Find out how technology is reshaping our lives every day and explore the new powers of governments and companies.
…
continue reading
Security Technology Podcasts
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Every weekday our global network of correspondents makes sense of the stories beneath the headlines. We bring you surprising trends and tales from around the world, current affairs, business and finance — as well as science and technology. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Conversations exploring China, technology, and US-China relations. Guests include a wide range of analysts, policymakers, and academics. Hosted by Jordan Schneider. Check out the newsletter at https://www.chinatalk.media/
…
continue reading
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job, there's always something fun to wrap up the show.
…
continue reading
Exploring the bonds shared between people and technology
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We're going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject's benefit or ju ...
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Expert mode marketing technology, AI, and CX insights from top brands and Martech platforms fill every episode, focusing on what leaders need to know to build customer lifetime value and long-term business value. The Agile Brand with Greg Kihlström® features executives and thought leaders from top brands and tech platforms discussing the industry's trends, like AI adoption, first-party data strategies, artificial intelligence in the consumer journey, consumer data privacy, omnichannel custom ...
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Off The Hook a podcast from 2600: The Hacker Quarterly. It discusses the hacker's view of the emerging technology, and the threats posed by an increasingly Orwellian society. Hear updates on security flaws from the hacker perspective, as well as the latest news from within the hacker community. Follow us on Twitter @HackerRadioShow and Mastodon @[email protected]
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
The United States is in the midst of a dramatic political realignment with shifting views on national security, economics, technology, and the role of government in our lives. Saagar Enjeti and Marshall Kosloff explore this with thinkers, policymakers, and more.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
AI, vCons, CPaaS, CCaaS, UCaaS, Mobility, Security. Reporting on how the world communicates.
…
continue reading
The Next Five is the FT’s partner-supported podcast, exploring the future of industries through expert insights and thought-provoking discussions with host Tom Parker. Each episode brings together leading voices to analyse the trends, innovations, challenges and opportunities shaping the next five years in business, technology, health and lifestyle This content is paid for by advertisers and is produced in partnership with the Financial Times’ Commercial Department Hosted on Acast. See acast ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Daily run down of top cyber and tech current events
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
…
continue reading
A show about the technology, strategy, media and business trends defining the future of national security.
…
continue reading
A Technology Geek Podcast with an EVER so Slight Macintosh Bias!
…
continue reading
The best in maritime security, technology, history, and international affairs from CIMSEC - your moment of power point rehab.
…
continue reading
Brought to you by the Texas National Security Review, this podcast features lectures, interviews, and panel discussions at The University of Texas at Austin.
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Best 10-minute, daily tech podcast on emerging technologies, hundreds of Silicon Valley CEOs, Influencers and Celebrities. Hosted by technology executive and creator of Coruzant Technologies.
…
continue reading
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
…
continue reading
Learn from history's greatest entrepreneurs. Every week I read a biography of an entrepreneur and find ideas you can use in your work. This quote explains why: "There are thousands of years of history in which lots and lots of very smart people worked very hard and ran all types of experiments on how to create new businesses, invent new technology, new ways to manage etc. They ran these experiments throughout their entire lives. At some point, somebody put these lessons down in a book. For v ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
continue reading
Board Certified Physical Security Professional and HID Mobile Evangelist, Phil Coppola, provides you with a comprehensive look at all things related to the Physical Security Industry, with a tilt toward Mobile Access technology.
