Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
Aimed at CISOs, CTOs, CROs and other global security professionals, the ISF Analyst Insight Podcast goes in-depth on the hottest topics in information security, and the extensive research conducted by the Information Security Forum, the leading authority on cyber, information security, and risk management. Drawing from our network of over 18,000 security professionals, our analysts hand selects active security professionals from ISF Member organisations to discuss how the implementation of I ...
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Weekly Information Security News. Stay up to date on what’s going on in the InfoSec world in about 40 minutes. Join us for InfoSec news and stay for some friendly banter, guest interviews, gadget reviews, tech interview tips, and hilarious dad jokes! New episodes every Monday.
…
continue reading
Hacks, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
…
continue reading
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking wit ...
…
continue reading
The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don't have to) and then bring this to you in small, digestible chunks.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
…
continue reading
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field of cybersecurity.
…
continue reading
In "Surfacing Security," we explore a variety of cybersecurity topics relevant to Attack Surface Management and beyond. Your co-hosts are Michael Gianarakis (Assetnote Co-Founder/CEO) and Shubham Shah (Assetnote Co-Founder/CTO).
…
continue reading
Trace Labs is a Canadian based non profit specializing in the crowd sourcing of open source intelligence collection. In this series, we explore the topics, techniques and tools that relate to OSINT collection.
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
How does GDPR, data privacy and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader or InfoSec security expert this is the podcast to learn about what is happening in the UK, EU, US and beyond.
…
continue reading
Modem Mischief tells the true stories of the outlaws of cyberspace. Hackers, dark web lurkers and cybercrime perpetrators of the digital underground are explored in this true crime series.
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.
…
continue reading
Hey everyone, Welcome to the Infosec Prep Podcast. We aim to bring you weekly Infosec news and bring some people on to interview! Join our discord at https://discord.gg/9xTqKTY
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
Podcast by InfoSec Campus
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
SecTools Podcast is a series of audio podcast featuring free or opensource tool authors from Information Security industry, sharing their interesting experience on developing and maintaining amazing tools for the security community. Hosted by Sanoop Thomas (s4n7h0) https://infoseccampus.com https://twitter.com/InfoSecCampus
…
continue reading
Welcome to the podcast: Sustainable Compliance. Are you passionate about data protection, GDPR, information security, and general compliance? Then, this podcast is dedicated to you. We delve into the intricacies of data protection and compliance. Join us as the host, Jacob Høedt Larsen, interviews experts and discusses the latest trends, insights, and advice within the realm of compliance. We also explore how we can reshape the way we think and organise ourselves around compliance, to forge ...
…
continue reading
The Liquidmatrix Security Digest Podcast - Information Security News and Commentary from Professionals.
…
continue reading
A group of friends getting together and talking about things that we enjoy. We wanted to start recording conversations that we normally would have while hanging out. Interesting topics, busting chops, and some derailment here and there. Sit back, grab a drink and welcome to the circus.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
1
2024-08-19 Nine Years for Chicken Wings
1:04:35
1:04:35
Play later
Play later
Lists
Like
Liked
1:04:35
00:00:00 - PreShow Banter™ — Nine Years for Chicken Wings 00:08:19 - BHIS - Talkin’ Bout [infosec] News 2024-08-19 00:09:03 - Story # 1: NationalPublicData.com Hack Exposes a Nation’s Data 00:18:17 - Story # 1b: National Public Data Published Its Own Passwords 00:25:01 - Story # 2: RansomHub Group Deploys New EDR-Killing Tool in Latest Cyber Attack…
…
continue reading
1
S3 Ep2: Creating a CERT on Jersey - part one
19:33
19:33
Play later
Play later
Lists
Like
Liked
19:33
Matt Palmer, Director of the Jersey Cybersecurity Centre has been the driving force behind the creation of a Computer Emergency Response Team (CERT) for Jersey – one of the Channel Islands. As the architect behind this initiative, Matt explains the circumstances that led to the realisation of its necessity, the efforts involved in bringing it to fr…
