Your weekly fix of everything economics. Hosted by James Meadway.
…
continue reading
Security Weekly Productions Podcasts
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Hosted by Product School Founder & CEO Carlos Gonzalez de Villaumbrosia, The Product Podcast features candid conversations with product management executives from the world's best tech companies like Google, Meta, Netflix, Airbnb, and Amazon. New episodes release weekly, unveiling actionable frameworks, unconventional best practices, and real-world examples you can implement immediately. Perfect for senior product managers, directors, and VPs hungry to build better products, stronger teams, ...
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Brought together by their unified passion for tennis and ability to not take each other too seriously, Joel, Kim & Chris are here every Monday to give their verdict on the biggest stories from everyone’s favourite fuzzy yellow ball sport. From the sublime to the ridiculous (with the odd bit of trivia thrown in), Tennis Weekly serves an all-court mix of ATP/WTA tour catch-ups, Grand Slam round-by-round coverage and special guests in conversation, to be your definitive tennis companion for the ...
…
continue reading
Semiconductor Insiders A weekly podcast series by SemiWiki.com, the open forum for semiconductor professionals.
…
continue reading
Sirens, a new podcast from the ladies of Bombshell, dissects the institutions of American power. With their trademark wit and charm, join Loren DeJonge Schulman, Radha Iyengar Plumb, and Erin Simpson as they sound the alarm on technology, governance, and national security issues. (And maybe lure men to their deaths.)
…
continue reading
Software Unscripted, A weekly podcast of casual conversations about code hosted by Richard Feldman. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Talk Python to Me is a weekly podcast hosted by developer and entrepreneur Michael Kennedy. We dive deep into the popular packages and software developers, data scientists, and incredible hobbyists doing amazing things with Python. If you're new to Python, you'll quickly learn the ins and outs of the community by hearing from the leaders. And if you've been Pythoning for years, you'll learn about your favorite packages and the hot new ones coming out of open source.
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
M365 Voice is a weekly podcast dedicated to share information with the community about the Microsoft 365 platform that includes Office 365, Windows 10 and EMS. Our podcasts will be 20 minutes each and will cover new features, updates, best practices and other ideas about the platform. We will also host guests from the community and from different Microsoft Product Group members.
…
continue reading
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
The Twenty Minute VC (20VC) interviews the world's greatest venture capitalists with prior guests including Sequoia's Doug Leone and Benchmark's Bill Gurley. Once per week, 20VC Host, Harry Stebbings is also joined by one of the great founders of our time with prior founder episodes from Spotify's Daniel Ek, Linkedin's Reid Hoffman, and Snowflake's Frank Slootman. If you would like to see more of The Twenty Minute VC (20VC), head to www.20vc.com for more information on the podcast, show note ...
…
continue reading
Welcome to Hands-On Tech, where host Mikah Sargent turns tech troubles into tech triumphs. Each episode zooms in on a specific theme, unpacking listener questions with expert analysis and easy-to-follow advice. From decoding the latest gadgets to simplifying everyday tech, Mikah's got you covered. Submit your tech queries through email at [email protected] or via TWiT's social media. You might hear your question answered on air! Whether you're puzzled by privacy settings or curious about cutting-e ...
…
continue reading
We are often distracted in life and never really dive deep into the real foundation of self improvement, goal achieving, and wellbeing. - Join our team of experts every week as we discuss the real facets of manhood. Topics like: How to develop more self esteem, self love, deeper relationships. How to improve our wellbeing, mental toughness, resilience, and productivity. How to develop critical skills, become better leaders, expand our careers/business, create financial security and contribut ...
…
continue reading
Ready to work on yourself, supercharge your life and create the love, happiness, and success you truly deserve? Join me, Dr. Lisa Marie Bobby, your trusty guide on this transformative journey! I'm here every week to help you develop yourself, do the work, and grow into the person you want to be. In every episode, you'll discover the secrets to incredible relationships, authentic happiness, life-changing personal growth, the dream career you've been longing for, and how to create all the good ...
…
continue reading
Whether you’re buried in paperwork or just looking for a break from the grind, we’ve got your back with HR Mixtape. Tune in each week to hear thought-provoking interviews with industry leaders, compliance tips, coffee chats with human resources trendsetters, and the latest HR-related news. It’s like nothing else out there: it’s the perfect mix of practical advice and stories that just hit different so that work doesn’t have to feel like...well...work!
