Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Understanding Cyber Podcasts
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Robert Peston and Steph McGovern bring you insightful business and finance stories. Join Robert Peston and Steph McGovern as they delve into the key challenges and opportunities facing today’s business world. From the complexities of tech investments to the impact of political decisions on global markets, this podcast offers valuable perspectives on current financial topics. Whether discussing business funding, economic policies, or corporate strategies, they provide listeners with the tools ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Mastering Cybersecurity is your narrated audio guide to the essential building blocks of digital protection. Each 10–15 minute episode turns complex security concepts into clear, practical lessons you can apply right away—no jargon, no fluff. From passwords and phishing to encryption and network defense, every topic is designed to strengthen your understanding and confidence online. Whether you’re new to cybersecurity or refreshing your knowledge, this series makes learning simple, smart, an ...
…
continue reading
The Cyber-Savvy Woman is where women business owners reclaim their power in the digital world. We break down the cybersecurity barriers that have kept women out of critical tech conversations, transforming complex protection strategies into clear, actionable guidance. Our vision: every woman leading a business deserves to feel unshakeable in her digital decisions—no matter her technical background. From women founders who lead businesses in a digital world to top security experts who underst ...
…
continue reading
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
…
continue reading
Our podcast covers major data breaches, digital privacy issues, and the quirks of internet culture with a mix of humor and insight. Why Subscribe? Stay Informed: Get the latest updates on cybersecurity threats, ransomware attacks, and cyber insurance trends. Engaging Content: We break down complex topics with a lighthearted approach, making them easy to understand. Expert Insights: Learn from industry experts and our own experiences in the cybersecurity field. We dive deep into the latest in ...
…
continue reading
2 Cyber Chicks is an inclusive cybersecurity podcast designed to educate and break the stereotypes of cybersecurity professionals. We will be discussing the “tough” topics that come along with being a woman in this field while providing life hacks on how to handle burnout, networking, and goal-setting. Our mission is to cast a net to an inclusive audience and provide a safe place for discussion. Guests will include leading professionals in the field, providing real-life insight and demystify ...
…
continue reading
Welcome to One Step Beyond Cyber, the ultimate IT and cybersecurity podcast that's sure to keep you on the edge of your seat! Whether you're a tech guru or a total newbie, our hosts Scott Kreisberg, and Tim Derrickson will make sure you're entertained and educated every step of the way. As technology advances, it can be challenging to keep up with the latest trends and developments. Don’t worry, our hosts are here to help! They will discuss real-world IT-related problems and solutions, as we ...
…
continue reading
Cyber Sitrep brings you all the latest cybersecurity news, commentary, and threat intelligence. Focused on small to midsize businesses who we feel have been left behind. Hosted by Eric from Corvus Technologies and Mike from Digital Beachhead who bring their unique perspective based on their military and cybersecurity experience. If you want to understand more about how cybersecurity is important to your organization, enjoy funny tales or just want to learn more about the field of cybersecuri ...
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
…
continue reading
This is your guide to navigating the ever-evolving world of cybersecurity. Hosted by Annie-Mei Forster and Anika Guenov, this podcast breaks down complex topics into relatable, easy-to-understand conversations. Whether you're a tech enthusiast, a curious newcomer, or a professional looking for fresh perspectives, join us as we explore cyber threats, digital safety tips, and the human stories behind the screen. Follow us on Instagram @thecybersecuritygals
…
continue reading
The GC+CISO Connection Show explores how we can better foster collaboration between organizations’ legal departments and security teams, with a focus on the General Counsel (GCs) and Chief Information Security Officers (CISOs). In an era where cyber threats are rapidly evolving, the partnership between legal and cybersecurity leaders is more crucial than ever. The goal of this Show is to enhance dialogue, understanding, and cooperation between these critical roles to bolster organizational c ...
…
continue reading
Unraveling the technology that affects us all but that few of us understand, in a format to give you a basic understanding in the time it takes to drive to and from the grocery store.