…
continue reading
Check out the latest Defensive Security Podcast Ep. 276! From cow milking robots held ransom to why IT folks dread patching, Jerry Bell and Andrew Kalat cover it all. Tune in and stay informed on the latest in cybersecurity! Summary: In episode 276 of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat delve into a variety of security…
…
continue reading
1
MaaS infrastructure exposed. [Research Saturday]
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39
Robert Duncan, VP of Product Strategy from Netcraft, is discussing their work on "Mule-as-a-Service Infrastructure Exposed." Netcraft's new threat intelligence reveals the intricate connections within global fraud networks, showing how criminals use specialized services like Mule-as-a-Service (MaaS) to launder scam proceeds. By mapping the cyber an…
…
continue reading
1
Week in Review: NPD breach update, Hawaii hacker sentenced, Poisoned LLM coders
31:12
31:12
Play later
Play later
Lists
Like
Liked
31:12
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Bethany De Lude, CISO, The Carlyle Group Thanks to today’s episode sponsor, Nudge Security When your CEO asks “Hey, are we using that SaaS app that was just breached?”, how quickly and confidently can you answer? Stop guessing with Nudge…
…
continue reading
The exploitation of the LiteSpeed Cache Wordpress plugin has begun. Halliburton confirms a cyberattack. Velvet Ant targets Cisco Switch appliances. The Qilin ransomware group harvests credentials stored in Google Chrome. Ham radio enthusiasts pay a million dollar ransom. SolarWinds releases a hotfix to fix a hotfix. A telecom company will pay a mil…
…
continue reading
1
Ep9: The blurring lines between nation-state APTs and the ransomware epidemic
1:06:16
1:06:16
Play later
Play later
Lists
Like
Liked
1:06:16
Three Buddy Problem - Episode 9: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misat…
…
continue reading
1
Russia’s questionable DDoS, FAA’s cybersecurity proposal, Windows Recall reappears
7:50
7:50
Play later
Play later
Lists
Like
Liked
7:50
Kremlin complains of DDoS attack, digital experts not so sure FAA proposes new cybersecurity rules for airplanes Windows Recall to reappear Thanks to today’s episode sponsor, Nudge Security Do you know who’s using genAI tools in your org? Find out today with Nudge Security. Their patented approach to SaaS discovery gives you a full inventory of all…
…
continue reading
1
Loops and Angles of Cybersecurity Compliance with Ian Thornton Trump | Cybersecurity Insights Podcast with Matthew Rosenquist
35:57
35:57
Play later
Play later
Lists
Like
Liked
35:57
Guest: Ian Thornton Trump, CISO at Cyjax Limited and the CTO at Octopi Managed Services LinkedIn | https://www.linkedin.com/in/ian-thornton-trump-cd-77473a26/ Host: Matthew Rosenquist On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-rosenquist ______________________ Episode Sponsors Are you interested in spons…
…
continue reading
A Wordpress plugin vulnerability puts 5 million sites at risk. Google releases an emergency Chrome update addressing an actively exploited vulnerability. Cisco patches multiple vulnerabilities. Researchers say Slack AI is vulnerable to prompt injection. Widely used RFID smart cards could be easily backdoored. The FAA proposes new cybersecurity rule…
…
continue reading
1
A System Where Local Is the Norm – and We Pay What It Really Costs To Drive Something Hundreds of Miles | A conversation with Trevor Vaughn and Hunter Buffington | What If Instead? Podcast with Alejandro ...
40:45
40:45
Play later
Play later
Lists
Like
Liked
40:45
Guests: Trevor Vaughn On LinkedIn | https://www.linkedin.com/in/trevor-vaughn-2165a661/ Hunter Buffington On LinkedIn | https://www.linkedin.com/in/hunter-buffington-co/ Hosts: Alejandro Juárez Crawford On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alejandro-juarez-crawford Miriam Plavin-Masterman On ITSPmagazine 👉…
…
continue reading
1
Talking To People Who Think Like Us Has Made Us Stagnant | A conversation with Trevor Vaughn and Hunter Buffington | What If Instead? Podcast with Alejandro Juárez Crawford and Miriam Plavin-Masterman
48:00
48:00
Play later
Play later
Lists
Like
Liked
48:00
Guests: Trevor Vaughn On LinkedIn | https://www.linkedin.com/in/trevor-vaughn-2165a661/ Hunter Buffington On LinkedIn | https://www.linkedin.com/in/hunter-buffington-co/ Hosts: Alejandro Juárez Crawford On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alejandro-juarez-crawford Miriam Plavin-Masterman On ITSPmagazine 👉…
…
continue reading
1
Is APT a Lie? | A Conversation with Amar Sonik | Cyber Cognition Podcast with Hutch and Len Noe