…
continue reading
1
#780: Third-party partner experience and security with Haider Iqbal, Thales
31:04
31:04
Play later
Play later
Lists
Like
Liked
31:04What if the biggest threat to your brand’s agility and security isn't a competitor, but the welcome mat you lay out for your own partners? Agility requires not just the ability to move quickly, but the confidence to do so securely. It’s about building a foundation of trust that enables seamless collaboration without introducing unnecessary risk. To…
…
continue reading
1
Data Integrity, AI Risk, Cyber Realities and tech leadership with Kate Carruthers
44:21
44:21
Play later
Play later
Lists
Like
Liked
44:21In this episode of the Technology & Security podcast, host Dr. Miah Hammond-Errey is joined by Kate Carruthers. Kate is currently the head of data analytics and AI at the Australian Institute of Company Directors. She shares her journey from defending Westfield against state and non-state cyber attacks to leading UNSW's enterprise data, AI, and cyb…
…
continue reading
As the Managed Service Provider (MSP) landscape shifts vastly, service providers must fundamentally differentiate their offerings and value proposition to remain competitive. This imperative means a necessary expansion into robust security services, addressing a growing and critical concern for businesses ranging from Small to Medium Businesses (SM…
…
continue reading
1
EP256 Rewiring Democracy & Hacking Trust: Bruce Schneier on the AI Offense-Defense Balance
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37Guest: Bruce Schneier Topics: Do you believe that AI is going to end up being a net improvement for defenders or attackers? Is short term vs long term different? We're excited about the new book you have coming out with your co-author Nathan Sanders "Rewiring Democracy". We want to ask the same question, but for society: do you think AI is going to…
…
continue reading
1
Détente 2.0 with Mike Froman of CFR
1:01:00
1:01:00
Play later
Play later
Lists
Like
Liked
1:01:00Mike Froman is president of the Council on Foreign Relations and former U.S. Trade Representative. He joins ChinaTalk for the first time to discuss: Why his 1992 dissertation on détente is suddenly relevant again – and why “positive linkage” fails to change adversary behavior, How mutual assured destruction has shifted from nuclear weapons to rare …
…
continue reading
Today Hong Kong’s most prominent media mogul was convicted of flouting national security legislation. Our correspondent explains the consequences for the territory. Why the policies of Britain’s Labour government are damaging London. And our correspondent offers sober advice on how (not) to cure a hangover. Listen to what matters most, from global …
…
continue reading
1
Cybersecurity Today: Apple Security Updates, AI Search Engine Scams, Torrent Malware, and Stanford's AI Penetration Testing
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48In this episode of Cybersecurity Today, host David Shipley discusses significant developments in the cybersecurity landscape. Apple releases security updates to address two actively exploited WebKit vulnerabilities. Scammers manipulate AI-powered search tools to recommend fake support numbers, reflecting a growing security risk. Bitdefender uncover…
…
continue reading
1
The Hidden Threat in Your Holiday Emails: Tracking Pixels and Privacy Concerns
18:47
18:47
Play later
Play later
Lists
Like
Liked
18:47Join us in the midst of the holiday shopping season as we discuss a growing privacy problem: tracking pixels embedded in marketing emails. According to Proton’s latest Spam Watch 2025 report, nearly 80% of promotional emails now contain trackers that report back your email activity. We discuss how these trackers work, why they become more aggressiv…
…
continue reading
1
The Hidden Threat in Your Holiday Emails: Tracking Pixels and Privacy Concerns
18:47
18:47
Play later
Play later
Lists
Like
Liked
18:47Join us in the midst of the holiday shopping season as we discuss a growing privacy problem: tracking pixels embedded in marketing emails. According to Proton's latest Spam Watch 2025 report, nearly 80% of promotional emails now contain trackers that report back your email activity. We discuss how these trackers work, why they become more aggressiv…
…
continue reading
1
#784: Monday.com Global Creative Director Robbie Ferrara on clarifying the benefits of AI