…
continue reading
Powerful interviews and on-the-go information to gain a better understanding of the various services and functions the City of Port Orange provides. For questions, comments, or feedback, please contact us at [email protected]
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
Welcome to Smarter Online Safety: Protect, Empower, Transform—your go-to channel for digital security, AI productivity, and digital transformation. As cyber fraud, identity theft, and AI-driven risks grow, Jocelyn King, “The Queen of Online Safety,” is here to help you stay secure and thrive. A Top 10 Woman in Cybersecurity, speaker, and educator, she has been featured on Dr. Phil, prime-time news, international radio, and top podcasts. 💡 What You’ll Learn: ✔️ Protect yourself & your family ...
…
continue reading
In today's interconnected world, the lines between cybersecurity and safety are more crucial than ever. Join us on "Cyber Safety: The Life-Saving Distinction," where we delve into the critical differences that could protect your digital life and personal well-being. Hosted by cybersecurity enthusiast Allison Cutts (AJ), this podcast explores the nuances of staying secure in a fast-paced digital age. Each episode offers insightful discussions, expert interviews, and practical advice to help y ...
…
continue reading
Raising Tech is your guide to understanding the role technology plays in your community, where to invest to transform culture, and how to bring your team and residents along the journey. Tune in to explore the latest tech trends, dive into hot topics, and hear from industry experts, community leaders, and innovative vendors shaping the senior living tech landscape. Each episode is packed with practical insights and real-world stories to help you spark change and level up your community’s tec ...
…
continue reading
Cyber Security doesn't have to be a daunting task. Everyone has the right to be more secure and enjoy some privacy while surfing the web. That's where we come in. We will give you simple yet effective ways of staying safe and private online. And we'll do it in a language you'll understand. Learn how to be Cyber Smart because Privacy Matters.
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
Bi-Weekly Cyber intellgence briefing, each episode includes update regrading some of the latest events happened in the cyber security world. This podcast is meant for people who wants to listen to a short (5 minute) overview about some of the latest events happened lately in the cyber world. The Podcast is not getting into technical details and anyone can understand.
…
continue reading
Artificial intelligence is reshaping how we work, live, and lead. But what does that mean for Australian businesses? The AI Australia Podcast, hosted by Emma Bromet and Kathryn Collier, is your essential guide to understanding the AI revolution and its impact on Australian businesses. We cut through the jargon to bring you practical discussions and expert interviews on how AI is affecting everything from enterprise strategy to daily life, with a focus on ethical and responsible AI, diversity ...
…
continue reading
CCN Conversations is the official podcast of the Canadian Cybersecurity Network, created to bring real voices and real experience directly to the cybersecurity community. Hosted by Francois Guay, founder of CCN, each episode opens the door to the people who are shaping how Canada protects, innovates, and grows. This show brings you candid conversations with practitioners, CISOs, founders, researchers, builders, and rising talent from Canada and beyond. You will hear honest insight and storie ...
…
continue reading
A podcast series aimed at helping Australians deepen their understanding of the local cyber security industry.
…
continue reading
This podcast features interviews of CTOs and other technical leadership figures and topics range from technology (AI, blockchain, cyber, DevOps, Web Architecture, etc.) to management (e.g. scaling, structuring teams, mentoring, technical recruiting, product etc.). Guests from leading tech companies share their best practices and knowledge. The goal is to support other CTOs on their journey through tech and engineering, inspire and allow a sneak-peek into other successful companies to underst ...
…
continue reading
Hacking Your Health Podcast with Ben Canning and Dave Kennedy - Two guys setting out to hack body, mind, business and beyond. We are here to provide a single source, bullshit free guide to understanding your body and how you can live better, for longer.
…
continue reading
Move beyond the headlines with fast & focused expert analysis on breaking news and big stories in foreign policy & national security. We help you understand the context and policy implications of the stories you see every day from around the world. In each episode, we sit down with an expert to break down a developing global news story—what's happening, why it matters, and how the United States should respond. For more information on the Vandenberg Coalition, visit our website: www.vandenber ...
…
continue reading
YASH cyber security solutions are helping global corporations address a plethora of cyber risks proactively and reactively. We help our customers to grow their business securely, we understand your world.
