Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Security Management Podcasts
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Welcome to Church Security Talk – your go-to resource for church safety and security. Join host Simon Osamoh, an ex-UK detective, former head of counterterrorism at Mall of America, Minnesota and church security expert. As he shares tips and tool to help your church stay safe and secure! Stay protected and informed with our online training courses visit worshipsecurity.org.
…
continue reading
Modern CTO is the #1 place where technology leaders and CTOs hang out. We live to bring tech leaders value. Listen in on our fun, intelligent and engaging podcast. We hang out with interesting and popular CTOs in Aerospace, Artificial Intelligence, Robotics + Many more industries. All of this, right here, right now, on the Modern CTO Podcast. What do you think of the show? Let us know here!
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Federal News Network Executive Editor Jason Miller talks to federal chief information officers about the latest technology trends and issues facing their agencies.
…
continue reading
The BUILDINGS Podcast presents the latest developments and practices in facility management from energy management, lowering operating costs, maintenance of commercial buildings, life and safety, sustainability, green issues, project management, security, building performance and much more. Find more facility management news at www.buildings.com Send any comments or questions to [email protected] Support this podcast: https://podcasters.spotify.com/pod/show/buildings-podcast/support
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
Jake Voll brings security industry professionals together to discuss best practices, challenges, and opportunities.
…
continue reading
discussions on topics connected with software development; privacy, security, management, tools, techniques, skills, training, business, soft skills, health
…
continue reading
The United States is in the midst of a dramatic political realignment with shifting views on national security, economics, technology, and the role of government in our lives. Saagar Enjeti and Marshall Kosloff explore this with thinkers, policymakers, and more.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Thuis aan de keukentafel praat Roel Rens met Microsoft- en IT-experts over actuele IT-topics.
…
continue reading

1
Your Time Management Revolution - productivity tips from The Inefficiency Assassin, Helene Segura
Helene Segura, MA Ed, CPO
Time management consultant Helene Segura brings you a variety of recommendations on the mindset, strategies and tactics successful people implement for effective time management and productivity. Some episodes are solo musings, only 2-5 minutes in length. Other episodes are interviews that can last 30 minutes to an hour. Note to podcast aficionados: This is not a templated show, so there’s no set format. These are recordings of thoughts, recommendations and interviews – all designed to help ...
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Join County National Bank's Senior Wealth Management Officers Christopher Phillips and Holleigh Baker as they explore the true meaning behind the question "What is Wealth?" From discussions with various guests, they delve into how wealth is not just about financial abundance but also about security, flexibility, and values discovered through personal stories and insights. Join them as they uncover the diverse perspectives on what wealth truly means in today's world and how these insights sha ...
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading

1
Cybersecurity, Privacy, Risk Management, Cryptocurrencies, Fintech, Information Technology
Shahid Sharif
Career guidance & consulting services in Information Technology, Cybersecurity, Privacy, Risk Management, Cryptocurrencies, & Fintech #self improvement # productivity #cybersecurity #security #privacy #risk #fintech #blockchain #cryptocurrencies
…
continue reading
Helping people build practical emergency preparedness, situational awareness, and survival skills—so they can confidently protect their families and thrive in any crisis.
…
continue reading
The Bare Metal Cyber CISM Prepcast is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series offers ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Tech Disruptors by Bloomberg Intelligence features conversations with thought leaders and management teams on disruptive trends. Topics covered in this series include cloud, e-commerce, cybersecurity, AI, 5G, streaming, advertising, EVs, automation, crypto, fintech, AR/VR, metaverse and Web 3.0. This podcast is intended for professional investors only. It is being prepared solely for informational purposes only and does not constitute an offer or investment advice.
…
continue reading
The Bare Metal Cyber CCISO Prepcast is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO 270 ...
…
continue reading
Ken Tumolo and his son Nick Tumolo join you on the Tumolo Financial Radio to offer solutions and strategies for your retirement needs. With decades of financial experience, Ken and Nick offer tax recommendations, Social Security maximization, wealth management, retirement income planning and much more.
…
continue reading
Produced by Products That Count, a 501(c)3 nonprofit that helps everyone build great products, this podcast is an award-winning show by and for product minds, with millions of downloads and a 5-star rating on most major platforms. Each of the 300+ episodes features a product leader interviewing another product leader and exploring what it takes to build great products. Recent ones feature the Chief Product Officers of Brex, Glassdoor, Experian and more. About Us: Products that Count is a 501 ...
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
We’ve been doing Software Development and Architecture work for a while at Snowpal, and currently have several B2B and B2C products in production. In this podcast, we’ll share our experiences on a regular basis to help you & your teams build great software. The topics covered in this podcast will include Product Management, Project Management, Architecture, Development, Deployment, Security, Release Management, Sales, Marketing, Advertising, and just about everything else an ambitious, fast ...
…
continue reading
Viral wisdom bytes that elevate and prioritize conscious leadership, humanity, learning and purpose.
…
continue reading

