Find out how technology is reshaping our lives every day and explore the new powers of governments and companies.
…
continue reading
Security Technology Podcasts
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Conversations exploring China, technology, and US-China relations. Guests include a wide range of analysts, policymakers, and academics. Hosted by Jordan Schneider. Check out the newsletter at https://www.chinatalk.media/
…
continue reading
Every weekday our global network of correspondents makes sense of the stories beneath the headlines. We bring you surprising trends and tales from around the world, current affairs, business and finance — as well as science and technology. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Naked Scientists flagship science show brings you a lighthearted look at the latest scientific breakthroughs, interviews with the world's top scientists, answers to your science questions and science experiments to try at home.
…
continue reading
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job, there's always something fun to wrap up the show.
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We're going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject's benefit or ju ...
…
continue reading
Shared Security is the the longest-running cybersecurity and privacy podcast where industry veterans Tom Eston, Scott Wright, and Kevin Tackett break down the week’s security WTF moments, privacy fails, human mistakes, and “why is this still a problem?” stories — with humor, honesty, and hard-earned real-world experience. Whether you’re a security pro, a privacy advocate, or just here to hear Kevin yell about vendor nonsense, this podcast delivers insights you’ll actually use — and laughs yo ...
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
Expert mode marketing technology, AI, and CX insights from top brands and Martech platforms fill every episode, focusing on what leaders need to know to build customer lifetime value and long-term business value. The Agile Brand with Greg Kihlström® features executives and thought leaders from top brands and tech platforms discussing the industry's trends, like AI adoption, first-party data strategies, artificial intelligence in the consumer journey, consumer data privacy, omnichannel custom ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
The United States is in the midst of a dramatic political realignment with shifting views on national security, economics, technology, and the role of government in our lives. Saagar Enjeti and Marshall Kosloff explore this with thinkers, policymakers, and more.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Artificial Intelligence has too much hype. In this podcast, linguist Emily M. Bender and sociologist Alex Hanna break down the AI hype, separate fact from fiction, and science from bloviation. They're joined by special guests and talk about everything, from machine consciousness to science fiction, to political economy to art made by machines.
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Two CISOs and a security-minded friend discuss and debate topics of security and privacy, with a focus on looking at the topic from various angles, both that they support and those they don't. Sign up for our newsletter to be notified when new episodes drop, or when new projects are announced https://newsletter.greatsecuritydebate.net
…
continue reading
Brad Gross, one of the top technology law attorneys in the country, discusses security, licensing, and contract issues for MSPs. Learn what you’re doing wrong and how to fix it, so you can sleep more soundly and focus on what you do best. Contact: [email protected]
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
…
continue reading
Daily run down of top cyber and tech current events
…
continue reading
The Next Five is the FT’s partner-supported podcast, exploring the future of industries through expert insights and thought-provoking discussions with host Tom Parker. Each episode brings together leading voices to analyse the trends, innovations, challenges and opportunities shaping the next five years in business, technology, health and lifestyle This content is paid for by advertisers and is produced in partnership with the Financial Times’ Commercial Department Hosted on Acast. See acast ...
…
continue reading
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
…
continue reading
The best in maritime security, technology, history, and international affairs from CIMSEC - your moment of power point rehab.
…
continue reading
Brought to you by the Texas National Security Review, this podcast features lectures, interviews, and panel discussions at The University of Texas at Austin.
…
continue reading
Sirens, a new podcast from the ladies of Bombshell, dissects the institutions of American power. With their trademark wit and charm, join Loren DeJonge Schulman, Radha Iyengar Plumb, and Erin Simpson as they sound the alarm on technology, governance, and national security issues. (And maybe lure men to their deaths.)
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Inside Java is a podcast for Java Developers brought to you directly from the people that make Java at Oracle. We'll discuss the language, the JVM, OpenJDK, platform security, innovation projects like Loom and Panama, and everything in between.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
A show about the technology, strategy, media and business trends defining the future of national security.
