Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: podcast@emsisoft.com Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
…
continue reading
Official Website: https://lockdown.media Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional. Follow the show on Twitter @privacypod
…
continue reading
Zero Gravity LIVE is the ultimate destination for tech enthusiasts! Join us every Tuesday for a captivating live stream experience as we explore the latest and greatest in IT, tech, security, and storage news, and if you missed it, that's what the podcast is here for! The Zero Gravity Podcast delivers our weekly tech talk to your feed every week. Our show features interviews with leading experts in the field of technology, who will share their insights and knowledge with you. We’ll keep you ...
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
In today's episode we have a tendency to state the most recent cyberattack on JBS and check out to quantify the impact they could wear giant businesses
…
continue reading
The Ransomware Files podcast tells the harrowing stories of technology experts who have fought back against ransomware, which is one of the greatest crime waves the internet has ever seen. It features in-the-trenches stories about how organisations recovered and frank human reflections from those who have faced file-encrypting malware, a potent weapon used by high-tech criminals.
…
continue reading
Get to know the PNW and each other.
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
The essential tech news you need every day in 10 minutes or less.
…
continue reading
Twisted Money Podcast is a podcast on Fraud, Scams, and Deceptions to help the listeners become better informed on fraud and cyber-attacks methods so that listeners don't become a victim of fraud and cyber-attacks.
…
continue reading
Your Home for Linux-related fun and learning!
…
continue reading
Modem Mischief tells the true stories of the outlaws of cyberspace. Hackers, dark web lurkers and cybercrime perpetrators of the digital underground are explored in this true crime series.
…
continue reading
a unique perspective on technology
…
continue reading
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
The Predatar Podcast is back for 2024. Each episode will dive into a different aspect of Recovery Assurance, helping to keep security and IT leaders informed of what's new in this fast-moving area of technology.
…
continue reading
healthsystemCIO.com is the sole online-only publication dedicated to exclusively and comprehensively serving the information needs of healthcare CIOs.
…
continue reading
Two lawyers talk about technology.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
…
continue reading
In-depth analysis and perspective from our experts in Europe, the Middle East and Africa.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
…
continue reading
Online security and privacy aren't very sexy, but they are important. SpiderBytes is a podcast where normal people from many different fields discuss the tools and techniques they use to be more secure and maintain their privacy. Hosted by Adam Tervort. Guests from across the SpiderOak community.
…
continue reading
A delicious mix of Insurance and TV
…
continue reading
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
…
continue reading
A genuine and informative podcast about data privacy and security. Your reliable place for best practices, interviews, belly laughs, and real stories.
…
continue reading
"The real price of everything is the toil and trouble of acquiring it." -Adam Smith (WoN, Bk I, Chapter 5) In which the Knower of Important Things shows how transaction costs explain literally everything. Plus TWEJ, and answers to letters. If YOU have questions, submit them to our email at taitc.email@gmail.com There are two kinds of episodes here: 1. For the most part, episodes June-August are weekly, short (<20 mins), and address a few topics. 2. Episodes September-May are longer (1 hour), ...
