Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Aimed at CISOs, CTOs, CROs and other global security professionals, the ISF Analyst Insight Podcast goes in-depth on the hottest topics in information security, and the extensive research conducted by the Information Security Forum, the leading authority on cyber, information security, and risk management. Drawing from our network of over 18,000 security professionals, our analysts hand selects active security professionals from ISF Member organisations to discuss how the implementation of I ...
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
…
continue reading
1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
Weekly Information Security News. Stay up to date on what’s going on in the InfoSec world in about 40 minutes. Join us for InfoSec news and stay for some friendly banter, guest interviews, gadget reviews, tech interview tips, and hilarious dad jokes! New episodes every Monday.
…
continue reading
Explore the minds of fascinating specialists ranging from mathematics, physics, web3, cybersecurity, HFT/MEV, startup founders, investigators and so many more. Every episode will give you a glimpse into the unknown unknowns. Enjoy your stay, anon. Keywords: mathematics, math, physics, biology, chemistry, solo auditor, public auditing platforms, private audits, scalability, freedom, Scraping Bits podcast, blockchain technology, audit industry, flashbots, reverse engineering, cybersecurity, in ...
…
continue reading
In "Surfacing Security," we explore a variety of cybersecurity topics relevant to Attack Surface Management and beyond. Your co-hosts are Michael Gianarakis (Assetnote Co-Founder/CEO) and Shubham Shah (Assetnote Co-Founder/CTO).
…
continue reading
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
…
continue reading
Welcome to the Ctrl-Alt-Secure podcast, your guide to navigating the ever-changing landscape of cybersecurity. Join us as we delve into the latest trends, threats, and innovations shaping the infosec space.
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
A podcast for anyone and everyone interested in leadership in the cybersecurity industry - we talk about the challenges impacting our industry & how leadership can address that and gain insights, advice and the occasional anecdote from experienced leaders who are happy to share their stories with us!
…
continue reading
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
…
continue reading
On the Hacker to Founder podcast, we are joined with our host Chris (REal0day) Magistrado, who interviews hackers who have reached the pinnacle of their cybersecurity journey and have ventured into the world of startups and/or investing.
…
continue reading
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking wit ...
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Hey everyone, Welcome to the Infosec Prep Podcast. We aim to bring you weekly Infosec news and bring some people on to interview! Join our discord at https://discord.gg/9xTqKTY
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
Podcast by InfoSec Campus
…
continue reading
Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field of cybersecurity.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Welcome to the podcast: Sustainable Compliance. Are you passionate about data protection, GDPR, information security, and general compliance? Then, this podcast is dedicated to you. We delve into the intricacies of data protection and compliance. Join us as the host, Jacob Høedt Larsen, interviews experts and discusses the latest trends, insights, and advice within the realm of compliance. We also explore how we can reshape the way we think and organise ourselves around compliance, to forge ...
…
continue reading
00:00:00 - PreShow Banter™ — Sarsaparilla 00:05:50 - BHIS - Talkin’ Bout [infosec] News 2024-10-28 00:06:46 - Story # 1: AWS, Azure auth keys found in Android and iOS apps used by millions 00:15:02 - Story # 2: Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs 00:29:03 - Story # 3: Delta officially l…
…
continue reading
1
Select Defensive Security Podcast Episode 284
54:19
54:19
Play later
Play later
Lists
Like
Liked
54:19
