Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Cloud Security Podcast Team
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
…
continue reading
Software engineers, architects and team leads have found inspiration to drive change and innovation in their team by listening to the weekly InfoQ Podcast. They have received essential information that helped them validate their software development map. We have achieved that by interviewing some of the top CTOs, engineers and technology directors from companies like Uber, Netflix and more. Over 1,200,000 downloads in the last 3 years.
…
continue reading
Digital certificate industry veterans Tim Callan and Jason Soroko explore the issues surrounding digital identity, PKI, and cryptographic connections in today's dynamic and evolving computing world. Best practices in digital certificates are continually under pressure from technology trends, new laws and regulations, cryptographic advances, and the evolution of our computing architectures to be more virtual, agile, ubiquitous, and cloud-based. Jason and Tim (and the occasional guest subject ...
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
The Cyber-Savvy Boardroom, a Google Cloud Office of the CISO podcast, offers monthly 15-20 minute episodes featuring security leaders, board members, and thought leaders. Hosted by David Homovich and rotating Office of the CISO members, experts share insights for strategic clarity and improved organizational security. Guests include board members, Google Cloud/Google executives, Office of the CISO Board Insights team members, board advisors, and industry thought leaders.
…
continue reading
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your ...
…
continue reading
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
…
continue reading
Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
…
continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
Welcome to 'Waves & Wires', the podcast that explores the fascinating world of computer networking, brought to you by Zyxel Networks (EMEA). Join us as we dive into the intricacies of cloud networking, explore the latest wired, wireless technologies, and discuss the ever-important topic of network security for businesses.Our team of experts, with years of experience in the networking industry, share their insights and knowledge on how these technologies are shaping the future of communicatio ...
…
continue reading
ShipTalk is the podcast series on the ins, outs, ups, and downs of software delivery. This series dives into the vast ocean Software Delivery, bringing aboard industry tech leaders, seasoned engineers, and insightful customers to navigate through the currents of the ever-evolving software landscape. Each session explores the real-world challenges and victories encountered by today’s tech innovators. Whether you’re an Engineering Manager, Software Engineer, or an enthusiast in Software delive ...
…
continue reading
Join three telecom industry leaders as they discuss tips and tricks in the Unified Communications world. Plus, meet their expert guests who share their own unique perspectives on the industry.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Bringing cyber security professionals together to share their expertise. CyberTech Talks is a podcast hosted by CREST.
…
continue reading
This podcast shines a light on a range of topics regarding Information Security including data security laws, cyber threat detection, driving information technology to leverage your business, and so much more. The podcast is brought to you by the Information Security Summit which is a non-profit organization headquartered in Cleveland, OH. Additional information can be found at www.informationsecuritysummit.org.
…
continue reading
In our age of digital transformation, everything is moving to the cloud, including the management of devices, users and applications. The Infoblox ThreatTalk podcast brings you the latest thinking on how to tap the full potential of the cloud while making the most of your existing network security solutions. In each episode, leading cybersecurity experts share insights and practical advice on how to raise network security and automation to the next level across diverse on-premises, virtual a ...
…
continue reading
Cloudsmith is solving the challenges of artifact management and are on the path to becoming the software supply chain itself. In this weekly podcast, we share knowledge from Cloudsmith employees, customers, and other great guests from the software industry. Along the way, we’ll unpack topics like the cloud, security, supply chains, and the developer experience.
…
continue reading
Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
…
continue reading
This Week in Health Tech podcast is a health technology podcast. Podcast features Vik Patel, a health technology veteran and CEO of Tido Inc. (A Trusted Tech Partner for Healthcare Organizations) and industry experts. Our shows provide commentary, news, and perspective on the latest trends in health tech and features seasoned experienced industry experts. All of our shows are free. TWIHT is supported by advertising. We limit the number of ads on each show, and we only accept advertising from ...
…
continue reading
"Blue Square Security" is a Microsoft Security focused podcast that explores the latest trends and best practices in cybersecurity, led by the Microsoft Digital Security team including in-depth discussions with experts from multiple industry experts and Microsoft partners. Each episode will delve into a different topic, such as cloud security, threat intelligence, or identity and access management, providing listeners with practical insights and actionable advice to help them better protect ...
…
continue reading
Talking Security is your go-to podcast for everything related to Microsoft Security and DevSecOps. Hosted by Frans Oudendorp and Pouyan Khabazi, we dive deep into topics like Microsoft Defender, Entra, Intune, Zero Trust, identity protection, security automation, and secure development practices. In each episode, we engage with Microsoft MVPs, product team members, and security experts to explore real-world challenges, practical solutions, and the latest innovations across the Microsoft Secu ...
…
continue reading
ITProToday.com is a leading online source of daily news, analysis and how-to’s about the information technology industry. We help IT professionals and technology stakeholders learn about, assess and manage the acquisition of next-gen technology that drives business innovation, including — but not limited to — analytics, artificial intelligence/machine learning, cloud computing, compute engines, containers, data center operations, edge computing, hyper-converged infrastructure, the mobile-fir ...
…
continue reading
Every week Wayne Scott from brings together a team of technology journalists from http://www.ITProPortal.com to discuss, share analysis and argue about the biggest Tech News stories of the past week. From enterprise and business technology, to tech start ups, consumer gadgets, office IT and mobile you can get informed here. Plus join us live at some of the many technology shows around the world like CeBit, IFA, Infosec, The Gadget Show and much more !
…
continue reading
Explore the cutting-edge world of platform engineering, the backbone of modern software development. The Platform Engineering Show podcast dives into how internal developer platforms (IDPs) are revolutionizing the way teams build, deploy, and manage applications at scale. From streamlining workflows and reducing cognitive load for developers to fostering innovation and enabling seamless collaboration across development, operations, and IT service management (ITSM), we break down the key conc ...
…
continue reading
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
…
continue reading
Unlock the power of data and dive into the world of technology with our podcast, Talk Tech with Data Dave! Join us as we embark on an exciting journey, exploring the endless possibilities of data and its impact on our lives. From cutting-edge innovations to practical applications, we’ll demystify the complexities and make it accessible to all. Together, we’ll uncover fascinating stories and unveil the secrets hidden within the digital realm. Get ready for engaging conversations, mind-blowing ...
…
continue reading
Learn how the top brands wow customers through production-first engineering. On this podcast you will find the tactics, methodologies, and metrics used to drive customer value by the engineering leaders actually doing it. Join Rookout CTO, Liran Haimovitch as he explores how customer-centric brands approach engineering to create a competitive advantage; with interviews covering topics such as automation, issue resolution, team structure, DevOps, and more.
…
continue reading
AppSec Builders features practical and actionable conversations with application security experts and practitioners. Topics range from understanding and solving classes of vulnerability, building protections to efficiently scale with your business, and core best practices to strengthen your security posture. AppSec Builders is hosted by Jb Aviat, AppSec staff engineer at Datadog, former CTO and co-founder at Sqreen and Apple Red Team member. Contact us at [email protected]
…
continue reading

