Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Engineers Podcasts

show episodes
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
The Engineers Collective

New Civil Engineer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
News and interviews covering all corners of infrastructure, from rail to roads to energy to tunnels and much more, with guests from all around the wide world of civil engineering chatting with NCE news editor Rob Hakimian and the rest of the NCE team
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
Artwork

1
The Future of Everything

Stanford Engineering

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Host Russ Altman, a professor of bioengineering, genetics, and medicine at Stanford, is your guide to the latest science and engineering breakthroughs. Join Russ and his guests as they explore cutting-edge advances that are shaping the future of everything from AI to health and renewable energy. Along the way, “The Future of Everything” delves into ethical implications to give listeners a well-rounded understanding of how new technologies and discoveries will impact society. Whether you’re a ...
  continue reading
 
Artwork

1
Verdict with Ted Cruz

Premiere Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Join Senator Ted Cruz and co-host Ben Ferguson as they break down the most important news stories of the day and reveal what they mean for you. On "Verdict with Ted Cruz,” you will go behind the scenes of the political debates that define our country. "Verdict with Ted Cruz" is being brought to you by Jobs, Freedom, and Security PAC, a political action committee dedicated to supporting conservative causes, organizations, and candidates across the country. In 2022, Jobs, Freedom, and Security ...
  continue reading
 
Artwork

1
Cyber Work

Infosec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Artwork

1
The Amp Hour

David L. Jones and Chris Gammell

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
An off-the-cuff radio show and podcast for electronics enthusiasts and professionals. Note: this is the "show only" version of the feed. To see the show notes, check out the main podcast feed: https://theamphour.com/feed/
  continue reading
 
Artwork

1
Big Ideas Lab

Mission.org

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Your exploration inside Lawrence Livermore National Laboratory. Hear untold stories, meet boundary-pushing pioneers and get unparalleled access to groundbreaking science and technology. From national security challenges to computing revolutions, discover the innovations that are shaping tomorrow, today.
  continue reading
 
Artwork

1
Embedded Insiders

Embedded Computing Design

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Assistant Managing Editor, and Ken Briodagh, Editor-in-Chief of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology m ...
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Artwork
 
Tech Takes podcast knows what matters to you. Thought-provoking interviews with industry leaders, government officials, academia and influencers on hot topics relevant to the engineering and applied science profession and the technologies that shape the world around us.
  continue reading
 
Artwork

1
Book Overflow

Carter Morgan and Nathan Toups

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
In a world of short-form content, it's important to engage with long-form ideas. Book Overflow is a podcast created for software engineers, by software engineers to discuss the best technical books in the world. Join co-hosts Carter Morgan and Nathan Toups each week as they discuss a new technical book! New episodes every Monday!
  continue reading
 
Artwork

1
Grumpy Old Geeks

Jason DeFillippo & Brian Schulmeister with Dave Bittner

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
  continue reading
 
Artwork

301
Foreign Policy Live

Foreign Policy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
  continue reading
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
  continue reading
 
Artwork

1
The Realignment

The Realignment

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The United States is in the midst of a dramatic political realignment with shifting views on national security, economics, technology, and the role of government in our lives. Saagar Enjeti and Marshall Kosloff explore this with thinkers, policymakers, and more.
  continue reading
 
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
  continue reading
 
Artwork

1
Cables2Clouds

Cables2Clouds

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
  continue reading
 
Discover the people, ideas, and technological breakthroughs that are shaping the next iteration of human co-experience. Featuring a diverse cross-section of guest speakers from Roblox’s product and engineering teams, we’ll discuss how we got to where we are today, the road ahead, and the lessons we’ve learned along the way. Hosted by David Baszucki, founder and CEO of Roblox.
  continue reading
 
Artwork

51
Platform Engineering Podcast

Cory O'Daniel, CEO of Massdriver

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Platform Engineering Podcast is a show about the real work of building and running internal platforms — hosted by Cory O’Daniel, longtime infrastructure and software engineer, and CEO/cofounder of Massdriver. Each episode features candid conversations with the engineers, leads, and builders shaping platform engineering today. Topics range from org structure and team ownership to infrastructure design, developer experience, and the tradeoffs behind every “it depends.” Cory brings two deca ...
  continue reading
 