…
continue reading
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
…
continue reading
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
continue reading
1
#780: Third-party partner experience and security with Haider Iqbal, Thales
31:04
31:04
Play later
Play later
Lists
Like
Liked
31:04What if the biggest threat to your brand’s agility and security isn't a competitor, but the welcome mat you lay out for your own partners? Agility requires not just the ability to move quickly, but the confidence to do so securely. It’s about building a foundation of trust that enables seamless collaboration without introducing unnecessary risk. To…
…
continue reading
1
Data Integrity, AI Risk, Cyber Realities and tech leadership with Kate Carruthers
44:21
44:21
Play later
Play later
Lists
Like
Liked
44:21In this episode of the Technology & Security podcast, host Dr. Miah Hammond-Errey is joined by Kate Carruthers. Kate is currently the head of data analytics and AI at the Australian Institute of Company Directors. She shares her journey from defending Westfield against state and non-state cyber attacks to leading UNSW's enterprise data, AI, and cyb…
…
continue reading
1
So this is quizmas: our inaugural holiday face-off
28:07
28:07
Play later
Play later
Lists
Like
Liked
28:07Join our editors and correspondents in a gripping test of recall and reflexes. There are questions on business and politics of course—but also news noises to identify, one saucy limerick and quotes from “The Real Housewives” franchise that frankly no one expected. Which team will take the trophy? Get a world of insights by subscribing to Economist …
…
continue reading
1
Year End Repeat: Pig Butchering: Operation Shamrock Fights Back
41:13
41:13
Play later
Play later
Lists
Like
Liked
41:13Over the holidays we are rerunning some of our favourite episodes. This one first aired this summer and was one of my first conversations with the fascinating head of Operation Shamrock. We'll be back with regular programming on January 5th.By Jim Love
…
continue reading
1
#788: Year-end review with Greg Kihlström, The Agile Brand
15:43
15:43
Play later
Play later
Lists
Like
Liked
15:43In this episode I’m going to do something a little different. As we wind down for the year, we’re going to be running some of our favorites from 2025 until the new year begins. Let’s take a look back at some of the overall themes discussed and point out a few highlights for me. I won’t be able to highlight everything of course but I found 5 themes …
…
continue reading
1
SN 1057: GhostPoster - Free VPNs, Hidden Risks
2:20:19
2:20:19
Play later
Play later
Lists
Like
Liked
2:20:19What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer c…
…
continue reading
What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer c…
…
continue reading
1
Joe Weisenthal and I do a Show About Nothing
1:03:22
1:03:22
Play later
Play later
Lists
Like
Liked
1:03:22A festivus special! Joe Weisenthal, host of Odd Lots and my podcast host alter ego, come to celebrate his ten years of hosting, reflect on the medium and China. 01:21 following your podcasting bliss 21:19 handling guests 26:06 china 46:04 journalism integrity 49:24 parenting in nyc Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading
Love a hot take? 🔥 You’re in luck! We’re back with a special end-of-year treat: a rapid-fire round of cybersecurity hot takes guaranteed to start arguments in your group chats and hijack at least one Slack thread. 💬 The team weighs in on bold claims like “Passwords will finally die in 2026” and “AI will solve more cybersecurity problems than it cau…
…
continue reading
1
Modern AppSec: OWASP SAMM, AI Secure Coding, Threat Modeling & Champions - Sebastian Deleersnyder, James Manico, Adam Shostack, Dustin Lehr - ASW #362
1:07:52
1:07:52
Play later
Play later
Lists
Like
Liked
1:07:52Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
…
continue reading
Recessions are, in their way, bad news. But so, paradoxically, is a lasting dearth of them. We explain the dangers that lie beneath the current run of continuous growth. Our correspondent looks into the hidden economics of online reviews, and whether to trust them. And a turkey-industry exposé that you’ll just gobble up. Get a world of insights by …
…
continue reading
There may not be any computers in Home Alone, but few movie characters embody the old-school hacker ethos like Kevin McCallister does. Resourceful, clever, determined, and creative, Kevin uses all of the tools and talents at his disposal to repel a pair of relentless adversaries. Merry Christmas ya filthy animals! Support the show…
…
continue reading
1
Slop stars: why AI-generated content could help creators
20:46
20:46
Play later
Play later
Lists
Like
Liked
20:46In a world of infinite content, who wins and who loses? Our correspondent explains what the proliferation of AI-generated art means for human artists. What the prevalence of male-female friendships tell us about a society. And why you should propose with a yellow-gold ring. Listen to what matters most, from global politics and business to science a…
…
continue reading
1
"Predictability or Innovation? Both!" with Georges Saab
20:38
20:38
Play later
Play later
Lists
Like
Liked
20:38This Inside Java Podcast takes a meta approach. Instead of focusing on specific features, it explores the bigger picture: What are the right problems for Java to tackle? What are the current and future challenges for the Java platform? Why is predictability so important for Java, and what's driving the recent focus on learners and students? Nicolai…
…
continue reading
1
Second Breakfast: Arctic Warfare Christmas Special!