1
Your SecOps Team Can't Save Your Cloud: A New Blueprint for Security.
47:03
47:03
Play later
Play later
Lists
Like
Liked
47:03The conversation around cloud security is maturing beyond simple threat detection. As the industry grapples with alert fatigue, we explore the necessary shift from a reactive to a proactive security posture, questioning if a traditional SecOps model is sufficient for modern cloud environments. We spoke with Gil Geron, CEO of Orca Security, to exami…
…
continue reading
The capstone week brings together all prior concepts, emphasizing integration as the defining quality of resilient design. Students learn that resilience arises not from isolated tools but from coherent architectures that link cryptography, identity, networks, applications, and supply chains into a unified strategy. Frameworks such as NIST CSF, ISO…
…
continue reading
This week addresses the rapidly evolving threat landscape. Ransomware is studied from its early origins to its present role as a multimillion-dollar business model, while advanced persistent threats demonstrate the persistence and adaptability of state-sponsored actors. Insider threats add complexity, highlighting the difficulty of defending agains…
…
continue reading
Applications and APIs form the backbone of digital services, enabling everything from online banking to global supply chains. Students study common weaknesses cataloged in the OWASP Top 10, including injection, misconfiguration, and weak session management, as well as the specific risks of mobile and API security. Case studies of T-Mobile and Pelot…
…
continue reading