1
Episode 65: Security Budgeting Essentials: Managing and Adjusting Budgets
11:56
11:56
Play later
Play later
Lists
Like
Liked
11:56Security budgeting doesn’t end once funding is approved—CISOs must continuously manage, adjust, and defend their budgets in the face of shifting priorities and evolving threats. In this episode, we explore the fundamentals of dynamic budget management, including tracking expenditures, reallocating resources, and responding to unexpected events such…
…
continue reading

1
Episode 68: Managing and Monitoring Security Compliance with External Parties
10:42
10:42
Play later
Play later
Lists
Like
Liked
10:42Vendors, suppliers, and partners all affect your risk posture. This episode explores how to define, enforce, and monitor external security requirements. You’ll learn how to handle audits, compliance failures, and communication with third parties—real-world skills with high relevance on the CISM exam. Ready to start your journey with confidence? Lea…
…
continue reading

1
NASDAQ’s Spring Rally: A 3.5-Month Climb Through Volatility and AI Hype
26:37
26:37
Play later
Play later
Lists
Like
Liked
26:37In this podcast, Krish Palaniappan discusses the recent performance of the NASDAQ, analyzing market trends, volatility, and the impact of AI on trading. He provides insights into historical comparisons, daily fluctuations, and potential investment opportunities, while also addressing the current market sentiment and future predictions.…
…
continue reading

1
Existential Dread, MCP, Cloudflare, ESXI, QR Codes, Salt Typhoon, Aaran Leyland... - SWN #495
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42Existential Dread and Seawater, MCP, Cloudflare, ESxi, QR Codes, Salt Typhoon, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-495
…
continue reading

1
030 - Info Stealers, GrapheneOS Drama, and Why Video Games and Anti-Virus Are Spyware
52:42
52:42
Play later
Play later
Lists
Like
Liked
52:42In this episode, I address listener feedback and corrections regarding use of public Wi-Fi, MAC addresses, and aliases. I dive deep into the nuances of MAC address randomization on GrapheneOS versus Apple’s private Wi-Fi addresses, explaining why GrapheneOS offers superior privacy protection. I discuss the real threats of public Wi-Fi in 2025 (hint…
…
continue reading

1
Scaling Laws: Eugene Volokh on Libel and AI
59:17
59:17
Play later
Play later
Lists
Like
Liked
59:17In this Scaling Laws Academy "class," Kevin Frazier, the AI Innovation and Law Fellow at Texas Law and a Senior Editor at Lawfare, speaks with Eugene Volokh, a Senior Fellow at the Hoover Institution and long-time professor of law at UCLA, on libel in the AI context. The two dive into Volokh's paper, “Large Libel Models? Liability for AI Output.” E…
…
continue reading

1
Reddit Product Lead on Driving the Future of AI Search and Health Tech
39:24
39:24
Play later
Play later
Lists
Like
Liked
39:24How can product managers shape the future of digital technology (for the better)? In this podcast hosted by Nacho Andrade, Reddit Product Lead Rachel Miller shares how she’s leveraged her experience scaling Reddit Search and AI products to build impactful digital tools for millions of users and expand into new markets. She shares insights on using …
…
continue reading

