Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Security Technology Podcasts
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job, there's always something fun to wrap up the show.
…
continue reading
Find out how technology is reshaping our lives every day and explore the new powers of governments and companies.
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Industry expert Mikah Sargent, brings you interviews from tech journalists who make or break the top stories of the week. Get the freshest perspective and in depth insight into the fast-paced world of technology from Tech News Weekly. Records every Thursday at 2:00pm Eastern / 11:00am Pacific / 18:00 UTC.
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
š Welcome to Bizionic Technology Pvt Ltd! We specialize in providing top-notch Hire Talent, Marketing, Technologies, Cloud Consulting Services, and Security Solutions. Don't forget to check out our podcast for valuable insights. Visit our website at https://www.bizionictech.com for more information. Let's innovate together! š” #BizionicTech #InnovateWithUs
…
continue reading

1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. Weāre a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Exploring the bonds shared between people and technology
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
Artificial Intelligence has too much hype. In this podcast, linguist Emily M. Bender and sociologist Alex Hanna break down the AI hype, separate fact from fiction, and science from bloviation. They're joined by special guests and talk about everything, from machine consciousness to science fiction, to political economy to art made by machines.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
The United States is in the midst of a dramatic political realignment with shifting views on national security, economics, technology, and the role of government in our lives. Saagar Enjeti and Marshall Kosloff explore this with thinkers, policymakers, and more.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
A show about the technology, strategy, media and business trends defining the future of national security.
…
continue reading
This podcast will give you help you with passing your CompTIA exams. We also sprinkle different technology topics.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Introducing you to the world of Social Engineering Security, personal privacy, and the technology of our changing world, such as Artificial Intelligence (AI). Our goal is to provide you with the armor you need to protect yourself and the knowledge to identify the red flags of both online and offline attackers.
…
continue reading
āAt the Boundaryā is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we donāt produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Cultureāand how best to upgrade ourselves to be ready for what's coming.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael āRooā Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Digital certificate industry veterans Tim Callan and Jason Soroko explore the issues surrounding digital identity, PKI, and cryptographic connections in today's dynamic and evolving computing world. Best practices in digital certificates are continually under pressure from technology trends, new laws and regulations, cryptographic advances, and the evolution of our computing architectures to be more virtual, agile, ubiquitous, and cloud-based. Jason and Tim (and the occasional guest subject ...
…
continue reading
A Technology Geek Podcast with an EVER so Slight Macintosh Bias!
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But itās not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever ā and these cyber threats are forcing them to prove theyāre secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
…
continue reading
Your Destination for Gadgets and Gear
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
We talk to security industry leaders, disruptors, and innovators with strong views and opinions on the future of topics like physical security, smart buildings, artificial intelligence, cybersecurity and more. We dig into the latest tech trends, explore how security is shaping the world, and delve into those tricky regulations (like NIS2, the Cyber Resilience Act, the EU Artificial Intelligence Act, the UK's Product Security, Telecommunications, Infrastructure Act and more) that keep everyon ...
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Get the edge with Hidden Forces where media entrepreneur and financial analyst Demetri Kofinas gives you access to the people and ideas that matter, so you can build financial security and always stay ahead of the curve.
…
continue reading
Front Burner is a daily news podcast that takes you deep into the stories shaping Canada and the world. Each morning, from Monday to Friday, host Jayme Poisson talks with the smartest people covering the biggest stories to help you understand whatās going on. Weāre Canadaās number one news podcast and a trusted source of Canadian news. We cover Canadian news and Canadian politics, Prime Minister Mark Carney, Pierre Poilievre, the Donald Trump administration, provincial politics from Alberta, ...
…
continue reading
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ā We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clientsā data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Inside Java is a podcast for Java Developers brought to you directly from the people that make Java at Oracle. We'll discuss the language, the JVM, OpenJDK, platform security, innovation projects like Loom and Panama, and everything in between.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading

1
Counterfeit medicine, forensic frontiers and foreign interference with Dr Adrian De Grazia
41:52
41:52
Play later
Play later
Lists
Like
Liked
41:52By Dr Miah Hammond-Errey
…
continue reading

1
How to Proactively Manage Change in Security Technology Implementations
35:37
35:37
Play later
Play later
Lists
Like
Liked
35:37Your mindset makes a huge difference in proactively managing change at work, rather than just reacting to it, says Mohammed Shehzad in the October 2025 episode of SM Highlights. When security technology and processes get involved, resistance and confusion can impact the overall progression and success of the change. Also in this episode, Rachel Briā¦
…
continue reading

