Threat Vector is the hit podcast from Palo Alto Networks, with over 1 million downloads and growing. Get inside the minds of top cybersecurity leaders as they break down real threats, smart defenses, and what's coming next. Each episode features insights from industry experts, customers, and Palo Alto Networks teams. It is built for security pros who want to stay ahead.
…
continue reading
Vector Podcasts
Cool Vector covers the rise of data centers and the digital infrastructure investment asset class. Through interviews and panel discussion with leaders in operations, capital, energy, real estate and technology, Cool Vector offers in-depth, lively conversations with the entire ecosystem of the booming digital infrastructure world. Cool Vector is produced by financial journalist David Snow in partnership with long-time data center operators Phillip Koblence and Nabeel Mahmood. Full episodes o ...
…
continue reading
Welcome to the Vector Cast podcast!
…
continue reading
Spectre Vector is a #Podcast about the #Paranormal! Each episode focuses on different topics such as spirits, UFOs, Psychic Abilities, and more.
…
continue reading
Peter Gregorio | Artist Interviews
…
continue reading
TalkRL podcast is All Reinforcement Learning, All the Time. In-depth interviews with brilliant people at the forefront of RL research and practice. Guests from places like MILA, OpenAI, MIT, DeepMind, Berkeley, Amii, Oxford, Google Research, Brown, Waymo, Caltech, and Vector Institute. Hosted by Robin Ranjit Singh Chauhan.
…
continue reading
News with Joe Vector concerns topics of Personal Finance, Entertainment, Wrestling, and the lighter side of the news. We look forward to another year of this Podcast Series in Production. News with Joe Vector logo from Design with Dalle-3 with Chat GPT Become a supporter of this podcast: https://www.spreaker.com/podcast/news-with-joe-vector--5009773/support.
…
continue reading
Baseball viewed through different lenses to help everyone understand the game.
…
continue reading
The Memriq AI Inference Brief – Engineering Edition is a weekly deep dive into the technical guts of modern AI systems: retrieval-augmented generation (RAG), vector databases, knowledge graphs, agents, memory systems, and more. A rotating panel of AI engineers and data scientists breaks down architectures, frameworks, and patterns from real-world projects so you can ship more intelligent systems, faster.
…
continue reading
The Logistics with Purpose series spotlights and celebrates organizations around the world who are dedicated to creating a positive impact. Co-hosted by representatives from Supply Chain Now and Vector Global Logistics, you’ll get a behind-the-scenes glimpse of the origin stories, change-making progress, and future plans of organizations who are actively making a difference. If you or your company want not just a dose of inspiration, but to learn by example, you won’t want to miss a single e ...
…
continue reading
Vector Moving is Philadelphia’s go-to moving company for fast, professional, and stress-free moves. Whether you’re relocating across town or just a few blocks away, our experienced local movers handle your belongings with care and precision. We’re here to give you a better way to move — so your next move is the best one yet.
…
continue reading
Podcast by Vector Zero Radio
…
continue reading
Jack and Patrick talk about Megagames in the Australian environment - how it all started, how we do things down under, and how our players and designers find the world of megagaming. The Great Game Theme: Balrog Boogie, Diablo Swing Orchestra The Great Game logo by Jack McNamee using Earth Vectors by Vecteezy.
…
continue reading
One of us is gay, we are a podcast of friends and random shit, enjoy
…
continue reading
In 2016 I quit the graphic design world to pursue a new path in woodworking. 2 years later I'm back to graphic design only this time I've found my true passion in creating vector art pieces. Come follow along with me as I learn how to tackle a new business, receive advice from industry peers and tackle struggles that other designers are having.
…
continue reading
Paper Discussions
…
continue reading
Image2VectorGraphicsIndia.com offers professional image-to-vector conversion services, transforming raster images into scalable vector graphics with precision and quality.