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
True crime. Real prosecutors. Expert analysis. Experienced prosecutors from San Diego, CA discuss the latest crime news, interview criminal justice leaders, and bring you their expert analysis.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Connected Lawyer Podcast Episode Eighteen: Ransomware
42:46
42:46
Play later
Play later
Lists
Like
Liked
42:46
Aaron and Bryan talk about ransomware and why it keeps Bryan up at night. Things that we discuss in the episode: CISA Synology SyncBack Checkout the blog at The Connected Lawyer Checkout our YouTube page. Find out more about your hosts: Aaron Brooks Bryan Sims Email us at info@theconnectedlawyer.com
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Infinidat Revolutionizes Enterprise Cyber Storage Protection, Combats Ransomware And Malware Threats
9:06
9:06
Play later
Play later
Lists
Like
Liked
9:06
This story was originally published on HackerNoon at: https://hackernoon.com/infinidat-revolutionizes-enterprise-cyber-storage-protection-combats-ransomware-and-malware-threats. Sophisticated cyberattacks, including new sinister forms of AI-driven attacks, are increasingly targeting the data storage infrastructure of enterprises. Check more stories…
…
continue reading
As we’ve discussed numerous times on Security Breach, terms like change, evolution and constant are more than just buzz terms – they’re a simple reality of working in the industrial OT space. Whether we’re discussing threat actors from Stuxnet to Lockbit, tactics from social engineering to double-extortion ransomware, or vulnerability sources rangi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Red Tape Is Making Hospital Ransomware Attacks Worse
11:35
11:35
Play later
Play later
Lists
Like
Liked
11:35
With cyberattacks increasingly targeting health care providers, an arduous bureaucratic process meant to address legal risk is keeping hospitals offline longer, potentially risking lives. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy SpokenLayer
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity Alert: 45% of Survey Respondents Had Ransomware Attack in the Past Year 🚨🔒
2:23
2:23
Play later
Play later
Lists
Like
Liked
2:23
Arctic Wolf’s 2024 report reveals 45% of companies faced ransomware attacks in the past year, highlighting the urgent need for improved security measures. Check out this excerpt from the Insuring Cyber Podcast where Carrier Management Deputy Editor Elizabeth Blosfield talks with Arctic Wolf’s Chief Product and Services Officer Dan Schiappa about th…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Security Today, June 24, 2024 - Ransomware gang reportedly behind the hack of car dealership software provider
7:12
7:12
Play later
Play later
Lists
Like
Liked
7:12
This episode reports on a warning to patch Serv-U applications, the workings of the Rafel trojan, and moreBy Howard Solomon
…
continue reading
Change Healthcare suffered a ransomware attack in February that affected a substantial number of Americans, TikTok offered a “kill switch, to U.S. lawmakers, and Google is pausing real-money games globally less India. https://open.acast.com/public/streams/619570402eacc3a36070252c/episodes/6675a5f9a4ecc300124cb52f.mp3 Please SUBSCRIBE HERE. You can …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CYFIRMA Research- Tracking Ransomware May 2024
4:20
4:20
Play later
Play later
Lists
Like
Liked
4:20
Stay informed about the latest trends in the ransomware landscape with CYFIRMA's May 2024 Ransomware report. This edition highlights significant increases in ransomware activity, with LockBit3 surging tremendously and Play rising by 10.34%. Incransom's activity doubled, while RansomHub and Medusa also showed notable activity. Manufacturing, real es…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Rethinking Business Responsibility in Ransomware-focused Catastrophic Downtime Planning
1:00:03
1:00:03
Play later
Play later
Lists
Like
Liked
1:00:03
The recent rash of ransomware-induced outages has truly created a "not if, but when" dynamic for health systems. And with that feeling must come a commitment on the part of all leaders to ensure their organizations can continue safely treating patients and maintaining critical business operations during such an ordeal. To do that, downtime plans ne…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Snowflake, Findlay Auto Ransomware, Olympics
32:03
32:03
Play later
Play later
Lists
Like
Liked
32:03
In this episode of the Blue Security Podcast, Andy and Adam discuss three main topics: the unauthorized user access at Snowflake, the cybersecurity issue at Finley Automotive Group, and the cyber threats surrounding the upcoming Olympics in Paris. They highlight the importance of implementing strong security controls like multi-factor authenticatio…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Security Today, July 3, 3034 - Beware of advanced attack tactics
3:41
3:41
Play later
Play later
Lists
Like
Liked
3:41
This episode reports on some of the new ways threat actors are bypassing phishing defencesBy Howard Solomon
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 99: Tool Time - OneDriveEnum & AD Miner
37:05
37:05
Play later
Play later
Lists
Like
Liked
37:05
Text us feedback! In this episode, Spencer and Tyler discuss two of their current favorite tools: OneDriveEnum for enumerating user accounts in Microsoft 365 and AD Miner for visualizing attack paths in Active Directory. We hope you enjoy and get value from this episode! Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Tw…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S5, E215 - Click, Track, Share: Privacy, What's That?