1
Infrastructure, Cloud, and Supply Chain Security
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58Modern infrastructure has evolved from physical servers to cloud-native platforms, redefining both opportunities and risks. Students explore Infrastructure as Code, continuous integration and delivery, and the challenges of configuration drift. Case studies of pipeline compromises show how trusted automation can be weaponized, with vulnerabilities …
…
continue reading
This week highlights the role of architecture as the skeleton of security. Students learn how flat networks and perimeter-based models have failed under modern conditions, with the Target breach serving as a cautionary case. Defense in depth, segmentation, and microsegmentation are introduced as structural strategies for containing adversaries. The…
…
continue reading

1
Identity, Authentication, and Access Control
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59With the dissolution of traditional network perimeters, identity has emerged as the central gatekeeper of enterprise security. This week explores authentication, authorization, and access control as critical building blocks of trust. Students examine the weaknesses of passwords, the rise of multi-factor authentication, and the push toward passwordl…
…
continue reading
Cryptography serves as the scientific bedrock of confidentiality, authenticity, and integrity. Students will explore both symmetric and asymmetric encryption, comparing their respective strengths in performance and distribution. Hashing, digital signatures, and message authentication codes are introduced as complementary tools that secure modern tr…
…
continue reading

1
Security Foundations & Risk in the Modern Enterprise
25:48
25:48
Play later
Play later
Lists
Like
Liked
25:48This week introduces security as a foundational discipline rather than a collection of scattered tools. Learners will examine the enduring concepts of confidentiality, integrity, and availability, understanding how these principles anchor defenses across decades of technological change. The CIA triad is presented as a lens through which design choi…
…
continue reading

1
Episode 118 - Quantum Cryptography and Quantum Computing with Mark Russinovich
33:31
33:31
Play later
Play later
Lists
Like
Liked
33:31In this episode Michael and Mark talk with guest Mark Russinovich, Technical Fellow, Deputy CISO and Chief Technology Officer of Microsoft Azure about quantum cryptography and quantum computing and its implications for security and the future. NOTE: There's a portion where Mark and Michael talk about a quote made by Richard Feynman about understand…
…
continue reading

1
Off with your CMS’s head! Composability and security in headless CMS
23:20
23:20
Play later
Play later
Lists
Like
Liked
23:20Ryan welcomes Sebastian Gierlinger, VP of Engineering at Storyblok, to talk about how headless content management systems (CMS) fit into an increasingly componentized software landscape. They run through the differences between headless and traditional CMS systems (and databases), prototyping and security concerns, and how a team building distribut…
…
continue reading

1
How Security Consultant Can Transition to AI Security Engineer in 2025
21:25
21:25
Play later
Play later
Lists
Like
Liked
21:25In this episode, we explore the rapid evolution of cybersecurity and the critical rise of a new specialisation: the AI Security Engineer. As artificial intelligence advances, it not only enhances our defensive capabilities but also introduces sophisticated new attack vectors that traditional security measures can't handle. AI Security Certification…
…
continue reading