Software engineers, architects and team leads have found inspiration to drive change and innovation in their team by listening to the weekly InfoQ Podcast. They have received essential information that helped them validate their software development map. We have achieved that by interviewing some of the top CTOs, engineers and technology directors from companies like Uber, Netflix and more. Over 1,200,000 downloads in the last 3 years.
  continue reading
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Join us as we discuss news and current events, trends, and controversies in the world of cybersecurity. We have strong feelings and they're not limited to FedRAMP, CMMC, FISMA, IRAP, security engineering, or documentation. Anything goes -- some of the things we say are probably even helpful! Interested in having words? Email us at [email protected].
  continue reading
 
Building AI: Securing the Future of Artificial Intelligence is the podcast for leaders navigating the security challenges of modern AI infrastructure. Host David Yacov speaks with CISOs, security engineers, and enterprise leaders building secure AI systems, from privacy-preserving synthetic data and MLOps security to AI governance, regulatory compliance, and infrastructure risk management. If you're securing AI infrastructure, managing AI compliance, or building trustworthy AI systems, this ...
  continue reading
 
Artwork

1
Heavy Wireless

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Heavy Wireless is a deep dive into Wi-Fi, IoT, wireless security, and more. Host Keith Parsons, CWNE#3, draws on his decades of experience to educate, entertain, and inspire those working in the WLAN industry. Each twice-monthly episode explores an aspect of wireless technology with guests including Wi-Fi engineers, industry experts, and vendors. Whether you're already a WLAN specialist or looking to expand your skills in this high-demand sector of IT, Heavy Wireless gives you the technical ...
  continue reading
 
A podcast for Architects and Engineers who want to thrive in this industry by creating more freedom, fulfillment and financial security. Join Scott Zurn, P.E. and guests in uncovering how to restore value and honor to the unique people who choose to be designers and caretakers of our built world and why it’s essential to the future of our society, our industry, and our planet.
  continue reading
 
Loading …
show series
 
"If we were building Box today, what would we do?” Ben Kus (CTO @ Box) deconstructs their playbook for enterprise AI innovation. We cover their journey to reimagine & reorient the company to a new technical vision, how they run a “multi-speed” org that balances startup agility and & enterprise-grade stability, and their “platform first” approach to…
  continue reading
 
In Episode 7 of Simply Social Engineering, Eddie Miro talks with ChatGPT, an AI language model. They explore the human element in AI, social engineering tactics, the psychology of influence, and practical ways to defend against emerging threats like deepfakes and AI-powered phishing. They also discuss non-judgmental validation, identity verificatio…
  continue reading
 
In July 2025, Allianz Life Insurance Company of North America confirmed a data breach impacting over 1.1 million customers, financial professionals, and employees—a stark reminder of how vulnerable even the most established financial institutions remain to evolving cyber threats. The breach stemmed from a third-party vendor compromise, specifically…
  continue reading
 
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Jowan Joseph. Chris and Jowan discuss the importance of effective communication, role adaptation, and the psychological aspects of crisis situations. The discussion emphasizes the need for proactive preparedness and building trust within teams to navigate challe…
  continue reading
 
Luke Hinds, CTO of Stacklok and creator of Sigstore, speaks with SE Radio's Brijesh Ammanath about the privacy and security concerns of using AI coding agents. They discuss how the increased use of AI coding assistants has improved programmer productivity but has also introduced certain key risks. In the area of secrets management, for example, the…
  continue reading
 
The latest episode of the Engineers Collective is out now: listen in on Spotify, Apple Podcasts, your usual platform or the player below. In this month’s episode we discuss the UK’s long-term plan for a vast underground storage facility for nuclear waste – known as a geological disposal facility (GDF) – with Nuclear Waste Services (NWS). NWS chief …
  continue reading
 
This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are ma…
  continue reading
 
Interesting Technique to Launch a Shellcode Xavier came across malware that PowerShell and the CallWindowProcA() API to launch code. https://isc.sans.edu/diary/Interesting%20Technique%20to%20Launch%20a%20Shellcode/32238 NX Compromised to Steal Wallets and Credentials The popular open source NX build package was compromised. Code was added that uses…
  continue reading
 
A new and highly sophisticated cyber espionage campaign attributed to Silk Typhoon—also known as Mustang Panda, TEMP.Hex, or UNC6384—has been uncovered, targeting diplomats and government entities across Southeast Asia. Researchers from Google’s Threat Intelligence Group (GTIG) revealed that the attackers deployed Adversary-in-the-Middle (AitM) tec…
  continue reading
 
The fight over encryption has entered a new phase. The Federal Trade Commission (FTC), led by Chairman Andrew Ferguson, has issued a strong warning to major U.S. technology companies: resist foreign government demands to weaken encryption. At stake is nothing less than the security of millions of Americans’ private communications, financial data, a…
  continue reading
 