1
Cybersecurity Fundamentals : Enterprise Security Architecture Chapter 5
23:54
23:54
Play later
Play later
Lists
Like
Liked
23:54[email protected] Dive deep into the essential building blocks of secure enterprise networks with Professor J. Rod in this comprehensive exploration of network architecture, security appliances, and remote access solutions. What makes a truly secure organizational network? It's more than just firewalls and fancy equipmentāit's thoughtful desiā¦
…
continue reading

1
Exploring the Dark Web: A Conversation with Criminologist David Decary-Hetu
51:19
51:19
Play later
Play later
Lists
Like
Liked
51:19In this episode, Jim Love interviews David Decary-Hetu, a criminologist at the University of Montreal, discussing the dark web and its impact on criminal activity and cybersecurity. They delve into what the dark web is, how it operates, its primary users, and its role in cybercrime. They also explore the dynamics of online criminal networks, challeā¦
…
continue reading

1
Hackers claim Discord breach exposed data of 5.5 million users - 2025-10-13
58:37
58:37
Play later
Play later
Lists
Like
Liked
58:37Register for FREE Infosec Webcasts, Anti-casts & Summits ā https://poweredbybhis.com 00:00 - PreShow Banter⢠ā A Real Podcast 03:15 - Hackers claim Discord breach exposed data of 5.5 million users ā BHIS - Talkin' Bout [infosec] News 2025-10-13 05:44 - Story # 1: CamoLeak: Critical GitHub Copilot Vulnerability Leaks Private Source Code 24:27 - Storā¦
…
continue reading

1
Militarisation of Tech: Redefining the Battlefield
39:24
39:24
Play later
Play later
Lists
Like
Liked
39:24This week we talk to Ilia and Serhat about the creeping militarisation of technology, and with it our societies. Links All of our militarisation work: https://privacyinternational.org/campaigns/militarisation-of-tech What is Militarisation of Tech?: https://privacyinternational.org/long-read/5668/what-militarisation-tech Key Concerns Regarding Goveā¦
…
continue reading

1
Scaling Laws: AI and Energy: What Do We Know? What Are We Learning?
52:18
52:18
Play later
Play later
Lists
Like
Liked
52:18Mosharaf Chowdhury, Associate Professor at the University of Michigan and Director of the ML Energy lab, and Dan Zhou, former Senior Research Scientist at the MIT Lincoln Lab, MIT Supercomputing Center, and MIT CSAIL, join Kevin Frazier, AI Innovation and Law Fellow at the University of Texas School of Law and a Senior Editor at Lawfare, to discussā¦
…
continue reading
This year, the Nobel Peace Prize was awarded to Venezuelan opposition leader, MarĆa Corina Machado. In the announcement last week, the chairman of the Norwegian Nobel Committee said Machado had earned the prize for her āstruggle to achieve a just and peaceful transition from dictatorship to democracy". The award comes at a time when the U.S. has taā¦
…
continue reading
Techstination, your destination for gadgets and gear. Iām Fred Fishkin. How much do you trust AI to do your travel planning for you? The platform for coastal travel, Beach.com, is out with a survey that shows a mixed bag. Lead Data Journalist Noah Holtgraves says while two thirds of the...By Fred Fishkin
…
continue reading

1
SANS Stormcast Friday, October 17th, 2025: New Slack Workspace; Cisco SNMP Exploited; BIOS Backdoor; @sans_edu reseach: Active Defense (#)
21:28
21:28
Play later
Play later
Lists
Like
Liked
21:28SANS Stormcast Friday, October 17th, 2025: New Slack Workspace; Cisco SNMP Exploited; BIOS Backdoor; @sans_edu reseach: Active Defense New DShield Support Slack Workspace Due to an error on Salesforceās side, we had to create a new Slack Workspace for DShield support. https://isc.sans.edu/diary/New%20DShield%20Support%20Slack/32376 Attackers Exploiā¦
…
continue reading

1
Root Causes 537: The Thermodynamics of Privacy
13:34
13:34
Play later
Play later
Lists
Like
Liked
13:34In this episode we build on our concept of entropy-aware guidance to explain how we might quantify privacy. We touch on GDPR, proof of work, and Landaur's principle.By Tim Callan and Jason Soroko
…
continue reading

