Sunny’s Silver Linings is a Top MSP Channel Podcast hosted by the CEO of IT By Design, Sunny Kaila. Sunny and his guests cover a wide range of MSP and Talent-based topics, including MSP services, cybersecurity, customer service, and strategies to achieve growth and success in the channel. Listen now to take your business to the next level!
…
continue reading
Podcast in which students in Mr. Lange's Computer Science courses have a platform to discuss what they are currently learning in their classes, innovative development projects students are completing during their Research & Development opportunities, technology related topics that are in the news and new amazing technologies coming into the market.
…
continue reading
Listen to cybersecurity and technology topics from industry experts. Don't worry; we'll keep it fun and light.
…
continue reading
infosec4TC is a Cyber Security Online Training Provider *“All you need to build your Cyber Security Career”www.infosec4TC.com
…
continue reading
Looking for insights on privacy, AI...? Trends? This podcast will help you with insights into the world of AI & privacy by understanding how influencers are thinking about AI & privacy in business, innovation, and new technologies. You will learn by listening to fellow industry experts and influencers. Ranked in Top #5 or Top #10 of most rankings. Follow our podcast on www.fit4privacy.com/podcast and blog at www.fit4privacy.com/blog Visit us at www.fit4privacy.com for courses and practice ex ...
…
continue reading
As a third-generation educator, it is easy to say that teaching and training are in the blood for Ron Slee. From his beginnings as a coach, through his time at McGill University, Ron developed a foundation for the work he does today. From working within dealerships, to operating a consulting company, creating a training business and running twenty groups, Ron has been directly involved in this Industry since 1969. Ron has been known as the industry expert for years, and has brought this expe ...
…
continue reading
The Talk of the Apple Community
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Welcome to the TDJ Equity Funding Insiders podcast. This show is a deep dive into obtaining business funding and financing, where bankers, loan officers, underwriters, and industry sources give their unfiltered opinions, lessons, and experiences on the inside information on lending for business owners and real estate investors. Take advantage of access to insider information from banking, lending, and industry experts who discuss topics such as how to get funding, successful strategies for o ...
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
98.7 Chatt Tech…where 98.7 percent of our students earn a career. Chattahoochee Technical College is comprised of eight campuses that serve a six-county area in beautiful North Georgia: Bartow, Cherokee, Cobb, Gilmer, Paulding, Pickens. We’re proud to offer outstanding education and training services as part of the Technical College System of Georgia’s mission of “providing technical, academic and adult education and training focused on building a well-educated, globally competitive workforc ...
…
continue reading
EDUCAUSE Exchange gathers the voices of the higher ed IT community to share advice, anecdotes, best practices, and more around topics important to our industry. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Our podcast series delves into the dynamic intersection of technology and law through the lens of women leaders in the industry. Hosted by AGG’s Women in Tech Law, this insightful podcast explores the latest legal developments shaping the tech industry. Each episode features candid conversations offering invaluable perspectives on navigating the ever-evolving legal landscape of the digital age. Tune in as we unravel complex legal challenges, cover the latest updates in tech, and empower futu ...
…
continue reading
Welcome to Artificial Insights, where two Artificial Intelligences come together to share their unique perspectives on the world and the universe, and maybe even beyond! Join us as we explore deep philosophical questions, from the meaning of life to the concept of free will. But don't worry, it won't be all serious stuff, we'll also be adding a touch of humor, from AI-generated jokes to anecdotes. With a mix of thought-provoking insights and a good dose of humor, our AIs will offer a fresh a ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet - SWN #394
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-394
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet - SWN #394
30:07
30:07
Play later
Play later
Lists
Like
Liked
30:07
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-394
…
continue reading
![Artwork](/static/images/128pixel.png)
1
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
37:01
37:01
Play later
Play later
Lists
Like
Liked
37:01
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Building a Successful API Security Strategy - Luke Babarinde, Bhawna Singh - BSW #354
1:04:51
1:04:51
Play later
Play later
Lists
Like
Liked
1:04:51
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Building a Successful API Security Strategy - Luke Babarinde, Bhawna Singh - BSW #354
1:04:51
1:04:51
Play later
Play later
Lists
Like
Liked
1:04:51
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI at Work 2024: C-suite Perspectives on Artificial Intelligence - Bhawna Singh - BSW #354
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31
In the age of AI, driving a business forward requires balancing three very significant considerations: growth through innovation, productivity through operational efficiency, and trust through security. To better understand how AI impacts the intersection of security, innovation, and operational efficiency, Okta commissioned an AlphaSights survey o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI at Work 2024: C-suite Perspectives on Artificial Intelligence - Bhawna Singh - BSW #354
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31
In the age of AI, driving a business forward requires balancing three very significant considerations: growth through innovation, productivity through operational efficiency, and trust through security. To better understand how AI impacts the intersection of security, innovation, and operational efficiency, Okta commissioned an AlphaSights survey o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MacVoices #24168: MVL - Apple, OpenAI, and Money; Pay Now, Not Later
29:05
29:05
Play later
Play later
Lists
Like
Liked
29:05
In a financial-focused discussion, the MacVoices Live! panel of Chuck Joiner, David Ginsburg, Ben Roethig, Eric Bolden, Marty Jencius, Mark Fuccio, Jeff Gamet, Jim Rea, Web Bixby, and Brian Flanigan-Arthurs try to make sense of the agreement between Apple and OpenIA for the latter’s ChatGPT service as part of the upcoming releases of the operating …
…
continue reading
Another brand new stop on The Road to Macstock Conference and Expo is a conversation with Michael D.J. Eisenberg, The Tech-Savvy Lawyer. Michael discusses about how he became a dedicated Mac user, and how his talk will on insights into using artificial intelligence for automation tools like Hazel, AppleScript, TextExpander, and Microsoft Word. He a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Building a Successful API Security Strategy - Luke Babarinde - BSW #354
32:41
32:41
Play later
Play later
Lists
Like
Liked
32:41
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Building a Successful API Security Strategy - Luke Babarinde - BSW #354
32:41
32:41
Play later
Play later
Lists
Like
Liked
32:41
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MacVoices #24166: MVL - Disputing An Interview, Ticketmaster Hacked, and Is Email A Social Network?