Delta’s Lawsuit, SEC Penalties, and Fortinet’s Zero-Day Exploit In this episode, hosts Jerry Bell and Andrew Kellett discuss current cybersecurity issues, starting with Delta Air Lines’ $500 million lawsuit against CrowdStrike over an IT outage and data breach. They explore SEC penalties imposed on tech companies for downplaying the SolarWinds hack…
…
continue reading
1
InfoSec Beat: How to Balance Real-Time Intelligence with System Availability
18:55
18:55
Play later
Play later
Lists
Like
Liked
18:55
Are organizations in control of updates to their environments? The July 2024 CrowdStrike disruptive update has many asking this question. Patches are essential to security, but this event and others before it have organizations asking how to strike a balance in protecting quickly with the need to be resilient? Join me and Jacky Fox, Accenture Secur…
…
continue reading
1
Unsecurity Episode 226: Infosec Buy In with Victoria Fogarty
41:10
41:10
Play later
Play later
Lists
Like
Liked
41:10
In this episode of the Unsecurity Podcast, Associate Penetration Tester Victoria Fogarty joins Megan and Brad to walk through how to buy in for InfoSec programs with an executive team. Don't forget:The show is available in audio-only form wherever you listen to podcasts! Please send any questions, comments, or feedback to unsecurity@protonmail.com.…
…
continue reading
1
S3 Ep6: Threat Horizon: Net gains and losses
35:08
35:08
Play later
Play later
Lists
Like
Liked
35:08
The internet underpins most of modern life, change it and the world follows or falls. This discussion draws on work by Australia's net overseer to explore just how it might change and who benefits and loses. If you would like to find out more about the topics covered in this episode, get in touch with Mark Ward, Senior Research Analyst at the ISF. …
…
continue reading
1
Dinah Davis: Building your network. [R&D] [Career Notes]
8:10
8:10
Play later
Play later
Lists
Like
Liked
8:10
Please enjoy this encore episode, where we are joined by VP of R&D at Arctic Wolf Networks Dinah Davis, as she shares how she arrived in the cybersecurity industry after finding her niche. Dinah recalls how at a time of indecision, a computer course at university and a job with the Canadian government helped to solidify her career direction. Dinah …
…
continue reading
1
The Medium is the Reality: Immersive Storytelling through Augmented and Virtual Reality | A Conversation with Thibault Mathieu | Audio Signals Podcast With Marco Ciappelli
33:19
33:19
Play later
Play later
Lists
Like
Liked
33:19
Guest: Thibault Mathieu, Founder and CEO, Wilkins Avenue AR On LinkedIn | https://www.linkedin.com/in/thibaultmathieu/ On Twitter | https://x.com/thibaultmathieu _____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast On ITSPmagazine | https://www…
…
continue reading
1
Velvet Ant's silent invasion. [Research Saturday]
22:26
22:26
Play later
Play later
Lists
Like
Liked
22:26
This week, we are joined by, Amnon Kushnir from Sygnia, who is sharing their work on "China-Nexus Threat Group ‘Velvet Ant’ Leverages a Zero-Day to Deploy Malware on Cisco Nexus Switches." In early 2024, Sygnia observed the ‘Velvet Ant’ threat group exploiting a zero-day vulnerability (CVE-2024-20399) to infiltrate Cisco Switch appliances and opera…
…
continue reading
1
Cybersecurity as a Proactive Societal Safeguard? How Cybersecurity Shapes Society and Technology — and Vice Versa — and The Other Way Around! | A Conversation with Sean Martin and Fred Heiding | Redefining ...
40:19
40:19
Play later
Play later
Lists
Like
Liked
40:19
Guests: Fred Heiding, Computer Security Specialist, World Economic Forum [@wef] On LinkedIn | https://www.linkedin.com/in/fheiding/ On Twitter | https://twitter.com/fredheiding On Mastodon | https://mastodon.social/@fredheiding On Instagram | https://www.instagram.com/fheiding/ Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Red…
…
continue reading
1
Week in Review: Deepfake targets Wiz, Black Basta leverages Teams, Russia’s Linux plans
24:35
24:35
Play later
Play later
Lists
Like
Liked
24:35
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest David Cross, SVP/CISO, Oracle. Also check out David’s travel blog and recent “Secure by Default” white paper at IT ISAC. Thanks to our show sponsor, Dropzone AI Security operations are evolving, and AI is leading the way. Dropzone AI …
…
continue reading
1
A push to debunk election disinformation.