1
3455: From Prototype to Deep Tech Unicorn: XPANCEOās Journey at GITEX Global
21:36
21:36
Play later
Play later
Lists
Like
Liked
21:36What if the next generation of computing was not something you held or wore, but something you looked through? In this special episode recorded live from GITEX Global in Dubai, I speak with Roman Axelrod, founder of EXPANCEO, a deep tech company creating AI-powered smart contact lenses designed to merge augmented reality, biosensing, and what he caā¦
…
continue reading

1
TNW 409: Apple's New M5 MacBook and iPad Pro - How Apple's New Hub Chip Could Reshape Home Automation
1:16:14
1:16:14
Play later
Play later
Lists
Like
Liked
1:16:14Jennifer Pattison Tuohy of The Verge is on Tech News Weekly with Mikah Sargent this week! Jennifer is excited about the new iPad Pro. California passed a law requiring warning labels on social media. Apple announced the new iPad Pro, MacBook Pro, and Vision Pro with the M5 chip. Meta launched new PG-13 Guidelines for teen users on Instagram. The iPā¦
…
continue reading
Wondering what happens to your old devices when theyāre recycled, upgraded, or passed down? In this video, Chris and Sarah Howells from Learn Online Security explain how laptops, phones, printers, gaming systems, and even smart home devices can hold sensitive informationāand why scammers target them. Learn practical tips for wiping, factory resettiā¦
…
continue reading
In the wake of the disclosure of a serious intrusion at F5 that reportedly lasted about a year, we talk about the details of the disclosure, the potential link to Chinese state actors, the fallout from the attackers' access to source code and bug reports, and what this could mean in the long term.By Decipher
…
continue reading

1
Cybersecurity Fundamentals : High Availability, Real Resilience Chapter 7
24:12
24:12
Play later
Play later
Lists
Like
Liked
24:12[email protected] What keeps a business alive when the lights flicker, a server drops, or an ISP blinks? We pull back the curtain on practical resilienceāhow continuity planning, capacity, and clear runbooks turn chaos into a minor hiccupāthen pressure-test the plan with drills, documentation, and ruthless honesty. We start by grounding COOP ā¦
…
continue reading

1
Surviving Ransomware: Strategies and Stories with Cybersecurity Expert Matthew Waddell
42:23
42:23
Play later
Play later
Lists
Like
Liked
42:23In episode 44 of Cyber Security America, host Joshua Nicholson sits down with Matthew Waddell, a battle-tested cybersecurity leader with over 25 years of experience in digital forensics, incident response, and ransomware defense. From conducting ājust-in-time forensicsā under combat conditions in Iraq and Afghanistan to leading global ransomware inā¦
…
continue reading

1
Lawfare Daily: Prosecuting Terrorism and the Pursuit of Justice, with Jake Tapper
53:25
53:25
Play later
Play later
Lists
Like
Liked
53:25Lawfare Public Service Fellow Michael Feinberg sits down with Jake Tapper, the lead Washington anchor for CNN, to discuss his new book, āRace Against Terror: Chasing an Al Qaeda Killer at the Dawn of the Forever War.ā The book chronicles the investigation, prosecution, and ultimate conviction of Spin Ghul, an Al Qaeda operative who became the firstā¦
…
continue reading

1
Running IT Like a Growth Engine with Chidi Alams of Just Born, Inc.
31:13
31:13
Play later
Play later
Lists
Like
Liked
31:13This episode features Chidi Alams, CIO of Just Born ā the company behind candy classics like Peeps, Mike and Ike, and Hot Tamales. Chidi shares how his team is using AI, automation, and smarter data systems to modernize operations, strengthen supply chain resilience, and double the business impact of technology. Itās a conversation about what it reā¦
…
continue reading
Marie-Philippe Bouchard has been in her role as President and CEO of CBC/Radio-Canada for a little under a year. Since her appointment, weāve had a federal election that has spared the public broadcaster from defunding threats for now, but certainly not from a broad sentiment that the CBC needs change and evolution. This week, Bouchard unveiled herā¦
…
continue reading
Techstination, your destination for gadgets and gear. Iām Fred Fishkin. In addition to the latest 500 dollar 360 degree Max 2 camera announced by GoPro this fall, the company is also out with a new, lower priced modelā¦this time with a built in light. Itās the Hero Lit. The companyās Chris...By Fred Fishkin
…
continue reading

