Marty from Change State public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
The Changing State of Talent Acquisition

Graham and Marty from Change State

Unsubscribe
Unsubscribe
Monthly
 
From generative AI, to DEI, the talent acquisition space has arguably never experienced a time of greater change. How will emerging technologies shape the recruiter and candidate experiences in the years to come? How is employer branding evolving from a “tactic” to a strategic asset that delivers value across the entire talent lifecycle? And what are the implications of all of this for making smart, data-driven decisions with limited advertising budgets? Each week we tackle these big questio ...
  continue reading
 
Artwork
 
An original podcast from T-Mobile for Business and iHeartRadio, Jonathan Strickland connects with the world’s most unconventional thinkers, the leaders at the intersection of technology and business, to understand how they continue to thrive in a world of complex organizations and lightning-fast technology. How do these executives innovate and enable change, both inside and outside their companies, and what are they looking forward to tackling next? Let’s find out…
  continue reading
 
Artwork

1
ASecuritySite Podcast

Professor Bill Buchanan OBE

Unsubscribe
Unsubscribe
Weekly
 
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
  continue reading
 
Artwork

1
The Scary Guy Podcast

The Scary Guy Podcast

Unsubscribe
Unsubscribe
Monthly+
 
The Scary Guy's sole mission is “The Total Elimination of Hate, Violence and Prejudice Worldwide.” These were the first words that Scary spoke when he began his mission in 1998. Since that day, Scary has worked with millions of people through Television, film, radio, social media and live shows around the world promoting peace through the teaching of Love and Acceptance of all people. His audience consists of both youth and adults on an individual, community and society level, unaware of how ...
  continue reading
 
Loading …
show series
 
Ted Miracco is the CEO of Approov and which is Scottish/US company that is headquartered in Edinburgh. Miracco has over 30 years of experience in cybersecurity, defence electronics, RF/microwave circuit design, semiconductors and electronic design automation (EDA). He co-founded and served as CEO of Cylynt, which focuses on intellectual property an…
  continue reading
 
Troy is a world-leading cybersecurity professional. He created and runs the Have I Been Pwned? Web site, and which contains details of the most significant data breaches on the Internet. Along with this, he has developed other security tools, such as ASafaWeb, which automated the security analysis of ASP.NET Web sites. Troy is based in Australia an…
  continue reading
 
This week we welcome William Sims to the podcast. Before joining Lightcast as SVP of Professional Services, Williams held a number of leadership positions in talent acquisition and sales at Qualtrics, Jani-King Gulf Coast, and Career Builder, where he served as Director of Global Solutions Architects. Topics include: the current state of the labor …
  continue reading
 
This is Day 0 of a new world of cybersecurity. Everything changes from here. There will be a time before Generative AI (GenAI) in cybersecurity and a time after it. Over the last two years, GenAI has come on leaps and bounds, and where it once suffered from hallucinations, took racist and bigoted approaches, and often was over-assertive, within Cha…
  continue reading
 
This week we welcome Susan LeMotte to the podcast. Before starting exaqueo, Susan held a number of leadership positions in talent acquisition and employer branding, including as an HR consultant for Home Depot, Director of Talent Acquisition at Ritz Carlton, and Senior Director of Global Employer Branding and Marketing at Marriott. Topics include: …
  continue reading
 
And, so George Orwell projected a world where every single part of our lives was monitored and controlled by Big Brother. Arthur C Clark outlined the day when machines focused solely on a goal — even if it was to the detriment of human lives. And, Isaac Asimov outlined a world where machines would have to be programmed with rules so that they could…
  continue reading
 
This seminar series runs for students on the Applied Cryptography and Trust module, but invites guests from students from across the university. Martin is one of the co-creators of public key encryption, and worked alongside Whitfield Diffie in the creation of the widely used Diffie-Hellman method. In 2015, he was presented with the ACM Turing Awar…
  continue reading
 
This week we welcome Heather Tenuto to the podcast. Before taking on her current role as CEO of The Muse Group (owners of The Muse and Fairygodboss), Heather spent her early career as a public school teacher before pivoting to a range of sales enablement and revenue growth roles, including VP of Channels at ShoreTel, VP of Sales (SMB Services) at O…
  continue reading
 