Artie Shevchenko, author of Code Health Guardian, speaks with host Jeff Doolittle about the crucial role of human programmers in the AI era, emphasizing that humans must excel at managing code complexity. Shevchenko discusses these concepts and key takeaways from his book, including the three problems caused by complexity: change amplification, cog…
  continue reading
 
Researchers have uncovered a new form of indirect prompt injection that leverages a simple but powerful trick: image scaling. This novel attack involves hiding malicious instructions inside high-resolution images, invisible to the human eye. When AI systems automatically downscale these images during preprocessing, the hidden prompt becomes visible…
  continue reading
 
In Episode 8 of Simply Social Engineering, Eddie Miro talks with Wade Wells about the growing threat of “labor laundering” — where North Korean IT workers and other threat actors infiltrate remote jobs to funnel money, gain access, and bypass sanctions. Tune in to hear how these operations are carried out, the social engineering tactics used to gai…
  continue reading
 
The healthcare sector has been rocked yet again by a massive cybersecurity incident. Healthcare Services Group (HCSG), a provider of dining and laundry services to healthcare facilities, disclosed a data breach that compromised the personal information of over 624,000 individuals. Between late September and early October 2024, hackers gained unauth…
  continue reading
 
French retail giant Auchan has confirmed a massive data breach that compromised the personal details of hundreds of thousands of customers. The stolen data includes names, addresses, phone numbers, email addresses, and loyalty card numbers—though banking details, passwords, and PINs were reportedly not affected. Despite this, the breach is serious …
  continue reading
 
Send us a text What happens when three major cloud providers each reimagine network design from scratch? You get three completely different approaches to solving the same fundamental problem. The foundation of cloud networking begins with the virtual containers that hold your resources: AWS's Virtual Private Clouds (VPCs), Azure's Virtual Networks …
  continue reading
 
Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
  continue reading
 
Cruz’s Visit to El Salvador Cruz is in El Salvador meeting with President Nayib Bukele, government officials, U.S. military, and embassy staff. He describes dramatic changes in safety under Bukele’s leadership—highlighting the crackdown on gangs, mass arrests of MS-13 members, and construction of a mega-prison. Cruz emphasizes the murder rate dropp…
  continue reading
 
Getting a Better Handle on International Domain Names and Punycode International Domain names can be used for phishing and other attacks. One way to identify suspect names is to look for mixed script use. https://isc.sans.edu/diary/Getting%20a%20Better%20Handle%20on%20International%20Domain%20Names%20and%20Punycode/32234 Citrix Netscaler Vulnerabil…
  continue reading
 
A critical vulnerability in Docker Desktop, CVE-2025-9074, has shaken the container security world. Scoring 9.3 on the CVSS scale, this flaw exposed an unauthenticated Docker Engine API (192.168.65.7:2375) to any container running on Windows and macOS. With nothing more than a few HTTP requests—or even three lines of Python code—attackers could esc…
  continue reading
 
The Arch Linux community has just endured more than a week of turbulence as a massive distributed denial-of-service (DDoS) attack disrupted its most critical services, including the main website, the Arch User Repository (AUR), and community forums. Beginning in mid-August 2025, the sustained volumetric and protocol-level assault overwhelmed hostin…
  continue reading
 
Meet my friends, Clay Travis and Buck Sexton! If you love Verdict, the Clay Travis and Buck Sexton Show might also be in your audio wheelhouse. Politics, news analysis, and some pop culture and comedy thrown in too. Here’s a sample episode recapping four takeaways. Give the guys a listen and then follow and subscribe wherever you get your podcasts.…
  continue reading
 
Cyberattacks against supply chains are no longer isolated disruptions—they are systemic threats with the power to cascade across industries and nations. The recent ransomware attack on Data I/O, a chip programming firm whose customers include global giants like Apple, Microsoft, Amazon, and Bosch, demonstrates how one breach can disrupt manufacturi…
  continue reading
 
The U.S. healthcare sector continues to face relentless cyberattacks, and rural hospitals are increasingly at the center of this crisis. The recent Aspire Rural Health System breach in Michigan—attributed to the BianLian ransomware group—exposed the personal and medical data of nearly 140,000 patients and staff. From Social Security numbers and fin…
  continue reading
 
Send us a text What does it take to build an online community of 50,000 cybersecurity professionals? Jerry Bell, founder of InfoSec Exchange and former CISO for IBM Cloud, reveals the journey behind creating one of the most influential Mastodon servers in the security world. When Twitter underwent significant changes in 2022, Bell's Fediverse serve…
  continue reading
 
