The podcast where we choose a subject, read a single Wikipedia article about it, and pretend we're experts. Because this is the internet, and that's how it works now.
…
continue reading
Security Conversations Podcasts
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Relaxed Conversations around getting AI into production, whatever shape that may come in (agentic, traditional ML, LLMs, Vibes, etc)
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Shield of the Republic is a Bulwark podcast co-sponsored by the Miller Center of Public Affairs at the University of Virginia. We probe beyond the hive mind of Washington conventional wisdom on national security and foreign affairs.
…
continue reading
Our podcast series is dedicated to exploring topics related to adoption, fostering and kinship care. We invite children’s social care professionals and experts by experience to join us to share best practices, their experiences and knowledge.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth, Bailey Harmon, and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
…
continue reading
Teaching you all about IRAs & Roth IRAs, employer retirement plans, taxes, Social Security, Medicare, portfolio withdrawal strategies, annuities, estate planning and much more!
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
U.S. foreign policy for the future. Security Dilemma brings you conversations with the experts, policymakers, and thinkers charting new paths forward from the wreckage of recent decades and toward a national security and defense policy guided by prudence and restraint. Cohosts John Allen Gay and A.J. Manuzzi bring you the information you need to shape a wiser approach. Security Dilemma is a podcast of the John Quincy Adams Society, an independent nonprofit organization dedicated to advancing ...
…
continue reading
Panel Discussions & Interviews
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!
…
continue reading
We talk to security industry leaders, disruptors, and innovators with strong views and opinions on the future of topics like physical security, smart buildings, artificial intelligence, cybersecurity and more. We dig into the latest tech trends, explore how security is shaping the world, and delve into those tricky regulations (like NIS2, the Cyber Resilience Act, the EU Artificial Intelligence Act, the UK's Product Security, Telecommunications, Infrastructure Act and more) that keep everyon ...
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Unusually in-depth conversations about the world's most pressing problems and what you can do to solve them. Subscribe by searching for '80000 Hours' wherever you get podcasts. Hosted by Rob Wiblin and Luisa Rodriguez.
…
continue reading
Conversations with people shaping our world, from all around the globe. Listen to The Interview for the best conversations from the BBC, the world's most trusted international news provider. We hear from titans of business, politics, finance, sport and culture. Global leaders, decision-makers and cultural icons. Politicians, activists and CEOs. Each interview is around 20-minutes, packed full of insight and analysis, covering some of the biggest issues of our time. How does it work? Well, at ...
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
Conversations with artists, writers, intellectuals, workers--you choose the designation--about the politics of culture
…
continue reading
Forrest Hanson is joined by clinical psychologist (and his dad) Dr. Rick Hanson and a world-class group of experts to explore the practical science of lasting well-being. Conversations focus on the key insights from psychology, science, and contemplative practice that you need to build reliable inner strengths, overcome your challenges, and get the most out of life. New episodes every Monday.
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Love is more than you think. From the creators of Criminal. New episodes twice a month. Part of the Vox Media Podcast Network.
…
continue reading
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
…
continue reading
Just Security is an online forum for the rigorous analysis of national security, foreign policy, and rights. We aim to promote principled solutions to problems confronting decision-makers in the United States and abroad. Our expert authors are individuals with significant government experience, academics, civil society practitioners, individuals directly affected by national security policies, and other leading voices.
…
continue reading
Redacted (verb): censor or obscure for legal or security purposes. [REDACTED] History is a show where we can have real, unfiltered conversations about the things that SOME FOLK don't want us to talk about. This is where we will huddle around the campfire and tell the stories of people that the textbooks forgot. Sit back, relax, and enjoy the show! If you want to support the show, come join the Patreon! https://www.patreon.com/Blackkout https://www.tiktok.com/@blackkout___ For all inquiries, ...
…
continue reading
Are you looking for a new and fun way to learn American English? Come hang out with Lindsay and Michelle from Boston and New York City and have fun while you improve your English listening skills! We are an English as a Second Language (ESL) podcast for intermediate to advanced English learners around the world. We will show you how to use everyday English vocabulary and natural idioms, expressions, and phrasal verbs and how to make small talk in American English. We will also give you speci ...