9:09
9:09
Play later
Play later
Lists
Like
Liked
9:09
Send us a Text Message. History of location sharing, it certainly didn't start yesterday folks...😉 Younger internet users seem to be okay with sharing their location data and the convenience it offers however, what about the potential risks of being constantly tracked? Do you know how much of your life is up for grabs in the digital world? In this …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Pedaling Towards The Stars (Read In English) | Stories Sotto Le Stelle Podcast | Short Stories For Children And The Young At Heart
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25
PEDALING TOWARDS THE STARS One fine day, in the squares of the city of Ciclopoli, large billboards appeared advertising a bicycle race; everyone could participate, from zero years and up. There wasn’t much information, but it suggested that those interested should contact the Association of Bicycles with Wheels, located at Via dei Manubri Number Ei…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Producer picks: tracing family lineage and searching for hermits
50:44
50:44
Play later
Play later
Lists
Like
Liked
50:44
The Soundside team is on a break this week for the 4th of July holiday, so we’re revisiting some of our favorite segments of the year. First up, when Seattle writer and illustrator Tessa Hulls started drafting the story of her grandmother’s life, she wanted to take on the role of neutral narrator, but that didn't last long. We’ll hear about her gra…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EP 40: Hacking IoT Surveillance Cameras For Espionage Operations
28:27
28:27
Play later
Play later
Lists
Like
Liked
28:27
That camera above your head might not seem like a good foreign target, yet in the Ukraine there’s evidence of Russian-backed hackers passively counting the number of foreign aid workers at the local train stations. Andrew Hural of UnderDefense talks about the need to secure everything around a person, everything around an organization, and everythi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
What is CHECK Penetration Testing and Why Do You Need It?
6:03
6:03
Play later
Play later
Lists
Like
Liked
6:03
This story was originally published on HackerNoon at: https://hackernoon.com/what-is-check-penetration-testing-and-why-do-you-need-it. What is CHECK Penetration Testing and Why do you need it? Read this article to find out. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Understanding IP Geolocation: Its Benefits and Challenges
4:42
4:42
Play later
Play later
Lists
Like
Liked
4:42
This story was originally published on HackerNoon at: https://hackernoon.com/understanding-ip-geolocation-its-benefits-and-challenges. Explore how IP geolocation shapes user experience, security, and marketing strategies in a digital world, despite accuracy and privacy challenges. Check more stories related to cybersecurity at: https://hackernoon.c…
…
continue reading
Tap to Pay could become more useful and more complicated with “Multi-Purpose Tap”, YouTube’s new policy now allows people to request the takedown of AI-generated content of themselves, and Paramount+ wants to merge with another streaming service. MP3 Please SUBSCRIBE HERE. You can get an ad-free feed of Daily Tech Headlines for $3 a month here. A s…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Founder to Founder Fireside Chat with Sara Teare and Adamaka Ajaelo
19:53
19:53
Play later
Play later
Lists
Like
Liked
19:53
Surprise! Tune in for our bonus episode, as we host a founder-to-founder fireside chat. 🔥🪵 Join 1Password Founder, Sara Teare, and Self-eSTEM founder, Adamaka Ajaelo as they share their personal experiences as women in STEM careers and the things they've learned along the way. Settle in and learn how you can overcome some of the common challenges w…
…
continue reading
In this episode of the Blue Security Podcast, Andy and Adam discuss recommended settings for Exchange Online Protection (EOP) and Microsoft Defender for Office (MDO). They explain that EOP is the core security for M365 subscriptions, providing anti-malware, anti-spam, and anti-phishing protection. They also highlight the importance of the secure by…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Monkey See, Monkey App! And IP Walks Into a Bar....
