Technical interviews about software topics.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
…
continue reading
Discusses a broad range of technology ethics topics. Hosted by Daniel Smith, Associate Director of Content and Education at CITI Program. New episodes every month. Learn more at about.citiprogram.org.
…
continue reading
Technical interviews about software topics.
…
continue reading
SPaMCAST explores the varied world of software process improvement and measurement. The cast covers topics that deal with the challenges found in information technology organizations as they grow and evolve.
…
continue reading
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
…
continue reading
The brutal truth about digital performance engineering and operations. Andreas (aka Andi) Grabner and Brian Wilson are veterans of the digital performance world. Combined they have seen too many applications not scaling and performing up to expectations. With more rapid deployment models made possible through continuous delivery and a mentality shift sparked by DevOps they feel it’s time to share their stories. In each episode, they and their guests discuss different topics concerning perfor ...
…
continue reading
Millions of Plays! The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
…
continue reading
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
…
continue reading
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
…
continue reading
CCN Conversations is the official podcast of the Canadian Cybersecurity Network, created to bring real voices and real experience directly to the cybersecurity community. Hosted by Francois Guay, founder of CCN, each episode opens the door to the people who are shaping how Canada protects, innovates, and grows. This show brings you candid conversations with practitioners, CISOs, founders, researchers, builders, and rising talent from Canada and beyond. You will hear honest insight and storie ...
…
continue reading
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
SC Media and Saviynt are proud to present this month's CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
The NYUAD Institute is a center of advanced research, scholarly and creative activity, and public workshops. Institute programs facilitate discussion between academics, students, professionals, and leaders from the UAE and from around the world.
…
continue reading
Ikwekwezi FM Education Programs serve to delivering on the educational mandate of the public broadcaster (SABC). In true South African social tradition, Ikwekwezi FM Education Programs meet this challenge by delivering compelling educational content for diverse audiences in South Africa. The education content, gathered from a wide range of educational issues contributes to a rich cultural shared South African identity. Enriching Minds, Enriching Lives!
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
A list of multimedia related to this Program
…
continue reading
Listen for today's top stories, with context, in just 15 minutes. Get informed from Bloomberg's 3,000 journalists and analysts.
…
continue reading
We talk about everything to do with coding bootcamps and technology education, including gender parity, scholarships, and the latest industry news.
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
1
Behind the Screens – Presented by the ClearIT® Partner Program
Matson & Isom Technology Consulting
Ever wonder what really drives business success behind the scenes? Behind the Screens explores the systems, tools, and leadership decisions that help growing organizations run smarter, not harder. Hosted by Tyler Smith and Chris Harp of Matson & Isom Technology Consulting, each episode breaks down real-world tech strategies, business operations, and modern tools like AI, with insights leaders can actually use. No jargon. No hype. Just honest conversations about what works, and what doesn’t. ...
…
continue reading
A free podcast about cybersecurity, vulnerability management, and the CVE Program.
…
continue reading
Dr. Darren Pulsipher, Chief Enterprise Architect for Public Sector, author and professor, investigates effective change leveraging people, process, and technology. Which digital trends are a flash in the pan—and which will form the foundations of lasting change? With in-depth discussion and expert interviews, Embracing Digital Transformation finds the signal in the noise of the digital revolution. People Workers are at the heart of many of today’s biggest digital transformation projects. Lea ...
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
Level up your business with technology solutions to increase productivity, improve client service, and uncover opportunities for growth. Osaic's technology podcast offers best practices to help you learn, adapt, and implement technology to thrive as an independent financial professional. Visit http://www.osaic.com for additional information. Securities and investment advisory services are offered through the firms: Osaic Wealth, Inc., Triad Advisors, LLC, Osaic Institutions, Inc., and Woodbu ...
…
continue reading
Struggling to keep pace with the ever-changing world of technology? For experienced tech professionals, making sense of this complexity to find real strategic advantages is key. This series offers a clear path, featuring insightful, casual conversations with leading global experts, innovators, and key voices from Red Hat, all cutting through the hype. Drawing from Red Hat's deep expertise in open source and enterprise innovation, each discussion delves into new and emerging technologies-- fr ...
…
continue reading
As breaches abound and cybercriminals up the ante, it's more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory's director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
…
continue reading
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
…
continue reading
UMBC Mic'd Up Podcast welcomes faculty, students, alumni, and industry thought leaders to share their insights and UMBC experiences.
