Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Software Security Podcasts
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The State and Popular Culture
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Off The Wall is a weekly show on WUSB radio, Stony Brook - Long Island, produced by 2600 Magazine. This feed offers a high-bitrate (128k) MP3 version of the show.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Off The Hook a podcast from 2600: The Hacker Quarterly. It discusses the hacker's view of the emerging technology, and the threats posed by an increasingly Orwellian society. Hear updates on security flaws from the hacker perspective, as well as the latest news from within the hacker community. Follow us on Twitter @HackerRadioShow and Mastodon @[email protected]
…
continue reading
1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
1
SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability.
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing s…
…
continue reading
Today we are joined by Dr. Sasha O'Connell, Senior Director for Cybersecurity Programs at Aspen Digital, discussing "10 Years of Cybersecurity Progress & What Comes Next." Ben talks about a couple of instances of AI companies reigning in their chatbots. Dave's got the story of ICE’s controversial facial recognition operations. While this show cover…
…
continue reading
1
Seeing the unseen: why geospatial intelligence is important
41:57
41:57
Play later
Play later
Lists
Like
Liked
41:57What are the origins of AGO and how has the organisation developed within the National Intelligence Community? How does AGO contribute to the broader remit of Australian statecraft, the work done by other NIC agencies, and the Five Eyes partnership? What are some of the biggest challenges in Australia’s immediate region that AGO is working towards?…
…
continue reading
1
SANS Stormcast Thursday, November 6th, 2025: Domain API Update; Teams Spoofing; VShell Report
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation v…
…
continue reading
1
Off The Hook - Wed, 05 Nov 2025 19:00:00 EST
54:51
54:51
Play later
Play later
Lists
Like
Liked
54:51Feelings about the election results, reactions to last week's show, new life for old Nest thermostats, unnecessary complexity, listener email, ICE using facial recognition tech.By [email protected] (Emmanuel Goldstein et.al.)
…
continue reading
Operation “Chargeback” takes down global fraud networks. An investigation reveals the dangers of ADINT. M&S profits plunge after a cyberattack. Google patches a critical Android flaw. Asian prosecutors seize millions from an accused Cambodian scam kingpin. Ohio residents are still guessing water bills months after a cyberattack. Houston firefighter…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Scattered Spider, LAPSUS$, ShinyHunters join forces, Nikkei data breach impacts 17k people, React Native NPM flaw leads to attacks
6:59
6:59
Play later
Play later
Lists
Like
Liked
6:59Scattered Spider, LAPSUS$, and ShinyHunters join forces Nikkei reports data breach impacting 17,000 people React Native NPM flaw leads to attacks Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero…
…
continue reading
1
Ransomware Insider Threats, AI Vulnerabilities, and Major Security Gaffes
10:14
10:14
Play later
Play later
Lists
Like
Liked
10:14In this episode of Cybersecurity Today, host Jim Love dives into several shocking security lapses and emerging threats. Highlights include ransomware negotiators at Digital Mint accused of being behind attacks, a new AI vulnerability that exploits Windows' built-in stack, and a misuse of OpenAI's API for command and control in malware operations. A…
…
continue reading
1
SN 1050: Here Come the AI Browsers - Scareware Blockers
3:21:25
3:21:25
Play later
Play later
Lists
Like
Liked
3:21:25AI-powered web browsers are hitting the scene fast, but Steve and Leo unpack why these smart assistants could usher in an era of security chaos most users aren't ready for. Brace yourself for the wild risks, real-world scams, and the privacy questions no one else is asking. Secret radios discovered in Chinese-made busses. Edge & Chrome introduce LL…
…
continue reading
1
Yahoo's Sean Zadig on How to Raise a Hacker Safely and How Maybe AI Isn't Changing Everything
51:29
51:29
Play later
Play later
Lists
Like
Liked
51:29Yahoo CISO and Chief Paranoid Sean Zadig returns to the podcast for a discussion with Dennis Fisher about how to go about getting kids interested in technology and teaching them about hacking (in the broad, classical sense) safely (9:10). Then they talk about how rapidly the cybersecurity industry is changing and what effects AI is and is not havin…
…
continue reading
1
Risky Business #813 -- FFmpeg has a point
1:05:08
1:05:08
Play later
Play later
Lists
Like
Liked
1:05:08In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: We love some good vulnerability reporting drama, this time FFmpeg’s got beef with Google OpenAI announces its Aardvark bug-gobbling system Two US ransomware responders get arrested for… ransomware Memento (nee HackingTeam) CEO says: Sì, those are tot…
…
continue reading
1
SANS Stormcast Wednesday, November 5th, 2025: Apple Patches; Exploits against Trucking and Logistic; Google Android Patches
6:29
6:29
Play later
Play later
Lists
Like
Liked
6:29Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tool…
…
continue reading
By Emmanuel Goldstein
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-526
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-526
…
continue reading
China-Linked hackers target Cisco firewalls. MIT Sloan withdraws controversial “AI-Driven Ransomware” paper. A new study questions the value of cybersecurity training. Hackers exploit OpenAI’s API as a malware command channel. Apple patches over 100 Security flaws across devices. A Florida-based operator of mental health and addiction treatment cen…
…
continue reading
Episode 302 of Absolute AppSec has hosts Ken Johnson and Seth Law speculating on the upcoming Global AppSec DC conference, predicting the announcement of the OWASP Top Ten 2025 edition, with Brian Glass scheduled to discuss it on the podcast. The conversation shifts to a technical discussion of OpenAI's new browser, Atlas, which is built on Chromiu…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
I Don't Just Guess About Effectiveness, I Make Educated Guesses!
