott's questions, and share their insights. Follow us at: friday.azure.com.
…
continue reading
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
…
continue reading
...where Tech, Engineering, and The Culture intersects.
…
continue reading
Welcome to Betatalks the podcast, in which we talk with friends from the development community. We chat not only about technology, but what drives them, inspires them and makes them unique. Rick (Cloud Solution Architect at Microsoft) and Oscar (CTO at Virtual Vaults), invite developers, makers, Open Source maintainers and other amazing people from the .NET and Azure development community. Looking for more content? Have a look at our Betatalks video's.
…
continue reading
Software engineers, architects and team leads have found inspiration to drive change and innovation in their team by listening to the weekly InfoQ Podcast. They have received essential information that helped them validate their software development map. We have achieved that by interviewing some of the top CTOs, engineers and technology directors from companies like Uber, Netflix and more. Over 1,200,000 downloads in the last 3 years.
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
…
continue reading
Financial and retirement planning guidance from Charles Welde of CP Welde Group in Chadds Ford, PA. We'll teach you how to reduce taxes and increase income so you can have a bigger impact on your family, friends and the causes you believe in.
…
continue reading
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
…
continue reading
Eddie Miro brings years of social engineering experience to bear on an educational and entertaining program around all things social engineering.
…
continue reading
Discover the people, ideas, and technological breakthroughs that are shaping the next iteration of human co-experience. Featuring a diverse cross-section of guest speakers from Roblox’s product and engineering teams, we’ll discuss how we got to where we are today, the road ahead, and the lessons we’ve learned along the way. Hosted by David Baszucki, founder and CEO of Roblox.
…
continue reading
The Security Podcast of Silicon Valley invites founders, engineers, and security leaders to share how they tackle compliance, growth, and real-world security challenges—turning obstacles into strategic advantages. Brought to you by YSecurity.
…
continue reading
Embedded edge with Maurizio is a podcast show hosted by Maurizio Di Paolo Emilio, who talks to both engineers and executives in the embedded systems design and development industry to gain insights into the embedded systems, technologies and products featured in embedded.com.
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading

1
How Security Consultant Can Transition to AI Security Engineer in 2025
21:25
21:25
Play later
Play later
Lists
Like
Liked
21:25In this episode, we explore the rapid evolution of cybersecurity and the critical rise of a new specialisation: the AI Security Engineer. As artificial intelligence advances, it not only enhances our defensive capabilities but also introduces sophisticated new attack vectors that traditional security measures can't handle. AI Security Certification…
…
continue reading

1
Ep. 321 - Security Awareness Series - Trust But Verify Even Under Abnormal Circumstances: A Red Team Story with Chris and Faith
29:29
29:29
Play later
Play later
Lists
Like
Liked
29:29Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Faith Kent. Together, they delve into the critical role of effective communication, the art of role adaptation, and the psychological dynamics in crisis situations. The conversation highlights the importance of proactive preparedness and fostering trust within t…
…
continue reading

1
“This GRC Space is Hot!” with Varun Gurnaney, Staff Security Engineer at Apple
53:30
53:30
Play later
Play later
Lists
Like
Liked
53:30How does a software engineer become a GRC leader? In this episode of Security & GRC Decoded, host Raj Krishnamurthy welcomes Varun Gurnaney, Staff Security Engineer at Apple. Varun shares his journey from writing janky Python scripts for compliance evidence collection to shaping the discipline of GRC engineering at some of the world’s biggest compa…
…
continue reading

1
If I Won’t Live to 90, Should I Claim Social Security Early?
13:49
13:49
Play later
Play later
Lists
Like
Liked
13:49If your parents passed away relatively young, it’s only natural to wonder whether you’ll follow the same path. And from a financial standpoint, does that change how you should approach things like retirement planning and when to draw Social Security benefits? We’ll answer a listener’s question on this exact topic on today’s episode. Important Links…
…
continue reading

1
SE Radio 684: Dan Bergh Johnsson and Daniel Deogun on Secure By Design
56:43
56:43
Play later
Play later
Lists
Like
Liked
56:43Daniel Deogun and Dan Bergh Johnsson -- two of the co-authors of the book, Secure by Design -- discuss the intersection of good software design and security with host Sam Taggart. They describe how following certain software design principles can help developers create secure software without needing to become security experts. They talked about ho…
…
continue reading