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
Welcome to "The CvCISO Podcast" - an extension of SecurityStudio's vCISO training program. Designed to keep the conversation alive beyond the confines of traditional training, this podcast is your ongoing resource for all things related to Virtual Chief Information Security Officers (vCISOs). This podcast is a space where vCISOs can continue to explore, discuss, and evolve their understanding of the cybersecurity landscape. Join us as we delve into the experiences, perspectives, and challeng ...
…
continue reading
Building a cybersecurity program is complicated. Building one that is equipped to truly enable the organization it serves is another thing altogether. Robert Wood from Sidekick Security interviews security leaders from a diverse set of organizations to talk about program transformations. From team design, technology, compliance versus security, and strategic leadership, learn about how to lead a program transformation of your own from people who have gone through it before.
…
continue reading
Welcome to the ETLA The Beat! This is the official podcast of the EdTech Leader Alliance. This is an Ohio based EdTech Leadership group acting as the COSN Chapter and ISTE Chapter. There is also a yearly ETLA Conference where leaders can meet and network to learn and grow around current topics in education. The group also support DPA, SPDC, Cybersecurity, Mentorship opportunities, AI, the COSN CETL program and more. Episodes will highlight topics supporting the EdTech community. For more inf ...
…
continue reading
1
Learners Support: Back to school Cybersecurity tips
23:13
23:13
Play later
Play later
Lists
Like
Liked
23:13By Ikwekwezi FM
…
continue reading
1
RxJS Cookbook for Reactive Programming: Discover 40+ real-world solutions for building async, event-driven web apps
19:03
19:03
Play later
Play later
Lists
Like
Liked
19:03A practical guide for intermediate-to-advanced JavaScript developers. It focuses on using the RxJS library to build asynchronous, event-driven web applications, particularly with Angular and NestJS. The book provides numerous real-world solutions and recipes covering topics like error and side effect handling, UI building, performance optimization,…
…
continue reading
1
The Hidden Reason Most Manufacturing Cybersecurity Programs Fail
30:59
30:59
Play later
Play later
Lists
Like
Liked
30:59Dino sits down with cybersecurity expert Wil Klusovsky to discuss the massive gap between IT security practices and OT reality. With 26 years of experience, Wil shares his unconventional journey into operational technology and reveals why most security tools end up as shelfware on plant floors. They dive deep into the communication breakdown betwee…
…
continue reading
1
Cybercrime Wire For Jan. 9, 2026. Iran Hacks Itself, Internet Down Nationwide. WCYB Digital Radio.
1:11
1:11
Play later
Play later
Lists
Like
Liked
1:11The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
Youth Talk: Computer Basic Literacy Class
22:28
22:28
Play later
Play later
Lists
Like
Liked
22:28By Ikwekwezi FM
…
continue reading
1
Civic Education: Setting Goals for the new season.
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16By Ikwekwezi FM
…
continue reading
1
Science and Technology: Environmental Programmes.
29:45
29:45
Play later
Play later
Lists
Like
Liked
29:45By Ikwekwezi FM
…
continue reading
1
Walz Clashes With Noem Over ICE Shooting Probe; Trump’s Tariffs Face Supreme Court Test
15:23
15:23
Play later
Play later
Lists
Like
Liked
15:23On today's podcast: 1) The investigation into the killing of a US citizen by an ICE agent in Minneapolis this week is being complicated by clashes between federal and local officials, with the FBI taking control over the objections of Governor Tim Walz. State authorities questioned whether a federal probe could be trusted, especially given comments…
…
continue reading
1
CCNAv7: Introduction to Networks Companion Guide by Cisco
18:52
18:52
Play later
Play later
Lists
Like
Liked
18:52An official textbook for individuals pursuing careers in network administration or seeking to enhance their professional knowledge. The book comprehensively covers fundamental networking concepts, beginning with an overview of network types, topologies, and basic connectivity, and progressing to detailed explanations of protocols and models like TC…
…
continue reading
The US withdraws from global cybersecurity institutions. A maximum-severity vulnerability called Ni8mare allows full compromise of a workflow automation platform. Cisco patches ISE. Researchers uncover a sophisticated multi-stage malware campaign targeting manufacturing and government organizations in Italy, Finland, and Saudi Arabia. The growing r…
…
continue reading
1
Cyber at the Top: Evolving Zero Trust for the AI Era
40:55
40:55
Play later
Play later
Lists
Like
Liked
40:55Zero Trust has become one of the most talked-about frameworks in cybersecurity, but what does it really look like in practice at global scale? And how is it being reshaped by the rise of artificial intelligence? In this episode, Mastercard’s Deputy Chief Security Officer, Alissa “Dr. Jay” Abdullah joins Dr. Hugh Thompson to discuss how Zero Trust i…
…
continue reading
1
Cybercrime News For Jan. 8, 2026. Infostealer Attack Hits 50 Global Companies. WCYB Digital Radio
3:22
3:22
Play later
Play later
Lists
Like
Liked
3:22The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
1
Ransomware Minute. Sedgwick Subsidiary Hit By Cyber Incident. Scott Schober, WCYB Digital Radio.