27:41
27:41
Play later
Play later
Lists
Like
Liked
27:41What if the biggest risk in deploying AI isn't the technology itself, but how your team is able to understand its most significant benefits? Agility requires more than just adapting your technology stack; it demands a flexible brand narrative and a creative approach that can evolve with customer sentiment and cultural shifts. This is particularly t…
…
continue reading
1
NC #1075 Record Your Own Review, Sandy’s Smart Outlets, Everything Tech is Broken, Andy Dolph on Zoom Webinars for Remote Events
Hi, this is Allison Sheridan of the NosillaCast Apple Podcast, hosted at Podfeet.com, a technology geek podcast with an EVER so slight Apple bias. Today is Sunday, December 14, 2025, and this is show number 1075. Before we get started, I wanted to let everyone know that there will be NO LIVE SHOW for the […] The post NC #1075 Record Your Own Review…
…
continue reading
There are some people who are part of the fabric of the NosillaCast, piping up from time to time over many years to provide valuable insight to the show when a topic tickles them. One of these people is Andy Dolph, who’s been sending in content and chatting with me in the background since 2012. […] The post CCATP #825 — Andy Dolph on Remote Product…
…
continue reading
1
#407 Bruce Springsteen Repairs the Hole in Himself
1:12:53
1:12:53
Play later
Play later
Lists
Like
Liked
1:12:53A viciously unhappy childhood causes Bruce Springsteen to retreat into work in an extreme way as he searches for success (and control). He channels his pain into focus and drive and gets everything he thought he wanted. He didn’t yet know he was lying to himself. He will find that out soon. He falls into a deep depression. One that almost leads to …
…
continue reading
1
SANS Stormcast Monday, December 15th, 2025: DLL Entry Points; ClickFix and Finger; Apple Patches (#)
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45SANS Stormcast Monday, December 15th, 2025: DLL Entry Points; ClickFix and Finger; Apple Patches Abusing DLLs EntryPoint for the Fun DLLs will not just execute code when some of their functions are called, but also as they are loaded. https://isc.sans.edu/diary/Abusing%20DLLs%20EntryPoint%20for%20the%20Fun/32562 Apple Patches Everything: December 2…
…
continue reading
Christmas in full swing at both Eric and Jon's places. Less secure certificate validation mechanisms being deprecated, and SEO of AI chats to deploy ClickFix style lures for Stealer installation. For fun we have a shockingly good way to avoid motion sickness in VR, and a promising Leukemia treatment using gene therapy. 0:00 - Intro 9:28 - Weak Vali…
…
continue reading
1
The Hidden Danger of Storing Secrets Online | Interview with Jake Knott from Watchtower
38:16
38:16
Play later
Play later
Lists
Like
Liked
38:16In this episode of Cybersecurity Today, host Jim Love discusses the shocking discovery of over 80,000 leaked credentials and secrets in online code formatting tools with Jake Knott, a principal security researcher from Watchtower. They delve into the vulnerabilities exposed by these tools, the inadvertent leaking of sensitive information, and how a…
…
continue reading
1
Paul Scharre explains the global AI arms race
54:56
54:56
Play later
Play later
Lists
Like
Liked
54:56The former Army Ranger explores how AI might reshape drone warfare, America's tech race with China, Russia's war in Ukraine, and much more. Guest: Paul Scharre, executive vice president at the Center for a New American Security and author of several books, including "Four Battlegrounds: Power in the Age of Artificial Intelligence," and "Army of Non…
…
continue reading
Cybersecurity Today: Spider-Man Phishing Kit, Gogs Zero-Day Exploits, and Recent Patches In this episode, host Jim Love discusses recent cybersecurity issues including the Spider-Man phishing kit targeting European banks and cryptocurrency users, a zero-day vulnerability in the self-hosted Git service Gogs, and various security updates. The Spider-…
…
continue reading
1
More React Bugs Reaction, the Challenge of Vulnerability Management, and CI Attacks
24:00
24:00
Play later
Play later
Lists
Like
Liked
24:00This week gave us the gift of some more React Server Components vulnerabilities and further exploitation of the previously disclosed bugs by a variety of threat groups. There were also a long list of vulnerabilities disclosed by Microsoft, Adobe, and others, which we discuss in the context of how difficult vulnerability management is right now. Fin…
