Try another search?

No series here Empty list
Loading …
 
On the 38th episode of Enterprise Software Innovators, hosts Evan Reiser (Abnormal Security) and Saam Motamedi (Greylock Partners) talk with Mojgan Lefebvre, EVP and Chief Technology & Operations Officer of Travelers. Travelers is a Fortune 500 insurance company offering a range of insurance products to customers across the globe. With over $41 bil…
  continue reading
 
For this month's Enterprise Month in Review, Jon and Brian will be joined by a surprise special guest. We'll pick our top stories of the month, and then dig with our guest on the ups and downs of AI as a consideration in software selection, how to avoid the gotchas of software evaluation, how HR vendors are approaching AI, and more. As always, brin…
  continue reading
 
**Video may be required**: this episode is focused on demonstrating uses of LLMs against various code. As such, listeners may want to watch the stream to see these uses rather than just listening. Also, Seth and Ken talk briefly at the beginning of the episode about a new tldr;sec project (thanks Clint!) called awesome secure defaults that lists ou…
  continue reading
 
There are as many paths into infosec as there are disciplines within infosec to specialize in. Karan Dwivedi talks about the recent book he and co-author Raaghav Srinivasan wrote about security engineering. There's an appealing future to security taking on engineering roles and creating solutions to problems that orgs face. We talk about the breadt…
  continue reading
 
In this episode of the IoT For All Podcast, Curtis Govan, President of Americas for floLIVE, joins Ryan Chacon to discuss hyperlocal global IoT connectivity. The conversation covers the critical factors companies need to consider when adopting IoT solutions, compatibility and data regulation requirements across different countries, single SIM techn…
  continue reading
 
In this episode, Austin chats with Connor O'Hara (Celestia) about the scope of DA projects like Celestia. After a reflective discussion on a wide range of topics from the early days of Bitcoin to tradeoffs of proof-of-stake networks, Connor gets at the heart of how data availability works, how it differs from settlement and state, and where data av…
  continue reading
 
Autonomous AI represents a frontier in artificial intelligence, encompassing a spectrum that differs from predictive and generative capabilities. Distinguishing between these facets, predictive AI anticipates outcomes based on historical data, while generative AI creates new content or scenarios. Autonomous AI, however, takes a leap further by not …
  continue reading
 
TL;DR: On this episode of the DtSR Podcast, Shawn Tuma joins James & I to talk over what's changed, what's new, and what's not going well at the intersection of cyber and legal. Spoiler Alert: Nothing's that much better, and things are worse. YouTube video: https://youtube.com/live/VDqxohnvpXs Support the show >>> If you're reading this, consider c…
  continue reading
 
Chris and Gina on what payment model works best for users Back in the day people paid for cable packages and big bundled deals. Then many products moved to a free, ad-supported model. Now it seems the industry is leaning somewhere in the middle. This week Chris and Gina talk about the history of product payment models and discuss current trends in …
  continue reading
 
Palo Alto Networks releases hotfixes for an exploited zero-day. Delinea issues an urgent update for a critical flaw. Giant Tiger data is leaked online. A European semiconductor manufacturer deals with a data breach. Roku suffers its second breach of the year. Operators of the Hive RAT face charges. A former Amazon security engineer gets three years…
  continue reading
 
Tuija RiekkinenTuija Riekkinen brings a unique perspective to scaling both content and design operations, as well as other digital initiatives.She has applied her holistic and pragmatic enterprise product management skills at organizations like IKEA, where she has worked on both their design system and content management system.Tuija is a persuasiv…
  continue reading
 
Startup founders dream of success, but it's much harder than it looks. As a former founder, I know the challenges of cultivating an idea, establishing product market fit, growing revenue, and finding the right exit. Trust me, it doesn't always end well. In this interview, we welcome Seth Spergel, Managing Partner at Merlin Ventures, to discuss how …
  continue reading
 