Artificial Intelligence (AI) models are shaping the future of industries from healthcare and finance to autonomous vehicles and national infrastructure. But with this rise comes a hidden battlefield: adversarial attacks designed to manipulate AI systems in subtle yet devastating ways. One of the most alarming threats is the OneFlip attack, a method…
  continue reading
 
Supernovas, asteroids, dark matter, and dark energy… the universe is constantly changing. Today we’ll dive into how we track what’s shifting in the night sky and how it shapes our understanding of The Universe. Through decades of experience in astrophysics, planetary science, and instrumentation, we explore Lawrence Livermore National Laboratory’s …
  continue reading
 
A key challenge with designing AI agents is that large language models are stateless and have limited context windows. This requires careful engineering to maintain continuity and reliability across sequential LLM interactions. To perform well, agents need fast systems for storing and retrieving short-term conversations, summaries, and long-term fa…
  continue reading
 
The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
  continue reading
 
House GOP Probe House Republicans, led by Oversight Committee Chair James Comer, launched an investigation into alleged manipulation of Washington, D.C. crime data. Allegations claim Metropolitan Police Department (MPD) officials intentionally downgraded charges to make crime statistics appear lower. A whistleblower with knowledge of MPD operations…
  continue reading
 
Realignment Newsletter: https://therealignment.substack.com/ Realignment Bookshop: https://bookshop.org/shop/therealignment Email the Show: [email protected] Dan Wang, Research Fellow at Stanford University's Hoover History Lab and author of Breakneck: China's Quest to Engineer the Future, joins The Realignment. Marshall and Dan discuss Chin…
  continue reading
 
Please enjoy this encore of Word Notes. A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/waterfall-software-development⁠ Audio reference link: “⁠Creating Video Games - Agile Software Development,⁠” by Sara Verr…
  continue reading
 
Reading Location Position Value in Microsoft Word Documents Jessy investigated how Word documents store the last visited document location in the registry. https://isc.sans.edu/diary/Reading%20Location%20Position%20Value%20in%20Microsoft%20Word%20Documents/32224 Weaponizing image scaling against production AI systems AI systems often downscale imag…
  continue reading
 
The United States and China are constantly looking for a leg up in their rivalry for geopolitical primacy. But what if the real advantage lies in adopting a bit of the other’s culture? A new book makes the case that while China has become an engineering state obsessed with building, the United States has become a lawyerly society focused on procedu…
  continue reading
 
Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Bobby Knost. Bobby is a proud memb…
  continue reading
 
Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
  continue reading
 
What happens when your next hire isn't who they claim to be? In this eye-opening episode of The Audit, we dive deep into the alarming world of AI-powered hiring fraud with Justin Marciano and Paul Vann from Validia. From North Korean operatives using deepfakes to infiltrate Fortune 500 companies to proxy interviews becoming the new normal, this con…
  continue reading
 
Andrew Lamb, a veteran of database engine development, shares his thoughts on why Rust is the right tool for developing low-latency systems, not only from the perspective of the code’s performance, but also looking at productivity and developer joy. He discusses the overall experience of adopting Rust after a decade of programming in C/C++.Read a t…
  continue reading
 
1. Dunking on Gavin Newsom Ted Cruz responds to a tweet by Newsom blaming Trump for rising electricity prices. Cruz uses AI (Grok) to highlight that the states with the highest electricity rates are Democrat-led with strong renewable energy mandates. He argues that liberal policies, not Trump, are responsible for high energy costs. The discussion i…
  continue reading
 
The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were zero padded , an unfortunate choice. As of this week, datafeeds should no longer be zero padded . https://isc.sans.edu/diary/The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data./32228 .d…
  continue reading
 
1. Recognition of Somaliland The senator discusses efforts to urge President Trump to formally recognize Somaliland as an independent nation. Somaliland is portrayed as a stable, democratic ally of the U.S., strategically located near the Gulf of Aden. The senator criticizes China's influence in Africa, particularly its opposition to Somaliland's t…
  continue reading
 
Remember all that "AI is gonna change everything" nonsense the kids were screaming about just a few months ago? Yeah, about that. It turns out 95% of corporate generative AI pilots are, to use a technical term, completely shitting the bed, according to a report from MIT. This shocking revelation has sent Wall Street into a tizzy, wiping trillions o…
  continue reading
 
Humans wiped out by 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Philip K. Dick, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-505
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play