…
continue reading
Diplomatic Immunity: Frank and candid conversations about diplomacy and foreign affairs Diplomatic Immunity is a podcast from the Institute for the Study of Diplomacy at Georgetown University. We bring you "frank and candid" conversations on the issues facing diplomats and national security decision makers globally. We talk to current and former diplomatic officials, scholars, and analysts and seek to understand how best to foster international cooperation in an age of global crises. Hosted ...
…
continue reading
Introducing the new podcast series from the National Cyber Security Centre (NCSC). Join us as we dive deep into the ever-evolving world of cyber security, bringing you discussions on topical issues, emerging trends, and expert insights from our in-house experts and external guests. Each episode offers a comprehensive exploration of a specific topic, providing listeners with valuable knowledge and actionable advice. Visit ncsc.gov.uk to find out more about the topics discussed, access additio ...
…
continue reading
Kyle Hulbert shares his WMDs (Whimsically Maniacal Diatribes) from behind the bars of Buckingham Correctional Center, a medium-security Virginia state prison, where he's serving a life sentence.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
This podcast explores investment strategies, economics, personal finance, and stock analysis. It features real conversations and analysis to inform, educate, and entertain. Note that nothing in this podcast is investment advice and it is for entertainment & discussion purposes only. Do your own due diligence before making any investment. www.securityanalysis.org
…
continue reading
Conversations about contemporary warfare and what it means for the future of fighting. Each episode will look at how wars are being fought around the world today, whether (and why) this is important, and what it all might mean for militaries and national security in the coming decades.
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, and software supply chain security. Hosted by Paul Roberts, director of editorial and content at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
Welcome to Healthy Conversations, a podcast from Athens-Limestone Hospital sharing expert healthcare insights. Hosted by Susan Claborn and local co-hosts, each episode features medical professionals discussing wellness, prevention, chronic care, and local services—because your health matters. 🎧 Subscribe and be part of the conversation, one episode at a time.
…
continue reading
Welcome to Lowy Institute Conversations – a podcast in which Lowy Institute researchers and some of the world’s leading experts delve into the big issues in international affairs.
…
continue reading
The Irregular Warfare Podcast explores an important component of war throughout history. Small wars, drone strikes, special operations forces, counterterrorism, proxies—this podcast covers the full range of topics related to irregular war and features in-depth conversations with guests from the military, academia, and the policy community. The podcast is a collaboration between the Modern War Institute at West Point and Princeton University’s Empirical Studies of Conflict Project.
…
continue reading
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
…
continue reading
1
Conversations: Australia and the UN Security Council
30:00
30:00
Play later
Play later
Lists
Like
Liked
30:00During his visit to the UN in September, Prime Minister Anthony Albanese re-declared Australia’s bid for a non-permanent seat on the UN Security Council for 2029–30. But winning a seat on the world’s apex body is not assured, and the Council itself is facing a crisis of confidence. The Lowy Institute’s Ryan Neelam speaks with former Australian Amba…
…
continue reading
1
Mark Folmer - Thought Leadership Interview
46:53
46:53
Play later
Play later
Lists
Like
Liked
46:53Mark Folmer is a high-profile Canadian security professional. He has twice won awards as a 'Global Influencer in Security Thought Leadership'. He is a regular panellist and speaker on the security circuit from his expertise in physical and corporate security, as well as robotics. He is also an experienced volunteer leader. Sign up to the Security &…
…
continue reading
By Athens Limestone Hospital
…
continue reading
1
Nhial Deng Nhial: ‘South Sudan is being run down’
22:59
22:59
Play later
Play later
Lists
Like
Liked
22:59‘There's basically a total failure of governance. Nothing is working. There is very serious political instability that has actually manifested itself in violence all across the country.’ James Copnall speaks to senior South Sudanese politician Nhial Deng Nhial, about the political instability that’s threatening the future of the world’s youngest co…
…
continue reading
1
3478: Why Aviatrix Believes Network Visibility Is the Missing Pillar of Cloud Defense
40:37
40:37
Play later
Play later
Lists
Like
Liked
40:37How do you secure a world where trusted internal traffic now travels over the public internet? That's the question I put to Doug Merritt, CEO of Aviatrix, in this thought-provoking conversation recorded for Tech Talks Daily. Doug brings decades of experience from his time leading Splunk and other major technology players, and he now finds himself a…
…
continue reading
1
Building a Real Security Culture: Why Most AppSec Champion Programs Fall Short | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 5 | A Musing On the Future of Cybersecurity with Sean Martin ...