41:29
41:29
Play later
Play later
Lists
Like
Liked
41:29
Guest: Amar Sonik, Organizer, BSides Singapore On LinkedIn | https://www.linkedin.com/in/amarjitsonik/ Hosts: Hutch On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/hutch Len Noe, Technical Evangelist / Whitehat Hacker at CyberArk [@CyberArk] On ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/…
…
continue reading
1
🚨 Jenkins Bug Exploit Still Active, Github Authentication Flaw, Post Quantum Crypto Deep Dive
15:58
15:58
Play later
Play later
Lists
Like
Liked
15:58
🚨 Jenkins Bug Exploit Still Active, Github Authentication Flaw, Post Quantum Crypto Deep Dive 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as Jenkins struggles to patch an active exploit with more news below: Github authentication flaw Microsoft…
…
continue reading
1
Episode 76: Losing the Cyberwar Through Marketing, Part 2
55:19
55:19
Play later
Play later
Lists
Like
Liked
55:19
Jonathan and Todd continue the conversation about how the way we talk about cybersecurity puts us in a deficit against the malicious actors and how we might reframe to better equip the defenders. Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episode now at https://bit.ly/47eYPTK Listen on Apple Podcasts, Spotify and anywh…
…
continue reading
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining me is our guest, Sherron Burgess, CISO, BCD Travel. In this episode: Disingenuous clai…
…
continue reading
1
Japanese auto security, Feds tap encrypted messages, Microsoft breaks Linux dual-booting
7:20
7:20
Play later
Play later
Lists
Like
Liked
7:20
Security initiative from Japanese auto companies Feds tapping into encrypted messaging haul Microsoft breaks Linux dual-boot systems Thanks to today’s episode sponsor, Nudge Security How big is your SaaS attack surface? Find out today with Nudge Security. Nudge Security discovers all SaaS accounts ever created by anyone in your org, in minutes, and…
…
continue reading
1
Fighting Misinformation in a Divided Landscape
30:12
30:12
Play later
Play later
Lists
Like
Liked
30:12
Send us a Text Message. Have you ever wondered how drastically your media consumption could change just by crossing state lines? During a recent family vacation to Nashville, I experienced firsthand how my YouTube and social media feeds were manipulated to present opposing political views. This episode exposes the unnerving reality of regional medi…
…
continue reading
1
UL NO. 446: AI Ecosystem Components, MS 0-Days, Iranian Campaign Hacks…
42:27
42:27
Play later
Play later
Lists
Like
Liked
42:27
Political deepfakes are here, Grok2 is insane, weakness vs. evil, and more… Check out ThreatLocker to secure your data: threatlocker.com/ul Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmiessler Follow on LinkedIn: https://www.…
…
continue reading
1
"OG privacy people! They're ready for anything." (w/Shoshana Rosenberg)
31:06
31:06
Play later
Play later
Lists
Like
Liked
31:06
"So first of all, OG privacy people who were scrappy and had to fight really hard to get any kind of budget and to even get people to understand that this was a necessary component of a business. They're ready for anything," Shoshana Rosenberg says in this podcast. We discuss: - The future of AI and whether privacy people are equipped to take that …
…
continue reading
1
Cyberattack cripples major American chipmaker.
34:26
34:26
Play later
Play later
Lists
Like
Liked
34:26
A major American chipmaker discloses a cyberattack. Cybercriminals exploit Progressive Web Applications (PWAs) to bypass iOS and Android defenses. Mandiant uncovers a privilege escalation vulnerability in Microsoft Azure Kubernetes Services. ALBeast hits ALB. Microsoft’s latest security update has caused significant issues for dual-boot systems. Th…
…
continue reading
1
Uncovering Critical Vulnerabilities in Magento: A Deep Dive
41:03
41:03
Play later
Play later
Lists
Like
Liked
41:03
Today, co-hosts Michael and Shubs reflect on the six-year milestone of Assetnote and do a deep dive into a critical Magento bug. They explore the importance of proactive and reactive security research, the limitations of traditional vulnerability scoring systems like CVSS and EPSS, and the significance of understanding exploitability in assessing v…
…
continue reading
1
Bryan Ware on modern conflict, entrepreneurship and emerging technologies
1:01:37
1:01:37
Play later
Play later
Lists
Like
Liked
1:01:37
Bryan Ware is an entrepreneur, innovator and technology business leader who served as the first Presidentially appointed Assistant Director of Cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA). Bryan is deeply knowledgeable about the current threat and geopolitical landscapes, along with emerging technologies like AI. He'…
