show episodes
 
Artwork
 
A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
  continue reading
 
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
  continue reading
 
Artwork
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
Mac Admins Podcast

Mac Admins Podcast LLC

Unsubscribe
Unsubscribe
Weekly
 
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
  continue reading
 
Artwork

1
SpyTalk

SpyTalk, Jeff Stein

Unsubscribe
Unsubscribe
Monthly+
 
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
  continue reading
 
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
  continue reading
 
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the trends that truly matter. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, end-to ...
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman and Paul Robichaux, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
  continue reading
 
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: List ...
  continue reading
 
Welcome to covert actions and national security podcast. Welcome to covert and national security podcast. A podcast where we discuss a spectrum of activities concerning covert operations, intelligence, counterintelligence, unconventional warfare, assassination issues, espionage spy craft technology and more. Enter the operational world with Dr. Carlos
  continue reading
 
Artwork

1
Mean Time To Insight

Enterprise Management Associates + APMdigest

Unsubscribe
Unsubscribe
Monthly
 
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Stories of resilience, grit, and triumph over trauma from Veterans and First responders. Hosted by Sara Correl from "The Power of your Story." A limited series from Security Halt Media.
  continue reading
 
Artwork
 
Conversations about contemporary warfare and what it means for the future of fighting. Each episode will look at how wars are being fought around the world today, whether (and why) this is important, and what it all might mean for militaries and national security in the coming decades.
  continue reading
 
Exceptional advice for using technology to streamline operations, improve marketing, gain financial security, and enjoy greater freedom. Increasingly solo lawyers can be more efficient and cost-effective than larger firms. That's because of modern technology. But you have to use it better than most lawyers do. And that's what this podcast will help you do.
  continue reading
 
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
  continue reading
 
Artwork

1
Cloud Security Podcast

Cloud Security Podcast Team

Unsubscribe
Unsubscribe
Weekly
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
  continue reading
 
From the law enforcement and security organization you’ve never heard of comes a podcast revealing some of the greatest stories in America’s history. Hear from special agents, engineers, technicians, and others who belong to the Diplomatic Security Service as they give Americans insight into what really happened. From the terrorist bombings in East Africa to discovering bugs buried in U.S. embassy walls to dismantling a major sex trafficking network in New York City, listen along as we peel ...
  continue reading
 
Artwork
 
The only Mental Health podcast that shares honest and authentic accounts of living with mental health issues, that's also hosted by individuals fighting the same fight you are!Providing information and resources for help with a heavy dose of humor and entertainment. Helping you find hope and the strength to fight on.
  continue reading
 
Artwork

1
Surveillance Report

Techlore & The New Oil

Unsubscribe
Unsubscribe
Weekly+
 
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
IT talk with a healthy dose of empathy: Hosts Matt Yette & Matt Cozzolino draw on their combined 40+ years of infrastructure experience as they discuss the ever-changing technology landscape – from virtualization to storage, security to networking, and everything in between.
  continue reading
 
Artwork

1
Field Notes

EsriFieldNotes

Unsubscribe
Unsubscribe
Monthly
 
The Field Notes Podcast is focused on communicating and exploring all things Field Operations at Esri. We’ll explore a variety of topics that showcase the range and use of mobile GIS technology. The ability to take your data, forms, and maps into the field using a cellphone or tablet has changed the way organizations have approached field workflows—and we want to dive into as many as possible!
  continue reading
 
I was a morbidly obese heart surgeon. Throughout high school, college, med school and surgical training, I followed the U.S. dietary guidelines for both diet and exercise. Yet nothing I did kept the weight off. I just kept getting bigger and bigger. Each day in the operating theater I would split open the chests of people just like me. I knew I was heading for the operating table myself if I didn't find solutions that worked. In 2016, I finally found a way to lose 100 pounds and keep it off. ...
  continue reading
 