1
SANS Stormcast Friday, July 18th, 2025: Extended File Attributes; Critical Cisco ISE Patch; VMWare Patches; Quarterly Oracle Patches
4:55
4:55
Play later
Play later
Lists
Like
Liked
4:55Hiding Payloads in Linux Extended File Attributes Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick, and he presents some scripts to either hide data or find hidden data. https://isc.sans.edu/diary/Hiding%20Payloads%20in%20Linux%20Ex…
…
continue reading
In the security news: The train is leaving the station, or is it? The hypervisor will protect you, maybe The best thing about Flippers are the clones Also, the Flipper Zero as an interrogation tool Threats are commercial and open-source Who is still down with FTP? AI bug hunters Firmware for Russian drones Merging Android and ChromOS Protecting you…
…
continue reading
In the security news: The train is leaving the station, or is it? The hypervisor will protect you, maybe The best thing about Flippers are the clones Also, the Flipper Zero as an interrogation tool Threats are commercial and open-source Who is still down with FTP? AI bug hunters Firmware for Russian drones Merging Android and ChromOS Protecting you…
…
continue reading
In the security news: The train is leaving the station, or is it? The hypervisor will protect you, maybe The best thing about Flippers are the clones Also, the Flipper Zero as an interrogation tool Threats are commercial and open-source Who is still down with FTP? AI bug hunters Firmware for Russian drones Merging Android and ChromOS Protecting you…
…
continue reading

1
ep. 90 When Seconds Count: Lessons from the Richmond Road Baptist Church Shooting
18:59
18:59
Play later
Play later
Lists
Like
Liked
18:59Could your church stop a gunman if he walked through the doors today? It happened again, this time in Kentucky. Just 24 hours after a tragic church shooting, we break down the chain of events, the signs that were missed, and the hard truths about church security. Simon walks you through the timeline, key warning signs, and most importantly, what yo…
…
continue reading

1
Roblox CEO Baszucki on AI, 3D, Stable Coins
37:36
37:36
Play later
Play later
Lists
Like
Liked
37:36Roblox CEO Dave Baszucki said an immersive 3D co-experience is going to form the future foundation for how people communicate, connect, shop, learn and play together — even how they experience entertainment. Gaming has always been at the forefront of 3D communication. Baszucki joins Bloomberg Intelligence’s head of technology research, Mandeep Sing…
…
continue reading

1
What Are the Cybersecurity Trends We Need To Follow?
24:23
24:23
Play later
Play later
Lists
Like
Liked
24:23All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode, co-hosted by me, David Spark, the producer of CISO Series, and Dan Walsh, CISO, Datavant. Joining them is Sneha Parmar, former information security officer, Lufthansa Group Digital. In this episode: …
…
continue reading

1
Lawfare Daily: The End of USAID, with Nicholas Kristof
37:31
37:31
Play later
Play later
Lists
Like
Liked
37:31Since Jan. 20, 84% of U.S. Agency for International Development grants and contracts have been terminated and 93% of agency staff have been fired. On July 1, the State Department absorbed the remaining staff and grants. On Lawfare Daily, Lawfare Associate Editor for Communications Anna Hickey spoke to New York Times opinion columnist Nicholas Krist…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts share some follow-up, includi…
…
continue reading

1
SANS Stormcast Thursday, July 17th, 2025: catbox.moe abuse; Sonicwall Attacks; Rendering Issues
5:09
5:09
Play later
Play later
Lists
Like
Liked
5:09More Free File Sharing Services Abuse The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused https://isc.sans.edu/diary/More%20Free%20File%20Sharing%20Services%20Abuse/32112 Ongoing SonicWall Secure Mobile Access (SMA) Exploitation…
…
continue reading

1
Jay Beale discusses his K8s class at BlackHat, Kubernetes developments, and mental health
1:48:38
1:48:38
Play later
Play later
Lists
Like
Liked
1:48:38Youtube Video at: https://www.youtube.com/watch?v=yHPvGVfPgjI Jay Beale is a principal security consultant and CEO/CTO for InGuardians. He is the architect of multiple open source projects, including the Peirates attack tool for Kubernetes (in Kali Linux), the Bustakube CTF Kubernetes cluster, and Bastille Linux. Jay created and leads the Kubernete…
…
continue reading