14:44
14:44
Play later
Play later
Lists
Like
Liked
14:44
The method of much of social science is "comparative statics." There's an amazing natura experiment going on, after Hurricane Maria changed the environment for the rhesus macaques of Cayo Santiago. Sometimes, you need a simulation to understand something is only obvious after the fact. These primates, known for their fierce competition and rigid hi…
…
continue reading
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining us is our sponsored guest, Jason Clark, chief strategy officer, Cyera. In this episode: Does AI require new security measures? Meeting the new SEC requirements…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Problem the US TikTok Crackdown and Kaspersky Ban Have in Common
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16
While Kaspersky and TikTok make very different kinds of software, the US has targeted both over national security concerns. But the looming bans have larger implications for internet freedom. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy SpokenLayer
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Producer picks: An Oscar nominee and Coast Salish Punk share the power of Indigenous stories
53:31
53:31
Play later
Play later
Lists
Like
Liked
53:31
The Soundside team is taking some time off this 4th of July week; some of us are on vacation, and others are working on upcoming shows. We’re going to revisit some of our favorite segments, and the hardworking producers who make Soundside, will be making the picks. Producer Noel Gasca's picks: Lily Gladstone chronicles Blackfeet Nation's reunion wi…
…
continue reading
French antitrust regulators looking into Nvidia anti-competition practices, European Commission says Meta failed DMA compliance, Apple starting production on Airpods with cameras? MP3 Please SUBSCRIBE HERE. You can get an ad-free feed of Daily Tech Headlines for $3 a month here. A special thanks to all our supporters–without you, none of this would…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
A Deep Dive into Path Traversal Vulnerabilities
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30
This story was originally published on HackerNoon at: https://hackernoon.com/a-deep-dive-into-path-traversal-vulnerabilities. Discover how path traversal attacks work and learn effective strategies to secure your web applications against these hidden threats. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Yo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Amazon Is Investigating Perplexity Over Claims of Scraping Abuse
6:31
6:31
Play later
Play later
Lists
Like
Liked
6:31
AWS hosted a server linked to the Bezos family- and Nvidia-backed search startup that appears to have been used to scrape the sites of major outlets, prompting an inquiry into potential rules violations. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy SpokenLayer
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Downfall of LockBit, with Jon DiMaggio
25:55
25:55
Play later
Play later
Lists
Like
Liked
25:55
Jon DiMaggio is the chief security strategist at Analyst1 and has over 16 years of experience hunting, researching, and writing about advanced cyber threats. In 2022, Jon’s authored his first book, “The Art of Cyberwarfare,” which earned him the prestigious SANS Difference Makers Award, solidifying his status as a thought leader in the industry. Th…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CYFIRMA Research: Lumma Stealer-Tactics, Impact, and Defense Strategies
3:27
3:27
Play later
Play later
Lists
Like
Liked
3:27
Cyfirma research team has examined a variant of Lumma Stealer malware, and this report provides a comprehensive analysis of this advanced information-stealing malware, explores the tactics employed by threat actor to evade detection on the system and over the network, as well as their techniques for concealing malicious code and activities. Lumma S…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Security Today, July 1, 2024 - A critical patch for GitLab
5:19
5:19
Play later
Play later
Lists
Like
Liked
5:19
This episode reports on new reports on vulnerabilities and software supply chain securityBy Howard Solomon
…
continue reading
Ismael Valenzuela, Vice President Threat Research & Intelligence, from Blackberry Threat Research and Intelligence team is discussing their work on "Transparent Tribe Targets Indian Government, Defense, and Aerospace Sectors Leveraging Cross-Platform Programming Languages." BlackBerry has identified Transparent Tribe (APT36), a Pakistani-based adva…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Security Today, Week in Review for week ending Friday, June 28, 2024
25:53
25:53
Play later
Play later
Lists
Like
Liked
25:53
This episode features a discussion on the latest MOVEit vulnerability, a report on recruiting cybersecurity pros and how an API coding error is being blamed for a large cyber breach in AustraliaBy Howard Solomon
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Implications of Generative AI on Digital Identity, Brand Protection, and Content Marketing: A Philosophical and Sociological Reflection | A Musing On Society & Technology with Marco Ciappelli and TAPE3 ...