1
Satellite Internet Data Is Discovered To Be Unencrypted And Easy To Intercept
10:44
10:44
Play later
Play later
Lists
Like
Liked
10:44This episode of Cybersecurity Today, hosted by Jim Love, covers several critical topics in the realm of cybersecurity. Researchers found that unencrypted data from satellites is accessible with cheap equipment, leading to potential eavesdropping on sensitive information worldwide. A new botnet campaign is aggressively scanning for unsecured RDP serā¦
…
continue reading
The story of a massive swatting hoax campaign across the US that helped take down a piece of cybercrime infrastructure in the heart of New York. That and a big rambling chatty chat about Tilly Norwood, AI bubbles, and somehow, very briefly, Goku. Learn more about your ad choices. Visit podcastchoices.com/adchoicesā¦
…
continue reading

1
CRSP06: State of AI 2025 pt.1 - Evolving role of AI across industries with Craig Suckling [AAA]
53:26
53:26
Play later
Play later
Lists
Like
Liked
53:26In 'Access All Areas' shows we go behind the scenes with the crew and their friends as they dive into complex challenges that organisations faceāsometimes getting a little messy along the way. Weāre launching a special AI mini-series exploring how artificial intelligence is reshaping industries. Each episode dives into key themes like scaling AI, sā¦
…
continue reading

1
3454: Why Pinecone Believes the Future of AI Depends on Data, Not Models
39:13
39:13
Play later
Play later
Lists
Like
Liked
39:13What if the real breakthrough in AI isnāt the model itself, but the data that gives it knowledge? In this episode of Tech Talks Daily, I sit down with Edo Liberty, founder and Chief Scientist of Pinecone, to unpack how vector databases have quietly become the backbone of modern AI infrastructure. We explore why retrieval-augmented generation (RAG) ā¦
…
continue reading

1
Novelty Exploration vs. Pattern Exploitation
3:44
3:44
Play later
Play later
Lists
Like
Liked
3:44How going from exploration to exploitation can help you as both a consumer and creator of everything. Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.By Daniel Miessler
…
continue reading

1
SANS Stormcast Thursday, October 16th, 2025: Clipboard Image Stealer; F5 Compromise; Adobe Updates; SAP Patchday (#)
8:40
8:40
Play later
Play later
Lists
Like
Liked
8:40SANS Stormcast Thursday, October 16th, 2025: Clipboard Image Stealer; F5 Compromise; Adobe Updates; SAP Patchday Clipboard Image Stealer Xavier presents an infostealer in Python that steals images from the clipboard. https://isc.sans.edu/diary/Clipboard%20Pictures%20Exfiltration%20in%20Python%20Infostealer/32372 F5 Compromise F5 announced a wide-raā¦
…
continue reading

1
AI Attack and Defense With Adam Meyers and Elia Zaitsev of CrowdStrike
57:26
57:26
Play later
Play later
Lists
Like
Liked
57:26Have you heard about this AI thing? It's wild. Turns out, attackers are using it for all kinds of things we'd rather not have them doing. Dennis Fisher is joined by two experts from CrowdStrike--Adam Meyers, head of counter adversary operations, and Elia Zaitsev, CTO--to talk about how both defenders and attackers are leveraging AI and where thingsā¦
…
continue reading

1
Rational Security: The āDonāt Upset the Masksā Edition
1:13:12
1:13:12
Play later
Play later
Lists
Like
Liked
1:13:12This week, Scott sat down with his Lawfare colleagues Benjamin Wittes, Kate Klonick, and newly-minted Senior Editor Molly Roberts to talk through the weekās big national security news stories, including: āPeace by Piece.ā The first phase of the Trump administrationās peace plan for Gaza went into effect on Monday, resulting in the return of the lasā¦
…
continue reading

1
Lawfare Daily: Serhii Plokhii on the History of the Nuclear Arms Race
59:47
59:47
Play later
Play later
Lists
Like
Liked
59:47Lawfare Contributor Mykhailo Soldatenko sits down with Serhii Plokhii, Harvard History Professor and a leading authority on the history of the Cold War and Ukraine, to discuss his new book, "The Nuclear Age: An Epic Race for Arms, Power and Survival," that tells a history of nuclear proliferation and international efforts to tame it. They discuss tā¦
…
continue reading
At its peak, Marineland was the second most popular tourist destination in Ontarioās Niagara region after the falls. Visitors could get up close and personal with beluga whales, dolphins and orcas, and watch them perform in elaborate shows. Throw in a side of rollercoasters and other exhibits and you had a family friendly attraction built to last. ā¦
…
continue reading
Techstination interview: Google cybersecurity expert calls it a game of chess against the bad guysBy Fred Fishkin
…
continue reading
Techstination interview: A dashcam that uses AI to detect license plates & more: VUEROIDBy Fred Fishkin
…
continue reading
Techstination, your destination for gadgets and gear. Iām Fred Fishkin. The long time action camera pioneer GoPro has some new tricks up its sleeve this fall. The new 360 degree Max 2 camera has lenses on front and backā¦and the companyās Chris Prado says one great new feature isā¦those lenses...By Fred Fishkin
…
continue reading