…
continue reading
A Vector Maestro is someone who can draw vector lines, manipulate anchors, create paths and export a clean crispy illustration scalable to any size required. Some Vector Maestros take the skills further with digital drawing apps and programs like Adobe Draw, Affinity Designer and even Microsoft’s Expression Design. Our favorite: Adobe Illustrator. The Vector Maestro Podcasts are companions to the VectorMaestros.com website where you will find links to vector illustration resources and tutori ...
…
continue reading
We believe that when people think historically, they are engaging in a disciplined way of thinking about the world and its past. We believe it gives thinkers a knack for recognizing nonsense; and that it cultivates not only intellectual curiosity and rigor, but also intellectual humility. Join Al Zambone, author of Daniel Morgan: A Revolutionary Life, as he talks with historians and other professionals who cultivate the craft of historical thinking.
…
continue reading
DISCLAIMER: All guests are high school students, not actual experts. (n.d.). Extreme Weather. Retrieved from Global Change website: https://nca2014.globalchange.gov/highlights/report-findings/extreme-weather (2019, May 23). Global Climate Change. Retrieved from NASA website: https://climate.nasa.gov/ Fabrice Courtin, J. R., Tamboura, I., Serdébéogo, O., Koudougou, Z., Solano, P., & Sidibé, I. (2010, April 15). Updating the Northern Tsetse Limit in Burkina Faso (1949–2009): Impact of Global C ...
…
continue reading
From the writer of The Message, Life/After, and Steal the Stars. They call the crashed spaceship “The Ghosthouse” because it screams—the screams of thousands of extraterrestrial political prisoners trapped in its horrific mainframe. The only way to free them... is to transfer them into humans willing to share their minds with a second consciousness forever. Who would volunteer for that?
…
continue reading
Join Vector AI as we explore how AI agents, chatbots, and automation are transforming the way businesses work, sell, and support their customers. Whether you’re a small business owner, a marketing pro, or just AI-curious, you’ll discover how to harness intelligent automation to save time, cut costs, and boost customer satisfaction. Each episode features: 🤖 Deep dives into AI and chatbot trends 💡 Real-world business success stories 🛠 Tips for designing, training, and deploying AI agents 🔮 Fut ...
…
continue reading
Join Andy Marsland in Exploring Clean Energy where we uncover the ideas, innovations, and projects powering our sustainable future. You may know us as Exploring Hydrogen, where for 31 episodes we’ve shone a spotlight hydrogen. However, our global challenge of decarbonisation is much bigger than one energy vector. Now, as we continue as The Exploring Clean Energy Podcast, this 2nd season we’re expanding the conversation to include the other stories that are shaping the energy transition of Au ...
…
continue reading
Welcome to Parables From Pearls, the tabletop role-playing game actual play that is directly inspired by Biblical scripture. Have you watched some of these fantasy story-telling games, and felt like cringing when a piece of adult content emerged out of nowhere? Do you feel nervous about letting your child listen or watch shows like these, since there are questionable influences at play? Do you want to just relax, and listen to a Christian alternative to this immersive and imaginative genre o ...
…
continue reading
This podcast is for Chapter 1 of the book "A Student's Guide to Vectors and Tensors" by Dan Fleisch.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Just 3 stupid and opinionated people who decided to make a podcast. Join in on our civil arguments and heated discussions about things and stuff. Youtube Channel: youtube.com/channel/UCY24KGZ025SDDZK8bVSrBXw Logo by Joanna Cheriyan(Instagram): @jo_cheriyan98 (Email): [email protected] Outro Music by Joshua Wilfred(Instagram): @joshua._.wilfred Follow us on Instagram! Afaan: @afaan_rahman Rishab: @veryshortusername Mic image by dgim-studio - www.freepik.com Background vector created ...
…
continue reading
A podcast about the principles and practices of interface design.