3:17
3:17
Play later
Play later
Lists
Like
Liked
3:17The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.By Cybercrime Magazine
…
continue reading
1
Navigating 2026: Exam Readiness, AI Risk, and Vendor Strategy for Financial Institutions
58:10
58:10
Play later
Play later
Lists
Like
Liked
58:10In this insightful panel episode, host Keaton Tanzer & Lucas Hathaway at Rivial Security are joined by Darrin Moorer, Senior VP and Information Security Officer at NBKC Bank, and Mike Sloan, Associate VP and ISO at the University of Kentucky Federal Credit Union, for a practical, forward-looking discussion on information security and compliance in …
…
continue reading
1
Life Of A Cybersecurity Czar. The CISO Handbook For 2026. Dr Eric Cole, Secure Anchor.
20:29
20:29
Play later
Play later
Lists
Like
Liked
20:29A world renowned cybersecurity expert with more than 30 years of network security experience, Dr. Eric Cole – founder and CEO of Secure Anchor – helps organizations curtail the risk of cyber threats. He has worked with a variety of clients ranging from Fortune 50 companies, to top international banks, to the CIA, for which he was a professional hac…
…
continue reading
1
Apples at the Crossroads: Domestication, Genomics, and Climate Resilience
36:34
36:34
Play later
Play later
Lists
Like
Liked
36:34This event is related to 19 Washington Square North's Faculty Fellows Program.The apple tree (Malus domestica) is one of the world’s most iconic fruit crops, with profound cultural, economic, and ecological significance. Yet many questions remain about its origins, its domestication history, and its ability to withstand the challenges of climate ch…
…
continue reading
Since the 2008-2009 financial crisis and the Occupy movements around the globe, artists have increasingly turned to new models of artistic production and community engagement, expanding their work beyond the walls of theaters and museums and into situated social and ecological practices. Katia Arfara’s new book, Curating the Commons. Socially Engag…
…
continue reading
1
Leonardo da Vinci’s Salvator Mundi, Lost and Found
45:11
45:11
Play later
Play later
Lists
Like
Liked
45:11This presentation briefly recaps the emergence of the painting, the critical reception and ongoing controversy, and eventual purchase by Mohammed bin Salman, the Crown Prince of Saudi Arabia. The history and condition, the restoration, the materials and techniques of the painting in comparison with other works by the artist are discussed. An evalua…
…
continue reading
1
When Cities Get Hotter: From New York to Abu Dhabi
50:35
50:35
Play later
Play later
Lists
Like
Liked
50:35Cities like New York often feel hotter than their surroundings, especially on summer nights. This is the “urban heat island” effect, caused by the replacement of natural land covers with heat-absorbing materials, reduced vegetation and evapotranspiration, urban geometry that traps heat, and waste heat from human activities. Around the world, UHIs a…
…
continue reading
1
“Side Effects May Include…”: How We Can Make Medicine Better
40:55
40:55
Play later
Play later
Lists
Like
Liked
40:55All cutting-edge medical treatments come with side effects that can limit their benefit. In this talk, Prof. Ramadi explores how we can make medicine better—by moving beyond today’s one-size-fits-all approaches toward smarter, personalized interventions. With breakthroughs in nanotechnology, artificial intelligence, and advanced therapeutics, we ar…
…
continue reading
1
Stem Cells: From Basic Science to Clinical Advances
59:25
59:25
Play later
Play later
Lists
Like
Liked
59:25Stem cells hold promise for understanding human disease, screening for novel therapeutics, and regenerating damaged tissues. However, the mechanisms underlying how these cells form and are activated are still being uncovered, and the development of stem cell-derived tissues for drug screening and transplantation is a work in progress. This conversa…
…
continue reading
1
AI Security. Protecting Today's Organizations. Brandyn Murtagh, Bug Bounty Hunter.