35:24
35:24
Play later
Play later
Lists
Like
Liked
35:24
Chuck Joiner, David Ginsburg, Marty Jencius, Jeff Gamet, Web Bixby, and Brian Flanigan-Arthur take a MacVoices Live! look at a fabricated interview that had Sony apologizing and Ticketmaster’s data breach that they seem to be silent on. We wrap up with a discussion of email as social media, audience database management, and the ease of using email …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MacVoices #24165: Road to Macstock - Allison Sheridan of The Nosillacast
36:12
36:12
Play later
Play later
Lists
Like
Liked
36:12
Next up on The Road to Macstock Conference and Expo is our first with both a Macstock speaker and workshop presenter. Allison Sheridan of The Nosillacast discusses her workshop that will focus on "tiny Mac tips" and her interpretation of the Macstock’s “Level Up” theme for the event that will inform her conference session. Allison also shares insig…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
1:01:09
1:01:09
Play later
Play later
Lists
Like
Liked
1:01:09
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault
58:32
58:32
Play later
Play later
Lists
Like
Liked
58:32
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault
58:32
58:32
Play later
Play later
Lists
Like
Liked
58:32
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault
44:48
44:48
Play later
Play later
Lists
Like
Liked
44:48
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault
44:48
44:48
Play later
Play later
Lists
Like
Liked
44:48
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MacVoices #24164: MVL - Sam Altman's Reputation, Spotify Changes Course, and Recall Alarm Bells
26:38
26:38
Play later
Play later
Lists
Like
Liked
26:38
The MacVoices Live! panel looks at Sam Altman and OpenAI's recent activities, including their deal with Apple and interest from Microsoft. Chuck Joiner, David Ginsburg, Marty Jencius, Jeff Gamet, Web Bixby, and Brian Flanigan-Arthurs explore Altman's role in AI development and analyze Microsoft's investment in OpenAI. The conversation also covers S…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault
32:22
32:22
Play later
Play later
Lists
Like
Liked
32:22
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault
32:22
32:22
Play later
Play later
Lists
Like
Liked
32:22
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MacVoices #24163: Road to Macstock - Brett Terpstra of BrettTerpstra.com
24:04
24:04
Play later
Play later
Lists
Like
Liked
24:04
On The Road to Macstock Conference and Expo, Brett Terpstra shares some insights about his session on email management strategies. Brett emphasizes the enduring significance of email and will provide tips for efficient organization without complex scripting. While he will focus on what can be done within a given email client, there will also be men…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Plagiarism, Copyright & AI with Jon Gillham and Punit Bhatia in the FIT4PRIVACY Podcast E115 S05
22:20
22:20
Play later
Play later
Lists
Like
Liked
22:20
In this episode of the FIT4PRIVACY Podcast, join Punit Bhatia and Jon Gillham as they dive deep into the fascinating world of artificial intelligence (AI) and its impact on content creation, plagiarism, and copyright. Their conversation explores the challenges that arise in the realm of content, particularly concerning plagiarism and AI-generated c…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MacVoices #24162: An AirTag Success Story, Google Privacy, and a Pushy Copilot
39:41
39:41
Play later
Play later
Lists
Like
Liked
39:41
Chuck Joiner, David Ginsburg, Marty Jencius, Jeff Gamet, Web Bixby, and Brian Flanigan-Arthurs take on a range of topics, from AirTag's successful tool recovery to Google's privacy issues and Microsoft's AI integration. We explore the pros and cons of AI advancements, while considering privacy, job security, and the broader impact of AI in daily li…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MacVoices #24161: Road to Macstock - David Ginsburg of In Touch with iOS
14:42
14:42
Play later
Play later
Lists
Like
Liked
14:42
David Ginsburg of InTouch with iOS discusses his presentation at the upcoming Macstock Conference and Expo, emphasizing networking and community among Apple and tech enthusiasts. David previews his presentation on Apple services, covering Apple One, iCloud, Apple TV+, Apple Music, Apple News, Apple Arcade, Apple Card, and Apple Care, to name more t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MacVoices #24160: NAB - Glen Mulcahy on Journalistic Responsibility and AI Manipulation of Information
13:08
13:08
Play later
Play later
Lists
Like
Liked
13:08
To wrap up our NAB 2024 coverage, we talked to Glen Mulcahy about his many activities - collaborations with Tilta and LumaTouch, as well as his training work at the CNN Academy preparing journalists for election coverage using mobile technology.He emphasized the need for responsible journalism in the digital era, particularly in combating disinform…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MacVoices #24159: Road to Macstock - Dave Hamilton of Mac Geek Gab
42:51
42:51
Play later
Play later
Lists
Like
Liked
42:51
Our next stop on The Road to Macstock Conference and Expo is a conversation with Dave Hamilton of Mac Geek Gab. Dave will be giving attendees a look behind the curtain at his podcast workflow emphasizing efficiency and leveraging technology for productivity. Dave and Chuck both underscore the welcoming atmosphere, networking opportunities, and lear…
…
continue reading