show episodes
 
The EY India Insights podcast features conversations with experts on a wide range of topical subjects like ESG, technology, and economic and policy changes that are shaping the thought process of the C-Suite, and are likely to be the cornerstone of a transformative business.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Our podcast features Tech Talks with professionals at WeblineIndia who share their experiences, challenges, and solutions in software development and technology services. Each episode offers practical examples, lessons learned from recent projects, and suggestions on improving development processes. The discussions also cover current trends in AI, IT outsourcing, software development, and mobile app creation, helping you stay informed about approaches and methods that could make a difference ...
  continue reading
 
SaaS is revolutionizing Indian businesses by making advanced technology accessible, affordable, and scalable. From startups to large enterprises, cloud-based solutions are streamlining operations, boosting productivity, and enabling data-driven decisions. With automation, real-time analytics, and remote collaboration, Indian companies are now competing globally while staying agile and innovative.
  continue reading
 
Artwork

1
Forbes India - The Startup Fridays Podcast

Forbes India - The Startup Fridays Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Startup Fridays Podcast is a weekly podcast series where Forbes India's Technology Editor Harichandan Arakali brings you conversations with startup entrepreneurs who are finding opportunities in solving problems in multiple areas. From agriculture and satellite imagery to digital finance and cryptocurrencies, venture capital investors, and more, meet the change agents on this podcast, out every Friday
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Welcome to MessageBot, the podcast that explores how Indian businesses are transforming communication using Bulk SMS, Voice Calls, WhatsApp Business API, and RCS Messaging. Each episode dives into real-world use cases, automation strategies, and the latest updates in India’s messaging ecosystem. Whether you’re a startup, developer, or enterprise, you’ll learn how to send secure OTPs, automate campaigns, and stay TRAI-compliant — all while delivering messages that truly connect.
  continue reading
 
The Rocking Entrepreneur Podcast | Startup Stories | Indian Entrepreneurs | India | Entrepreneurship | Startups. Rocking Entrepreneur is created for today’s entrepreneur whether you have just started your journey as an entrepreneur/founder/small business owner OR are a serial entrepreneur. Are you ambitious and crafting your next upstart or startup? Then there is no greater place to get quality information and education than The Rocking Entrepreneur. You don’t need to go to business school. ...
  continue reading
 
Artwork

1
Indian Podcasting Revolution

Done For You Podcasts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Why is podcast suddenly the buzzword? What goes into making a good podcast that listeners love? How can a podcaster make moolah from podcasting? Is India ready for a podcast revolution? These and many more eyebrow-raising questions that go unanswered for emerging and established podcasters are being addressed on DFYPs original show - Indian Podcasting Revolution. Join us every week as we deep dive into the world of podcasting, covering crucial topics like authority building, content strategy ...
  continue reading
 
Artwork

1
The ValueSaaS Podcast

Thiyagarajan Maruthavanan (Rajan)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In the Value SaaS Podcast we talk to founders from B2B SaaS about their experience building capital-efficient businesses that deliver real value to customers. We started this podcast because we know there are founders like you who are facing obstacles that seem insurmountable. Here, you will meet folks who've tackled similar problems and overcome them, so you can do the same.
  continue reading
 
This series is dedicated to sharing authentic and honest advice about tech leadership journeys, as well as providing thought leading insight about trending topics like DEI in Tech, Tech for Good, the hybrid model and more! Hosted by Sandra Patel, CEO of Transition Partners. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Loading …
show series
 
Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes…
  continue reading
 
Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Show Notes: https://securityweekly.com/bsw-427…
  continue reading
 
It’s the holidays, your defenses are down, your inbox is lying to you, and yes—you’re gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won’t save you, and why the real job is surviving after the click. From phishing and sm…
  continue reading
 
It's the holidays, your defenses are down, your inbox is lying to you, and yes—you're gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won't save you, and why the real job is surviving after the click. From phishing and sm…
  continue reading
 
It's the holidays, your defenses are down, your inbox is lying to you, and yes—you're gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won't save you, and why the real job is surviving after the click. From phishing and sm…
  continue reading
 
Hear from Paul Spain and Ben O'Brien as they unpack the latest tech news including NZ Police’s redaction glitch, a new Government Digital Delivery Agency, smart TV privacy concerns, James Powell's transition from Dawn Aerospace and Waymo’s outage pause and the future of autonomous vehicles. Plus, Ben O'Brien shares insights from his upcoming book f…
  continue reading
 
Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
  continue reading
 
Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
  continue reading
 
Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There's a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn't infringe on any individual organization's privacy. That's why we hear the i…
  continue reading
 
Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There’s a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn’t infringe on any individual organization’s privacy. That’s why we hear the i…
  continue reading
 
In this episode of the EY India Insights podcast, Rajnish Gupta, Partner in the Tax and Economic Policy Group at EY India discusses India’s evolving approach to AI governance and what it means for businesses and policymakers. The conversation explores India’s recently released “light-touch, innovation-first” AI guidelines and how they aim to encour…
  continue reading
 