Learn how NetSuite OpenAir centralizes operations for services companies: https://www.openair.com/ What’s new in NetSuite OpenAir 2024 Release 1? Joining us to answer that question is Adam Mayo, Vertical Product Manager, Services at NetSuite. Adam shares some of the big-picture changes and trends affecting services companies [1:37] before giving mo…
  continue reading
 
Dmitry Shapiro is a serial entrepreneur who most recently founded and is the CEO of YouAi and the popular AI app-builder MindStudio. He has a bold vision to help you index your mind which we unpack in today's conversation. Previously, Dmitry founded and led GoMeta and created the video sharing site Veoh in 2005 which launched a few months after You…
  continue reading
 
Despite the outward similarities shared among various ERP systems, the construction industry imposes distinct and specialized requirements that necessitate tailored capabilities. Construction projects involve a dynamic interplay of factors, such as project timelines, resource allocation, and compliance with specific regulations, which differ signif…
  continue reading
 
You can learn more about AWS in Orbit at space.n2k.com/aws. N2K Space is working with AWS to bring the AWS in Orbit podcast series to the 39th Space Symposium in Colorado Springs from April 8-11. Our guests today are ​​Clint Crosier, Director at AWS Aerospace and Satellite, and Jim Tran, Vice President of Government Solutions at Iridium. AWS in Orb…
  continue reading
 
In this episode of Amazing Apps, host Neil Benson explores the importance of rethinking our approach to building business applications. Join us as we delve into the benefits of questioning our assumptions and adapting to new information in the dynamic landscape of app development. - Unpacking the concept of "thinking like a scientist" and its impac…
  continue reading
 
Founder and CEO Stu Sjouwerman takes us on a journey of how his career developed from starting a software service company to currently focusing on the infosec side of the business where his team essentially helps to create human firewalls. Stu talks about learning all aspects of the business while creating startups and suggests you learn to speak t…
  continue reading
 
Hyperpersonalization has been recognized as one of the seven defining patterns of AI. Why? Is it deserving? Useful? Buzzword mischief? Time for an enterprise BS detector dissection... Join me and CRM analyst and buzzword detoxifier Thomas Wieberneit as we pick apart hyperpsersonalization in this informal discussion. Where does hyperpersonalization …
  continue reading
 
Hyperpersonalization has been recognized as one of the seven defining patterns of AI. Why? Is it deserving? Useful? Buzzword mischief? Time for an enterprise BS detector dissection...Join me and CRM analyst and buzzword detoxifier Thomas Wieberneit as we pick apart hyperpsersonalization in this informal discussion. Where does hyperpersonalization w…
  continue reading
 
You can learn more about AWS in Orbit at space.n2k.com/aws. N2K Space is working with AWS to bring the AWS in Orbit podcast series to the 39th Space Symposium in Colorado Springs from April 8-11. Our guests today are ​​Salem El Nimri, Chief of Space Technology at AWS Aerospace and Satellite, and Declan Ganley, Chairman and CEO at Rivada Space Netwo…
  continue reading
 
Tomer Peled, a Security & Vulnerability Researcher from Akamai is sharing their work on "What a Cluster: Local Volumes Vulnerability in Kubernetes." This research focuses on a high-severity vulnerability in Kubernetes, allowing for remote code execution with system privileges on all Windows endpoints within a Kubernetes cluster. The research states…
  continue reading
 
Section 702 edges closer to a vote. CISA provides guidance on Sisense and Microsoft breaches. A major conservative think tank reports a breach. Obsolete D-Link devices are under active exploitation, and Palo Alto warns of a zero-day. Raspberry Robin grows more stealthy. A lastpass employee thwarts a deepfake phishing attempt. Are AI models growing …
  continue reading
 
We all know video is important to grow exposure, but creating enough is still challenging. The tools are complex, production is expensive, and it can be overwhelming just to come up with ideas. In this episode, Aug X Labs founder Jeremy Toeman talks about his personal frustration with the complex tools just to make basic videos that can be used on …
  continue reading
 
