Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
PANCast™

Palo Alto Networks - LIVEcommunity

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Listen, Learn, Leverage! This Palo Alto Networks podcast offers insights to help you build knowledge, maximize investment, and improve your company’s cybersecurity posture.
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
Artwork

1
Tech Bytes

Packet Pushers

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Tech Bytes are short sponsored audio segments that appear at the end of Network Break episodes. We also separate them into this standalone feed so it’s easy to stay in the loop on new vendor developments.
  continue reading
 
Artwork

1
Training Data

Sequoia Capital

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Join us as we train our neural nets on the theme of the century: AI. Sonya Huang, Pat Grady and more Sequoia Capital partners host conversations with leading AI builders and researchers to ask critical questions and develop a deeper understanding of the evolving technologies—and their implications for technology, business and society. The content of this podcast does not constitute investment advice, an offer to provide investment advisory services, or an offer to sell or solicitation of an ...
  continue reading
 
Artwork

1
Sales Pipeline Radio

Matt Heinz, Heinz Marketing

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
We feature the brightest minds in B2B sales and marketing, sharing secrets to driving greater volume, velocity and conversion of sales pipelines in any industry. We cover the entire pipeline– demand generation, lead management, sales effectiveness, technology and more– all focused on helping you find, manage and win more business.
  continue reading
 
Artwork

1
Narrow Lanes

Delve Deeper

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Greg Sobiech speaks with high performing leaders to discover how brands create exceptional value and grow revenues for their through obsession and sacrifice. The leaders who succeed today are those who are relentlessly obsessed about a handful of the most important things. Being ‘obsessed’ means channelling all your team’s energy into what really matters. ‘sacrifice’ means deliberately choosing to do the ‘hard things’ because they will deliver greater value in the medium to long term. For ea ...
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
The Doctor's Lounge

America's Web Radio

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Dr. Hal Scherz Hal C. Scherz MD has been practicing pediatric urology for 23 years. He has been in private practice in San Diego, California and in Atlanta, Georgia and has been on the faculty of the University of California- San Diego and Emory University. He has been involved in resident and fellow training for all of his career, and has published over 75 peer reviewed articles and contributed chapters to 6 academic texts. He has been a reviewer for over 20 years for the major peer reviewe ...
  continue reading
 
Loading …
show series
 
In this episode of Threat Vector, host David Moulton speaks with Sam Ainscow, Group Chief Security Officer at Hill & Smith PLC. With over 20 years in cybersecurity, Sam shares his deep insights into cyber resilience, risk assessment, and incident response. He explains why a business must prepare through practical training, testing, and honest post-…
  continue reading
 
AI is no longer on the horizon. It’s part of how people and products work today. And as AI finds its way into more business applications and processes, it can create new risks. On today’s Tech Bytes, sponsored by Palo Alto Networks, we talk about how Palo Alto Networks is addressing those risks so that... Read more »…
  continue reading
 
In this special episode of Sales Pipeline Radio from the Forrester B2B Summit 2025 marketplace floor, Matt spoke with Lauren Daley, Director, Marketing Operations, and Jeremy Schwartz, Sr. Manager, Global Lead Management & Strategy at Palo Alto Networks. Don't miss an episode! Subscribe to Sales Pipeline Radio or tune in live Thursdays at 11:30 PT …
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
This week's show is entitled, "Courageous Marketing: The B2B Marketer's Playbook for Career Success" and my guest is Udi Ledergor, Chief Evangelist at Gong. Tune in to... Learn how to create memorable brand experiences and why they are crucial for lasting customer connections. Understand the balance of providing psychological safety and process acc…
  continue reading
 
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
  continue reading
 
This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
  continue reading
 
In this week’s edition of Risky Business Dmitri Alperovitch and Adam Boileau join Patrick Gray to talk through the week’s news, including: EXCLUSIVE: A Scattered Spider-style crew is hijacking DNS MX entries and compromising enterprises within minutes The SVG format brings the all horrors of HTML+JS to image files, and attackers have noticed Brian …
  continue reading
 
In this special episode of Sales Pipeline Radio from the Forrester B2B Summit 2025 marketplace floor, Matt spoke with Veena Vadgama, Fractional CMO and Kate Long, Vice President, Marketing at Crunchbase. Don't miss an episode! Subscribe to Sales Pipeline Radio or tune in live Thursdays at 11:30 PT | 12:30 MT | 1:30 CT | 2:30 ET on LinkedIn (also av…
  continue reading
 
Although we’ve seen great successes come out of the technology sector in recent decades, many critics — and even some insiders — say it’s due for an overhaul. As a longtime Silicon Valley engineer and executive and cofounder of the Grace Hopper Celebration of Women in Computing conference, Telle Whitney argues that tech culture is still too closed-…
  continue reading
 
ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
  continue reading
 
Former Airbus CTO Paul Eremenko shares his vision for bringing AI to physical engineering, starting with Archie—an AI agent that works alongside human engineers. P-1 AI is tackling the challenge of generating synthetic training data to teach AI systems about complex physical systems, from data center cooling to aircraft design and beyond. Eremenko …
  continue reading
 