…
continue reading
Here we take you to the enchanting untold short stories of God and Demons, Curses and Boons from the immortal epic of Ramayana. PC: Freepik Image by <a href=”https://www.freepik.com/free-vector/gradient-dussehra-background_31150422.htm#query=ramayana%20dussehra&position=46&from_view=search&track=ais”>Freepik</a>
…
continue reading
I will stop the crime is in this planet I will be Justice I would have found clean because they call me Vector a Tyrell and I will help the police anything I have on there well good luck all of you
…
continue reading
Welcome to Growth talk with Kris! An interactive space where we pick apart various issues young people struggle with, shed light on different stories, and provide tips, advice, solutions, and guidelines to positive living, self improvement, and a healthy mindset. Cover attribution: Girl Vectors by Vecteezy
…
continue reading
A podcast by Safeer Syed and David Pidgeon, where we design a tabletop (story, rpg, maybe board) game based on crowdsourced suggestions and then play the dang thing next episode. Icon vector created by Freepik (http://www.freepik.com/free-photos-vectors/icon) Snow vector created by Bamdewanto - Freepik.com (http://www.freepik.com/free-photos-vectors/snow)
…
continue reading
Eavan and Karen test their conspiracy theory knowledge, as well as their powers of persuasion. In each episode, the hosts will choose a conspiracy theory and convince the other of its legitimacy. Pop on your tinfoil hat and enjoy! Follow us at: instagram.com/conspiracytheorytest https://twitter.com/ConspiracyTest Cover art by Laura Kennedy (UFO image https://www.vectorstock.com/royalty-free-vector/world-ufo-day-vector-26493962) Theme music by mixkit.co
…
continue reading
A humorous video podcast from CartoonSmart.com. Topics will include: iOS / tvOS game development with Xcode, Swift and Sprite Kit, plus anything to do with illustration, character design, animation, or Adobe software (Flash / Animate in particular). These are a bit of a spoof on our usual material (okay, very much a spoof), but we dare you NOT to learn at least something in these videos tutorials. Videos range from 30mb to 50mb (relatively small).
…
continue reading
Putting the basics of Bitcoin within everyone's reach. This is a great starting point for someone with no knowledge of Bitcoin to get a basic understanding of what bitcoin is and how to be smart and secure when getting into the world of digital currency. Logo Designed by Freepik https://www.freepik.com/free-vector/digital-bitcoin-currency-symbol-vector-design_1324386.htm
…
continue reading
Covering infectious diseases through history from plague to COVID-19.
…
continue reading
Microwave Journal podcasts including the RF/microwave update series, Frequency Matters, plus interviews with industry experts and executives.
…
continue reading
Cutting through AI bullsh*t. Come join the discussion on Discord! https://discord.gg/4UNKGf3
…
continue reading
Ashley and Caitlin explore the world of Canadian pop culture both new and "original flavours". // Logo created by Caitlin O'Brien. Television vector image designed by Macrovector @ Freepik.com.
…
continue reading
You create products, even if you don’t know it yet. If you’re creating things that other people use - you need to apply product thinking to you work. Now you have a place to learn about product thinking and learn from others how they do it. Visit the blog on https://link.medium.com/Z46sCOfqi8 Cover Designed by Freepik https://www.freepik.com/free-vector/doodle-business-charts-infographics-elements_1529599.htm
…
continue reading
Join database educator Aaron Francis as he gets schooled by database professionals.
…
continue reading
Discussing gaming news, topics, and speculation! We also talk about a whole slew of nerdy topics from movies to comic books! -- Logo attribution: https://www.freepik.com/free-vector/gaming-logo-collection-with-flat-design_2353463.htm Support this podcast: https://podcasters.spotify.com/pod/show/mistakes-were-made/support
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Welcome to TodaysBusinessRadio.com. We are a combination of an on air radio show at KTLK AM 1130, Minneapolis, MN and our online and on demand “business reference library” of over 100 interviews with business advisors, in podcast format. Our mission is to help business owners to: increase enterprise value, improve profitability, control expenses and formulate an exit strategy for the business.
…
continue reading
A bite-sized tech podcast for busy developers where we’ll briefly cover technical topics, new snippets, and more in short time blocks. Your host, Jennifer Reif, is an avid developer and problem-solver with special interest in data, learning, and all things technology.
…
continue reading
1
Software Engineering Radio - the podcast for professional software developers
[email protected] (SE-Radio Team)
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. SE Radio is brought to you by the IEEE Computer Societ ...