1
Scaling Global Trade with AI Powered Tools for SMBs - with Kuo Zhang of Alibaba.com
28:49
28:49
Play later
Play later
Lists
Like
Liked
28:49Global sourcing has long been a barrier for small and medium-sized businesses (SMBs). Language differences, compliance challenges, logistics hurdles, and trust issues can overwhelm even the most determined entrepreneurs. In this episode of the AI in Business podcast, Kuo Zhang, President of Alibaba.com, shares how new technologies—including Alibaba…
…
continue reading

1
CR108: Season 5 Trailer, The future just dropped
4:53
4:53
Play later
Play later
Lists
Like
Liked
4:53Dave, Esmee, and Rob are strapping in for another season of bold, brain-bending conversations—and they’re bringing the flux capacitor with them from Back to the Future. Season 5 beams in global leaders and innovators who challenge how we think about technology, business, and humanity. From AI disruption to digital sovereignty, from leadership to cu…
…
continue reading

1
EP15 Getting Ready for FLARE-On 12 - An Inside Look at the Reverse Engineering Gauntlet
39:13
39:13
Play later
Play later
Lists
Like
Liked
39:13In this episode, we're "Getting Ready for FLARE-On 12" with an inside look at the world-renowned reverse engineering competition. We’re joined by long-time FLARE-On host and challenge author Nick Harbour and regular challenge author Blas Kojusner for an in-depth conversation. We'll take a brief tour of FLARE-On history and discuss how it has grown …
…
continue reading

1
Root Causes 528: Misissued SSL Certificate for 1.1.1.1
17:31
17:31
Play later
Play later
Lists
Like
Liked
17:31A CA has incorrectly issued TLS certificates for the 1.1.1.1 and 2.2.2.2 IP addresses. We go into the details.By Tim Callan and Jason Soroko
…
continue reading

1
41. Silencing the Robocall, Breaching the Cloud, Trusting the Inside
34:28
34:28
Play later
Play later
Lists
Like
Liked
34:28In this episode of Defending the Edge, we dive into a few of the biggest challenges shaping today’s security landscape. From robocaller blocking measures reshaping communication security, to SaaS breaches exposing weaknesses in platforms like Salesforce, to the persistent danger of insider threats, we examine what these trends reveal about evolving…
…
continue reading

1
The Evolution of Email Security: From Pre-Breach to Post-Breach Protection
30:02
30:02
Play later
Play later
Lists
Like
Liked
30:02For the last 30 years, email security has been stuck in the past, focusing almost entirely on stopping bad things from getting into the inbox. In this episode, Rajan Kapoor, Field CISO at Material Security and former Director of Security at Dropbox, argues that this pre-breach mindset is dangerously outdated. The real challenge today is post-breach…
…
continue reading

1
How to Identify Your Critical Data Elements
24:35
24:35
Play later
Play later
Lists
Like
Liked
24:35Discover what makes Critical Data Elements essential, how to identify them, and why they’re the foundation of effective data management.By Alexis Keller-Carrell
…
continue reading

1
Reducing Errors and Improving Compliance in Global Oncology Programs - with Anthony Mikulaschek at IQVIA Technologies
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09Clinical trials are growing more complex, and nowhere is that more evident than in oncology and obesity research. As sponsors push for reliable, real-time patient data, the role of electronic clinical outcome assessments (eCOAs) has never been more critical. These tools determine not only how patients report on their quality of life but also how sp…
…
continue reading

1
What an MCP implementation looks like at a CRM company
24:20
24:20
Play later
Play later
Lists
Like
Liked
24:20Ryan chats with Karen Ng, EVP of Product at HubSpot, to chat about Model Context Protocol (MCP) and how they implemented it for their server for their CRM product. They chat the emergence of this as the standard for agentic interactions, the challenges of implementing the server and integrating it with their ecosystem, and how agentic AI has affec…
…
continue reading

1
Scaling Systems, Companies, and Careers with Suhail Patel
46:27
46:27
Play later
Play later
Lists
Like
Liked
46:27In this episode, Suhail Patel joins Thomas Betts for a discussion about growing yourself as your company grows. When he started at Monzo, Patel was one of four engineers on the then new platform team–there are now over 100 people. The conversation covers how to thrive when the company and the systems you’re building are going through major growth.R…
…
continue reading