2:24
2:24
Play later
Play later
Lists
Like
Liked
2:24Most organizations have security champions. Few have a real security culture. In this episode of AppSec Contradictions, Sean Martin explores why AppSec awareness efforts stall, why champion programs struggle to gain traction, and what leaders can do to turn intent into impact. 🔍 In this episode: Why compliance training doesn’t build culture The dat…
…
continue reading
1
Turning To The Darkside & AI Cyberslop - PSW #899
2:07:54
2:07:54
Play later
Play later
Lists
Like
Liked
2:07:54This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
…
continue reading
1
Turning To The Darkside & AI Cyberslop - PSW #899
2:07:54
2:07:54
Play later
Play later
Lists
Like
Liked
2:07:54This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
…
continue reading
1
Fighting the Loneliness Epidemic and the Power of Intergenerational Friendships: Feed Drop
34:34
34:34
Play later
Play later
Lists
Like
Liked
34:34Today we’re featuring an episode from another show I think you’re really going to connect with: Turning Points: Navigating Mental Health. Can a meaningful friendship bridge a 51-year age gap and help combat social isolation? Meet Peter and Pooja; two unlikely companions whose intergenerational bond proves that friendships can flourish when we break…
…
continue reading
1
How AI is Expanding the CIO Role with Chetna Mahajan of Webflow
31:30
31:30
Play later
Play later
Lists
Like
Liked
31:30In this episode, Chetna explains how new automation strategies are evolving not only productivity, but the role of the CIO. Chetna emphasizes the importance of data quality and security when scaling a fast-growing company, as well as transparency and partnership in vendor relationships. About the Guest: Chetna is an award winning CIO, board member,…
…
continue reading
1
Marcelo Santos: democracy, Latin America, Socrates, the public
48:49
48:49
Play later
Play later
Lists
Like
Liked
48:49Marcelo Santos on democratic political communication, machismo, Latin America, Socrates, and the public You can read about his work here: https://www.udp.cl/academico/marcelo-santos/By Toby Miller
…
continue reading
1
History, Statecraft, and Strategy with Francis J. Gavin
48:44
48:44
Play later
Play later
Lists
Like
Liked
48:44This week, Kelly talks with Johns Hopkins Professor Francis J. Gavin about his new book, Thinking Historically: A Guide to Statecraft and Strategy (Yale University Press, 2025). The book looks at how history could be utilized to improve policy and enable better decision-making. It argues for a "historical sensibility" as a practical discipline—one …
…
continue reading
By Athens Limestone Hospital
…
continue reading
Today we are joined by Dr. Sasha O'Connell, Senior Director for Cybersecurity Programs at Aspen Digital, discussing "10 Years of Cybersecurity Progress & What Comes Next." Ben talks about a couple of instances of AI companies reigning in their chatbots. Dave's got the story of ICE’s controversial facial recognition operations. While this show cover…
…
continue reading
Global English Pronunciation is available now. We’ll show the 8 native secrets to clear English pronunciation. This is our newest course! Join today to get access to all 8 modules, interactive exercises, AI pronunciation analysis and scoring, teacher feedback, weekly live conversation practice, and more. Go here to enroll now. Save $50 this week o…
…
continue reading
1
#177 - 2025 year-end tax planning tips and items to consider
54:02
54:02
Play later
Play later
Lists
Like
Liked
54:02Andy shares some year-end tax planning tips, deadlines and things to consider around the following topics: contributions to qualified accounts Roth conversions distributions from qualified accounts Required Minimum Distributions ("RMDs") charitable donations Qualified Charitable Distributions ("QCDs") from IRAs gifting tax loss and tax gain harvest…
…
continue reading
1
3477: The Intersection of AI, DX, and Technical Debt.