…
continue reading
Join me every Monday to talk NFL games, MLB rumors, NBA trades, you get the picture. SPORTS! https://linktr.ee/firstroundko Cover Artwork Background - Background vector created by freepik - www.freepik.com
…
continue reading
I'm a 21-year-old college student from India, and in this podcast, I talk about my life, conspiracy theories, and anything else that captures my interest. Psst... dm me on social media to send me stuff I can talk about, and to give your opinion on anything I mention! I'd love to hear from you. We can be best friends! No kidding, I'll even send you a friendship bracelet. Find me on: Instagram.com/dwija26 Instagram.com/onedayatatimepod Twitter.com/lunardragoness Email: [email protected] Cover ...
…
continue reading
This is Changing Lives Selling Knives — a podcast that shares transformational life and business lessons from highly successful entrepreneurs and business leaders. All the guests on this podcast have two things in common. First, they're all changing lives today through their work and their influence. Second, they all got their start in business by selling Cutco knives with Vector Marketing. This podcast was created to share inspiring stories from Cutco's most prominent alumni and current lea ...
…
continue reading
1
Ep64: Neo4j Vector Migration + Learning in the AI Era
10:12
10:12
Play later
Play later
Lists
Like
Liked
10:12Welcome back to Breaktime Tech Talks for 2026! In this episode, dive into the technical challenges I faced with GenAI procedure migrations, and the workarounds needed for Ollama embeddings. Then, explore the evolving landscape in the age of AI, including new terms like AEO (Answer Engine Optimization) that are changing how we think about discoverab…
…
continue reading
AI security is no longer optional, it’s urgent. In this episode of Threat Vector, David Moulton sits down with Ian Swanson, former CEO of Protect AI and now the AI Security Leader at Palo Alto Networks. Ian shares how securing the AI supply chain has become the next frontier in cybersecurity and why every enterprise building or integrating AI needs…
…
continue reading
1
Tower Infrastructure Keeps Adding "Gizmo" Revenue
26:13
26:13
Play later
Play later
Lists
Like
Liked
26:13Towers are the digital infrastructure that make modern connectivity possible. As demand for wireless connectivity surges, towers are becoming more valuable, while at the same time an increasing number of “gadgets” are being added to tower sites to serve the needs of proliferating digitally-enabled services. In this episode of Cool Vector, David Sno…
…
continue reading
1
Confronting China’s Expanding Cyber Threats [Threat Vector]
22:55
22:55
Play later
Play later
Lists
Like
Liked
22:55While our team is out on winter break, please enjoy this episode of Threat Vector from our partners at Palo Alto Networks. In this episode of Threat Vector, host David Moulton talks with Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks, about the increasing scale of China-linked cyber threats and the vulnerabilities in outd…
…
continue reading
Graham and Joshua race against the clock to cut a deal that could both save - and betray - everyone they hold dear. Written by Mac Rogers, directed by Jordana Williams, sound design by Bart Fasbender. Featuring: Sean Williams, Dani Martineck, Felicia Hudson, Jordan Tierney, Lauren Shippen, Diana Oh, Nat Cassidy, Jason Howard, Brian Silliman, Rebecc…
…
continue reading
Stolen Target source code looks real. CISA pulls the plug on Gogs. SAP rushes patches for critical flaws. A suspected Russian spy emerges in Sweden, while Cloudflare threatens to walk away from Italy. Researchers flag a Wi-Fi chipset bug, a long-running Magecart skimming campaign, and a surge in browser-in-the-browser phishing against Facebook user…
…
continue reading
1
Is the cyber talent ecosystem broken? [CISO Perspectives]
40:36
40:36
Play later
Play later
Lists
Like
Liked
40:36Please enjoy this encore of CISO Perspectives We're sharing an episode from another N2K show we thought you might like. It's the first episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: The cyber talent ecosystem faces severe indigestion, which has stifled growth and closed doors to new talent. In this episod…
…
continue reading
The FBI warns of Kimsuky quishing. Singapore warns of a critical vulnerability in Advantech IoT management platforms. Russia’s Fancy Bear targets energy research, defense collaboration, and government communications. Malaysia and Indonesia suspend access to X. Researchers warn a large-scale fraud operation is using AI-generated personas to trap mob…
…
continue reading