Artwork

1
Security Cocktail Hour

Joe Patti and Adam Roth

Unsubscribe
Unsubscribe
Monthly+
 
Security veterans Joe Patti and Adam Roth share cyber security insights from their virtual bar stools. Join Joe and Adam, along with a diverse lineup of industry insiders, for a view into how the professionals see the security issues that impact all of us. Tune in for engaging discussions, expert analyses, and a behind-the-scenes look into the cybersecurity world. Video on Spotify and YouTube; audio on all other podcasting platforms. Reach us at feedback@securitycocktailhour.com or @SecCockt ...
  continue reading
 
"Building the Base" - an in-depth series of conversations with top entrepreneurs, innovators, and leaders from tech, financial, industrial, and public sectors. Our special guests provide their unique perspectives on a broad selection of topics such as: shaping our future national security industrial base, the impact of disruptive technologies, how new startups can increasingly contribute to national security, and practical tips on leadership and personal development whether in government or ...
  continue reading
 
"Secured" is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful ...
  continue reading
 
Artwork
 
Host Jon Olson, US Navy (Ret.) Interviews different experts to learn about current and historical events with a focus on national security. Topic's include: the economy, climate change, cyber security, nuclear weapons, intelligence operations, and more. New episodes released Wednesdays.
  continue reading
 
Join the Intego Mac security experts for the latest Apple news, industry opinions, and a splash of security advice in our easy-to-digest, entertaining, and informative podcast series. Hosted by Kirk McElhearn and Josh Long.
  continue reading
 
Artwork

1
At The Boundary

Global and National Security Institute

Unsubscribe
Unsubscribe
Weekly
 
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
  continue reading
 
Artwork

51
Day Two Cloud

Packet Pushers

Unsubscribe
Unsubscribe
Monthly+
 
Join hosts Ned Bellavance and Kyler Middleton as they dive deep into the challenges of cloud operations from the perspective of seasoned practitioners. You'll hear from expert guests—technical leaders, trainers, and consultants with years of hands-on experience—discussing the nuances of modern cloud environments. From AWS to Azure, networking to security, automation to DevOps, each weekly episode equips you with the insights to confidently address tech and business challenges such as resilie ...
  continue reading
 
"DevOps Chats" by Techstrong Group, the force behind industry-leading platforms like DevOps.com, Cloud Native Now, Security Boulevard, Techstrong.ai, DigitalCxO, and Techstrong.TV, is your premier destination for all things DevOps. Hosted by industry veterans Alan Shimel and Mitchell Ashley, this podcast series delves deep into the world of DevOps, bringing you the latest trends, innovative strategies, and insightful discussions that matter. Each episode of "DevOps Chat" is a journey through ...
  continue reading
 
If you wish to know what it’s really like to make the life and death decisions portrayed in the movies by James Bond or on TV by Homeland's, Cary Matherson, then Black Spy Podcast is the show for you. If you're interested in the clandestine world of secret intelligence, espionage, counter-terrorism and national security, then this definitely your must listen Podcast! Every week, along with a different successful or famous guest who's always been interested in the secret services, ex officer, ...
  continue reading
 
Loading …
show series
 
From satellite imagery to G.P.S.-guided navigation, intelligence gathered from space has long facilitated military operations. But after space was declared a warfighting domain, intelligence agencies are now shifting their focus to supporting operations in space. For the United States Space Force, this shift is exemplified by the evolving mission c…
  continue reading
 
Christina Shannon is an accomplished Chief Information Officer (CIO) in the CPG chemical manufacturing sector. With a career spanning over two decades, she transitioned from senior security leadership roles in Fortune 100 companies to executive technology leadership positions in mid-to-large-sized, private equity-owned firms. Christina's journey in…
  continue reading
 
Send us a Text Message. Today's guest is Seth Ewing, the heart and soul behind Operation Tabletop, a nonprofit dedicated to bringing veterans together through the magic of tabletop gaming. From his roots in the Shenandoah Valley to his enlistment in the Air Force, Seth's journey is marked by resilience and a love of gaming. Discover how limited Wi-…
  continue reading
 
What if the way we source our food is putting our health and national security at risk? Bold statement, but Texas Slim, a pivotal figure in the Beef Initiative, argues that our centralized food systems are doing just that. Join us as we reconnect with Texas Slim, who’s been on a mission across the U.S. and beyond, advocating for regenerative beef a…
  continue reading
 