…
continue reading
Join George and Jim from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
…
continue reading
imanmeet13 brings you "Cyber Safar" which is an audio version of his daily experience in Hacking & Digital World. It’s FREE to learn here! You don’t have to have a coding bone in yourself to understand technology. Every single successful person out there is a practitioner & has some or the other motivational routine as well. Stay Informative every single day with Cyber Safar when it comes to Technology, Hacking & Motivation. Got doubt? Contact me⤵️ Instagram = https://www.instagram.com/imanm ...
…
continue reading
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
…
continue reading
Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security.. Each episode features our host Christie Ogubere This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free Website: https: ...
…
continue reading
1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
1
CCT 306: CISSP Domain 1.5: Understanding Legal, Regulatory, and Compliance Requirements
51:31
51:31
Play later
Play later
Lists
Like
Liked
51:31Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv What happens when cybersecurity meets the engine room of the business? We…
…
continue reading
1
Understanding Cyber Threats in Elections and Infrastructure with Maggie Miller
52:21
52:21
Play later
Play later
Lists
Like
Liked
52:21Welcome back to "Forcepoint," a podcast where we dive deep into the critical and evolving world of cybersecurity. In today's riveting episode, hosts Vince Spina and Rachael Lyon sit down with Maggie Miller, a cybersecurity reporter for Politico, to unpack some of the most pressing cyber threats we face today. From the notorious Ticketmaster hack du…
…
continue reading
1
Understanding Cellular Access Control and AI Adoption with Mark Bentsen
47:54
47:54
Play later
Play later
Lists
Like
Liked
47:54Guest Introduction Mark Bentsen serves as the Chief Information Officer at CellGate Access Control Systems and is the Co Founder of Secure IVAI, an artificial intelligence managed service provider. His career includes decades of experience in logistics, banking software, healthcare technology, and security engineering. Mark spent ten years at FedEx…
…
continue reading
Most threat actors come and go with the times, not lasting more than a couple years. Prince of Persia was assumed to be one such group, but it turns out they not only returned but never left in the first place. Sources: https://pastebin.com/9yJ1fxP3By Chloe Thonus
…
continue reading
1
CCT 308: Scripted Sparrow BEC and CISSP Incident Response - Domain 7.6
46:54
46:54
Play later
Play later
Lists
Like
Liked
46:54Send us a text A single convincing email can move real money. We break down how Scripted Sparrow and other BEC crews spoof reply chains, impersonate trusted service providers, and slip under approval thresholds to nudge finance teams into wiring funds. The threat isn’t flashy malware; it’s pressure, process gaps, and the illusion of internal approv…
…
continue reading
1
Avanade on Preparing Organizations for a World of Stronger Cybersecurity Expectations
27:59
27:59
Play later
Play later
Lists
Like
Liked
27:59What does the UK’s new Cyber Security and Resilience Bill actually mean for mid-sized businesses that sit quietly inside complex supply chains, often assuming the rules are aimed at someone else? In this episode of Business of Cybersecurity, I sit down with Jason Revill, Global Security Practice Technology Lead at Avanade, to unpack why this legisl…
…
continue reading
1
The Fast-Track Guide to VXLAN BGP EVPN Fabrics: Implement Today’s Multi-Tenant Software-Defined Networks
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48Offers an extensive guide to implementing VXLAN BGP EVPN fabrics, focusing heavily on the spine-and-leaf architecture in data center networking. It details the logical and physical components necessary for fabric creation, including the configuration of the underlay network using protocols like OSPF and IS-IS, and establishing the overlay network w…
…
continue reading
1
Ep. 334 - The 4th Monday Series - Travel Hacks and Tips with Christie Hudson
31:06
31:06
Play later
Play later
Lists
Like
Liked
31:06Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today, Chris and Mike are joined by Christie Hudson, a resident trave…
…
continue reading