17:34
17:34
Play later
Play later
Lists
Like
Liked
17:34Brandyn Murtagh is a full-time bug bounty-hunter and ethical ‘White Hat’ hacker who is the founder of MurtaSec. In this episode, he joins host Heather Engel to discuss AI threats and their impact on the security community, as well as his unique approach to threat modeling, the dual nature of AI, and more. • For more on cybersecurity, visit us at ht…
…
continue reading
1
Cybercrime Wire For Jan. 8, 2026. Hacker Breaches 50 Global Companies. WCYB Digital Radio.
1:28
1:28
Play later
Play later
Lists
Like
Liked
1:28The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
Open Text: The Future of AI and Human Collaboration
45:05
45:05
Play later
Play later
Lists
Like
Liked
45:05Send us a text Savinay Berry, CTO of OpenText, detailed his return to the company to lead AI integration, emphasizing OpenText’s extensive but often unseen role supporting essential systems for Fortune 5000 companies. He stressed the unique challenges of implementing AI in the enterprise, particularly concerning security and compliance. The discuss…
…
continue reading
1
CCT 313: CISSP Practice Questions and AI Agents As The New Insider Risk
32:22
32:22
Play later
Play later
Lists
Like
Liked
32:22Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv What happens when your “helper” becomes your riskiest insider? We dig int…
…
continue reading
1
Power to the People: Reclaiming Privacy Rights in the Age of AI
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33This episode explores how the United States drifted away from the robust, substantive privacy protections envisioned in the early 1970s, replacing them with ineffective "notice and choice" frameworks that favor government surveillance and corporate profit. As we face a new technological crossroads with artificial intelligence, the discussion reveal…
…
continue reading
51
ICE Minneapolis Shooting Sparks Anger; US Seizes Two More Tankers in Venezuela Campaign
15:29
15:29
Play later
Play later
Lists
Like
Liked
15:29On today's podcast: 1) An Immigration and Customs Enforcement officer fatally shot a woman during a confrontation in Minneapolis, sparking an uproar over the presence of ICE agents in the city and heightening political divisions around the Trump administration’s migrant crackdown. The Wednesday shooting — caught on video and shared widely on social…
…
continue reading
1
Flox, Nix, and Reproducible Software Systems with Michael Stahnke
55:16
55:16
Play later
Play later
Lists
Like
Liked
55:16Modern software development is more complex than ever. Teams work across different operating systems, chip architectures, and cloud environments, each with its own dependency quirks and version mismatches. Ensuring that code runs reproducibly across these environments has become a major challenge that’s made even harder by growing concerns around s…
…
continue reading
1
Flox, Nix, and Reproducible Software Systems with Michael Stahnke
55:16
55:16
Play later
Play later
Lists
Like
Liked
55:16Modern software development is more complex than ever. Teams work across different operating systems, chip architectures, and cloud environments, each with its own dependency quirks and version mismatches. Ensuring that code runs reproducibly across these environments has become a major challenge that’s made even harder by growing concerns around s…
…
continue reading
1
Introduction to Modern Cryptography: Third Edition (Chapman & Hall/CRC Cryptography and Network Security Series)
15:47
15:47
Play later
Play later
Lists
Like
Liked
15:47A rigorous, introductory treatment of modern cryptography, focusing on definitions, precise assumptions, and proofs of security as distinguishing features from classical cryptography. It explores private-key encryption in depth, covering concepts like chosen-plaintext attacks (CPA-security) and chosen-ciphertext attacks (CCA-security), along with p…
…
continue reading
Jaguar Land Rover reveals the fiscal results of last year’s cyberattack. A Texas gas station chain suffers a data spill. Taiwan tracks China’s energy-sector attacks. Google and Veeam push patches. Threat actors target obsolete D-Link routers. Sedgwick Government Solutions confirms a data breach. The U.S. Cyber Trust Mark faces an uncertain future. …
…
continue reading
1
Cybercrime News For Jan. 7, 2026. Rental Car Insurer Prosura Suffers Data Breach. WCYB Digital Radio
2:51
2:51
Play later
Play later
Lists
Like
Liked
2:51The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
1
AI Security Podcast. Social Engineering. Teresa Zielinski, GE Vernova & Brian Long, Adaptive.