This week, we discuss Matt Asay accusing OpenTufu of "lifting code" and recap the Google Next '24. announcements. Plus, we share some thoughts on camera placement and offer listeners a chance to get free coffee beans. Watch the YouTube Live Recording of Episode 462 Runner-up Titles Hey, I’m VP of Cables, not VP of Hubs. Well, I still have meetings.…
  continue reading
 
Join us for this special three-part series where the N2K Cyber Talent Insights team guides you through effective strategies to develop your cybersecurity team, helping you stay ahead in the constantly changing cybersecurity landscape. In the first episode of the series on cybersecurity workforce development, we dive into the complex world of cyber …
  continue reading
 
In the days when Mirai emerged and took down DynDNS, along with what seemed like half the Internet, DDoS was as active a topic in the headlines as it was behind the scenes (check out Andy Greenberg's amazing story on Mirai on Wired). We don't hear about DDoS attacks as much anymore. What happened? Well, they didn't go away. DDoS attacks are a more …
  continue reading
 
In the days when Mirai emerged and took down DynDNS, along with what seemed like half the Internet, DDoS was as active a topic in the headlines as it was behind the scenes (check out Andy Greenberg's amazing story on Mirai on Wired). We don't hear about DDoS attacks as much anymore. What happened? Well, they didn't go away. DDoS attacks are a more …
  continue reading
 
Apple warns targeted users of mercenary spyware attacks. CISA expands its Malware Next-Gen service to the private sector. US Cyber Command chronicles their “hunt forward” operations. Taxi fleets leak customer data. Trend Micro tracks DeuterBear malware. The BatBadBut vulnerability enables command injection on Windows. Cybercriminals manipulate GitH…
  continue reading
 
Epicor announced it has surpassed $1 billion in annual recurring revenue (ARR), realizing 42% year-over-year SaaS-based cloud revenue growth in its fiscal year 2023. Infor announced the launch of Infor GenAI and ESG Reporting. Salesforce announced AI-powered enhancements to its MuleSoft automation, integration, and API management solutions to help …
  continue reading
 
Jim joins the Security Weekly crew to discuss all things supply chain! Given the recent events with XZ we still have many topics to explore, especially when it comes to practical advice surrounding supply chain threats. Ahoi new VM attacks ahead! HTTP/2 floods, USB Hid and run, forwarded email tricks, attackers be scanning, a bunch of nerds write s…
  continue reading
 
Craig Spence was a developer at Trade Me in New Zealand before he moved to Sweden to join Spotify. Trade Me is New Zealand's biggest website and it is similar to eBay where people buy and sell lots of different items. Craig talks about his experiences migrating Trade Me from AngularJS to Angular and the challenges they faced. One of the tips Craig …
  continue reading
 
In this episode, I speak with Frans Swarttouw, Founder of GETTING THE MARKET I was really interested in speaking to Frans as a fellow owner of a creative services business - and one that is so niche in its target market to boot. How does the company differentiate from more generic, we do all things for all people, type agencies? What are the advant…
  continue reading
 
Vertical Systems Group Principal and Cofounder, Rosemary Cochran, explores how telecom carrier landscapes are adapting to evolving enterprise network trends and shifting network paradigms. With ethernet’s enduring relevance and SD-WAN’s evolution into SASE, how do emerging technologies like SSE influence the competitive dynamics within the carrier …
  continue reading
 
The House moves forward on Section 702 reauthorization. Ukraine suspends a top cybersecurity official. A Wisconsin health coop suffers a data breach. Sophos uncovers a malicious backdoor. Fortinet issues patches for critical and high severity vulnerabilities. A Microsoft server exposed employee passwords, keys, and credentials. LG releases patches …
  continue reading
 
Loading …

Quick Reference Guide