Vincent Rijmen is one of the co-creators of the NIST-defined AES standard (also known as Rijndael). He also co-designed the WHIRLPOOL hashing method, along with designing other block ciphers, such as Square and SHARK. In 2002, Vincent was included in the Top 100 innovators in the world under the age of 35, and, along with Joan Daemen, was awarded t…
  continue reading
 
This week we welcome Ben Zweig to the podcast. With a Ph.D. in Economics, Ben currently teaches a course on “the Future of Work” at NYU’s Stern School of Business, and serves as CEO of Revelio Labs, a workforce intelligence consultancy he founded in 2018. Topics include: economics, the basic definition of “work,” the value of viewing jobs as a bund…
  continue reading
 
Whitfield Diffie is one of the greatest Computer Scientists ever. He - along with Marty Hellman - was one of the first to propose the usage of public key encryption and co-created the Diffie-Hellman (DH) key exchange method. Overall, the Diffie-Hellman method is still used in virtually every Web connection on the Internet, and has changed from usin…
  continue reading
 
I do what I do because of one company … IBM. Why? Because in the 1970s, I got into computers, with a ZX81 (1KB of RAM) and a Dragon 32 (32 KB of RAM). They were very much home computers, and where you would rush out and buy the latest computer magazine, and then spend a happy evening entering some BASIC code that made a cursor move across the scree…
  continue reading
 
I have been lucky enough to speak to some of the most amazing people who have built the core of security on the Internet, and a person near the top of my list is … Torben P. Pedersen. The Pedersen Commitment So how do we create a world where we can store our secrets in a trusted and then reveal them when required? Let’s say I predict the outcome of…
  continue reading
 
There short podcast on Just Magic, Be A Teacher, And The King and Queen of Cybersecurity Magic: https://medium.com/asecuritysite-when-bob-met-alice/magic-from-heaven-to-earth-1837a1a1206e The Silly World of Cybersecurity https://medium.com/asecuritysite-when-bob-met-alice/the-silly-world-of-cybersecurity-a1143b90d3f0 Giving Back What Others Have Gi…
  continue reading
 
This seminar series runs for students in the Applied Cryptography and Trust module but invites guests from students from across the university. This seminar series runs for students on the Applied Cryptography and Trust module but invites guests from students from across the university. He has created a wide range of cryptographic methods, includin…
  continue reading
 
This week we welcome Rachel Gulley to the podcast. Rachel started as a recruiter at staffing agencies before taking on a variety of recruiting operations management roles at WilsonHCG, Asurion, and FanDuel, where she currently serves as Director of Talent Acquisition Operations. Topics include: organizational culture, core values, how core values c…
  continue reading
 
I’m going to show a full timeline of a Cyber Crime to show the steps that a scammer will take in order to gain funds from their target. Overall I’m interested in seeing how a scamming crime evolves to the point of profit for the scammer. https://medium.com/asecuritysite-when-bob-met-alice/a-full-diary-of-a-cyber-crime-from-phishing-to-profit-23ab53…
  continue reading
 
I’m going to show a full timeline of a Cyber Crime to show the steps that a scammer will take in order to gain funds from their target. Overall, I’m interested in seeing how a scamming crime evolves to the point of profit for the scammer. https://medium.com/asecuritysite-when-bob-met-alice/a-full-diary-of-a-cyber-crime-from-phishing-to-profit-23ab5…
  continue reading
 
This week we welcome Carina Clingman to the podcast. With a PhD in biochemistry, Carina’s early experiences looking for jobs in the biotech space led her to start Recruitomics, a TA consulting group that helps small and startup biotechnology and pharmaceutical companies find and retain top talent. Topics include: the advantages (and disadvantages) …
  continue reading
 
With the end of another great season of The Restless Ones, Jonathan looks back on some of the guests and conversations we’ve heard from. With some truly inspiring leaders, driving change at the intersection of technology and business, he reflects on the common themes throughout these discussions and the consistent thread that connects them all - co…
  continue reading
 
The local convenience store - the cornerstone of rural America, once a one-stop shop for everything from farming and pet supplies to household goods and homemade apple pies. Fast forward to today where those same stores are providing network connectivity, technology infrastructure, and operating efficiency to bustling farming communities. With inte…
  continue reading
 