How Chairman Archie Norman and CEO Stuart Machin are turning round one of the UK’s oldest and most iconic businesses, and how the government should watch and learn from it. If M&S can be great again, so can Britain. Email: the[email protected] X: …
…
continue reading
1
The Pythonic Way: An Architect’s Guide to Conventions and Best Practices for the Design, Development, Testing, and Management of Enterprise
10:43
10:43
Play later
Play later
Lists
Like
Liked
10:43A comprehensive guide for designing and developing enterprise Python code. It covers a vast array of topics, including best practices for code structure and quality (e.g., commenting, naming conventions, and PEP 8), effective use of Python data structures (lists, dictionaries, sets, and tuples), and object-oriented programming concepts (classes, in…
…
continue reading
1
Traefik API Gateway for Microservices: With Java and Python Microservices Deployed in Kubernetes
16:39
16:39
Play later
Play later
Lists
Like
Liked
16:39Detailing the configuration and use of Traefik as an API gateway in a microservices environment. The text explains the shift from monolithic to microservices architecture and the need for dynamic gateway solutions like Traefik, which offers features such as load balancing (Round Robin, Weighted Round Robin, Mirroring) for HTTP, TCP, and UDP traffic…
…
continue reading
1
Parenting in the Digital Jungle: Keeping Kids Safe Online
29:05
29:05
Play later
Play later
Lists
Like
Liked
29:05How can parents keep kids safe online without fear or constant conflict? 📱👨👩👧👦 In this episode of Smarter Online Safety, host Jocelyn King sits down with internationally recognized parenting expert Sue Atkins to talk about raising confident, safe kids in today’s digital world. They cover age-appropriate screen time, how to spot early signs of cy…
…
continue reading
An extensive overview of systems analysis and design, primarily focusing on the tenth edition of a textbook on the subject, likely by Kendall and Kendall. The content comprehensively covers the phases of the systems development life cycle (SDLC), including project management techniques such as feasibility analysis, PERT diagrams, and various conver…
…
continue reading
In this episode of Life of a CISO, Dr. Eric Cole explains why world-class CISOs must think like chief officers—not technicians. Drawing from boardroom experience and real-world cyber events, he breaks down the three threats executives are most concerned about heading into 2026: ransomware, cloud failures, and AI. Dr. Cole unpacks why the Land Rover…
…
continue reading
1
CCT 307: Practice CISSP Questions - Security Policies and Procedures
20:17
20:17
Play later
Play later
Lists
Like
Liked
20:17Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Headlines say the talent shortage is easing, yet nearly half of UK busine…
…
continue reading
1
Loose Leaf for Systems Analysis and Design
15:07
15:07
Play later
Play later
Lists
Like
Liked
15:07A detailed overview of the various phases, concepts, and tools involved in the Systems Development Life Cycle (SDLC). The text covers organizational topics such as the role and required skills of a systems analyst, the structure of the IT department, and strategic planning, including cost-benefit analysis and feasibility studies. It extensively exp…
…
continue reading
1
CRSP08: State of AI 2025 pt.3: AI Unplugged - from data to sovereign intelligence with Johanna Hutchinson, BAE Systems
42:58
42:58
Play later
Play later
Lists
Like
Liked
42:58In this last episode of the special AI mini-series, we now explore the human side of transformation, where technology meets purpose and people remain at the center. From future jobs and critical thinking to working with C-level leaders, how human intervention and high-quality data drive success in an AI-powered world. This week Dave, Esmee , Rob si…
…
continue reading
1
235. How M&S saw off the cyber criminals and its plan for the next 100 Years (Part 1)
46:35
46:35
Play later
Play later
Lists
Like
Liked
46:35Is there any worse trauma for a business than a cyber attack? What should you do if it happens? Plus how do M&S decide when to close a store and, if it does, is that the final nail in the coffin for that town centre? Steph and Robert talk with M&S chairman Archie Norman, about not just any cyber attack, but an M&S cyber attack. Plus what the barome…
…
continue reading
1
THE COMPLETE GUIDE TO COMPUTER HACKING: All What You Needs To Learn To Be An Amazing Hacker
20:04
20:04
Play later