39:26
39:26
Play later
Play later
Lists
Like
Liked
39:26All links and images can be found on CISO Series. This week's episode is hosted by me, David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining us is Sara Madden, CISO, Convera. In this episode: Optimizing for reality, not idealism Engineering governance instead of monitoring compliance When AI finds what humans mi…
…
continue reading
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, …
…
continue reading
Tanya Janca is a globally recognized AppSec (application security) expert and founder of We Hack Purple. In this episode, she shares wild stories from the front lines of cybersecurity. She shares stories of when she was a penetration tester to an incident responder. You can sign up for her newsletter at https://newsletter.shehackspurple.ca/ Sponsor…
…
continue reading
Please enjoy this encore of Word Notes. The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. CyberWire Glossary link: …
…
continue reading
In 2017, NSA contractor Reality Winner mailed a five-page classified document to “The Intercept.” What happened next – a botched verification, an FBI knock at her door, and a prison sentence under the Espionage Act – raised big questions about how journalists handle secrets and how the government punishes those who share them. We talk to Reality ab…
…
continue reading
1
"SleepyDuck" uses Ethereum, SesameOp abuses OpenAI API, cybercrooks steal physical cargo
7:36
7:36
Play later
Play later
Lists
Like
Liked
7:36"SleepyDuck" uses Ethereum to keep command server alive SesameOp abuses OpenAI Assistants API Organized crime cybercrooks steal cargo Huge thanks to our sponsor, ThreatLocker Cybercriminals don't knock — they sneak in through the cracks other tools miss. That's why organizations are turning to ThreatLocker. As a zero-trust endpoint protection platf…
…
continue reading
1
Privacy needs where you least expect it. [CISO Perspectives]
36:08
36:08
Play later
Play later
Lists
Like
Liked
36:08When discussing privacy risks, many often look to implementing strong encryption, secure data storage practices, and data sanitization processes to help ensure sensitive information remains protected. Though these practices are good and should be prioritized, many often miss other key areas that need just as much focus. As the internet of things ha…
…
continue reading
1
SANS Stormcast Tuesday, November 4th, 2025: XWiki SolrSearch Exploits and Rapper Feud; AMD Zen 5 RDSEED Bug; More Malicious Open VSX Extensions
6:56
6:56
Play later
Play later
Lists
Like
Liked
6:56XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.edu/diary/XWiki%20SolrSearch%20Exploit%20Attempts%20%28CVE-2025-24893%29%20with%20link%20to%20Chicago%20Gangs%20Rappers/32444 AMD Zen 5 Random Num…
…
continue reading
1
Department of Know: Azure security pitfalls, retailer cyberattack profits, Aardvark eats bugs
33:46
33:46
Play later
Play later
Lists
Like
Liked
33:46Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Davi Ottenheimer, vp, digital trust and ethics, Inrupt, and Rob Teel, Field CTO, GigaOm Thanks to our show sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's w…
…
continue reading
1
8.5 - Footprint Discovery for Red Teamers
29:18
29:18
Play later
Play later
Lists
Like
Liked
29:18Red Teaming 101: understand your target before you attack. On this episode, we invited two heavy hitters, Principal Security Consultants Hans Lakhan and Oddvar Moe on the show to talk about Red Team operations. We discuss footprinting and reconnaissance techniques including identifying a target's online presence, the tools and methods used for reco…
…
continue reading
The FCC plans to roll back cybersecurity mandates that followed Salt Typhoon. The alleged cybercriminal MrICQ has been extradited to the U.S. Ransomware negotiators are accused of conducting ransomware attacks. Ernst & Young accidentally exposed a 4-terabyte SQL Server backup. A hacker claims responsibility for last week’s University of Pennsylvani…
…
continue reading
Want to be the first to hear our episodes each week? Become a Patreon donor here. Links we discuss this week: https://thehackernews.com/2025/10/self-spreading-glassworm-infects-vs.html?m=1 https://www.cybersecuritydive.com/news/artificial-intelligence-security-risks-ey-report/803490/ https://www.cybersecuritydive.com/news/ai-augment-security-identi…
…
continue reading
1
How to Manage Manipulative and Disruptive Behavior at Work and in Public Spaces
26:55
26:55
Play later
Play later
Lists
Like
Liked
26:55Have you ever felt manipulated into doubting yourself and your abilities, even though your track record shows that you’re doing well? You might have encountered a gaslighter, says Michael Gips, CPP. These individuals’ manipulative shenanigans can be costly to personnel and productivity unless managers intervene promptly. Also in this episode, disru…
…
continue reading
Today we’ll wrap up my series of tips for enumerating all your old online accounts and deciding whether to delete them or just dumb down the personal data they have on you. There are several things to consider – we’ll go through them all! In other news: a study ranks the most private AI chatbots; LinkedIn is set to use your personal data to train t…
…
continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
Play later
Play later
Lists
Like
Liked
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
Play later
Play later
Lists
Like
Liked
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
continue reading