Matthew is a cryptographer and academic at Johns Hopkins University and has designed and analyzed cryptographic systems used in wireless networks, payment systems and digital content protection platforms. A key focus of his work is in the promotion of user privacy. He has an extensive following on X/Twitter (140K followers) and his blog covers impo…
  continue reading
 
Many people visit resorts to relax and take a break from their daily routines. However, for resort managers, disconnecting from technology is not an option if they want to provide a great guest experience. To ensure guest satisfaction, including catering to their preferences, reducing wait times, and improving services, resorts need to have a const…
  continue reading
 
The word “innovation” usually evokes new ways of thinking, acting, and accelerating what’s possible, but none of that means much if it doesn’t deliver meaningful results. So, when it comes to gauging innovation’s impact, Phillipa Leighton Jones and Matt Griffin are particularly well attuned. In this special episode recorded live from Mobile World C…
  continue reading
 
A world where customers can buy everything they want, whenever and wherever they want isn’t 100% there—but it’s pretty close. And perhaps no company has been up for that challenge as much as Lowe’s. In this episode of The Restless Ones, I had the chance to sit down with Seemantini Godbole, EVP and CIO of Lowe’s Companies, Inc., whose early start as…
  continue reading
 
Professor Peter Andras is the Dean of the School of Computing, Engineering & the Built Environment. Previously, Peter was the Head of the School of Computing and Mathematics (2017 – 2021) and Professor of Computer Science and Informatics at Keele University from 2014 – 2021. Prior to this he worked at Newcastle University in the School of Computing…
  continue reading
 
Building blocks are a critical part of almost any private or corporate mission to reach success and scale. They let executives quickly assemble a foundation for the rest of their plans to be built on – but how are the actual building blocks getting built? Enter Avantor, who is using advancements in connectivity, data, and computing power to “set sc…
  continue reading
 
And, so, if you could pick one or two people who have contributed most to our online security, who would it be? Ron Rivest? Shafi Goldwasser? Ralph Merkle? Marty Hellman? Whitfield Diffie? Neal Koblitz? Well, in terms of the number of data bytes protected, that prize is likely to go to Joan Daemen and Vincent Rijmen, and who created the Rijndael me…
  continue reading
 
In research, the publishing of high-quality papers is often critical for the development of a research career: “I am an academic. It’s publish or perish.” Daniel J Bernstien. But often we measure the work in terms of quality rather than quantity. One high-quality research paper is probably worth more than the millions of papers published in predato…
  continue reading
 
And, so, we are moving into one of the greatest changes that we ever see on the Internet, and where we will translate from our existing public key infrastructures towards Post Quantum Cryptography (PQC) methods. At the present time, NIST has approved one key exchange/public key encryption method (Kyber) and three digital signature methods (Dilithiu…
  continue reading
 
Please excuse me for using IBM in the title — I have the greatest of respect for a company that has continued to lead and innovate over the past six decades (and who have existed for over a century). The point of this article is to showcase where you, your team or your company have a deep passion for doing something great. For this, we go back to t…
  continue reading
 
As the impacts of climate change continue to escalate, public and private sector organizations find themselves in urgent need of innovation. Emergency management has been grappling with outdated tools and insufficient tech investment for decades. Companies such as Pano AI are stepping up to mitigate and better prepare for further crises with a new …
  continue reading
 
In cybersecurity, the teaching of Cloud security is often weak. So, here are my Top 100 things about encryption in the Cloud. I’ve focused on AWS, but Azure is likely to also be applicable. Keys are created in the AWS KMS (Key Management Store). In Azure, this is named KeyVault. The cost of using a key in KMS is around $1/month (prorated hourly). W…
  continue reading
 
Well, here are a few tips for PhD students and ECR (Early Career Researchers): Enjoy doing research. It is fun and one of the few times in your career when it is solely your work. To do a PhD is a privilege and not a chore. You will likely look back on it as one of the most useful things you did in your whole career. You will always hit a dip in yo…
  continue reading
 
Here are my 100 interesting things to learn about cryptography: For a 128-bit encryption key, there are 340 billion billion billion billion possible keys. [Calc: 2**128/(1e9**4)] For a 256-bit encryption key, there are 115,792 billion billion billion billion billion billion billion billion possible keys. [Calc: 2**256/(1e9**8)] To crack a 128-bit e…
  continue reading
 