55:13
55:13
Play later
Play later
Lists
Like
Liked
55:13Steve Gagnon joins the show! Book: Thousand Mile War https://www.amazon.com/Thousand-Mile-War-Aleutians-Classic-Reprint/dp/0912006838 Outtro music: Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Jordan Schneider
…
continue reading
1
Arrests In 0365 Scheme: Cybersecurity Today With David Shipley
13:09
13:09
Play later
Play later
Lists
Like
Liked
13:09Global Cybercrime Crackdowns and Rising Threats This episode of 'Cybersecurity Today' hosted by David Shipley covers significant cybersecurity news. Nigerian police arrested three suspects linked to a Microsoft 365 phishing platform known as Raccoon O365. U.S. prosecutors charged 54 individuals in an ATM malware scheme tied to a Venezuelan criminal…
…
continue reading
1
Why Networking Is Your Secret Weapon in Cybersecurity Job Hunting
12:42
12:42
Play later
Play later
Lists
Like
Liked
12:42In this episode, Tom Eston discusses the unique challenges in the current cybersecurity job market, emphasizing the importance of networking. Tom provides practical tips on how to enhance networking skills, such as attending conferences, volunteering for open source projects, creating a blog, and seeking mentors. He also addresses misconceptions ab…
…
continue reading
1
#787: Tray.ai's Stephen Stouffer on AI adoption and why marketers should care about the integration layer
25:56
25:56
Play later
Play later
Lists
Like
Liked
25:56Why are so many companies spending billions on AI, only to see their most ambitious projects stall out before they ever impact the customer experience? Agility requires more than just a fast-moving marketing team. It requires the foundational ability to connect disparate systems and data sources, allowing new technologies like AI to be implemented …
…
continue reading
1
Why Networking Is Your Secret Weapon in Cybersecurity Job Hunting
12:42
12:42
Play later
Play later
Lists
Like
Liked
12:42In this episode, Tom Eston discusses the unique challenges in the current cybersecurity job market, emphasizing the importance of networking. Tom provides practical tips on how to enhance networking skills, such as attending conferences, volunteering for open source projects, creating a blog, and seeking mentors. He also addresses misconceptions ab…
…
continue reading
In this episode, we're revisiting some of the most magical moments and scientific milestones of 2025 - including the incredible legacy of Dame Jane Goodall, the brain-wave reading bionic-knee, why labradors are so greedy, and the beer that doesn't give you a hangover... Like this podcast? Please help us by supporting the Naked Scientists…
…
continue reading
1
SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues (#)
6:01
6:01
Play later
Play later
Lists
Like
Liked
6:01SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ("Thread Local Storage") and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND…
…
continue reading
1
Year-End Review: The Highs and Lows of Cybersecurity in 2025
55:25
55:25
Play later
Play later
Lists
Like
Liked
55:25Cybersecurity Today brings you a special year-end episode, featuring noteworthy guests Tammy Harper from Flare, Laura Payne from White Tuque, David Shipley from Beauceron Security, and John Pinard, co-host of Project Synapse. This episode delves into the pivotal cybersecurity stories of 2025, including a detailed discussion on MFA phishing attacks,…
…
continue reading
Jon's car may or may not be fixed. Eric didn't go to Disneyland. Android is making in-call scam protection better. AI is creating a Blessing of Unicorns. Parked Domains keep scammers alive. Space is getting crowded. Word of the Year - Slop. 0:00 - Introduction 6:38 - In Call Scam Protection 10:21 - A Blessing of Unicorns 13:15 - Parked Domains are …
…
continue reading
1
Russian Targeting of Edge Devices. Cisco AsyncOS Zero Day, and React2Shell Won't Go Away
21:25
21:25
Play later
Play later
Lists
Like
Liked
21:25As we ease into the holidays, the security news doesn't stop coming. This week we discuss the research from AWS threat intelligence on Russian adversaries targeting a variety of network edge devices for opportunistic exploitation, then we break down attacks by a Chinese threat actor that target a new zero day in Cisco's AsyncOS, and finally we disc…
…
continue reading
1
Country of the year: The Economist’s pick for 2025
23:42
23:42
Play later
Play later
Lists
Like
Liked
23:42Each year, The Economist tries to identify which country has improved the most, whether economically, politically or in other ways. In a turbulent year, the choice was tricky. We unveil the result. And The Economist Educational Foundation helps kids worldwide be more news-savvy. We invite you to donate and support its work: https://economistfoundat…
…
continue reading
1
World-leaders in Cryptography: Giuseppe Ateniese
1:34:41
1:34:41
Play later
Play later
Lists
Like
Liked