1
Root Causes 527: Key Dates for the Deprecation of Public mTLS
10:25
10:25
Play later
Play later
Lists
Like
Liked
10:25Client authentication using public TLS server certificates is on the deprecation path. In this episode we go through the key dates in this deprecation.By Tim Callan and Jason Soroko
…
continue reading

1
Copilot Studio Updates, Licensing Changes, and Local AI Testing with Jan – Practical 365 Podcast S04E43
34:04
34:04
Play later
Play later
Lists
Like
Liked
34:04Join Steve Goodman and Paul Robichaux as they unpack Microsoft’s latest Copilot Studio updates, including new licensing terminology, human-in-the-loop features, and real-time protection for AI agents. Plus, hear how Jan can help you test AI agents locally before deploying them in Microsoft 365, and get their take on Microsoft’s quiet reversal of it…
…
continue reading

1
Planning to Arm mobile devices with chips that handle AI
32:36
32:36
Play later
Play later
Lists
Like
Liked
32:36Ryan welcomes Geraint North, AI and developer platforms fellow at Arm, to dive into the impact of GenAI on chip design, Arm’s approach to designing flexible CPU architectures, and the challenges of optimizing large language models at the chip level for edge devices. Episode notes: Arm is a global compute platform that allows the world’s leading tec…
…
continue reading

1
Root Causes 526: Voice Biometrics Are Worthless
8:32
8:32
Play later
Play later
Lists
Like
Liked
8:32Based on the ready availability of AI-based voice cloning, we declare voice biometric authentication to be utterly valueless.By Tim Callan and Jason Soroko
…
continue reading

1
From Manual Reports to Generative and Agentic AI Automation in Finance - with Pavlé Sabic of Moody’s
28:36
28:36
Play later
Play later
Lists
Like
Liked
28:36In this episode, Pavlé Sabic, Senior Director in Generative AI Solutions and Strategy at Moody’s, joins Emerj Editorial Director Matthew DeMello to discuss how agentic AI is redefining workflows in financial institutions. Pavlé explains why large enterprises are turning to AI-driven automation to overcome persistent challenges — from fragmented dat…
…
continue reading

1
How AI is reshaping developer teams and the future of software development
31:19
31:19
Play later
Play later
Lists
Like
Liked
31:19In this two-part episode of Leaders of Code, Peter O’Connor, Director of Platform Engineering, welcomes Ryan J. Salva, Senior Director of Product at Google, Developer Experiences, for a deep dive into the future of software development. They explore how AI-assisted tools are reshaping the developer experience, going far beyond just writing code. Fr…
…
continue reading

1
Root Causes 525: The End of Email-based DCV
10:03
10:03
Play later
Play later
Lists
Like
Liked
10:03A new CABF ballot proposal will eliminate all email- and phone-based DCV over the next few years. We go into the details.By Tim Callan and Jason Soroko
…
continue reading

1
Using AI to Fix Your Cloud Security Backlog beyond Visibility
48:40
48:40
Play later
Play later
Lists
Like
Liked
48:40You have the visibility, you see the alerts, but your security backlog is still growing faster than your team can fix it. So, are you actually getting more secure? In this episode, Snir Ben Shimol, CEO of Zest Security, argues that "knowing about an open door or an open window don't make you more secure... just make you more aware" . We spoke about…
…
continue reading

1
AI for Security vs Security for AI: From IBM Master Inventor to Microsoft AI Architect
47:48
47:48
Play later
Play later
Lists
Like
Liked
47:48Dewan Ahmed sits down with Fatih Bulut, AI Architect at Microsoft and former IBM Research Master Inventor, to separate hype from reality in AI for software delivery and cybersecurity. Fatih clarifies AI for security vs security for AI, walks through detection engineering as real software engineering, and explains proactive defense across an attack’…
…
continue reading