…
continue reading
1
'Privacy, Please!' Lorrie Cranor on why she wrote a privacy book for 4-to-6-year-olds
25:16
25:16
Play later
Play later
Lists
Like
Liked
25:16Lorrie Cranor has long been a leader in the privacy space. As Director and Bosch Distinguished Prof. in Security and Privacy Technologies at Carnegie Mellon's CyLab Security and Privacy Institute, Prof. Cranor is on the cutting edge of usable privacy and security. Her work has influenced researchers to view privacy as a fundamental design standard …
…
continue reading
1
Moving Stories: Border Violence and Surveillance
1:11:11
1:11:11
Play later
Play later
Lists
Like
Liked
1:11:11Join us as we discuss Border Externalisation - what is it, and why does it drive violence at the border? We're joined by two fantastic guests - Dan from the Border Violence Monitoring Network to discuss the EU's Border Externalisation, and Kathy from Al Otro Lado to discuss the America's. Border Violence Monitoring Network’s work BVMN's website htt…
…
continue reading
1
Right, here, waiting: Europe’s populists on the rise
27:51
27:51
Play later
Play later
Lists
Like
Liked
27:51In Britain, Germany and France, populist-right leaders and parties are making hay. What unites their movements, and how do their respective political environments shape their future prospects? And our obituaries editor reflects on the life of Frank Gehry, perhaps the world’s most innovative architect. Get a world of insights by subscribing to Econo…
…
continue reading
Walker interviews U.S. Coast Guard Commander Steven Hulse about his Proceedings article, “Bases on the Aleutians Islands Would Project Power Across the Pacific.” Hulse discusses his own experience operating in the Aleutians as a cutterman, and why they are still strategically relevant. Download Sea Control 592: The US Coast Guard in the Aleutian Is…
…
continue reading
We've got a full house with Tony, Justin and Eric today. We get into: The hottest NDAA takes on the airwaves (DFC, OSC, AUKUS, Taiwan, contested logistics, Xi's money) Tony has an amazing tv pitch for the deposed dictator White Lotus SOCOM creatine and super soldiers Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading
1
#783: Typeface CMO Jason Ing on the paradox of hyper personalization and brand consistency
28:30
28:30
Play later
Play later
Lists
Like
Liked
28:30What happens when your brand has a million different voices speaking to a million different customers? Is that the pinnacle of personalization, or is it just brand chaos? Agility requires both the speed to personalize content for every individual as well as the control to ensure every one of those interactions faithfully represents the core brand. …
…
continue reading
1
SANS Stormcast Friday, December 12th, 2025: Local AI Models; Mystery Chrome 0-Day; SOAPwn Attack (#)
6:56
6:56
Play later
Play later
Lists
Like
Liked
6:56SANS Stormcast Friday, December 12th, 2025: Local AI Models; Mystery Chrome 0-Day; SOAPwn Attack Using AI Gemma 3 Locally with a Single CPU Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556 "My…
…
continue reading
1
World-leaders in Cryptography: Joos Vandewalle
1:57:17
1:57:17
Play later
Play later
Lists
Like
Liked
1:57:17Joos is a Professor Emeritus with the Department of Electrical Engineering at the Catholic University of Leuven, Belgium. He is one of the most impactful researchers in Computer Science in the World, including in areas of cryptography, secure data communications, data mining and complex systems. His work has led to many areas of impact, including s…
…
continue reading
1
Ven and the art of hemispheric maintenance: America’s national-security posture
17:21
17:21
Play later
Play later
Lists
Like
Liked
17:21America’s seizure of a Venezuelan oil tanker fits with the stated goals in its new national-security strategy: untrammelled hemispheric dominance. How much of the document is polemic and how much will become policy? The long-run costs of the work-from-home revolution are becoming apparent in many American cities. And the one region where Pepsi is t…
…
continue reading
1
SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation (#)
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerab…
…
continue reading
1
Overfit: NeurIPS Vibes, Research Doesn't Matter, OpenAI Cooked?