1
7 Cognitive Biases That Destroy Your Situational Awareness
40:24
40:24
Play later
Play later
Lists
Like
Liked
40:24Most people don’t realize how much bias shapes their awareness—until it’s too late. Here’s how to stay sharp, think clearly, and act with purpose. The post 7 Cognitive Biases That Destroy Your Situational Awareness appeared first on Mind4Survival.By Brian Duff
…
continue reading

1
From Cop to CEO: HiveWatch CEO Ryan Schonfeld's Mission to Modernize Security
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49When Ryan Schonfeld began his security career as a D.C. law enforcement officer, he quickly became frustrated with traditional security methods. Tired of operational inefficiencies and determined to close longstanding security gaps, Schonfeld opted to drag the security industry into the modern day. Join host Steve Lasky on this episode of SecurityD…
…
continue reading
------------------------------------------------------------To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of o…
…
continue reading

1
ep. 89 From Tragedy to Preparedness: Why Church Safety Teams Need Legal Protection
47:13
47:13
Play later
Play later
Lists
Like
Liked
47:13What would you do if you had to defend your congregation with force? Join Right to Bear In this eye-opening episode, Simon sits down with the leadership team from Right to Bear, a faith-based legal defense membership for responsible firearm holders. Together, they explore real-life cases, legal misconceptions, and the emotional and financial tolls …
…
continue reading

1
Rational Security: The “Altered State” Edition
1:18:05
1:18:05
Play later
Play later
Lists
Like
Liked
1:18:05This week, Scott sat down with his Lawfare colleagues Benjamin Wittes and Eric Ciaramella to talk through the week’s big national security news stories, including: “With Arms Wide Open.” After years of open skepticism toward Ukraine (and uncharacteristic deference to Russia), it seems President Trump may have turned a page. His rhetoric has grown c…
…
continue reading

1
299 - Lessons learned self-hosting small Docker-based services and utilities
39:02
39:02
Play later
Play later
Lists
Like
Liked
39:02In this week's episode, it's time to share insights and lessons learned from self-hosting stuff at home! We'll talk about the why and the what, and also some stuff that didn't work at all. You'll also hear about how to best service workloads from home, and what sort of equipment is needed. (00:00) - Intro and catching up. (04:04) - Show content sta…
…
continue reading

1
EP 134 From Cartels to Corporates: Meth Labs, Microsoft & Moral Dilemmas with Christopher Macolini DEA Veteran and Security Professional
47:15
47:15
Play later
Play later
Lists
Like
Liked
47:15Send us a text "It wasn’t just about drugs — it was about removing violence from communities. That’s when you knew you were really doing good." – Christopher Macolini BIO Christopher T. Macolini is a recognized expert in investigations and security throughout Latin America, bringing nearly three decades of combined law enforcement and private-secto…
…
continue reading

1
Lawfare Daily: Reparations for Russia's Aggression Against Ukraine with Markiyan Kliuchkovskyi and Patrick Pearsall
1:13:36
1:13:36
Play later
Play later
Lists
Like
Liked
1:13:36Lawfare Legal Fellow Mykhailo Soldatenko and Lawfare Senior Editor Scott R. Anderson sit down with Markiyan Kliuchkovskyi, Executive Director of the Register of Damage for Ukraine at the Council of Europe and a former legal advisor of the Office of the President of Ukraine, and Patrick W. Pearsall, an international arbitration and disputes partner …
…
continue reading

1
Minimize SAP Migration Challenges, Cybersecurity Maturity, and Radical Transparency - Christopher Carter - BSW #404
58:31
58:31
Play later
Play later
Lists
Like
Liked
58:31Are you running SAP? The clock is ticking... Standard maintenance end-of-life is set for the end of 2027. Migration to S/4HANA must be completed by then (or 2030 if you buy into SAP’s special three-year reprieve). While that may appear to be enough time, companies currently working toward an S/4HANA transition are finding the journey challenging, a…
…
continue reading