1
Integrated strategy and Human Security outcomes: The British Army's engineering surveys in Albania
12:06
12:06
Play later
Play later
Lists
Like
Liked
12:06Aligned to His Majesty's Government (HMG) priorities of curtailing irregular migration and associated connections to human trafficking from Albania, efforts to address the drivers of migration and organised crime at source are underway. The British Army's ongoing specialist survey work in Albania's Kukës Subterranean Complex (KSC) may lead to livel…
…
continue reading

1
How Box Builds AI Agents, Redefines Technical Vision, and Balances Speed with Security w/ Ben Kus #230
46:14
46:14
Play later
Play later
Lists
Like
Liked
46:14"If we were building Box today, what would we do?” Ben Kus (CTO @ Box) deconstructs their playbook for enterprise AI innovation. We cover their journey to reimagine & reorient the company to a new technical vision, how they run a “multi-speed” org that balances startup agility and & enterprise-grade stability, and their “platform first” approach to…
…
continue reading

1
Roselle Safran: So much opportunity. [Entrepreneur] [Career Notes]
8:37
8:37
Play later
Play later
Lists
Like
Liked
8:37Please enjoy this encore of Career Notes. CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again. With a degree in civil engineering, Roselle veered off into a more technical role at a startup and she says "caught the startup bug." After convincing a hiring mana…
…
continue reading

1
0070: When ChatGPT 5 Gets Too Real: The Emotional Backlash
1:01:21
1:01:21
Play later
Play later
Lists
Like
Liked
1:01:21The boundaries between humans and AI are blurring in unexpected ways. As revealed in this thought-provoking episode, users have developed genuine emotional connections to ChatGPT 4.0, describing it as "warm" and "supportive" while rejecting the newer version 5 for being "too blunt" and "cold." This fascinating psychological response exposes our col…
…
continue reading

1
Liberals Celebrate Kirk Assassination on Social Media, 'Love' Texts from Assassin to Boyfriend & Designating Antifa as Terrorist Organization Week In Review
29:36
29:36
Play later
Play later
Lists
Like
Liked
29:36Charlie Kirk Assassination The central focus is the assassination of conservative activist Charlie Kirk. It highlights how some individuals on social media and in academic or professional positions were accused of celebrating his death. Commentary draws sharp contrasts between free speech protections and the consequences of hateful or violent speec…
…
continue reading

1
Browser attacks without downloads. [Research Saturday]
21:45
21:45
Play later
Play later
Lists
Like
Liked
21:45Today we are joined by Nati Tal, Head of Guardio Labs, discussing their work “CAPTCHAgeddon” or unmasking the viral evolution of the ClickFix browser-based threat. CAPTCHAgeddon — Shaked Chen’s deep dive into the ClickFix fake-captcha wave — reveals how a red-team trick morphed into a dominant, download-free browser threat that tricks users into pa…
…
continue reading
The internet continues its chaotic march, with a TikTok deal potentially happening (for real this time, maybe), while LimeWire bought the Fyre Fest brand, because more viruses are always a great idea. Corporate America is going full AI-bro with massive layoffs at Fiverr, xAI, and Google, while OpenAI reveals people are using ChatGPT for pretty much…
…
continue reading
OpenAI patches a ChatGPT flaw that could have exposed Gmail data. CISA documents malware exploiting two Ivanti Endpoint Manager Mobile (EPMM) flaws. WatchGuard patches a critical flaw in its Firebox firewalls. MI6 launches a dark web snitch site. The DoD looks to cut its cybersecurity job hiring time just 25 days. Researchers trick ChatGPT agents i…
…
continue reading
The dismantling of the U.S. Agency for International Development this year left countries scrambling, with many analysts going as far as calling the shutdown inhumane. But values were never the real driver of the global development agenda, says FP columnist Adam Tooze—it was actually about power. Now that the United States has stepped back, can Chi…
…
continue reading
Today’s discussion is on one of the most important transformations happening in the automotive industry: the shift from traditional 12-volt electrical systems to modern 48-volt architectures. For decades, 12V has been the backbone of vehicle electronics, but with the rise of electrification, ADAS, infotainment, and software-defined cars, the indust…
…
continue reading

1
Jimmy Kimmel Fired-Was it Right & Should the FCC have Gotten Involved plus Trump Designates ANTIFA a Terrorist Organization
34:52
34:52
Play later
Play later
Lists
Like
Liked
34:52Jimmy Kimmel’s Firing & FCC Involvement The hosts argue that Jimmy Kimmel was suspended/fired not just because of controversial remarks about Charlie Kirk’s assassination, but also because of poor ratings, declining revenue for ABC, and refusal to apologize. They dispute claims that it was “cancel culture,” instead framing it as a business decision…
…
continue reading