…
continue reading
Episode 360 of the transatlantic cable podcast kicks off with news that Nvidia are on the receiving end of a class-action law-suit, alleging that they scraped YouTube videos without creators’ consent. From there, the team discuss news around Taylor Swift AI images being shared by Donald Trump and an additional story around how photography is quickl…
…
continue reading
1
🚨 Microchip Cyberattack Halts Production, Data Hashing Ruling, RFID Cards Backdoor, Secure Open Source
16:51
16:51
Play later
Play later
Lists
Like
Liked
16:51
🚨 Microchip Cyberattack Halts Production, Data Hashing Ruling, RFID Cards Backdoor, Secure Open Source 🎙️ Join us on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Today’s episode will discuss the latest news as Microchip reels from a cyberattack with more news below: FTC Hashing Rule Azure Kubernetes Vul…
…
continue reading
1
401 Access Denied Podcast Ep. 113 | The Evolution of Platforms and the Role of AI with Phil Calvin
15:05
15:05
Play later
Play later
Lists
Like
Liked
15:05
Platformization is a hot topic in the cybersecurity industry, especially as use cases converge and vendor consolidation continues. Phil Calvin, chief product officer at Delinea, joins Joe to talk about how a platform approach changes the mindset around software development to prioritize agility and accelerate innovation. The two discuss how platfor…
…
continue reading
1
Michael Howard on Secure by Design vs Secure by Default
48:14
48:14
Play later
Play later
Lists
Like
Liked
48:14
Michael Howard, Principal Security Program Manager at Microsoft joins Nic Fillingham on this week's episode of The BlueHat Podcast. Michael shares his journey at Microsoft, starting from his early days in New Zealand as part of a small team of ten. He discusses his extensive career, his contributions to cybersecurity, and his role in the developmen…
…
continue reading
1
Toyota third-party breach, Hawaii registry hack, Iran disrupting campaigns
7:42
7:42
Play later
Play later
Lists
Like
Liked
7:42
Toyota confirms third-party data breach impacting customers Man who hacked Hawaii state registry sentenced U.S. Intelligence blames Iran for Trump campaign hack Thanks to today’s episode sponsor, Nudge Security When your CEO asks “Hey, are we using that SaaS app that was just breached?”, how quickly and confidently can you answer? Stop guessing wit…
…
continue reading
The Dem’s 2024 party platform touches on cybersecurity goals. The feds warn of increased Iranian influence operations. A severe security flaw has been discovered in a popular WordPress donation plugin. The Lazarus Group exploits a Windows zero-day to install a rootkit. Krebs on Security takes a closer look at the significant data breach at National…
…
continue reading
1
Book | Utopia Engine Trilogy | Writing Climate Fiction: A Conversation with Author Lee Schneider | Audio Signals Podcast With Marco Ciappelli
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54
Guest: Lee Schneider, Artistic Director, FutureX Studio On LinkedIn | https://linkedin.com/in/docuguy On Twitter | https://twitter.com/docuguy On Mastodon | https://scicomm.xyz/@docuguy On Instagram | https://instagram.com/docuguy _____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining …
…
continue reading
1
Powerful Strategies for Negotiation Success | A Conversation with Cash Nickerson | The Soulful CXO Podcast with Dr. Rebecca Wynn
30:01
30:01
Play later
Play later
Lists
Like
Liked
30:01
Guest: Cash Nickerson, Chairman & CEO, Nickerson Stoneleigh, Inc Website: https://cashnickerson.com/ LinkedIn: https://www.linkedin.com/in/stevencashnickerson/ Facebook: https://www.facebook.com/cashnickersonauthor Twitter: https://twitter.com/cashnickerson Host: Dr. Rebecca Wynn On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-r…
…
continue reading
1
Recapping Black Hat 2024 and What’s Next | On Location Coverage with Sean Martin and Marco Ciappelli
20:30
20:30
Play later
Play later
Lists
Like
Liked
20:30
Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | https://www.itspmagazine.com/sean-martin Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podca…
…
continue reading
1
OWASP Top 10 For Large Language Models: Project Update | An OWASP 2024 Global AppSec San Francisco Conversation with Steve Wilson | On Location Coverage with Sean Martin and Marco Ciappelli
23:31
23:31
Play later
Play later
Lists
Like
Liked
23:31
Guest: Steve Wilson, Chief Product Officer, Exabeam [@exabeam] & Project Lead, OWASP Top 10 for Larage Language Model Applications [@owasp] On LinkedIn | https://www.linkedin.com/in/wilsonsd/ On Twitter | https://x.com/virtualsteve ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Cyb…
…
continue reading