27:15
27:15
Play later
Play later
Lists
Like
Liked
27:15Every software team, no matter its size or sophistication, has wrestled with the same quiet threat, technical debt. But what if the issue isn't just messy code or outdated frameworks, but something more human? That's the question Ernesto Tagwerker, Founder and CEO of OmbuLabs.ai, has been asking as he works at the intersection of AI, developer expe…
…
continue reading
1
AEE 2508: Dating Advice: How to Turn Down an Invitation with Kindness
15:44
15:44
Play later
Play later
Lists
Like
Liked
15:44Global English Pronunciation is available now. We’ll show the 8 native secrets to clear English pronunciation. This is our newest course! Join today to get access to all 8 modules, interactive exercises, AI pronunciation analysis and scoring, teacher feedback, weekly live conversation practice, and more. Go here to enroll now. Save $50 this week o…
…
continue reading
Mostly taken from this GQ article here: https://www.gq.com/story/meet-the-nutmaxxers-obsessed-with-shooting-bigger-loadsBy Citation Needed Media
…
continue reading
1
Bridging the Cybersecurity Divide Between the Haves and Have-Nots: Lessons from Australia’s CISO Community | A Conversation with Andrew Morgan | Redefining CyberSecurity with Sean Martin
52:14
52:14
Play later
Play later
Lists
Like
Liked
52:14⬥GUEST⬥ Andrew Morgan, Chief Information Security Officer | On LinkedIn: https://www.linkedin.com/in/andrewmorgancism/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ The cybersecurity communi…
…
continue reading
1
The Geopolitics of AGI | Helen Toner (Director of CSET & past OpenAI board member)
2:20:02
2:20:02
Play later
Play later
Lists
Like
Liked
2:20:02With the US racing to develop AGI and superintelligence ahead of China, you might expect the two countries to be negotiating how they’ll deploy AI, including in the military, without coming to blows. But according to Helen Toner, director of the Center for Security and Emerging Technology in DC, “the US and Chinese governments are barely talking at…
…
continue reading
1
PP085: News Roundup – Naked Satellite Signals, Account Recovery Buddies, Busting Ghost Networks
52:28
52:28
Play later
Play later
Lists
Like
Liked
52:28Did you know college students are snooping on satellite transmissions? On today’s news roundup we discuss new research in which university investigators use off-the-shelf equipment to intercept traffic from geostationary satellites and discover that a lot of it is unencrypted. We also dig into the credential hygiene lessons we can learn from a corp…
…
continue reading
In this episode of ConversingLabs, host Paul Roberts interviews Casey John Ellis, founder of Bugcrowd, about the state of vulnerability management and bug bounties in 2025. Casey shares his insights on current changes impacting both the threat landscape and the cybersecurity industry, such as matters at the federal level and increased AI usage. Loo…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
“He stole my watch. He stole my jewelry. I stopped wearing jewelry – just to see what else he would steal.” In 2004, Ava Do met a professional pickpocket at a bachelorette party in Las Vegas. And they fell in love. Say hello on Facebook and Instagram. Follow the show and review us on Apple Podcasts. Want to listen to This is Love ad-free? Sig…
…
continue reading
1
AEE: Consonant Clusters for Clear English
12:31
12:31
Play later
Play later
Lists
Like
Liked
12:31Global English Pronunciation is available now. We’ll show the 8 native secrets to clear English pronunciation. This is our newest course! Join today to get access to all 8 modules, interactive exercises, AI pronunciation analysis and scoring, teacher feedback, weekly live conversation practice, and more. Go here to enroll now. Save $50 this week o…
…
continue reading
1
Sir Bradley Wiggins: I couldn’t see hope or joy
22:59
22:59
Play later
Play later
Lists
Like
Liked
22:59''There were periods when I couldn’t see any hope or joy,'' says British cycling champion Sir Bradley Wiggins in a deeply personal interview with Anna Foster The first Briton to win the Tour de France, he collected five Olympic gold medals throughout his career. But his stellar reputation came under attack as he faced allegations of doping. What fo…
…
continue reading
1
3476 How Denodo's Deep Query Brings Reasoning to Enterprise AI
23:11
23:11
Play later
Play later
Lists
Like
Liked
23:11What if business intelligence didn't stop at answering what happened, but could finally explain why? In this episode of Tech Talks Daily, I sit back down with Alberto Pan, Chief Technology Officer at Denodo, to unpack how Deep Query is redefining enterprise AI through reasoning, transparency, and context. We explore how Deep Query functions as an A…
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Show Notes: https://securityweekly.com/swn-526
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-526
…
continue reading