1:34:41Giuseppe is a Professor, Eminent Scholar in the Cybersecurity and CCI Faculty Fellow in the Department of Computer Science and the Department of Cyber Security Engineering at George Mason University. He has advanced many areas of research, including proxy re-encryption, anonymous communication, two-party computation, secure storage, and provable da…
…
continue reading
1
587 | Mike Konczal: What’s Actually Driving the Affordability Crisis + Announcing the Niskanen Summer Institute for Undergrads
42:52
42:52
Play later
Play later
Lists
Like
Liked
42:52Niskanen Summer Institute: https://www.niskanencenter.org/niskanen-summer-institute-democracy-that-works/ The Affordability Framework: https://economicsecurityproject.org/news/introducing-the-affordability-framework-a-tool-for-understanding-americas-affordability-crisis/ Realignment Newsletter: https://therealignment.substack.com/ Realignment Books…
…
continue reading
1
On the Zero Day of Christmas - Cisco Devices Under Attack
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35Cybersecurity Today: Cisco Zero Day Exploited & Maritime Cyber Attack Unfolds In this episode of Cybersecurity Today, host David Shipley discusses a series of critical cybersecurity incidents, including the exploitation of a zero-day flaw in Cisco email security infrastructure by a China-linked group, a Hollywood-style attack on an Italian ferry in…
…
continue reading
1
#786: Thrad CEO Andrea Tortella on advertising in your conversational AI
32:27
32:27
Play later
Play later
Lists
Like
Liked
32:27What if the most valuable part of your next conversation with an AI wasn't the answer it gave, but the ad it served? Agility requires more than just adopting new platforms; it demands a complete re-imagination of how brands provide value within them. It challenges us to move from interruption to integration, ensuring our presence is not only seen b…
…
continue reading
1
MI6 pushes cyber security, and WHO warns of fat jab shortage
30:35
30:35
Play later
Play later
Lists
Like
Liked
30:35This week, defence analyst, Michael Clarke, explains the significance of the MI6 agency's scientific shift. Will it help counter Russia's technological threat? Plus, the University of Glasgow's Naveed Sattar tells us why weight loss medicine could be a silver bullet for global obesity, Ellie Diamant at Bard College on beaky birds during COVID, and …
…
continue reading
1
They Sold the Business. You Didn't Get Paid.
12:34
12:34
Play later
Play later
Lists
Like
Liked
12:34You wake up to an email that says, “We sold the company. We’re terminating. Please arrange offboarding.” Do you have options? You're damn right you do. Welcome to the latest episode of the Technology Bradcast.By Bradley Gross
…
continue reading
CFR's Paul Stares unpacks the latest annual survey of foreign policy experts bracing for what might lie ahead. Guest: Paul Stares, General John W. Vessey senior fellow for conflict prevention and director of the Center for Preventive Action at the Council on Foreign Relations. Read the 2026 Preventive Priorities Survey results published this week a…
…
continue reading
1
SANS Stormcast Friday, December 19th, 2025: Less Vulnerabie Devices; Critical OneView Vulnerablity; Trufflehog finds JWTs (#)
4:38
4:38
Play later
Play later
Lists
Like
Liked
4:38SANS Stormcast Friday, December 19th, 2025: Less Vulnerabie Devices; Critical OneView Vulnerablity; Trufflehog finds JWTs Positive trends related to public IP range from the year 2025 Fewer ICS systems, as well as fewer systems with outdated SSL versions, are exposed to the internet than before. The trend isn't quite clean for ISC, but SSL2 and SSL…
…
continue reading
1
Really intelligent machines and the path to Artificial Intelligence
35:38
35:38
Play later
Play later
Lists
Like
Liked
35:38Is AI smarter than a five-year-old? In this episode of Connect, we sit down with Dr. Cyrus Shaoul, co-founder and Chief Evangelist at Leela AI, to unpack what artificial intelligence and visual analytics can and cannot accomplish. Cyrus breaks down how these tools are being used to make environments safer, operations more efficient, and decisions m…
…
continue reading
1
Securitization: The principles of data center financing
27:23
27:23
Play later
Play later
Lists
Like
Liked
27:23Claude Brown, Jeffrey Stern, and Simon Hugo explore the various securitization structures within the data center sector, followed by an in-depth discussion on the environmental and social implications of data centers. This episode concludes with a comprehensive market overview of investment trends in the data center industry.…
…
continue reading
1
Weight boss? Competition for Novo Nordisk
21:10
21:10
Play later
Play later
Lists
Like
Liked
21:10Since Novo Nordisk launched Wegovy in 2021, it has dominated the fast-growing market for slimming drugs. Now a new jab is eating into the Danish firm’s success. Why a slang expert thinks the first word humans ever uttered may have been a profane one. And why British sheep have got happier. Listen to what matters most, from global politics and busin…
…
continue reading
1
Rahm Returns to Chat Trump and China: “He is the worst negotiator.”