1
Why Human Oversight and Management Will Still Matter in AI-Driven Pharma Operations - with Yunke Xiang of Sanofi
20:45
20:45
Play later
Play later
Lists
Like
Liked
20:45In this episode of the AI in Business podcast, host and Emerj Editorial Director Matthew DeMello speaks with Yunke Xiang, Global Head of Data Science for Manufacturing, Supply Chain, and Quality at Sanofi. Together, they examine how generative AI and reasoning models are evolving from simple automation to high-impact copilots across pharmaceutical …
…
continue reading

1
We built stackoverflow.ai with the community and for the community
33:50
33:50
Play later
Play later
Lists
Like
Liked
33:50Ryan is joined by our very own Ash Zade, Product Manager, and Alex Warren, Staff Software Engineer, to discuss our newly released stackoverflow.ai, how it’s enhancing user experience by combining human-validated answers with AI, and our future plans for deeper personalization and community integration. Episode notes: stackoverflow.ai is helping you…
…
continue reading

1
Safely Changing Software to Avoid Incidents: A Conversation with Justin Sheehy
59:48
59:48
Play later
Play later
Lists
Like
Liked
59:48In this podcast, Michael Stiefel spoke with Justin Sheehy about how to safely put software into production without creating production incidents. Among the topics discussed were the futility of root cause analysis, and the importance of having a shared language for discussing incidents. This discussion included the need for software to be malleable…
…
continue reading

1
AI Red Teaming Guide for Beginners in 2025
20:16
20:16
Play later
Play later
Lists
Like
Liked
20:16This episode delves into the critical field of AI Red Teaming, a structured, adversarial process designed to identify vulnerabilities and weaknesses in AI systems before malicious actors can exploit them. The Certified AI Security Professional (CAISP) course is specifically designed to advance careers in this field, offering practical skills in exe…
…
continue reading

1
Root Causes 524: How to Kill Three Birds with One Stone
12:42
12:42
Play later
Play later
Lists
Like
Liked
12:42Three major changes are coming to the world of public certificates, all of which require major changes in how organizations deploy, renew, and manage their certificates. These are 47-day SSL, PQC, and the deprecation of mTLS. We describe the overlap between these efforts and how to combine them for better efficiency and project management.…
…
continue reading

1
The Future of Customer Experience in Financial Services with Agentic AI - with Abhii Parakh of Prudential Financial
26:09
26:09
Play later
Play later
Lists
Like
Liked
26:09The ‘AI in Business’ podcast connects enterprise leaders with the best insights on how AI is driving measurable impact across regulated industries. In this episode, we highlight Prudential Financial’s perspective on scaling AI in customer experience, an area facing both significant opportunity and unique regulatory challenges. By featuring Abhii Pa…
…
continue reading

1
Aligning Innovation with Oversight in AI Governance for Data Teams - with Shane Wiggins of OneTrust
23:45
23:45
Play later
Play later
Lists
Like
Liked
23:45As AI adoption accelerates in financial services, governance leaders face the challenge of keeping oversight processes aligned with innovation. OneTrust provides data governance and risk management tools, serving over 14,000 customers worldwide across privacy, security, third-party, and AI domains. Traditional data governance models, often designed…
…
continue reading

1
Kotlin is more than just the Android house language
30:58
30:58
Play later
Play later
Lists
Like
Liked
30:58Ryan welcomes Jeffrey van Gogh, Director of Engineering, Android Developer Experience, at Google and board member of the Kotlin Foundation. They discuss the evolution of the Kotlin language from JVM to multiplatform, how their governance board works with the community to stop breaking changes, and the intricacies of Kotlin’s multiplatform capabilit…
…
continue reading