Chapter Two returns us to the Company as they begin their pursuit of the bandit gang in order to capture and question their leader. Will they be able to catch the rogues? How will their quarry respond? Find out in this chapter of Parables From Pearls! Note: while this show uses the Holy Scriptures as inspiration for its stories and characters, it i…
…
continue reading
1
Recursive Language Models: A Paradigm Shift for Agentic AI Scalability
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41Discover how Recursive Language Models (RLMs) are fundamentally changing the way AI systems handle ultra-long contexts and complex reasoning. In this episode, we unpack why RLMs enable models to programmatically query massive corpora—two orders of magnitude larger than traditional transformers—delivering higher accuracy and cost efficiency for agen…
…
continue reading
Anthony and Katie discuss Scott Jenson's talk titled "Are we stuck with the same desktop UX forever" Video link: https://www.youtube.com/watch?v=1fZTOjd_bOQ Hosts: Anthony Hobday, Generalist Product Designer: https://twitter.com/hobdaydesign Katie Langerman, Design Technologist: …
…
continue reading
1
Laura Hoffner: Setting your sights high. [Intelligence] [Career Notes]
9:52
9:52
Play later
Play later
Lists
Like
Liked
9:52Please enjoy this encore of Career Notes. Laura Hoffner, Executive Vice President at Concentric, shares her story about her time working as a Naval Intelligence Officer and supporting special operations around the globe for 12 years, to now, where she transitioned to the Naval Reserves and joined the Concentric team. Laura has known since she was i…
…
continue reading
1
AGI: The Dream We Should Never Reach (Ep. 296)
45:41
45:41
Play later
Play later
Lists
Like
Liked
45:41Also on YouTube Two AI experts who actually love the technology explain why chasing AGI might be the worst thing for AI's future—and why the current hype cycle could kill the field we're trying to save. Want to dive deeper? Head to datascienceathome.com for detailed show notes, code examples, and exclusive deep-dives into the papers we discuss. Sub…
…
continue reading
1
Walking on EggStremes. [Research Saturday]
28:01
28:01
Play later
Play later
Lists
Like
Liked
28:01This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company." Built for long-term espionage, the campaign uses DLL sideloading, in-memory execution, and abused Windows services to stay stealthy an…
…
continue reading
The NSA reshuffles its cybersecurity leadership. A new report unmasks ICE’s latest surveillance system. CISA marks a milestone by retiring ten Emergency Directives. Trend Micro patches a critical vulnerability. Grok dials back the nudes, a bit. Cambodia extradites a cybercrime kingpin to China. Ghost Tap malware intercepts payment card data. Resear…
…
continue reading
1
Frequency Matters, Jan 9: Radar/Antennas Issue, Industry News/CES 2026
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14Microwave Journal editors Pat Hindle and Del Pierson review the technical articles in the Jan Radar and Antennas themed issue, industry news and CES 2026. Sponsored by RFMW.By microwavejournal
…
continue reading
The US withdraws from global cybersecurity institutions. A maximum-severity vulnerability called Ni8mare allows full compromise of a workflow automation platform. Cisco patches ISE. Researchers uncover a sophisticated multi-stage malware campaign targeting manufacturing and government organizations in Italy, Finland, and Saudi Arabia. The growing r…
…
continue reading
1
SE Radio 702: Derick Schaefer on Modern CLIs
48:05
48:05
Play later
Play later
Lists
Like
Liked
48:05Derick Schaefer, author of CLI: A Practical Guide to Creating Modern Command-Line Interfaces, talks with host Robert Blumen about command-line interfaces old and new. Starting with a short review of the origin of commands in the early unix systems, they trace the evolution of commands into modern CLIs. Following the historic rise, fall, and re-emer…
…
continue reading
Jaguar Land Rover reveals the fiscal results of last year’s cyberattack. A Texas gas station chain suffers a data spill. Taiwan tracks China’s energy-sector attacks. Google and Veeam push patches. Threat actors target obsolete D-Link routers. Sedgwick Government Solutions confirms a data breach. The U.S. Cyber Trust Mark faces an uncertain future. …
…
continue reading
Grok’s non-consensual imagery draws scrutiny from the European Commission. Researchers link several major data breaches to a single threat actor. The UK unveils a new Cyber Action Plan. A stealthy ClickFix campaign targets the hospitality sector. VVS Stealer malware targets Discord users. Covenant Health and AFLAC report data leaks. Google silences…
…
continue reading
1
A city goes dark as cyber questions multiply.