15:10
15:10
Play later
Play later
Lists
Like
Liked
15:10Brian Long is the CEO & Co-Founder at Adaptive Security. In this episode, he joins host Paul John Spaulding and Teresa Zielinski, Vice President and Global CISO at GE Vernova, to discuss social engineering and how it is evolving in light of artificial intelligence advancements. The AI Security Podcast is brought to you by Adaptive Security, the lea…
…
continue reading
1
"Kings Of Crypto." Coinbase, Crimes, & Beyond. Jeff John Roberts, Author & Journalist.
16:20
16:20
Play later
Play later
Lists
Like
Liked
16:20Jeff John Roberts, an attorney, journalist, and author, currently serves as Finance & Crypto Editor at Fortune and formerly Executive Editor at Decrypt. He is the author of "Kings of Crypto," which offers a deeply reported look into the origins and rise of Coinbase. In this episode, Roberts and host David Braue discuss the book, as well as Coinbase…
…
continue reading
1
Cybercrime Wire For Jan. 7, 2026. Rental Car Insurer Prosura Suffers Breach. WCYB Digital Radio.
1:19
1:19
Play later
Play later
Lists
Like
Liked
1:19The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
Kyndryl on Cyber Resilience: Bridging Readiness Gaps and Navigating AI Threats
30:05
30:05
Play later
Play later
Lists
Like
Liked
30:05Send us a text Denis Villeneuve, Cybersecurity and Resiliency Practice Lead at Kyndryl, talked about improving organizational cybersecurity and resilience. A Kyndryl readiness report revealed a significant gap between executive concern over cyber threats and their lack of preparedness to handle them. He stressed the necessity of a holistic approach…
…
continue reading
1
Securing the AI Economy: From the 2025 Holiday Breach Window to 2026’s Autonomous Threats
15:22
15:22
Play later
Play later
Lists
Like
Liked
15:22This episode analyzes the 2025 threat landscape, where U.S. data breach costs reached record highs of $10.22 million and cybercriminals utilized the "holiday breach window" to stage sophisticated attacks for the new year. We explore the transition into 2026—projected by experts to be the "Year of the Defender"—where organizations must combat "Agent…
…
continue reading
1
Trump Says Venezuela to Send Up to $2.8 BN of Oil; US Won’t Rule Out Military Force to Acquire Greenland
15:57
15:57
Play later
Play later
Lists
Like
Liked
15:57On today's podcast: 1) President Trump said Venezuela would relinquish as much as 50 million barrels of oil to the US, worth roughly $2.8 billion at the current market price, announcing the cargoes would be sold with proceeds benefiting both countries. The announcement late on Tuesday, which came with few details, marked a significant step up for t…
…
continue reading
1
Introduction to Compiler Construction in a Java World
17:50
17:50
Play later
Play later
Lists
Like
Liked
17:50A hands-on introduction to compiler construction, emphasizing Java technology and software engineering principles. It guides readers through the process of building and extending a real, functional Java compiler for a Java subset called "j--". The material covers fundamental compiler phases, including lexical analysis (scanning), parsing (syntax-di…
…
continue reading
1
Build a production-ready AI toolbox ft. Cat Weeks
26:39
26:39
Play later
Play later
Lists
Like
Liked
26:39While generative AI demos are flashy, moving those capabilities into a reliable, secure enterprise production environment is a different ballgame. In this episode of Technically Speaking, Red Hat CTO Chris Wright sits down with longtime Red Hatter and engineering leader Cat Weeks to dismantle the myth that you need a massive ""Frontier Model"" for …
…
continue reading
1
The AI Rubicon: Navigating the Intelligence Supercycle and the 2026 Threat Landscape
14:02
14:02
Play later
Play later
Lists
Like
Liked
14:02The year 2026 marks the entry into the "Intelligence Supercycle," a pivotal era where autonomous AI agents transition from mere tools to independent actors capable of executing complex attacks and defensive workflows at machine speed. Security leaders face a dual pressure: responding to the immediate rise of "portfolio extortion" ransomware and "Sh…
…
continue reading
Grok’s non-consensual imagery draws scrutiny from the European Commission. Researchers link several major data breaches to a single threat actor. The UK unveils a new Cyber Action Plan. A stealthy ClickFix campaign targets the hospitality sector. VVS Stealer malware targets Discord users. Covenant Health and AFLAC report data leaks. Google silences…
…
continue reading