1:00:25
1:00:25
Play later
Play later
Lists
Like
Liked
1:00:25Nathan and Jasmine debrief from NeurIPS San Diego, where we of course threw the best party. outtro music: we're on a boat https://suno.com/s/dkulmuRvScACxObX Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Jordan Schneider
…
continue reading
At every technological revolution, the industry of indecency is close at hand. We look at how sex workers and porn-peddlers are making use of AI. The sites of Syria’s most brutal civil-war deeds are just the latest destination for “dark tourists”; we explore the draw of atrocities. And to the many divisions in America, add one about a lawn-care imp…
…
continue reading
1
Billy Huang: Financing the Future of Creators | Ep1169
12:59
12:59
Play later
Play later
Lists
Like
Liked
12:59In this episode of The Digital Executive, host Brian Thomas sits down with Billy Huang, co-founder of CreatorFi and longtime innovator in data, identity, and digital revenue infrastructure. Billy shares how enterprise-scale data systems he built for brands like Coca-Cola and Under Armour now power CreatorFi’s AI-driven underwriting engine—unlocking…
…
continue reading
Cybersecurity Today: Google Chrome's AI Safety Plan, React2Shell Fixes, & New Ransomware Tactics In this episode of Cybersecurity Today, host Jim Love discusses Google's new security blueprint for AI-powered Chrome agents, highlighting measures against indirect prompt injections and model errors. Learn about Next JS's new tool for addressing the cr…
…
continue reading
1
From CIA Officer to a Career in Cybersecurity With Erin Whitmore
1:21:42
1:21:42
Play later
Play later
Lists
Like
Liked
1:21:42Coming from a military family, Erin Whitmore was prepared for a career of service. But her path took her not into the military, but the intelligence community, first in the private sector supporting the DIA and NGA, and later as a cybersecurty program manager in the Office of the Director of National Intelligence. She eventually joined CIA as an op…
…
continue reading
1
#782: Salesforce Marketing Cloud CMO Bobby Jania on the end of "Do Not Reply" marketing
24:48
24:48
Play later
Play later
Lists
Like
Liked
24:48What if the most damaging phrase in your marketing isn't a four-letter word, but three simple ones: "Do Not Reply"? Agility requires more than just moving fast; it requires breaking down the walls between departments to respond to customer needs in the moment they happen. It’s about empowering every part of the organization to act as one cohesive b…
…
continue reading
1
SN 1055: React's Perfect 10 - RAM Is the New Lobster
2:45:50
2:45:50
Play later
Play later
Lists
Like
Liked
2:45:50A devastating new React vulnerability earned a "perfect 10" for risk, letting attackers remotely run code on a million-plus servers with a single HTTP request. Find out what happened, how fast attackers moved in, and why this bug changes everything for web security. France's VanityFair face a stiff fine over cookies. GrapheneOS pulls out of France …
…
continue reading
1
SN 1055: React's Perfect 10 - RAM Is the New Lobster
2:45:50
2:45:50
Play later
Play later
Lists
Like
Liked
2:45:50A devastating new React vulnerability earned a "perfect 10" for risk, letting attackers remotely run code on a million-plus servers with a single HTTP request. Find out what happened, how fast attackers moved in, and why this bug changes everything for web security. France's VanityFair face a stiff fine over cookies. GrapheneOS pulls out of France …
…
continue reading
1
SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby patches. (#)
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby patches. Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution…
…
continue reading
At the Fall ’25 vCon in Washington, D.C., Doug Green, Publisher of Technology Reseller News, spoke with Jon Arnold, Principal of J Arnold & Associates, about why vCon matters, how it fits into the broader AI and communications landscape, and why legal frameworks around compliance and consent are as important as the technology itself. Arnold situate…
…
continue reading
1
Emergency Pod: H200s to China with Dmitri Alperovich
43:14
43:14
Play later
Play later
Lists
Like
Liked
43:14It's never over with Trump...Dmitri Alperovich of the Silverado Policy Accelerator comes on to discuss Trump's decision to allow the export of H200s to china. outtro music, a fan song to Jameison Greer: https://suno.com/s/yTi5R7xDRcM7p2ho Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading
In this Technology Reseller News podcast, Publisher Doug Green speaks with Roel Cortez, Senior Director, Sales–Telecom at C&D Technologies, about how AI-driven network growth is transforming power and energy storage requirements across telecom infrastructure. C&D Technologies—whose batteries and power systems are embedded throughout U.S. carrier ne…
…
continue reading
1
Trade, Technology, & the US–Korea Alliance: A Conversation with Ambassador Kang
34:33
34:33
Play later
Play later
Lists
Like
Liked
34:33Sheena Chestnut Greitens sat down with Ambassador Kang Kyung-wha, the Republic of Korea's ambassador to the United States. Recorded before a live audience at The University of Texas at Austin on December 3, the conversation explores the deepening alignment between Seoul and Washington. Ambassador Kang and Dr. Greitens discuss the implementation of …
…
continue reading