1
The Evolution of AI in Cyber Security // Jeff Schwartzentruber // #344
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14Dr. Jeff Schwartzentruber is a Senior Machine Learning Scientist at eSentire, working on anomaly detection pipelines and the use of large language models to enhance cybersecurity operations.The Evolution of AI in Cyber Security // MLOps Podcast #344 with Jeff Schwartzentruber, Staff Machine Learning Scientist at eSentire. Join the Community: https:…
…
continue reading
1
Losing a Taiwan War? with Lyle Goldstein
1:13:31
1:13:31
Play later
Play later
Lists
Like
Liked
1:13:31On this week's episode of Security Dilemma, A.J. Manuzzi and John Gay spoke with Lyle Goldstein of Defense Priorities and the Watson Institute at Brown University about his recent paper series "Target Taiwan," which argues that a U.S.-China conflict over Taiwan could be costlier and less winnable for the United States than conventional wisdom asses…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
AEE 2507: Pesky Prefixes Part 2: Inconvenient English Vocabulary
20:04
20:04
Play later
Play later
Lists
Like
Liked
20:04Global English Pronunciation is available now. We’ll show the 8 native secrets to clear English pronunciation. This is our newest course! Join today to get access to all 8 modules, interactive exercises, AI pronunciation analysis and scoring, teacher feedback, weekly live conversation practice, and more. Go here to enroll now. Save $50 this week o…
…
continue reading
Yes! I have beaten the prison phone system into submission and even it bends to my maniacal will!!! Need more The Kyle in your life? cheshiremadness.substack.comBy Kyle Hulbert
…
continue reading
1
3475: Jamf - Why Zero Trust Must Include macOS and iOS
30:23
30:23
Play later
Play later
Lists
Like
Liked
30:23For years, many businesses believed that Apple devices were inherently secure. That illusion has faded. In this episode of Tech Talks Daily, I speak with Adam Boynton, Senior Security Strategy Manager at Jamf, about why visibility across macOS and iOS is no longer a luxury but a necessity. Adam explains how Jamf has evolved from device management t…
…
continue reading
Jaipal Singh Goud is the CTO at Prem AI, working on model customization and privacy-preserving compute. This episode was recorded at the Plan B studios in Lugano, Switzerland. For more information, visit https://pow.space/ How do fine-tuned models and RAG systems power personalized AI agents that learn, collaborate, and transform enterprise workflo…
…
continue reading
1
S7E50 - A Conversation with Peter Gregory
35:27
35:27
Play later
Play later
Lists
Like
Liked
35:27In this episode of The Virtual CISO Moment, Greg Schaffer welcomes back cybersecurity expert and best-selling author Peter H. Gregory — who’s written over 50 books and helped shape many of today’s top security and certification programs. They dive deep into: 💡 AI Governance — how to use AI safely, ethically, and legally (and why “shadow AI” may be …
…
continue reading
I just want to say thank you! The first of many. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Andre White
…
continue reading
1
Reflections on International Law Weekend 2025: An International Law Chats x Just Security Podcast Crossover Episode
38:30
38:30
Play later
Play later
Lists
Like
Liked
38:30International law professors Chiara Giorgetti, Milena Sterio, and Rebecca Hamilton join Just Security’s Managing Editor, Megan Corrarino, to discuss takeaways from the American Branch of the International Law Association (ABILA)’s Oct. 23-25 International Law Weekend. In this special episode co-produced with ABILA’s International Law Chats podcast,…
…
continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
Play later
Play later
Lists
Like
Liked
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
Play later
Play later
Lists
Like
Liked
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
continue reading
1
Trauma Masterclass: Understanding and Repairing Our Hidden Wounds
2:43:28
2:43:28
Play later
Play later
Lists
Like
Liked
2:43:28Today we’re revisiting some of our favorite episodes to explore one of the most salient topics in psychology today: trauma. We begin by tracing its developmental roots with Dr. Lindsay Gibson and Dr. Bessel van Der Kolk, before looking at how it can be passed down through family systems with Dr. Mariel Buqué, associate somatic therapist Elizabeth F…
…
continue reading
1
AEE 2506: Explain it to Me Like I'm Five. How to Ask for a Simple Breakdown in English
17:38
17:38
Play later
Play later
Lists
Like
Liked
17:38The new course, Global English Pronunciation is available now. We’ll show the 8 native secrets to clear English pronunciation. Join today to get access to all 8 modules, interactive exercises, AI pronunciation analysis and scoring, teacher feedback, weekly live conversation practice, and more. Go here to enroll now. Save $50 this week only on bas…
…
continue reading