1
Qualys CEO Sumedh Thakar on Moving From SOC to ROC
33:51
33:51
Play later
Play later
Lists
Like
Liked
33:51Qualys CEO Sumedh Thakar joins me to unpack what cyber risk management really looks like when budgets are tight, signals are noisy, and AI is changing the game. Sumedh’s journey started in Pune with parents who prized education above everything. He arrived in the US with one hundred dollars, joined Qualys as one of its first software engineers, and…
…
continue reading

1
Predicting System Failures with AI in Banking - with Dale Skeen of Vitria Technology
24:56
24:56
Play later
Play later
Lists
Like
Liked
24:56Banks face some of the highest stakes when it comes to IT reliability. Even small disruptions can ripple into regulatory exposure, reputational harm, and major financial losses. Yet many financial institutions still rely on reactive monitoring systems that chase alerts without addressing the root causes of outages. On today’s episode of the ‘AI in …
…
continue reading

1
Balancing Trade-Offs in Hybrid Cloud and the Infrastructure behind Scalable AI - with Jason Hardy of Hitachi Vantara
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36As enterprises scale their AI initiatives, leaders face mounting challenges in balancing compute demands, sustainability goals, and hybrid cloud strategies. Many organizations rush to secure GPUs and cloud resources without accounting for hidden costs, data bottlenecks, and sustainability trade-offs. In this episode of the AI in Business podcast, E…
…
continue reading

1
EP14 Web3's Dark Side: Unmasking the New Age of Financial Crime
1:12:14
1:12:14
Play later
Play later
Lists
Like
Liked
1:12:14Web3 promised a new era of decentralized finance, but it has also created a new frontier for crime, with thefts and hacks far surpassing those in the traditional financial sector. In this episode, we sit down with experts Blas Kojusner, Robert Wallace, and Joseph Dobson to explore the Wild West of Web3 and decentralized finance (DeFi). But what is …
…
continue reading

1
Data Pipelines that Support Globalized Education and Training Programs - with Norma Scagnoli of the Illinois Institute of Technology
32:50
32:50
Play later
Play later
Lists
Like
Liked
32:50As universities and enterprises both turn to large-scale digital learning, the challenges of scaling education look remarkably similar across sectors. From managing data pipelines to ensuring learners feel a sense of connection, success depends on more than just technology. In this Pure Storage-sponsored episode of the ‘AI in Business’ podcast from…
…
continue reading

1
Turning CPG Complexity into Real-Time Decisions with AI - with Henrique Wakil Moyses of Crisp
26:30
26:30
Play later
Play later
Lists
Like
Liked
26:30The consumer goods and retail industries face an overwhelming challenge: too much fragmented data and too little clarity. From mismatched retailer reports to legacy systems that can’t keep up with today’s SKU volumes, many organizations find themselves bogged down in “data indigestion” instead of actionable insights. Today’s guest is Henrique Wakil…
…
continue reading

1
Root Causes 523: Will Your Configuration Block MPIC DCV?
11:16
11:16
Play later
Play later
Lists
Like
Liked
11:16MPIC (Multi-perspective Issuance Corroboration) is soon to move into enforcement phase. In this episode we describe three configuration decisions that can force Domain Control Validation (DCV) to fail and tell you what to do about them before you have a problem.By Tim Callan and Jason Soroko
…
continue reading
Data Dave and Alexis tackle listener questions on unstructured data, bad AI training, MDM, and measuring when data is “good enough.”By Alexis Keller-Carrell
…
continue reading

1
Unlocking Infrastructure as the Engine of Transformation – with Deborah Golden from Deloitte
38:46
38:46
Play later
Play later
Lists
Like
Liked
38:46What if the real AI revolution isn’t in the models — but in the reimagined systems beneath them? In this episode, Deborah Golden, U.S. Chief Innovation Officer at Deloitte, joins Emerj CEO and Head of Research Daniel Faggella to rethink what powers (or derails) AI at scale. The conversation challenges conventional wisdom – proposing that the future…
…
continue reading