How do you transform a tech giant into an AI-first (or AI-native) organization? In CXOTalk episode 881, Cisco's President and Chief Product Officer, Jeetu Patel, reveals the blueprint for building AI-native companies in 2025. Discover why AI won't replace your job – but someone using AI better than you will. Learn how Cisco is revolutionizing its e…
  continue reading
 
Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
  continue reading
 
This week's show is entitled, "Chewing Glass: Stories From an Early-Stage Entrepreneur" and my guest is Ben Henson, Co-Founder, CRO at Peel. Tune in to learn: How to transition from a successful career in marketing to entrepreneurship and find your path. The role of AI in creating efficient marketing solutions and addressing unmet market needs. Str…
  continue reading
 
This week in the security news: Malware-laced printer drivers Unicode steganography Rhode Island may sue Deloitte for breach. They may even win. Japan's active cyber defense law Stop with the ping LLMs replace Stack Overflow - ya don't say? Aggravated identity theft is aggravating Ivanti DSM and why you shouldn't use it EDR is still playing cat and…
  continue reading
 
In this episode of Threat Vector, host David Moulton speaks with Tanya Shastri, SVP of Product Management, and Navneet Singh, VP of Marketing - Network Security, at Palo Alto Networks. They explore what it means to adopt a secure AI by design strategy, giving employees the freedom to innovate with generative AI while maintaining control and reducin…
  continue reading
 
AI strategist and TikTok commentator Nate B. Jones joins CXOTalk host Michael Krigsman to explain the high-stakes race among OpenAI, Google, Meta, and others to advance large language models. The discussion explores token economics, model specialization, and hands-on prompting skills every executive needs to translate AI progress into business resu…
  continue reading
 
In the leadership and communications section, Why Every CISO Should Be Gunning For A Seat At The Board Table, The Innovation We Need is Strategic, Not Technical , The Best Leaders Ask the Right Questions, and more! This segment is sponsored by Fortra. Visit https://securityweekly.com/fortrarsac to learn more about them! Fortra is successfully reduc…
  continue reading
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: TeleMessage memory dumps show up on DDoSecrets Coinbase contractor bribed to hand over user data Telegram does seem to be actually cooperating with law enforcement Britain’s legal aid service gets 15 years worth of applicant data stolen Shocking no one, Ivanti …
  continue reading
 
CEO Amit Bendov shares how Gong evolved from a meeting transcription tool to an AI-powered revenue platform that's increasing sales capacity by up to 60%. He explains why task-specific AI agents are the key to enterprise adoption, and why human accountability will remain crucial even as AI takes over routine sales tasks. Amit also reveals how Gong …
  continue reading
 
In this special episode of Sales Pipeline Radio from the Forrester B2B Summit 2025 marketplace floor, Matt spoke with Latané Conant, Chief Revenue Officer at 6sense. Don't miss an episode! Subscribe to Sales Pipeline Radio or tune in live Thursdays at 11:30 PT | 12:30 MT | 1:30 CT | 2:30 ET on LinkedIn (also available on demand). In just 20 fast-pa…
  continue reading
 
To achieve long-term success in tumultuous businesses like media and entertainment, following formulas and data won't get you there. Barry Diller, the current Chairman and Senior Executive of both IAC and Expedia Group, has built a decades-long career in TV, film, and digital media by going with his instincts and betting on what he views as good id…
  continue reading
 
In the news, Coinbase deals with bribes and insider threat, the NCSC notes the cross-cutting problem of incentivizing secure design, we cover some research that notes the multitude of definitions for secure design, and discuss the new Cybersecurity Skills Framework from the OpenSSF and Linux Foundation. Then we share two more sponsored interviews f…
  continue reading
 
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
  continue reading
 
In this wholly sponsored Soap Box edition of the show, Patrick Gray chats with Adam Bateman and Luke Jennings from Push Security. Push has built an identity security platform that collects identity information and events from your users’ browsers. It can detect phish kits and shut down phishing attempts, protect SSO credentials, and find shadow/per…
  continue reading
 
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversi…
  continue reading
 
In this special episode of Sales Pipeline Radio from the Forrester B2B Summit 2025 marketplace floor, Matt spoke with Ed Grossman, Chief Data Nerd at NavigateIQ. Don't miss an episode! Subscribe to Sales Pipeline Radio or tune in live Thursdays at 11:30 PT | 12:30 MT | 1:30 CT | 2:30 ET on LinkedIn (also available on demand). In just 20 fast-paced …
  continue reading
 
Recorded live at Sequoia’s AI Ascent 2025: LangChain CEO Harrison Chase introduces the concept of ambient agents, AI systems that operate continuously in the background responding to events rather than direct human prompts. Learn how these agents differ from traditional chatbots, why human oversight remains essential and how this approach could dra…
  continue reading
 
Recorded live at Sequoia’s AI Ascent 2025: Sierra co-founder Bret Taylor discusses why AI is driving a fundamental shift from subscription-based pricing to outcomes-based models. Learn why this transition is harder for incumbents than startups, why applied AI and vertical specialization represent the biggest opportunities for entrepreneurs and how …
  continue reading
 
In the leadership and communications section, How CISOs can talk cybersecurity so it makes sense to executives, Firms to spend more on GenAI than security in 2025, Europe leads shift from cyber security ‘headcount gap’ to skills-based hiring, and more! Next, pre-recorded interviews from RSAC Conference 2025, including: This segment is sponsored by …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play