1
Wavell Reviews: Euclid's Army by William F. Owen
4:49
4:49
Play later
Play later
Lists
Like
Liked
4:49Modern military debate often gets lost in technology, jargon, and expensive promises about the "next war." In Euclid's Army: Preparing Land Forces for Warfare Today, William F. Owen cuts through the fog with a sharp and uncompromising thesis: armies must be simpler, cheaper, and better at the basics. This is not a comfortable read for those investe…
…
continue reading

1
You’re Not Ready to Retire If This Is All You’ve Done
21:24
21:24
Play later
Play later
Lists
Like
Liked
21:24You’ve spent decades building your investment accounts, monitoring the markets, and contributing to your 401(k). That’s great. But here’s the truth: you’re not ready to retire if that’s all you’ve done. Retirement planning isn’t just about your portfolio; it’s about so much more. On today’s episode, we’re diving into all the non-investment decision…
…
continue reading

1
A Conversation With Grant Lee CO-Founder & CEO At Gamma
21:48
21:48
Play later
Play later
Lists
Like
Liked
21:48➡ Upgrade your presentations with Gamma, the best AI presentation maker: https://gamma.app In this conversation, I speak with Grant, co-founder of Gamma, about how their platform is transforming presentations and idea-sharing. Instead of starting with slides, Gamma helps you focus on the story first—then builds the visuals, structure, and delivery …
…
continue reading
SonicWall confirms a breach in its cloud backup platform. Google patches a high-severity zero-day in Chrome. Updates on the Shai-Hulud worm. Chinese phishing emails impersonate the chair of the House China Committee. The UK’s NCA takes the reins of the Five Eyes Law Enforcement Group. RevengeHotels uses AI to deliver VenomRAT to Windows systems. A …
…
continue reading

1
Bonus: Daily Review with Clay and Buck - Sep 18 2025
59:32
59:32
Play later
Play later
Lists
Like
Liked
59:32Meet my friends, Clay Travis and Buck Sexton! If you love Verdict, the Clay Travis and Buck Sexton Show might also be in your audio wheelhouse. Politics, news analysis, and some pop culture and comedy thrown in too. Here’s a sample episode recapping four takeaways. Give the guys a listen and then follow and subscribe wherever you get your podcasts.…
…
continue reading

1
Designing for Harsh Environments & Quantum Cryptography
33:30
33:30
Play later
Play later
Lists
Like
Liked
33:30Send us a text In this episode of Embedded Insiders, Rich and Jeff Baldwin, Director of Engineering at Sealevel Systems, discuss the process of designing systems for harsh environments and how Sealevel’s expertise helps customers get started with safe and reliable solutions. Our next segment is sponsored by Infineon Technologies. Rich Nass is joine…
…
continue reading

1
$124B Data Problem: How Synthetic Data Accelerates AI
45:13
45:13
Play later
Play later
Lists
Like
Liked
45:13When your AI has to make decisions in the real world, the data you don’t have can hurt people. DiffuseDrive CEO Bahlint Pasztor joins IT Visionaries to unpack the $124B data scarcity problem holding back autonomous systems — and how synthetic data (done right) can compress years of data collection into hours. We dig into: why edge cases matter (and…
…
continue reading
Traditional package management systems for JavaScript have faced several inefficiencies related to dependency storage, resolution, and project performance. pnpm is a fast, disk-efficient package manager for JavaScript and TypeScript projects, serving as an alternative to npm and Yarn. Due to its efficiency and reliability, pnpm is increasingly popu…
…
continue reading

1
What Manufacturing Can Teach You About Scaling Enterprise AI
38:29
38:29
Play later
Play later
Lists
Like
Liked
38:29CIO Classified is back! More CIO secrets. More battle-tested IT wisdom. Straight from leading CIOs across a wide range of industries. In this episode, host Ian Faison and co-host Yousuf Khan dive into the deep end of technology leadership in manufacturing. Ben Davis, Executive Vice President of IT at Cambria, joins the show to talk about his sweepi…
…
continue reading

1
BONUS POD: Trump declares Antifa a Terrorist Organization plus Feds Drop Rates & How it Effects You
15:10
15:10
Play later
Play later
Lists
Like
Liked
15:10Part 1: Antifa Designation Announcement: Former President Donald Trump declared Antifa a major terrorist organization. Context: The declaration followed the reported assassination of conservative activist Charlie Kirk, which Trump and allies framed as evidence of left-wing extremism. Key Points: Antifa is described as a loosely affiliated ideology,…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and…
…
continue reading