1
Turning AI from Tactical Point Solutions to Strategic Product Innovations
44:51
44:51
Play later
Play later
Lists
Like
Liked
44:51How can product managers leverage AI to transform complex industries like insurance while maintaining business outcomes and customer trust? In this podcast hosted by Justin Leibow, Genpact Senior Client Partner Vaidilingam Rajmohan and EY Senior Manager Srinath Chandramohan will be speaking on turning AI from tactical point solutions to strategic p…
…
continue reading

1
SANS Stormcast Wednesday, July 16th, 2025: ADS Keystroke Logger; Fake Homebrew; Broadcom Altiris RCE; Malicious Cursor AI Extensions
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45Keylogger Data Stored in an ADS Xavier came across a keystroke logger that stores data in alternate data streams. The data includes keystroke logs as well as clipboard data https://isc.sans.edu/diary/Keylogger%20Data%20Stored%20in%20an%20ADS/32108 Malvertising Homebrew An attacker has been attempting to trick users into installing a malicious versi…
…
continue reading
What's happening with Fabric in 2025? While at Build, Richard chatted with Arun Ulag about the fantastic progress Fabric has made in the past year. Arun discusses expanding the product line beyond analytics to include real-time intelligence and hosting primary data workloads. The goal is to make it incredibly easy to get your organization's "data e…
…
continue reading

1
How Not to Be "That" Indian Immigrant
1:02:26
1:02:26
Play later
Play later
Lists
Like
Liked
1:02:26In this podcast, Krish Palaniappan discusses the importance of civic sense and cultural awareness for Indian immigrants in the U.S. He shares personal observations and guidelines to help individuals assimilate better into American society while maintaining respect for local customs and laws. The conversation covers various aspects of civic behavior…
…
continue reading

1
AI meltdowns, Gigabyte, NCSC, Rowhammer, Gravity Form, Grok, AsyncRat, Josh Marpet... - SWN #494
30:02
30:02
Play later
Play later
Lists
Like
Liked
30:02AI meltdowns, Gigabyte, NCSC, Rowhammer, Gravity Form, Grok, AsyncRat, Josh Marpet and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-494
…
continue reading

1
Scale Out to Scale Up in Broadcom’s AI Network
37:37
37:37
Play later
Play later
Lists
Like
Liked
37:37“AI is a distributed system — and the network is the computer,” says Ram Velaga, senior vice president of Broadcom’s Core Switching Group. In this episode of Tech Disruptors, Velaga joins Bloomberg Intelligence’s Kunjan Sobhani to explain how Ethernet is expanding from scale-out AI networking into the scale-up domain, challenging proprietary soluti…
…
continue reading
Nick Eicken is the founder of CyberAuthority and a seasoned Virtual Chief Information Security Officer (vCISO) with deep roots in both military and civilian cybersecurity leadership. A U.S. Army veteran who built top-secret communication networks as a signal officer, Nick transitioned to the private sector where he’s guided organizations across non…
…
continue reading

1
Windows Kernel & AV/EDR, BSOD Rebrand, Easier 3rd Party Updates
23:26
23:26
Play later
Play later
Lists
Like
Liked
23:26Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates from Microsoft, focusing on security enhancements, the evolution of the blue screen of death, and new options for consumers regarding extended security updates. They also explore a new update orchestration platform aimed at improving the user exper…
…
continue reading

1
Worth Savoring: 1862 Margarita Recipe & Life Enjoyment
1:55
1:55
Play later
Play later
Lists
Like
Liked
1:55http://www.TimeManagementRevolution.com - One of the greatest benefits of improving your time management is gaining more time for the things you truly enjoy. For Helene Segura, Time Management Fixer, that includes savoring a well-made drink—specifically, an 1862 Margarita. In this video, Helene shares the simple, timeless recipe for this classic co…
…
continue reading

1
Getting Started with Security Basics on the Way to Finding a Specialization - ASW #339
1:07:50
1:07:50
Play later
Play later
Lists
Like
Liked
1:07:50What are some appsec basics? There's no monolithic appsec role. Broadly speaking, appsec tends to branch into engineering or compliance paths, each with different areas of focus despite having shared vocabularies and the (hopefully!) shared goal of protecting software, data, and users. The better question is, "What do you want to secure?" We discus…
…
continue reading