How can AI impact Cloud Security Operations? Ashish sat down with Ely Kahn, VP of Cloud Security and AI at SentinelOne to talk about the evolving landscape of cloud security and the future of Security Operations Centers (SOC). Ely spoke about the shift from centralized to decentralized SOC operations, the increasing complexity in cloud security and…
  continue reading
 
We usually talk about information technology, but the real world runs on power, water and factories – and protecting them from attack is a whole different ballgame. Robert Lee, CEO of Dragos, gives us a fascinating introduction to Operational Technology (OT) cyber security. Listen in to learn about how Robert and colleagues secure the infrastructur…
  continue reading
 
Q&A184: How can we trust FOSS? Are there any apps you shouldn't trust with FOSS? What are our privacy & security thoughts on biohacking? How do we approach uncertainy in threat modeling? How do ISPS collect data? Join our next Q&A on Patreon: https://www.patreon.com/collection/415684?view=expanded** Welcome to the Surveillance Report - featuring Te…
  continue reading
 
Service Level Objectives (SLOs) are a set of reliability measurements for customer or user expectations of services; in other words, are people having a good experience with your application or service? Today’s Day Two Cloud explores SLOs, the relevant metrics, and how to measure them. We also talk about how SLOs are a cross-discipline objective...…
  continue reading
 
Angeline Corvaglia is the Founder of Data Girl and Friends, where she is committed to helping young people thrive in an AI-driven digital world. Her strategy encompasses three key pillars: privacy and security awareness, critical thinking skills, and balancing the benefits and risks of AI. Angeline is on a mission to equip young minds with the tool…
  continue reading
 
On this week’s show, Patrick Gray and Adam Boileau discuss the week’s security news, including: Widely used polyfill javascript gets hijacked by its new owners MacOS supply chain disaster bullet dodged That OpenSSH remote code exec OH MY <3 Entrust gets its CA business kicked to the kerb by Google South Korean telco intentionally viruses 600k custo…
  continue reading
 
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
  continue reading
 
Modern lawyers need new workspaces optimized for remote work, virtual collaboration, and asynchronous communication. In this episode, you'll find out which two software tools are the best online workspaces and why popular cloud-based practice management software does not compete with these new options. In this episode, you will hear: Modern online …
  continue reading
 
Amanda Decker, an experienced nurse practitioner, is revolutionizing metabolic health. She shares her journey from childhood obesity and psoriasis to discovering low carb lifestyle benefits. Decker discusses challenges implementing this approach in traditional healthcare, where medication is often prioritized over lifestyle changes. Her determinati…
  continue reading
 
Trust is a subject we regularly discuss with our guests. How do we trust our users, how do we trust the software they want to run, how do we trust the devices they are on. In the modern world where you can’t believe everything a computer or mobile device is telling you about itself, how do we make sure that the devices we are managing and granting …
  continue reading
 
Text the ATB Team! We'd love to hear from you! 🎙️ Join us on "At the Boundary" as Dr. Caitlin Lee breaks down the "Countering CCP Drones Act" currently being considered in Congress. This legislation would ban drones from the Chinese-owned technology company, DJI, from operating in the U.S., which would have a massive impact on the personal and prof…
  continue reading
 
Send us a Text Message. How did a casual joke in a group chat evolve into the lowercase dooms block party, an event with a profound mission? Join us as we sit down with Luke Cavanaugh, Travis Thompson, and Kevin "BK" Shears from Snake Farm to uncover the origins of this community-driven initiative. This episode sheds light on how the block party ai…
  continue reading
 
What drives a man from the path to priesthood to the heart of a war zone? Join us as we sit down with Floyd "Shad" Meshad, a remarkable figure whose journey defies all expectations. From his early days in a devout Catholic family in Birmingham, Alabama, to his transformative role as one of the first mental health officers in Vietnam, Shad's story i…
  continue reading
 