Play later
Lists
Like
Liked
20:04An extensive guide to computer hacking for beginners, detailing various types of hackers, including Black Hat, White Hat, and Grey Hat practitioners. It thoroughly explains the most popular hacking technique, social engineering, outlining different forms such as Phishing, Impersonation, Vishing, and Smishing, which exploit human vulnerabilities. Fu…
…
continue reading
Australia's nationwide social media ban has put tech's age verification tools under the spotlight, exposing the flaws and privacy risks in today's facial detection systems and sparking worldwide debate about what's coming for the rest of us. Home Depot's puzzling reluctance to close a bad hole. GNOME's shell extension manager is unhappy with AI. Ho…
…
continue reading
1
SN 1056: Australia - AI Coding Blunders Exposed
2:56:38
2:56:38
Play later
Play later
Lists
Like
Liked
2:56:38Australia's nationwide social media ban has put tech's age verification tools under the spotlight, exposing the flaws and privacy risks in today's facial detection systems and sparking worldwide debate about what's coming for the rest of us. Home Depot's puzzling reluctance to close a bad hole. GNOME's shell extension manager is unhappy with AI. Ho…
…
continue reading
1
Lights, Camera, Confidence: Empowering Women Through Video with Caron Shahrestani
48:42
48:42
Play later
Play later
Lists
Like
Liked
48:42In this inaugural episode of Cyber Savvy Woman, host Rachel Shanker, a Silicon Valley technologist and owner of CMIT Solutions, sits down with Carone Ani, a video marketing expert and founder of a boutique marketing company. Together, they explore the latest tech trends shaping the digital landscape—like YouTube Shorts overtaking TikTok and Amazon’…
…
continue reading
The United States has continued to pressure the Maduro regime with F-18 flyovers, the seizure of oil tankers, and new sanctions on Venezuelan entities associated with the Maduro regime, alongside continued strikes on drug boats. Simultaneously, the Venezuelan opposition has continued gaining momentum. Notably, Maria Carina Machado, the head of the …
…
continue reading
1
Cloud War Games: Building Disaster Muscle Memory and Collaborative Resilience in DevOps Teams with Matt Lea
35:42
35:42
Play later
Play later
Lists
Like
Liked
35:42Welcome back to the Point Cybersecurity Podcast! On this week's episode, Rachael Lyon and Jonathan Knepher are joined by a very special guest, Matt Lea, the creator of Cloud War Games. Matt Lea shares his unique journey in cybersecurity, beginning with hacking video games as a sixth grader and evolving into a career helping startups and cloud profe…
…
continue reading
A comprehensive technical overview of synchronization and timing solutions within telecommunications, with a specific focus on 4G and 5G mobile networks. It explores the historical necessity of synchronization, progressing from frequency alignment for digital networks to the modern requirement for phase and time synchronization driven by mobile bas…
…
continue reading
1
Building The World's Only Cybersecurity Specific Health Eco-System
34:26
34:26
Play later
Play later
Lists
Like
Liked
34:26Something a little bit different this week. Andreas interviews me - the origin story and the coaching evolution. From working on the gym floor to building a cybersecurity specific health eco-system. Want more? Cyber Pro 8 week system reset Join 1600+ others on discord Support the show Want to know more about coaching? Book a call with Ben here Wher…
…
continue reading
1
Inside a Real World Ransomware Incident and Recovery with Zach Lewis
48:31
48:31
Play later
Play later
Lists
Like
Liked
48:31Guest Introduction Zach Lewis serves as both CIO and CISO at the University of Health Sciences and Pharmacy in St. Louis, bringing nearly a decade of experience across engineering, systems administration, help desk leadership, and executive IT leadership. He oversees technology operations and cybersecurity for one of the oldest pharmacy institution…
…
continue reading
1
Ep. 22 Nagivating Cyberia: Celebrating a Milestone and Reflecting on 2025
1:06:59
1:06:59
Play later
Play later
Lists
Like
Liked
1:06:59In the final episode of their first season, hosts Annie-Mei and Anika celebrate reaching 1,000 downloads with a not-so-suspicious balloon and recap the whirlwind year of 2025. The duo chats about their international listeners, weird podcast recommendations for pets, and their favourite episodes and guests. The conversation then takes a reflective t…