10:01
10:01
Play later
Play later
Lists
Like
Liked
10:01
This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence. Enjoy, think, share with others, and subscribe to the "Musing On Society & Technology" newsletter on LinkedIn. Sincerely, Marco Ciappelli and TAPE3 ________ Marco Ciappelli is the host of the Redefining Society Podcast, part of the…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Belltown Hellcat finds himself in hot water
12:24
12:24
Play later
Play later
Lists
Like
Liked
12:24
For months, one creature of the night has been drawing the fascination and exasperation of city leaders, police officers, and residents of one of Seattle’s trendiest neighborhoods. Some call him The Belltown Hellcat. Maybe you’ve caught a glimpse of his souped-up 2023 Dodge Charger Hellcat zipping by, or the car’s revving and backfiring has kept yo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
From Theory to Process to Practice: Cracking Mobile and IoT Security and Vulnerability Management | An OWASP AppSec Global Lisbon 2024 Conversation with Abraham Aranguren | On Location Coverage with Sean ...
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08
Guest: Abraham Aranguren, Managing Director at 7ASecurity [@7aSecurity] On LinkedIn | https://www.linkedin.com/in/abrahamaranguren/ ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | https://www.itspmagazine.com/sean-martin Mar…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Book | Cybersecurity Law Fundamentals | Defining 'Reasonable Cybersecurity': A Legal Perspective | A Conversation with Author, Jim Dempsey | Redefining CyberSecurity and Society with Sean Martin and Marco ...
47:02
47:02
Play later
Play later
Lists
Like
Liked
47:02
Guest: Jim Dempsey, Senior Policy Advisor, Stanford Program on Geopolitics, Technology and Governance [@FSIStanford]; Lecturer, UC Berkeley Law School [@BerkeleyLaw] On LinkedIn | https://www.linkedin.com/in/james-dempsey-8a10a623/ ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Cyb…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Can Your Java Cryptography Architecture Survive a Quantum Attack?
12:29
12:29
Play later
Play later
Lists
Like
Liked
12:29
This story was originally published on HackerNoon at: https://hackernoon.com/can-your-java-cryptography-architecture-survive-a-quantum-attack. Learn how to optimize Java Cryptography Architecture (JCA) to withstand quantum computing threats, with best. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can a…
…
continue reading
Meta may block news sites on Facebook in Australia, YouTube is working on plans for new YouTube Premium subscriptions, and the EU’s competition chief says Apple knows 100% that it is disabling competition. MP3 Please SUBSCRIBE HERE. You can get an ad-free feed of Daily Tech Headlines for $3 a month here. A special thanks to all our supporters–witho…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Global friends, local tensions – the two sides of Ruto’s Kenya
30:45
30:45
Play later
Play later
Lists
Like
Liked
30:45
A little over a month ago, President William Ruto of Kenya made a triumphant state visit to the White House. During the visit, Kenya was designated a major NATO ally – the first in sub-Saharan Africa – and a few weeks later, Ruto attended the G7 Summit in Italy. But his government faces turmoil at home. Proposals for tax rises have sparked a wave o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
From Air Force OSI Special Agent to Cybersecurity SVP: Wendi Whitmore's Leadership Journey Wend | The Leadership Student Podcast with MK Palmore
33:45
33:45
Play later
Play later
Lists
Like
Liked
33:45
Guest: Wendi Whitmore, Palo Alto Networks [@PaloAltoNtwks] On Twitter | https://x.com/wendiwhitmore On LinkedIn | https://www.linkedin.com/in/wendiwhitmore2/ ______________________ Host: MK Palmore, Host of The Leadership Student Podcast On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/mk-palmore _____________________…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Surprise! The Latest ‘Comprehensive’ US Privacy Bill Is Doomed
10:22
10:22
Play later
Play later
Lists
Like
Liked
10:22
Gutted of civil rights protections by Democrats to woo pro-business Republicans, the American Privacy Rights Act was pulled from a key congressional hearing—and appears unlikely to receive a full vote. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy SpokenLayer
…
continue reading