24:15
24:15
Play later
Play later
Lists
Like
Liked
24:15Venezuela blames physical attacks for blackout as cyber questions swirl. Trump reverses a chip technology sale over national security issues, and removes sanctions linked to Predator spyware. Greek officials say an air traffic shutdown was not a cyberattack. The U.S. Army launches a new officer specialization in AI and machine learning. The Kimwolf…
…
continue reading
1
Evaluating Agentic AI: DeepEval, RAGAS & TruLens Frameworks Compared
19:45
19:45
Play later
Play later
Lists
Like
Liked
19:45# Evaluating Agentic AI: DeepEval, RAGAS & TruLens Frameworks Compared In this episode of Memriq Inference Digest - Engineering Edition, we explore the cutting-edge evaluation frameworks designed for agentic AI systems. Dive into the strengths and trade-offs of DeepEval, RAGAS, and TruLens as we unpack how they address multi-step agent evaluation c…
…
continue reading
1
Michael Scott: A team of humble intellects. [Information security] [Career Notes]
9:37
9:37
Play later
Play later
Lists
Like
Liked
9:37Please enjoy this encore of Career Notes. Chief Information Security Officer at Immuta, Michael Scott shares his story from working at a forgotten internet service provider to leading the security fight for major food chain restaurants. Michael explains how the different roles at various companies he has worked with paved his way to where he is now…
…
continue reading
While our team is out on winter break, please enjoy this episode of Research Saturday. Today we are joined by Selena Larson, co-host of Only Malware in the Building and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at Proofpoint, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishin…
…
continue reading
1
Joseph Modayil of Openmind Research Institute @ RLC 2025
4:27
4:27
Play later
Play later
Lists
Like
Liked
4:27Joseph Modayil is the Founder, President & Research Director of Openmind Research Institute. Featured References Openmind Research Institute The Alberta Plan for AI Research Richard S. Sutton, Michael Bowling, Patrick M. Pilarski Additional References Joseph Modayil on Google Scholar Joseph Modayil Homepage…
…
continue reading
While our team is out on winter break, please enjoy this episode of Cyber Things from our partners at Armis. Welcome to Episode 2 of Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire in an homage to Stranger Things. Host Rebecca Cradick, VP of Global Communications at Armis, is joined by Curtis Simpson…
…
continue reading
1
Vjekoslav Krajačić on File Pilot and a return to fast UIs
33:44
33:44
Play later
Play later
Lists
Like
Liked
33:44Modern computers are faster than ever, yet much of our software feels slower, heavier, and more frustrating to use. In this episode of Hanselminutes, Scott talks with Vjekoslav Krajačić, creator of File Pilot, about bringing speed and responsiveness back to everyday tools. Vjekoslav built File Pilot as a reaction to bloated file managers and laggy …
…
continue reading
By James E. Baker
…
continue reading
Hello! This is James E. Baker. Here is a quick welcome to the show where I, the narrator, introduce myself, and share what this show is about, why I am making it, and what I hope to share with you through it. May the Grace and Peace of Jesus Christ rest on you. See you out there, fellow adventurer! Cover Art provided by Canva, Cover graphics design…
…
continue reading
Welcome to Forming the Company, a mini-series where we create the characters whom we will accompany on this first adventure together! Today, we meet Myrtle Smallburrow, a compassionate, but anxious, hobbit from the Shire who has set out to help protect the Free Folk from the Shadow and its foul agents. We will be using The One Ring table top role-p…
…
continue reading
1
Encore: Confronting China’s Expanding Cyber Threats
22:55
22:55
Play later
Play later
Lists
Like
Liked
22:55While our team is out on winter break, please enjoy this encore episode of Threat Vector . In this episode of Threat Vector, host David Moulton talks with Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks, about the increasing scale of China-linked cyber threats and the vulnerabilities in outdated OT environments. Wendi …