1
Lawfare Daily: David Noll on Civil Contempt Against a Defiant Executive
1:11:00
1:11:00
Play later
Play later
Lists
Like
Liked
1:11:00Alan Rozenshtein, Senior Editor and Research Director at Lawfare, sits down with David Noll, a Professor of Law at Rutgers Law School, to discuss his new Lawfare Research Report, “Civil Contempt Against a Defiant Executive.” They talk about the widespread assumption that the judiciary is powerless if the executive branch chooses to defy court order…
…
continue reading

1
561 | Jeff Hauser vs. Paul Williams - Debating What the Abundance Agenda Gets Right and Wrong
1:01:29
1:01:29
Play later
Play later
Lists
Like
Liked
1:01:29Abundance 2025 REALIGNMENT NEWSLETTER: https://therealignment.substack.com/ PURCHASE BOOKS AT OUR BOOKSHOP: https://bookshop.org/shop/therealignment Email Us: [email protected] Jeff Hauser, Paul E. Williams, Marshall Kosloff
…
continue reading

1
From Taxed to Maxed: Why Timing Your Roth Conversion Matters
15:39
15:39
Play later
Play later
Lists
Like
Liked
15:39Roth conversions, Medicare premiums, and legacy planning—oh my. In this episode, Ken and Nick Tumolo break down why tax planning isn’t just a retirement strategy—it’s a multi-generational game plan. From real-life cautionary tales to smart ways to avoid tax traps, Ken and Nick explain how timing, income levels, and even Medicare brackets can make o…
…
continue reading

1
Universal 2nd Factor (U2F) (noun) [Word Notes]
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17Please enjoy this encore of Word Notes. An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange. Cyberwire Glossary link: https://thecyberwire.com/glossary/u2f Audio reference link: “Rise of…
…
continue reading

1
SANS Stormcast Monday, July 14th, 2025: Web Honeypot Log Volume; Browser Extension Malware; RDP Forensics
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10DShield Honeypot Log Volume Increase Within the last few months, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from Jesse s residential honeypot, which has historically seen higher log volumes, but from all of the honeypots that Jesse runs. https://isc.sans.edu/diary/DSh…
…
continue reading

1
Coding with AI: A Take on the Future of Software Development
1:56:34
1:56:34
Play later
Play later
Lists
Like
Liked
1:56:34In this podcast episode, Krish Palaniappan and Mike Rispoli, CTO of Cause of a Kind, discuss the transformative impact of AI on software development. They explore how AI tools have evolved, the balance between human intellect and AI capabilities, and the changing dynamics of development teams. The conversation emphasizes the importance of problem-s…
…
continue reading
In this episode of Coffee Break with Jake, we're joined by Vinny Peone, a former technician turned award-winning marketer and co-founder of Ignite Strategic Partners. Vinny shares his journey from climbing ladders to claiming Sammy Awards for marketing excellence. And he’s not shy about what works and what doesn’t! If you've ever felt like marketin…
…
continue reading

1
5 Ways to Maximize Net Operating Income (NOI): ICYMI
9:29
9:29
Play later
Play later
Lists
Like
Liked
9:29There’s always room for growth, whether your vacancy rates are high or low. But growth can’t always come from rent increases. Explore these 5 ways to attract new tenants and get more use out of existing spaces.By Endeavor Business Media
…
continue reading

1
Security for AI, or AI for Security? With Nick Calver, VP at Palo Alto Networks
45:36
45:36
Play later
Play later
Lists
Like
Liked
45:36Today, we're talking to Nick Calver, VP of Financial Services at Palo Alto Networks. We discuss the state of AI ransomware attacks, what the mindset is to best prepare for them, and how to think about product consolidation in order to best serve your customers. All of this right here, right now, on the Modern CTO Podcast! To learn more about Palo A…
…
continue reading

1
Monzy Merza, How Much AI is Too Much, and the Weekly News - Monzy Merza - ESW #415
1:43:41
1:43:41
Play later
Play later
Lists
Like
Liked
1:43:41Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups build a basic wrapper around existing generative AI services like those offered by OpenAI and Anthropic. As a result, these services are expensive, and don't satisfy many security operations teams' p…
…
continue reading