…
continue reading
Usually ransomware targets large entities, but as always no one is truly safe online. This specific malware targets individual android users sideloading apps from illegitimate sources. Sources: https://pastebin.com/3J3uAVHtBy Chloe Thonus
…
continue reading
1
#133 - Build the Learning Machine: AI Adoption, Flow Metrics, and the Future of the CTO Role with Eric Bowman
57:00
57:00
Play later
Play later
Lists
Like
Liked
57:00From “dangerously skip permissions” to the Andon cord: voluntary adoption, flow metrics, and how agents change what CTOs optimize for Tradegate Direct: Europe’s most direct online broker – trade for free, efficiently, and directly on the stock exchange. (https://tradegate.direct/?utmsource=alphalist&utmmedium=podcast&utmcampaign=rb-kampagne-2025&ut…
…
continue reading
1
Statistics for Machine Learning: Implement Statistical methods used in Machine Learning using Python
15:00
15:00
Play later
Play later
Lists
Like
Liked
15:00An educational resource detailing statistical concepts foundational to machine learning, including descriptive statistics (mean, median, mode, and measures of dispersion), probability theory, and methods for parameter estimation and hypothesis testing. The book covers various analytical techniques such as ANOVA, regression models (linear, logistic,…
…
continue reading
1
Master The Fundamentals, Then Change The System
57:21
57:21
Play later
Play later
Lists
Like
Liked
57:21Send us a text We trace a journey from a teenage online threat to security engineering at global scale, exploring how deep fundamentals and distributed thinking shape reliable defenses. Along the way, we unpack certifications, teaching at scale, and building a practical path for learners worldwide. • curiosity-driven path from fear to purpose • fou…
…
continue reading
1
Ep. 333 - Security Awareness Series - DISC and Pivoting with Shelby Dacko
32:25
32:25
Play later
Play later
Lists
Like
Liked
32:25Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Shelby Dacko. Chris and Shelby delve into the intricacies of social engineering, focusing on the challenges of pivoting during on-site security assessments. Their discussion highlights the importance of adaptability and teamwork in overcoming unexpected obstacle…
…
continue reading
1
234. Is GB Energy Starmer’s missing growth plan?
50:35
50:35
Play later
Play later
Lists
Like
Liked
50:35How is GB Energy building a third of Britain's daily energy requirements? Can it hit the government’s clean energy target? And how is it creating high skilled jobs and new cutting edge businesses? Steph and Robert find out from the chair of Great British Energy, Jürgen Maier - the former government advisor and CEO of Siemens UK. Email: the…
…
continue reading
1
Swift in 30 Days: Build iOS Apps by Learning Swift, Xcode, and SwiftUI in Just Four Weeks
18:00
18:00
Play later
Play later
Lists
Like
Liked
18:00A comprehensive guide for learning iOS app development, starting with the fundamentals of the Swift programming language, including variables, control flow, and collections. The book thoroughly explains the use of Apple's development tools, such as Xcode and Playgrounds, and covers key application architecture concepts like Model-View-Controller (M…
…
continue reading
1
Scalable Data Streaming with Amazon Kinesis: Design and secure highly available, cost-effective data streaming applications
19:54
19:54
Play later
Play later
Lists
Like
Liked
19:54A book about building scalable data streaming solutions using various Amazon Web Services (AWS) tools, primarily focusing on the Amazon Kinesis family of services (Data Streams, Firehose, Data Analytics, and Video Streams). The content explains the core concepts of data streaming and distributed systems, detailing how to produce and consume data us…
…
continue reading
In this powerful episode of Smarter Online Safety, Jocelyn King talks with Roger Canaff — former New York City special victims prosecutor, survivor advocate, and legal thriller author — about how predators operate online, the rise of AI “nudify” tools, and concrete steps parents and caregivers can take to protect kids and support survivors. What yo…
…
continue reading
1
The Path Toward AGI and Its Impact on CMMC and GRC Platforms
4:16
4:16
Play later
Play later
Lists
Like
Liked