1:00:59
1:00:59
Play later
Play later
Lists
Like
Liked
1:00:59Rahm Emanuel returns to ChinaTalk with a characteristically blunt assessment of U.S.-China relations, delivering an unsparing verdict on the first year of Donald Trump’s second term. We discuss: The “Fear Factor” in Asia: Why Japan and South Korea are ramping up defense spending not because of Trump’s strength, but because his unpredictability and …
…
continue reading
1
SANS Stormcast Thursday, December 18th, 2025: More React2Shell; Donicwall and Cisco Patch; Updated Chrome Advisory (#)
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11SANS Stormcast Thursday, December 18th, 2025: More React2Shell; Donicwall and Cisco Patch; Updated Chrome Advisory Maybe a Little Bit More Interesting React2Shell Exploit Attackers are branching out to attack applications that initial exploits may have missed. The latest wave of attacks is going after less common endpoints and attempting to exploit…
…
continue reading
1
Episode 077 – What Security Leaders Do for Fun
15:59
15:59
Play later
Play later
Lists
Like
Liked
15:59From Spartan races to culinary arts, discover the hobbies and passions that keep CISOs balanced and inspired in this behind-the-scenes edition of Agent of Influence. Welcome to a special edition of the Agent of Influence podcast! In this episode, we step away from the usual cybersecurity deep dives to explore the personal side of security leaders, …
…
continue reading
1
Former AI Act negotiator Laura Caroli on the proposed EU Digital Omnibus for AI
49:18
49:18
Play later
Play later
Lists
Like
Liked
49:18On November 19, the European Commission unveiled two major omnibus packages as part of its European Data Union Strategy. One package proposes several changes to the EU General Data Protection Regulation, while the other proposes significant changes to the recently minted EU AI Act, including a proposed delay to the regulation of so-called high-risk…
…
continue reading
1
Emissions possible: EU petrol ban quashed
20:02
20:02
Play later
Play later
Lists
Like
Liked
20:02The European Union had promised to ban the sale of new diesel and petrol vehicles by 2035, as part of its environmental ambitions. Yesterday it watered down that commitment. Our correspondent explains the implications. Will Donald Trump’s choice of Federal Reserve chair politicise the institution? And The Economist announces its word of the year. L…
…
continue reading
1
React2Shell Vulnerability, Black Force Phishing Kit, Microsoft OAuth Attacks, and PornHub Data Breach
14:46
14:46
Play later
Play later
Lists
Like
Liked
14:46In this episode of Cybersecurity Today, host Jim Love discusses a range of pressing cybersecurity threats. The show covers the escalating React2Shell vulnerability, which has led to widespread automated exploitation campaigns involving crypto miners and back doors. Additionally, Jim reports on the Black Force phishing kit, which bypasses multifacto…
…
continue reading
Pete Baker and Zoe Lindsey join Dennis Fisher on the roof of Nakatomi Plaza to discuss one of the great action classics* and a beloved movie in the hacker community: Die Hard. Yippee ki-yay! *NOT a Christmas movie Support the showBy Decipher
…
continue reading