…
continue reading
1
Logistics with Purpose™ Classic: Generous Leadership in Action: Insights from Joe Davis on Feedback, Vulnerability, and Inclusivity
46:15
46:15
Play later
Play later
Lists
Like
Liked
46:15In this classic episode of Logistics with Purpose®, hosts Enrique Alvarez and Kristi Porter welcome Joe Davis to the show, Managing Director and Senior Partner at Boston Consulting Group (BCG), and author of "The Generous Leader." Listen in as Davis shares insights from his extensive career, emphasizing the importance of feedback, vulnerability, an…
…
continue reading
1
Lorrie Cranor: Why Security Fails Real People [Afternoon Cyber Tea]
23:45
23:45
Play later
Play later
Lists
Like
Liked
23:45While our team is out on winter break, please enjoy this episode of Afternoon Cyber Tea with Ann Johnson from our partners at Microsoft Security. Dr. Lorrie Cranor, Director of the CyLab Security and Privacy Institute at Carnegie Mellon University joins Ann Johnson, Corporate Vice President, Microsoft, on this week's episode of Afternoon Cyber Tea …
…
continue reading
1
Episode 52: Megagame Initiative with Peter and Liam
1:01:00
1:01:00
Play later
Play later
Lists
Like
Liked
1:01:00Keep in touch: linktr.ee/greatgamepod Join the conversation on our Discord server We connected with Peter and Liam from the Megagame Initiative (check them out online) to talk about about megagames have developed in Cape Town over the last few years. The Great Game theme is Balrog Boogie…
…
continue reading
1
SE Radio 701: Max Guernsey, III and Luniel de Beer on Readiness in Software Engineering
1:01:44
1:01:44
Play later
Play later
Lists
Like
Liked
1:01:44Max Geurnsey III and Luniel de Beer, co-authors of the book Ready: Why Most Software Projects Fail and How to Fix It, discuss the concept of readiness in software engineering with host Brijesh Ammanath. Although Agile workflows and technical practices help delivery, many software efforts still struggle to achieve desired outcomes. Rework, shifting …
…
continue reading
1
The New Frontlines of Cybersecurity: Lessons from the 2025 Digital Defense Report [Microsoft Threat Intelligence Podcast]
47:29
47:29
Play later
Play later
Lists
Like
Liked
47:29While our team is out on winter break, please enjoy this episode of The Microsoft Threat Intelligence Podcast from our partners at Microsoft. In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a co…
…
continue reading
1
Season finale: Leading security in a brave new world. [CISOP]
43:59
43:59
Play later
Play later
Lists
Like
Liked
43:59In the season finale of CSO Perspectives, Ethan Cook and Kim Jones reflect on a season of conversations exploring what it means to lead security in a rapidly evolving “brave new world.” From the realities behind AI hype and the slow-burn impact of quantum computing to the business forces shaping cybersecurity innovation, they revisit key lessons an…
…
continue reading
1
The Hidden Risk in Your Stack [Data Security Decoded]
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12While our team is out on winter break, please enjoy this episode of Data Security Decoded from our partners at Rubrik. In this episode of Data Security Decoded, host Caleb Tolin sits down with Hayden Smith, CEO of Hunted Labs, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and w…
…
continue reading
1
Charity Wright: Pursue what you love. [Threat intelligence] [Career Notes]
9:50
9:50
Play later
Play later
Lists
Like
Liked
9:50While our team is out on winter break, please enjoy this episode of Career Notes. Threat intelligence analyst at Recorded Future, Charity Wright, shares her story from the army to her career today. Transitioning from the army to cybersecurity was an exciting change for her. During college she was recruited by the U.S. army where she started her jou…
…
continue reading
1
Excel-lerating cyberattacks. [Research Saturday]
23:43
23:43
Play later
Play later