30:45
30:45
Play later
Play later
Lists
Like
Liked
30:45
Georgia’s Secretary of State Pushes Social Media to Remove Russian Disinformation. CISA introduces its first international strategic plan. Microsoft issues a warning about the Quad7 botnet. Researchers uncover a zero-click vulnerability in Synology devices. CISA warns of critical ICS vulnerabilities. The U.S.and Israel outline the latest cyber acti…
…
continue reading
1
Michael McLaughlin on service, security, and the growing cyber threat
1:06:14
1:06:14
Play later
Play later
Lists
Like
Liked
1:06:14
Michael McLaughlin is an attorney and author, who served in the United States Navy and now serves as a critical advisory to industry as we face a growing list of threats in the cyber domain. His book, Battlefield Cyber, brings these threats to light and paints a stark picture of where we need to focus our attention to defend our modern society goin…
…
continue reading
1
Peruvian bank heist, Task Manager error, CyberPanel vulnerabilities exploited
7:42
7:42
Play later
Play later
Lists
Like
Liked
7:42
Peruvian bank warns of data theft after dark web revelations Windows 11 Task Manager displays wrong number of running processes CyberPanel sees vulnerabilities exploited soon after disclosure Thanks to today's episode sponsor, Dropzone AI Security operations are evolving, and AI is leading the way. Dropzone AI autonomously investigates 100% of your…
…
continue reading
While there are plenty of unknowns when it comes to protecting the OT attack surface, there are some things that are undeniably true. We know that the frequency of attacks will continue to increase. We know that it’s not if your ICS will be probed, but when. And we also know that asset and connection visibility is an ongoing challenge due to the im…
…
continue reading
CISA spins up an election operations war room. Microsoft neglected to restrict access to gender-detecting AI. Yahoo uncovers vulnerabilities in OpenText’s NetIQ iManager. QNAP issues urgent patches for its NAS devices. Sysdig uncovers Emerald Whale. A malvertising campaign exploits Meta’s ad platform to spread the SYS01 infostealer. Senator Ron Wyd…
…
continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware M…
…
continue reading
1
Transforming Compliance and Revolutionizing Cybersecurity | A HITRUST Collaborate 2024 Conversation with Ryan T. Patrick | On Location Coverage with Sean Martin
36:24
36:24
Play later
Play later
Lists
Like
Liked
36:24
Guests: Ryan T. Patrick, Vice President of Adoption, HITRUST On LinkedIn | https://www.linkedin.com/in/ryan-patrick-3699117a/ ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | https://www.itspmagazine.com/sean-martin _________…
…
continue reading
1
🚨 Colorado Butches Election Security, FBI Warns on Election Fraud Schemes, Android Malware Fakecall
18:57
18:57
Play later
Play later
Lists
Like
Liked
18:57
🚨 Colorado Butches Election Security, FBI Warns on Election Fraud Schemes, Android Malware Fakecall 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as Colorado SOS botches key Election security with more news below: FBI Warns of Election Fraud Sche…
…
continue reading
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest Karthik Krishnan, founder and CEO, Concentric AI. In this ep…
…
continue reading
1
Who Pays Me? How Do I Feel About That? Is it in Service of Life? | A Conversation with B. Lorraine Smith | What If Instead? Podcast with Alejandro Juárez Crawford and Miriam Plavin-Masterman
59:51
59:51
Play later
Play later
Lists
Like
Liked
59:51
Guest: B. Lorraine Smith, Writer, Advisor, & Coach On LinkedIn | https://www.linkedin.com/in/b-lorraine-smith-155a875/ Hosts: Alejandro Juárez Crawford On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alejandro-juarez-crawford Miriam Plavin-Masterman On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-…
…
continue reading
1
CISA's plan, North Korea comes to Play, FakeCall's new tricks
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28
CISA launches International Cybersecurity Plan North Korean hackers tied to Play ransomware FakeCall learns new tricks Thanks to today's episode sponsor, Dropzone AI Tired of false positives slowing your SOC down? Dropzone AI uses advanced AI to filter out the noise and focus on real threats. 24/7, every alert, no manual intervention. Want to learn…
…
continue reading
1
Guiding Organizations on the Next Steps in Their Compliance Journey | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | An A-LIGN Short Brand Innovation Story with Shreesh Bhattarai
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13
The focus is on HITRUST assessments, specifically the e1 certification, which provides an entry-level approach to cybersecurity compliance. The session emphasizes that compliance is an ongoing process and highlights the HITRUST e1 framework's adaptability to evolving threats. It also discusses the value proposition of the e1 certification, its affo…
…
continue reading
1
The secret Strava service, deepfakes, and crocodiles
35:10
35:10
Play later
Play later
Lists
Like
Liked
35:10
In this week's episode your hosts practice standing on one leg, Carole gives Graham a deepfake quiz, and we investigate how Strava may be exposing the movements of world leaders. All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault. Warning: This podcast…
…
continue reading
1
Password snafu sparks election security questions.