Episode 184: Local accounts on Windows just got more difficult to create, a new red flag about Telegram security, updates from Mullvad, a ton of data breaches, and more! Support us on Patreon Support us on Liberapay Monero: 46iGe5D49rpgH4dde32rmyWifMjw5sHy7V2mD9sXGDJgSWmAwQvuAuoD9KcLFKYFsLGLpzXQs1eABRShm1RZRnSy6HgbhQD Timestamps Sources 00:00 Intro…
  continue reading
 
Conspiracy Theories - Or an epithet to hide used to hide inconvenient truths? (Part 2) Black Spy Podcast Season 15, Episode 0007 This week's Black Spy Podcast continues looking into the phenomenon of conspiracy theories and asks the question, are the powers that be attempting to fool us by labelling issues of covert manipulation or control, as theo…
  continue reading
 
The boys return to talk about home labs. Why you need one, why you don't, and what we use ours for. ==== Special Thanks to Our Patrons! ==== https://thelinuxcast.org/patrons/ ===== Follow us 🐧🐧 ====== MERCH - https://shop.thelinuxcast.org Discord - https://discord.gg/62RPDBMH8W Odysee - https://odysee.com/$/invite/@thelinuxcast:4 Mastodon- https://…
  continue reading
 
Links Coalition Navies During the Korean War: Understanding Combined Operations, edited by Ian Bowers, Routledge, 2024. Sea Control 231 – Not So Disruptive After All with Dr. Ian Bowers and Dr. Sarah Kirchberger, CIMSEC, March 11, 2021.By Dr. Deborah Sanders, Dr. Ian Bowers, Jared Samuelson
  continue reading
 
By Jared Samuelson Dr. Ian Bowers and Dr. Deborah Sanders join us to discuss coalition navy operations during the Korean war. Ian is Senior Research Scientist at the Norwegian Institute for Defence Studies. Deborah is a Professor of Contemporary conflict and strategy at the Defence Studies Department at the Defence Academy of the United Kingdom. … …
  continue reading
 
When former Google CEO Eric Schmidt launched the bipartisan Special Competitive Studies Project – known as SCSP - in 2021, he did it with the intention of bringing together the best and brightest minds in technology to make recommendations that would strengthen America’s long-term competitiveness in an increasingly complex world – a world where tec…
  continue reading
 
The second LUG for this month is in the books. If you'd like to join in for either of the LUGs next month, join the Discord server for more info! https://discord.gg/yAH4w8tZ2k https://thelinuxcast.org/contact https://patreon.com/thelinuxcast Thanks to all of my patrons! https://thelinuxcast.org/patrons…
  continue reading
 
In this episode, Geoff and Skyler are joined by special guests Keith Koehne and Matt Miller from Paradigm Cyber Ventures to discuss their mission to integrate cybersecurity into high school industrial tech education. Through this program, teachers at high schools around the U.S. are trained to deliver an in-depth cybersecurity curriculum to their s…
  continue reading
 
On this edition of The Checklist by SecureMac: The Commerce Department is kicking Kaspersky out of the U.S. Another shoe has dropped in the Change Healthcare hack And an Apple Vision Pro bug to unleash virtual bugs Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checklist@Securemac.com…
  continue reading
 
Overview A look into CISA’s Known Exploited Vulnerability Catalogue is on our minds thisweek, plus we look at vulnerability updates for gdb, Ansible, CUPS, libheif,Roundcube, the Linux kernel and more. This week in Ubuntu Security Updates 175 unique CVEs addressed [USN-6842-1] gdb vulnerabilities (01:10) 6 CVEs addressed in Xenial ESM (16.04 ESM), …
  continue reading
 
Dive into the world of IT tech with the Hands-On IT podcast, hosted by Landon Miles. Each episode uncovers the intricacies of IT technologies, real-life use cases, and practical guidance on their application. Tune in for your weekly dose of tech trends, user-friendly tutorials, and innovative solutions to transform your IT experience. This podcast …
  continue reading
 
Reuters reporter Aram Roston with Jeff Stein on the Proud Boys resurgence. Aram Roston https://twitter.com/aramroston https://www.reuters.com/authors/aram-roston/ Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow SpyTalk on Twitter: https://twitter.com/talk_spy Subscribe to SpyTalk on Substack https://www.spytalk.co/ Take our liste…
  continue reading
 