4:16Thank you for visiting our podcasts on CMMC Cybersecurity! Explore more insights, updates, and expert discussions on our blog: https://cybercomply.us/blog-list Luis G. Batista C.P.M., CPSM Founder & CEO, Armada Cyber Defense | CyberComply [email protected] Office: (305) 306-1800 Ext. 800 CAGE: 9QG33 UEI: K6UZHLE1WUA7 Schedule Introduction: https:…
…
continue reading
Explores several critical areas concerning the security and privacy of online platforms. The chapters discuss privacy-preserving analytics techniques for social network data, including methods like k-anonymity and differential privacy, to protect user information from breaches such as the Cambridge Analytica incident. Several sections are dedicated…
…
continue reading
1
Who You Must Become to Be a World-Class CISO
31:55
31:55
Play later
Play later
Lists
Like
Liked
31:55In this powerful episode of Life of a CISO, Dr. Eric Cole shifts the focus from strategy, roadmaps, and organizational security, and puts the spotlight directly on YOU. Instead of asking what you want or why you want it, Dr. Cole explains that the real key to becoming a world-class CISO is asking: Who do you need to become? Dr. Cole breaks down the…
…
continue reading
1
CCT 305: Practice CISSP Questions - Chrome Zero Days And Domain Eight Deep Dive
19:56
19:56
Play later
Play later
Lists
Like
Liked
19:56Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Headlines about eight Chrome zero days aren’t just noise—they’re a prompt…
…
continue reading
1
Security for Telecommunications Networks (Advances in Information Security Book 40)
14:50
14:50
Play later
Play later
Lists
Like
Liked
14:50An extensive overview of security in telecommunications networks, particularly focusing on cellular systems and their convergence with the Internet. The text first establishes core security concepts and cryptographic principles before thoroughly examining vulnerabilities in both traditional voice networks and modern cellular data services like GSM …
…
continue reading
1
CR117 Redesigning industries with AI with Scott Hanselman, Microsoft
48:57
48:57
Play later
Play later
Lists
Like
Liked
48:57AI is transforming software development—redefining roles, creativity, and community, while challenging developers to embrace ambiguity, orchestrate specialized agents, and stay human through empathy and curiosity. Will AI make developers more creative, or will we forget how the machine really works under the hood? This week Dave, Esmee , Rob sit do…
…
continue reading
1
233. The Trump Doctrine: Why Europe Is Failing & Who Wins the Warner Bros Bid?
44:43
44:43
Play later
Play later
Lists
Like
Liked
44:43What are the economic and business consequences for Europe of Trump’s National Security Strategy? How is the US president shaping Hollywood’s future as Netflix and Paramount fight for ownership of Warner Bros? And who is missing from the major conflict negations needed for peace and economic prosperity? Robert and Steph assess the impact of the lat…
…
continue reading
1
The Death of the Dashboard: Why ThoughtSpot's CEO Says 'AI is the New BI'
42:21
42:21
Play later
Play later
Lists
Like
Liked
42:21Forget building dashboards! The CEO of ThoughtSpot reveals how conversational AI is killing traditional business intelligence and putting a personal, 24/7 data analyst on every employee's desktop. Are you ready to fire your dashboard and start talking to your data and can you trust the answer when you do? In this episode, we talk to Ketan Karkhanis…
…
continue reading
1
Episode 11.16 - California Press Foundation: Saving journalism with tech
14:10
14:10
Play later
Play later
Lists
Like
Liked
14:10Last week I attended the most honest tech conference I can remember. The ironic thing was that it wasn’t a tech conference at all. If was the California Press Foundation (CPF) annual conference. The CPF traces its history back to 1878 when it was formed originally as the California Press Association to represent the journalism industry in the state…
…
continue reading
1
CCN Conversations: Welcome to the Voice of Canada’s Cyber Community
2:29
2:29
Play later
Play later
Lists
Like
Liked
2:29Welcome to CCN Conversations, the official podcast of the Canadian Cybersecurity Network. In this trailer, host Francois Guay, founder of CCN, introduces the vision behind the show and the community it serves. For years, Francois has had a front row seat to how Canada’s top cybersecurity leaders defend, innovate, and shape the country’s digital fut…
…
continue reading