…
continue reading
The Naval Institute is a private, not-for-profit educational institution whose mission is to provide an independent forum for those who dare to read, think, speak, and write to advance the professional, literary, and scientific understanding of sea power and other issues critical to global security. Every week on the Proceedings Podcast, the Naval Institute's Director of Outreach, Ward Carroll, and the Editor-in-Chief of Proceedings, Bill Hamblet, talk about what's happening in the Sea Servi ...
…
continue reading
I'm always fascinated by new technology, especially AI. One of my biggest regrets is not taking AI electives during my undergraduate years. Now, with consumer-grade AI everywhere, I’m constantly discovering compelling use cases far beyond typical ChatGPT sessions. As a tech founder for over 22 years, focused on niche markets, and the author of several books on web programming, Linux security, and performance, I’ve experienced the good, bad, and ugly of technology from Silicon Valley to Asia. ...
…
continue reading
How is technology changing our lives? Hosting interviews with innovators, execs, and more, Canada’s tech expert Mike Agerbo explores how everything from tech gadgets to internet culture are changing our world. For over 20 years, Mike Agerbo has made technology simple for audiences. He brings the latest gadgets to Global TV audiences with his weekly Noon Hour News Tech Talk segment and hosts the popular tech TV and YouTube show GetConnected. He also hosts The App Show, a radio show all about ...
…
continue reading
A bi-weekly podcast that helps you curb cybersecurity risk and tackle technology challenges
…
continue reading
What’s indexing this week in crypto, blockchain, and open-source AI? Find out on The Index, where we feature exclusive conversations that go beyond code. Each week, host and entrepreneur Alex Kehaya talks with founders, developers, and investors who are shaping the future of Web3. From startup advice to breakthrough strategies, our guests share their stories and take a deep dive into the decentralized future.
…
continue reading
1
The Pentagon and the Press: interview with Valerie Insinna
29:32
29:32
Play later
Play later
Lists
Like
Liked
29:32Breaking Defense reporter and longtime Pentagon press corps member Valerie Insinna details the work of the media in DOD, what the department owes Americans in terms of transparency, and the implications of Hegseth's new press guidelines.
…
continue reading
1
Podcast EP316: An Introduction to Hardware Security Modules (HSMs) and Marvell’s Unique LiquidSecurity Offering with Bill Hagerstrand
9:20
9:20
Play later
Play later
Lists
Like
Liked
9:20Daniel is joined by Bill Hagerstrand, director of Security Business at Marvell Technology where he manages the market-leading Marvell LiquidSecurity® HSM business. Bill has more than 20 years of experience in the semiconductor, AI/machine learning, and security markets. Bill explains what an HSM is, how it is configured and… Read More…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
This week on The Curve, James Meadway is joined by author and journalist Sarah Jaffe who has covered New York politics extensively. Together, they discuss Zohran Mamdani's momentous victory in New York's mayoral election and what it means for the future of economic populism on the left. In the full episode James and Sarah also discuss UK Chancellor…
…
continue reading
1
Risky Business #813 -- FFmpeg has a point
1:05:08
1:05:08
Play later
Play later
Lists
Like
Liked
1:05:08In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: We love some good vulnerability reporting drama, this time FFmpeg’s got beef with Google OpenAI announces its Aardvark bug-gobbling system Two US ransomware responders get arrested for… ransomware Memento (nee HackingTeam) CEO says: Sì, those are tot…
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-526
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-526
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-526
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Show Notes: https://securityweekly.com/swn-526
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Show Notes: https://securityweekly.com/swn-526
…
continue reading
1
Episode 135 – Enterprise Adoption Strategies for rolling out M365 Copilot
21:21
21:21
Play later
Play later
Lists
Like
Liked
21:21In this episode, we explore how organizations are adopting M365 Copilot and discuss various strategies to boost AI usage. We share several ideas, including hybrid deployment approaches, expanding Copilot’s capabilities, techniques for increasing adoption, personal use cases, prompt engineering, addressing issues like unclear benefits and licensing …
…
continue reading
1
Creating Trauma-Informed Workplaces: Understanding and Addressing the Impact of Trauma with Anita Roach
26:39
26:39
Play later
Play later
Lists
Like
Liked
26:39In this episode of the HR Mixtape, host Shari Simpson welcomes Anita Roach, founder of the Safe and Sound Workplace Alliance, to discuss the critical concept of trauma-informed workplaces. This timely conversation delves into how organizations can foster psychologically safe and equitable cultures, especially in light of increasing employee trauma …
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Sinner secures No.1 ranking from Alcaraz in Paris, WTA Finals underway + Mboko triumph!