This is a sponsored Soap Box edition of the Risky Business podcast. Abhishek Agrawal is the CEO and co-founder of Material Security, an email security company that locks down cloud email archives. Attackers have been raiding mailspools since hacking has existed, and with those mailspools now in the cloud with services like o365 and Google Workspace…
  continue reading
 
When studying cyberoperations, it’s easy to become enamored with state-backed hackers. Russian and Chinese operations have done much to shape our understanding of how power is exercised online, but it’s not clear that the intense attention dedicated to such operations is well-placed. Amid the current epidemic of ransomware, criminal hacking groups …
  continue reading
 
In this episode of the Unsecurity Podcast, the guys sit down with Michael Kennedy of Ostra to discuss burnout and share their personal experiences and strategies for preventing and managing work-related stress. Please send any questions, comments, or feedback to unsecurity@protonmail.com. About FRSecure https://frsecure.com/ FRSecure is a mission-d…
  continue reading
 
Mandiant Consultants Trisha Alexander, Muhammed Muneer, and Pat McCoy join host Luke McNamara to discuss Mandiant's recently launched services for securing AI. They discuss how organizations can proactively approach securing the implementation of AI workloads, red-team and test these security controls protecting generative AI models in production, …
  continue reading
 
By Jared Samuelson Dr. Bec Strating and Dr. Joanne Wallis join the program to discuss Australian security and their new book, Girt By Sea: Re-Imagining Australia’s Security. Bec is the director of La Trobe Asia and a professor in politics and international relations at La Trobe University. Joanne is a professor of international security at … Contin…
  continue reading
 
On the Practical 365 podcast this week, Rich Dean and I tackle a hot topic that's got the tech world buzzing - Microsoft's alleged security misstep that may have paved the way for the SolarWinds hack. We also chat with Julian Stephan from Quest Software, who shares some valuable insights on Active Directory modernization. Want to stay up to date on…
  continue reading
 
Links 1. Girt By Sea: Re-Imagining Australia’s Security, by Rebecca Strating and Joanne Wallis, La Trobe University Press, 2024. 2. Sea Control 430 - Australian Constabulary Missions with Sean Andrews, CIMSEC, May 11, 2023. 3. Sea Control 508 - Australian Capabilities in the Littoral with Jennifer Parker and Peter Jones, CIMSEC, April 6, 2024. 4. S…
  continue reading
 
Apple drops one of its financial services that it only introduced last year. More countries can now participate in Apple's self-service repair program. Installed Chrome browser extensions could be more dangerous than Google is letting on. And in a new white paper, Apple declares its dedication to long-range privacy and security using some "squishy"…
  continue reading
 
This week Joe and Dave share some interesting follow up from a few episodes ago where Dave shared his love for baby grand pianos and how scammers we're using that to lure people into traps. Listener George wrote in to share about a show on UK Channel 4, called "The Piano," it's a music competition where visitors play a public piano in a train stati…
  continue reading
 
This Episode we are joined by Michael Walford-Williams, a consultant specialising in operational resilience and third-party risk management. His consultancy Westbourne Consultancy Limited sees him working for various clients providing risk management services for the financial service industry. In this episode, we look at how risk appetite evolves …
  continue reading
 
Q&A183: Does the rise of RCS change our opinions on SMS? Aside from data removal and package managers, what are some helpful automations? What's the best workflow for VPN split tunneling? Join our next Q&A on Patreon: https://www.patreon.com/collection/415684?view=expanded** Welcome to the Surveillance Report - featuring Techlore & The New Oil to k…
  continue reading
 
Your digital identity is more than just your username and password. In fact, as AI continues to evolve, how we define identity online is changing, and so is how we prove who we are. In this episode, we delve into the future of digital identity with Venkat Raghavan, the CEO of Stack Identity and a seasoned expert in the field. Venkat breaks down the…
  continue reading
 
Loading …

Quick Reference Guide