Lists
Like
Liked
23:43While our team is out on winter break, please enjoy this episode of Research Saturday. This week, we are joined by Tom Hegel, Principal Threat Researcher from SentinelLabs research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belaru…
…
continue reading
1
Beyond cyber: Securing the next horizon. [Special Edition]
1:00:13
1:00:13
Play later
Play later
Lists
Like
Liked
1:00:13While our team is out on winter break, please enjoy this Special Edition episode. Cybersecurity is no longer confined to the digital world or just a technical challenge, it’s a global imperative. The NightDragon Innovation Summit convened a group of industry leaders to discuss how public and private entities can work together to address emerging …
…
continue reading
Why are so many developers suddenly talking about Zig? Is it just another systems language, or is something deeper happening? Scott sits down with Loris Cro, one of the community voices behind Zig, to explore why this relatively young language is getting so much attention from systems programmers, game developers, and performance-obsessed engineers…
…
continue reading
While our team is out on winter break, please enjoy this encore episode of Threat Vector . Join David Moulton, Senior Director of Thought Leadership for Unit 42, as he sits down with Kyle Wilhoit,Technical Director of Threat Research at Unit 42, for an intimate conversation about the evolution of hacker culture and cybersecurity. From picking u…
…
continue reading
While our team is out on winter break, please enjoy this episode of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries. Your host is Selena Larson, Proofpoin…
…
continue reading
In today’s episode, we dig into the Electronic Frontier Foundation’s annual Breachies, highlighting some of the year’s most avoidable, eye-opening, and sometimes head-shaking data breaches. From companies collecting far more data than they need to third-party missteps and quiet misconfigurations, the Breachies offer a revealing look at how familiar…
…
continue reading
1
Eyes in the sky, red flags on the ground.
27:28
27:28
Play later
Play later
Lists
Like
Liked
27:28The White House bans foreign-made drones. African law enforcement agencies crackdown on cybercrime. A new phishing campaign targets Russian military personnel and defense-related organizations. A University of Phoenix data breach affects about 3.5 million people. A pair of Chrome extensions covertly hijack user traffic. Romania’s national water aut…
…
continue reading
1
SE Radio 700: Mojtaba Sarooghi on Waiting Rooms for High-Traffic Events
1:07:46
1:07:46
Play later
Play later
Lists
Like
Liked
1:07:46Mojtaba Sarooghi, a Distinguished Product Architect at Queue-it, speaks with host Jeremy Jung about virtual waiting rooms for high-traffic events such as concerts and limited-quantity product releases. They explore using a virtual queue to prevent overloading systems, how most traffic is from bots, using edge workers to reduce requests to the custo…
…
continue reading
1
Lady Frances Berkeley/Amy Stallings: Bacon’s Rebellion, Colonial Virginia, and First-person Historical Interpretation
31:18
31:18
Play later
Play later
Lists
Like
Liked
31:18In this episode of Historically Thinking, we begin not with a historian’s voice, but with the voice of a seventeenth-century woman. Lady Frances Culpeper Berkeley—born in England, twice widowed, and married in 1670 to Sir William Berkeley, governor of Virginia—speaks from the midst of crisis. Jamestown has burned. Nathaniel Bacon’s rebellion has fr…
…
continue reading
1
Tech Investment Strategies and Overview [CISOP]
48:39
48:39
Play later
Play later
Lists
Like
Liked
48:39In this CISOP episode of CSO Perspectives, Host Kim Jones sits down with John Funge, venture capitalist at DataTribe, to explore how investors view the cybersecurity landscape. Kim reflects on the tension between innovation, profit motives, and the real needs of security practitioners—raising questions about whether the industry prioritizes mitigat…
…
continue reading