1
574 | Nancy Scola: The Anti-Monopoly Summit, Abundance 2025, & National Conservatism - What D.C.’s Conference Season Really Revealed
1:09:11
1:09:11
Play later
Play later
Lists
Like
Liked
1:09:11Realignment Newsletter: https://therealignment.substack.com/ Realignment Bookshop: https://bookshop.org/shop/therealignment Email the Show: [email protected] Nancy Scola, reporter and journalist focused on the battle of ideas in Washington, returns to The Realignment. Marshall and Nancy discuss the three big ideas-focused conferences in DC i…
…
continue reading
A new self-replicating malware infects the NPM repository. Microsoft and Cloudflare disrupt a Phishing-as-a-Service platform. Researchers uncover a new Fancy Bear backdoor campaign. The VoidProxy phishing-as-a-service (PhaaS) platform targets Microsoft 365 and Google accounts. A British telecom says its ransomware recovery may stretch into November…
…
continue reading

1
CNN Insists "Who can tell the Motive?" of Charlie Kirk's Murderer plus "Loving" Texts between the Murderer & His Boyfriend
38:15
38:15
Play later
Play later
Lists
Like
Liked
38:15CNN Debate (WATCH): Cruz defends his decision to appear on CNN, criticizing Collins for interrupting and for what he portrays as partisan framing. He argues against the idea that political violence is equally present on both sides of the spectrum. Media Narratives: The podcast accuses outlets like CNN, MSNBC, and ABC of dishonesty, especially in th…
…
continue reading
Introduction This year marked the 80th anniversary of the atomic bombing of Hiroshima and Nagasaki. Since then, the non-use of nuclear weapons has remained the single most significant phenomenon of the nuclear age. Central to any discussion of global nuclear politics is the term nuclear taboo, which refers to a de facto prohibition against the firs…
…
continue reading

1
SE Radio 686: François Daoust on W3C
1:02:36
1:02:36
Play later
Play later
Lists
Like
Liked
1:02:36François Daoust, W3C staff member and co-chair of the Web Developer Experience Community Group, discusses the origins of the W3C, the browser standardization process, and how it relates to other organizations like TC39, WHATWG, and IETF. This episode covers a lot of ground, including funding through memberships, royalty-free patent access for imple…
…
continue reading
A controversial Trump administration deal gives the U.A.E. access to cutting-edge U.S. AI chips. FlowiseAI warns of a critical account takeover vulnerability. A new social engineering campaign impersonates Meta account suspension notices. A macOS Spotlight 0-day flaw bypasses Apple’s Transparency, Consent, and Control (TCC) protections. Are cost sa…
…
continue reading

1
Bonus: Daily Review with Clay and Buck - Sep 16 2025
51:19
51:19
Play later
Play later
Lists
Like
Liked
51:19Meet my friends, Clay Travis and Buck Sexton! If you love Verdict, the Clay Travis and Buck Sexton Show might also be in your audio wheelhouse. Politics, news analysis, and some pop culture and comedy thrown in too. Here’s a sample episode recapping four Tuesday takeaways. Give the guys a listen and then follow and subscribe wherever you get your p…
…
continue reading

1
The Benefits of Rust Adoption for Mission-and-Safety-Critical Systems
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38A recent Google survey found that many developers felt comfortable using the Rust programming language in two months or less. Yet barriers to Rust adoption remain, particularly in safety-critical systems, where features such as memory and processing power are in short supply and compliance with regulations is mandatory. In our latest podcast from t…
…
continue reading

1
Retrieval-Augmented Generation With Bob Remeika From Ragie
36:45
36:45
Play later
Play later
Lists
Like
Liked
36:45Episode Summary Bob Remeika, CEO and Co-Founder of Ragie, joins host Danny Allan to demystify Retrieval-Augmented Generation (RAG) and its role in building secure, powerful AI applications. They explore the nuances of RAG, differentiating it from fine-tuning, and discuss how it handles diverse data types while mitigating performance challenges. The…
…
continue reading

1
Small Businesses Are Prime Targets, But There Are Ways to Fight Back
27:09
27:09
Play later
Play later
Lists
Like
Liked
27:09Send us a text "We're too small to be hacked" might be the most dangerous myth in small business cybersecurity today. As James Baierle, founder of SecurePoint Solutions, asks with a touch of irony – how exactly do you let the bad guys know to leave you alone? The hard truth is you can't, and that's why specialized security services for small busine…
…
continue reading