Your organisation needs a vision. Without it, you will never be great. You will never advance. You will keep doing the same old things and without any real purpose. A vision gives you a purpose and a focus. But, it needs to have a plan which takes you there. But, without it, how can you ever plan? For any great organisation, you start with a vision…
  continue reading
 
I remember attending a talk many years ago, and the presenter said, “I’ve got this amazing tool called Lotus 123”, and he gave a practical demo of doing some calculations. People in the audience were stunned by the simplicity of its operation. It was the birth of the thing that drives many businesses … spreadsheets. They are just so simple to use, …
  continue reading
 
So, here’s my Top 100 snippets of knowledge for blockchain: Blockchains use public key methods to integrate digital trust. Bob signs for a transaction with his private key, and Alice proves this with Bob's public key. The first usable public key method was RSA — and created by Rivest, Shamir and Adleman. It was first published in 1979 and defined i…
  continue reading
 
Blog: here. You can just imagine the movie trailer … “Your worst enemy has taken over all your flights, and you cannot remove them from your network. They demand a $1 billion ransom, or else they will bring every flight down. Bob accidentally removes one of the controllers — you now only have 25 minutes to save the lives of those in the air!” We ha…
  continue reading
 
Kerckhoff’s principle defines that “a Cryptographic system should be designed to be secure, even if all its details, except for the key, are publicly known”, but there aren’t too many other rules defined. So here are my 100 Basic Rules of Cryptography (and Secure Programming). First, my Top 10: Cryptography is both an art and a science. Cryptograph…
  continue reading
 
A team of developers at Distrust and others has discovered a weakness in the cryptographic methods of creating a random seed for the Libbitcoin Explorer wallet. This is allegedly behind a number of cryptocurrency thefts on 12 July 2023, and on November 2022. The vulnerability has been given the CVE identifier of CVE-2023–39910 and dubbed Milk Sad […
  continue reading
 
As humans we are driven by risks and threats, and where we are continually weighing-up costs and benefits. A threat is an actual thing that could actually cause harm, loss or damage, whereas a risk is the likelihood of a specific threat happening. In our lives, too, we expose ourselves through vulnerabilities, and which are our weaknesses and which…
  continue reading
 
Digital signatures are the foundation of our digital trust. With this, Bob has a key pair: a private key and a public key. In order to provide his identity, he signs a hash of a message with his private key, and then Alice proves this with his public key. Currently, we mainly use RSA, ECDSA and EdDSA for our signature methods, and where DSA signatu…
  continue reading
 
Lessons from the cybersecurity rule book for government: Lesson 1: If you have PII (Personally Identifiable Information), you should encrypt it. Lesson 2: Lock down access to encrypted data and require multifactor authentication for access. Lesson 3: All communications with citizens should be stored in an encrypted form. Lesson 4: The transmission …
  continue reading
 
Autonomous vehicles open up a world of possibilities. From supporting more efficient roadways and improving delivery reach to mitigate labor shortages and fostering a cleaner environment, there are many use cases. So where do companies focus their efforts to make an impact? For one company, they decided to tackle one of the most challenging use cas…
  continue reading
 
Blog: https://medium.com/asecuritysite-when-bob-met-alice/one-of-the-greatest-protocols-and-one-of-the-greatest-weaknesses-of-the-internet-meet-the-d8201a1e6e80 So the Internet isn’t the large-scale distributed network that DARPA tried to create, and which could withstand a nuclear strike on any part of it. At its core is a centralised infrastructu…
  continue reading
 
Blog: https://medium.com/asecuritysite-when-bob-met-alice/my-five-favouriate-least-favouriate-computer-programming-languages-dd8a560c27a I love programming and think that every child should be taught it at school at an early age — and, for me, coding is for everyone. As an artist uses paint and a canvas, programming allows me to practice my art — c…
  continue reading
 
Blog: https://medium.com/asecuritysite-when-bob-met-alice/the-wacky-world-of-javascript-and-npm-protecting-the-software-supply-chain-not-25662cfd1b66 JavaScript is the best and the worst of computer programming. It is able to exist in both the front end (the browser) and in the back end (with Node.js). It basically saved the Web as we moved from st…
  continue reading
 
Loading …

Quick Reference Guide