32:51
32:51
Play later
Play later
Lists
Like
Liked
32:51
Colorado election officials downplay a partial password leak. Over 22,000 CyberPanel instances were targeted in a ransomware attack. Google issues a critical security update for Chrome. Microsoft says Russia’s SVR is conducting a wide-ranging phishing campaign. The FakeCall Android banking trojan gains advanced evasion and espionage capabilities. A…
…
continue reading
1
🚨 Sinclair Sues Cyber Insurers, Netherlands Targeted by Russia & China, China Cloud Hijacking Attacks
19:32
19:32
Play later
Play later
Lists
Like
Liked
19:32
🚨 Sinclair Sues Cyber Insurers, Netherlands Targeted by Russia & China, China Cloud Hijacking Attacks 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as Sinclair sues its cyber insurers for nonpayment with more news below: WhiteRabbitNeo Uncensored…
…
continue reading
1
401 Access Denied Podcast Ep. 118 | CISO Stories: Leading Today, Shaping Tomorrow with Joshua Brown
40:38
40:38
Play later
Play later
Lists
Like
Liked
40:38
H&R Block’s transformational CISO, Joshua Brown, shares lessons for building a security strategy that provides guardrails so business can move faster. He and Joe discuss how to speak the language of the business in terms of motivations and metrics, and the importance of aligning on risk management for material incidents. With a distributed attack s…
…
continue reading
1
#19 Beating the Odds in Cybersecurity: What It Really Takes ft. James Scott
35:39
35:39
Play later
Play later
Lists
Like
Liked
35:39
Kyser Clark interviews James Scott, a cybersecurity professional with a diverse background in the military and digital forensics. They discuss James's journey into penetration testing, the challenges he faced in landing his first role, and the importance of networking and creating personal tools. The conversation also covers the significance of pro…
…
continue reading
1
From Software to Security: Arjun Gopalakrishna’s Journey at Microsoft
43:01
43:01
Play later
Play later
Lists
Like
Liked
43:01
By Microsoft
…
continue reading
1
Five Eyes program, Chinese activity, Russian Linux
8:14
8:14
Play later
Play later
Lists
Like
Liked
8:14
Five Eyes launches startup security program Canada and the Netherlands seeing increased Chinese activity Russia might fork the Linux community Thanks to today's episode sponsor, Dropzone AI Facing alert overload? Dropzone AI autonomously investigates every alert, reducing noise and providing decision-ready reports. Discover how our AI solutions can…
…
continue reading
1
#114 - Bastian Grossenbacher-Rieck: Topological Machine Learning + Topological Data Analysis Professor
1:25:25
1:25:25
Play later
Play later
Lists
Like
Liked
1:25:25
In this mind-bending episode of Scraping Bits, host DeGatchi sits down with Professor Bastian Grossenbacher-Rieck to explore the fascinating intersection of topology and machine learning. Key topics covered: Introduction to topological machine learning and its applications How topological data analysis can uncover hidden patterns in complex dataset…
…
continue reading
1
Crossroads: AI, Cybersecurity, and How to Prepare for What's Next
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15
Send us a text In this episode of the MLSecOps Podcast, Distinguished Engineer Nicole Nichols from Palo Alto Networks joins host and Machine Learning Scientist Mehrin Kiani to explore critical challenges in AI and cybersecurity. Nicole shares her unique journey from mechanical engineering to AI security, her thoughts on the importance of clear AI v…
…
continue reading
Chinese hacking into US telecoms draws federal scrutiny. ESET examines Evasive Panda’s CloudScout toolset. A new ChatGPT jailbreak bypassed security safeguards. Nintendo warns users of a phishing scam. The Five Eyes launch the Secure Innovation initiative for startups. CISA releases “Product Security Bad Practices” guidelines. Apple’s new bug bount…
…
continue reading
1
Solution Spotlight: Cultivating cybersecurity culture. [Special Edition]
35:33
35:33
Play later
Play later
Lists
Like
Liked
35:33
In this Solution Spotlight episode, our very own Simone Petrella sits down with Chris Porter, the Chief Information Security Officer at Fannie Mae. As a seasoned expert in the financial and cybersecurity sectors, Chris shares insights into how Fannie Mae navigates the complexities of securing one of the nation's most critical financial institutions…
…
continue reading