1
How cyber warfare really works with Hayley Benedict | DISRUPT CONFLICT RISK SYSTEM
1:09:41
1:09:41
Play later
Play later
Lists
Like
Liked
1:09:41What does cyberwarfare really look like behind the headlines? This week, Roo sits down with Hayley Benedict, a cyber intelligence analyst at RANE, to explore the evolving world of digital conflict. From hacktivists to disinformation specialists, Hayley shares how nation states, criminals, and ideologically driven groups are blurring lines — and why…
…
continue reading

1
Breaking Down the Human Side of Advanced Cyber Attacks and Social Engineering with Margaret Cunningham
29:11
29:11
Play later
Play later
Lists
Like
Liked
29:11Welcome back to To the Point Cybersecurity Podcast! In this week’s episode, hosts Rachael Lyon and Jonathan Knepher are joined by the brilliant Dr. Margaret Cunningham, Technical Director for Security and AI Strategy at Darktrace. With a PhD in Applied Experimental Psychology and multiple patents to her name, Dr. Cunningham is a leading voice in hu…
…
continue reading

1
SurrealDB 3.0 and Building Event-Driven AI Applications with Tobie Morgan Hitchcock
55:18
55:18
Play later
Play later
Lists
Like
Liked
55:18Modern application development often involves juggling multiple types of databases to handle diverse data models. The lack of unification can lead to complex architectures with attendant security concerns and fragmented development workflows. SurrealDB is an open-source, multi-model database developed in Rust and integrates functionalities of many …
…
continue reading

1
BONUS POD: 'No One Said Anything' as Warning Signs Emerge Online from Charlie Kirk's Investigation
12:48
12:48
Play later
Play later
Lists
Like
Liked
12:48Warning Signs Ignored: The suspect allegedly showed multiple warning signs before the shooting, including becoming more political, distancing himself from coworkers during political discussions, and openly expressing intentions to harm Charlie Kirk. Friends, family, and even coworkers reportedly noticed this but may not have taken it seriously. The…
…
continue reading

1
573 | Danielle Lee Tomson: The Story & Authenticity Gap - Why the Center-Left Keeps Losing the Plot
1:20:28
1:20:28
Play later
Play later
Lists
Like
Liked
1:20:28Failure to Communicate Substack: https://failuretocommunicate.substack.com/ Danielle Lee Tomson: https://failuretocommunicate.substack.com/p/beyond-messaging Danielle Lee Tomson: https://failuretocommunicate.substack.com/p/the-authenticity-gap Realignment Newsletter: https://therealignment.substack.com/ Realignment Bookshop: https://bookshop.org/sh…
…
continue reading
Please enjoy this encore of Word Notes. A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: http…
…
continue reading

1
The return of CISO Perspectives. [CISO Perspectives]
3:21
3:21
Play later
Play later
Lists
Like
Liked
3:21This season on CISO Perspectives—your host, Kim Jones is digging into the issues shaping the future of cybersecurity leadership. From the regulations every CISO needs to understand, to the unexpected places privacy risks are emerging, to the new ways fraud and identity are colliding—these conversations will sharpen your strategies and strengthen yo…
…
continue reading

1
Episode 123: Himadri Majumdar on Scaling Quantum with Spin Qubits
39:13
39:13
Play later
Play later
Lists
Like
Liked
39:13In Episode 123 of Entangled Things, Patrick and Ciprian talk with Himadri Majumdar, Co-Founder and CEO of SemiQon, about scaling quantum with silicon spin qubits. Himadri shares how SemiQon is bridging research and industry, supporting academia, and advancing cryo-CMOS-compatible processors. The discussion covers the advantages of spin qubits (scal…
…
continue reading
FBI botnet disruption leaves cybercriminals scrambling to pick up the pieces. Notorious ransomware gangs announce their retirement, but don’t hold your breath. Hacktivists leak data tied to China’s Great Firewall. A new report says DHS mishandled a key program designed to retain cyber talent at CISA. GPUGate malware cleverly evades analysis. WhiteC…
…
continue reading
This week on Azure Friday, Scott Hanselman meets with Vamshi Kommineni and Eitan Bremler to explore and demo how Microsoft is helping organizations protect cloud storage data at the core of their applications—by embedding intelligent, built-in posture management, threat protection, and malware scanning directly into Azure Blob Storage through its d…
…
continue reading