1:04:31
1:04:31
Play later
Play later
Lists
Like
Liked
1:04:31Jannik Sinner is back at No.1 after lifting the title in Paris for the first time. He surpasses Carlos Alcaraz for at least a week as the battle to be the year end No.1 heats up ahead of the ATP Finals. Sinner overcame Felix Auger Aliassime in the final to win his first Masters 1000 of the year but it will be a tall order if he is to retain the num…
…
continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
Play later
Play later
Lists
Like
Liked
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
Play later
Play later
Lists
Like
Liked
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
Play later
Play later
Lists
Like
Liked
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
Play later
Play later
Lists
Like
Liked
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
continue reading
1
If Attackers Built Your Security Plan
1:00:43
1:00:43
Play later
Play later
Lists
Like
Liked
1:00:43Welcome back to the Off the Wire Podcast! In this episode, we dive deep into the world of cybersecurity from an offensive standpoint. We sit down with Slade, the President of Contextual Security Solutions, to uncover what truly works in defending against real attack methods. Slade shares captivating stories and practical insights on penetration tes…
…
continue reading
1
When Does “My Money” Become “Our Money”? | Money and Relationships | E482
55:05
55:05
Play later
Play later
Lists
Like
Liked
55:05Have you ever asked yourself, “When does ‘my money’ become ‘our money’?” It’s one of those questions couples don’t really face until tension starts to build. And by then, it’s rarely about the dollars. It’s about fairness, power, and feeling seen. In this episode, I’m joined by Heather and Douglas Boneparth, the power couple behind Bone Fide Wealth…
…
continue reading
1
20VC: Cohere's Chief Scientist on Why Scaling Laws Will Continue | Whether You Can Buy Success in AI with Talent Acquisitions | The Future of Synthetic Data & What It Means for Models | Why AI Coding is ...
57:34
57:34
Play later
Play later
Lists
Like
Liked
57:34Joelle Pineau is the Chief Scientist at Cohere, where she leads research on advancing large language models and practical AI systems. Before joining Cohere, she was VP of AI Research at Meta, where she founded and led Meta AI's Montreal lab. A professor at McGill University, Joelle is renowned for her pioneering work in reinforcement learning, robo…
…
continue reading
1
HOT 240: Two-Factor & Multifactor Authentication - Which Authenticator App Should You Use?
27:01
27:01
Play later
Play later
Lists
Like
Liked
27:01On Hands-On Tech, Mikah Sargent lists some of his favorite two-factor authenticator apps for listener Stuart and some of the pros and cons using 2FA applications. Send in your questions for Hands-On Tech to [email protected]! Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video…
…
continue reading
1
#526: Building Data Science with Foundation LLM Models
1:07:24
1:07:24
Play later
Play later
Lists
Like
Liked
1:07:24Today, we’re talking about building real AI products with foundation models. Not toy demos, not vibes. We’ll get into the boring dashboards that save launches, evals that change your mind, and the shift from analyst to AI app builder. Our guide is Hugo Bowne-Anderson, educator, podcaster, and data scientist, who’s been in the trenches from scalable…
…
continue reading
1
Guarding the JavaScript Supply Chain: Preventing NPM Attacks with Feross Aboukhadijeh - JSJ 695
1:00:01
1:00:01
Play later
Play later
Lists
Like
Liked
1:00:01Hey everyone—it’s Steve Edwards here, and in this episode of JavaScript Jabber, I’m joined by returning guest Feross Aboukhadijeh, founder of Socket.dev, for a deep dive into the dark and fascinating world of open source supply chain security. From phishing campaigns targeting top NPM maintainers to the now-infamous Chalk library compromise, we unp…
…
continue reading
1
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen - Rob Allen - SWN #525
32:25
32:25
Play later
Play later
Lists
Like
Liked
32:25AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
…
continue reading
1
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen - Rob Allen - SWN #525
32:25
32:25
Play later
Play later
Lists
Like
Liked
32:25AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
…
continue reading
1
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen - Rob Allen - SWN #525
32:25
32:25
Play later
Play later
Lists
Like
Liked
32:25AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
…
continue reading
1
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen - Rob Allen - SWN #525
32:25
32:25
Play later
Play later
Lists
Like
Liked
32:25AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
…
continue reading