EY India Insights breaks down the Digital Personal Data Protection Act (DPDP) 2025 along with the Rules and their implications for individuals, organizations and India’s digital governance ecosystem. In this episode, Ritika Loganey Gupta, Partner, Tax & Regulatory Services, EY India and Lalit Kalra, Partner, Cybersecurity and National Leader-Data P…
  continue reading
 
This week in the security news: Linux process injection Threat actors need training too A Linux device "capable of practically anything" The Internet of webcams Hacking cheap devices Automating exploitation with local AI models Lame C2 Smallest SSH backdoor Your RDP is on the Internet These are not the high severity bugs you were looking for Low ha…
  continue reading
 
This week in the security news: Linux process injection Threat actors need training too A Linux device "capable of practically anything" The Internet of webcams Hacking cheap devices Automating exploitation with local AI models Lame C2 Smallest SSH backdoor Your RDP is on the Internet These are not the high severity bugs you were looking for Low ha…
  continue reading
 
After 100+ episodes over two years, this is Marcin Lewandowski’s final episode as host of the EU-Startups Podcast.We flipped the script: this time Marcin is interviewed by David Cendon Garcia (News Editor at EU-Startups) — who will be taking over the podcast going forward.We recorded it live on a padel court, in one take, while playing.It’s a fun b…
  continue reading
 
Business Security Weekly is well aware of the cybersecurity hiring challenges. From hiring CISOs to finding the right skills to developing your employees, we cover it weekly in the leadership and communications segment. But this week, our guest interview digs into the global cybersecurity hiring trends. Jim McCoy, CEO at Atlas, joins Business Secur…
  continue reading
 
Business Security Weekly is well aware of the cybersecurity hiring challenges. From hiring CISOs to finding the right skills to developing your employees, we cover it weekly in the leadership and communications segment. But this week, our guest interview digs into the global cybersecurity hiring trends. Jim McCoy, CEO at Atlas, joins Business Secur…
  continue reading
 
Open source projects benefit from support that takes many shapes. Kat Cosgrove shares her experience across the Kubernetes project and the different ways people can make meaningful contributions to it. One of the underlying themes is that code is written for other people. That means PRs need to be understandable, discussions need to be enlightening…
  continue reading
 
Open source projects benefit from support that takes many shapes. Kat Cosgrove shares her experience across the Kubernetes project and the different ways people can make meaningful contributions to it. One of the underlying themes is that code is written for other people. That means PRs need to be understandable, discussions need to be enlightening…
  continue reading
 
Join Paul Spain and Greg Shanahan, Managing Director at Veriphi and TIN, as they delve into the 2025 TIN Report revealing key takeaways, growth sectors, the evolving world of tech exports, and how NZ companies are navigating the challenges and opportunities in capital, talent, and global competition. They also discuss some of the latest tech news i…
  continue reading
 
Interview Segment: Tony Kelly Illuminating Data Blind Spots As data sprawls across clouds and collaboration tools, shadow data and fragmented controls have become some of the biggest blind spots in enterprise security. In this segment, we’ll unpack how Data Security Posture Management (DSPM) helps organizations regain visibility and control over th…
  continue reading
 
Interview Segment: Tony Kelly Illuminating Data Blind Spots As data sprawls across clouds and collaboration tools, shadow data and fragmented controls have become some of the biggest blind spots in enterprise security. In this segment, we'll unpack how Data Security Posture Management (DSPM) helps organizations regain visibility and control over th…
  continue reading
 
This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
  continue reading
 
This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
  continue reading
 
Discover how real-time monitoring and financial process automation can safeguard your business from fraud before it strikes. This episode explores the technology and strategies that help organizations detect anomalies instantly and strengthen transaction security across their financial workflows. What’s covered in this episode: ▪️ How real-time fra…
  continue reading
 
Ensure your intellectual property stays safe before you hire dedicated developers in India. This episode breaks down the must-do checks that founders, startups, and product owners should prioritize to safeguard their ideas and collaborate confidently with development teams. What’s covered in this episode: ▪️ The 3 critical IP & data security checks…
  continue reading
 
Empower your IT teams with practical insights into improving deployment speed, reliability, and scalability using DevOps cloud services. This episode breaks down how modern DevOps practices enhance IT agility and support seamless, future-ready operations. What’s covered in this episode: ▪️ How DevOps cloud services accelerate deployments ▪️ Buildin…
  continue reading
 
Most people talk about AI in the cloud. Karim Saleh is putting it on the factory floor.This week on the EU-Startups Podcast, Marcin Lewandowski sits down with Karim Saleh — Co-Founder & CEO of Cerrion, the company building agentic AI that watches factory lines 24/7 and intervenes in real time to prevent safety incidents, scrap, and costly downtime.…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play