1
SN 1047: RediShell's CVSS 10.0 - The Rise of Mega Botnets
2:32:07
2:32:07
Play later
Play later
Lists
Like
Liked
2:32:07Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification lawsāare tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netā¦
…
continue reading

1
SN 1047: RediShell's CVSS 10.0 - The Rise of Mega Botnets
2:45:35
2:45:35
Play later
Play later
Lists
Like
Liked
2:45:35Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification lawsāare tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netā¦
…
continue reading

1
3453: How Wolters Kluwer Is Building Trustworthy AI for Regulated Industries
31:47
31:47
Play later
Play later
Lists
Like
Liked
31:47What happens when an AI strategy meets the real-world complexity of healthcare, law, and finance? Thatās the challenge at the heart of my conversation with Mark Sherwood, CIO of Wolters Kluwer, a global leader in professional information services. With over three decades in technology leadership across Microsoft, Symantec, and Nuance, Mark brings aā¦
…
continue reading

1
Root Causes 536: Patent Blocker on ML-KEM
11:51
11:51
Play later
Play later
Lists
Like
Liked
11:51A patent dispute in 2024 nearly blocked ML-KEM. But emerging thinking raises concern that the 2024 resolution did not guarantee full, clear access to all ML-KEM implementations. We explain.By Tim Callan and Jason Soroko
…
continue reading

1
SANS Stormcast Wednesday, October 15th, 2025: Microsoft Patchday; Ivanti Advisory; Fortinet Patches (#)
6:22
6:22
Play later
Play later
Lists
Like
Liked
6:22SANS Stormcast Wednesday, October 15th, 2025: Microsoft Patchday; Ivanti Advisory; Fortinet Patches Microsoft Patch Tuesday Microsoft not only released new patches, but also the last patches for Windows 10, Office 2016, Office 2019, Exchange 2016 and Exchange 2019. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20October%202025/32368 Ivantiā¦
…
continue reading
Some thoughts on how novelty and attention magnify the time that we have. Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.By Daniel Miessler
…
continue reading

1
The state of passkeys in 2025 with Nick Steele | BEER SHORTAGE PUBLIC KEY
1:02:51
1:02:51
Play later
Play later
Lists
Like
Liked
1:02:51How is the transition to passkeys going in 2025? š This week, weāre joined by Nick Steele from the Product team at 1Password to talk all things passwordless. He walks us through the current state of adoption and a brand-new standard that will change the way we move and share passkeys. In Crash Course, we break down public-key encryption ā the powerā¦
…
continue reading

1
A + Fundamentals : Networking Unlocked: From LANs to Wi-Fi 7
25:50
25:50
Play later
Play later
Lists
Like
Liked
25:50[email protected] What if your āall-in-oneā router is doing too muchāand your WiāFi āspeedā isnāt the real bottleneck? We pull back the rack door and trace the digital bloodstream from SOHO setups to enterprise backbones, translating jargon into choices you can actually make. Starting with LANs, WANs, WLANs, and SANs, we map how scope changesā¦
…
continue reading

1
Bots vs Business: AI Fraud & Defending Your Margins
21:51
21:51
Play later
Play later
Lists
Like
Liked
21:51A North Carolina musician was arrested after using AI to generate fake bands and bots to stream their songsāracking up over a billion plays and pocketing $10 million in fraudulent royalties. Itās the first U.S. case of AI-driven music streaming fraud, and itās less about music than it is about bots exploiting business models. For enterprises, the lā¦
…
continue reading

1
Building Worlds Through Better Reading (with Reo Eveleth), 2025.09.29
56:59
56:59
Play later
Play later
Lists
Like
Liked
56:59Powerful AI boosters claim to love science fiction novels, but why do they always seem to take the wrong lessons from them? Reporter and writer Reo Eveleth joins us to discuss the ways tech leaders misuse storytelling, and how we can avoid their visions to imagine better futures. Reo Eveleth is a reporter, writer, and co-founder of COYOTE Media Colā¦
…
continue reading