Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
Learn the latest life hacking updates in the tech world.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Hacks, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
…
continue reading
Lighthearted security advice and banter from 1Password and guests.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Every Friday and Sunday, Slate’s popular daily news podcast What Next brings you TBD, a clear-eyed look into the future. From fake news to fake meat, algorithms to augmented reality, Lizzie O’Leary is your guide to the tech industry and the world it’s creating for us to live in.
…
continue reading
Modem Mischief tells the true stories of the outlaws of cyberspace. Hackers, dark web lurkers and cybercrime perpetrators of the digital underground are explored in this true crime series.
…
continue reading
AmateurLogic.TV Audio only downloads.
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
Tech News Briefing is your guide to what people in tech are talking about. Every weekday, we’ll bring you breaking tech news and scoops from the pros at the Wall Street Journal, insight into new innovations and policy debates, tips from our personal tech team, and exclusive interviews with movers and shakers in the industry. Hosted by Zoe Thomas
…
continue reading
Decoder is a show from The Verge about big ideas — and other problems. Verge editor-in-chief Nilay Patel talks to a diverse cast of innovators and policymakers at the frontiers of business and technology to reveal how they’re navigating an ever-changing landscape, what keeps them up at night, and what it all means for our shared future.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
…
continue reading
Download This Show is your weekly guide to the world of media, culture, and technology. From social media to gadgets, streaming services to privacy issues. Each week Marc Fennell and a team of people far smarter than him (his words, not ours) take a fun deep dive into how technology is reshaping our lives.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
Hacked Off demystifies the world of cybersecurity. Hosted by Secarma's Managing Director, Holly Grace Williams, it features weekly interviews delving beneath the headlines of the latest hacks, breaches and vulnerabilities, providing expert advice on how to stay safe online. This podcast is brought to you by global cybersecurity and penetration testing company, Secarma.
…
continue reading
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
…
continue reading
A monthly podcast covering Ham Radio equipment, events and personalities.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
"What the Hack with Adam Levin" is the award-winning weekly true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Podcast by RailsFactory
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
This podcast contains security topics discussed by the Secure Ideas LLC. team.
…
continue reading
Welcome to the cozy corner of the tech world where ones and zeros mingle with casual chit-chat. Datatopics Unplugged is your go-to spot for relaxed discussions around tech, news, data, and society. Dive into conversations that should flow as smoothly as your morning coffee (but don't), where industry insights meet laid-back banter. Whether you're a data aficionado or just someone curious about the digital age, pull up a chair, relax, and let's get into the heart of data, unplugged style!
…
continue reading
Join lively and organic conversations about today's most relevant topics, analyzed through the human, real and unfiltered lens of your favorite entrepreneurs, athletes, musicians, artists, creators, politicians, investors, and crypto geniuses. Hopefully, this podcast helps you form the opinions, mindset and habits you need to build the life you want. Thank you for listening.
…
continue reading
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
Tech-Hack's podcast By Nyce Saouth it's 30 min of the best Underground sounds of the world, every week ! Join us on Facebook : http://www.facebook.com/#!/pages/Nyce-Saouth/75758301620
…
continue reading
A weekly digital marketing podcast with listeners in over 190 countries worldwide.The Digital Marketing Podcast combines interviews with global experts, together with the latest news, tools, strategies and techniques to give your digital marketing the edge. Perfect for your daily commute, the podcast aims to be both entertaining and informative. Produced by Target Internet and hosted by Daniel Rowles, Ciaran Rogers and Louise Crossley. Find out more at targetIniernet.com/podcasts
…
continue reading
Hackaday Editors take a look at all of the interesting uses of technology that pop up on the internet each week. Topics cover a wide range like bending consumer electronics to your will, designing circuit boards, building robots, writing software, 3D printing interesting objects, and using machine tools. Get your fix of geeky goodness from new episodes every Friday morning.
…
continue reading
A thrice-weekly news show about tech + gaming culture
…
continue reading
Welcome to NADDPOD! Join Dungeon Master Brian Murphy as he leads players Emily Axford, Caldwell Tanner and Jake Hurwitz on a comedic, actual-play adventure through the realms of Bahumia and Beyond. The show also features a score composed and performed by Emily Axford. This team has created a variety of D&D campaigns, as well as numerous other series such as DUNGEON COURT and 8-BIT BOOK CLUB. They also occasionally hit the road and roll dice live on stage.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
1
From Hack to Sale: The Journey of Stolen Data
11:24
11:24
Play later
Play later
Lists
Like
Liked
11:24
This story was originally published on HackerNoon at: https://hackernoon.com/from-hack-to-sale-the-journey-of-stolen-data. Have you ever wondered what happens to stolen data when it goes to the Dark web? or how does someone purchase stolen data? Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also che…
…
continue reading
1
TNB Tech Minute: U.S. Prosecutors Probe Hacking-for-Hire Operation
3:01
3:01
Play later
Play later
Lists
Like
Liked
3:01
Plus, why some artificial intelligence workers say they’re afraid of voicing concerns. And Databricks is buying data-management startup Tabular in a bid for AI customers. Julie Chang hosts. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The Wall Street Journal
…
continue reading
1
Pathfinder Two-Shot: Ballad of the Twin Flames (Part 2)
1:55:49
1:55:49
Play later
Play later
Lists
Like
Liked
1:55:49
Our Heroes (AKA "The Twin Flames") delve deeper beneath Otari in order to discover the true nature of the menace that plagues it! Hellbiscuit swings for the seats, Krudbert's faith is rewarded and Cinnamon embraces a new role as the 2-Crew's Pathfinder Perusal continues! CREDITS Mixing and Sound Design - Daniel Ramos (@Schubirds on Twitter & @Dr.Sc…
…
continue reading
1
The Cybersecurity Market Gets Some New Quirks and Features - ESW #364
1:08:15
1:08:15
Play later
Play later
Lists
Like
Liked
1:08:15
We start off discussing the latest round of fundings, centered largely around data security and securing LLM use. This dovetails into a discussion about marketing language and how difficult it can be for buyers to work out what the latest round of early stage startups are doing. Next, we discuss Cloudflare and Bugcrowd's acquisitions, as well as Sy…
…
continue reading
1
Interest in Identity Security is Spiking - John Shier, Will Lin, Christopher Harrell, Jim Broome - ESW #364
2:31:08
2:31:08
Play later
Play later
Lists
Like
Liked
2:31:08
"Identity security has been around forever though", you might be thinking. Allow me to clarify. Identity is the largest cybersecurity product category, but most of it is focused on identity governance, authentication, multi-factor, etc. Very little of it is focused on operational identity security. It's this trend, where we recently (within the las…
…
continue reading
For years, Apple played it safe with generative artificial intelligence. Now, the company is set to unveil new AI features. WSJ reporter Aaron Tilley joins host Zoe Thomas to explain the iPhone maker’s moves. Plus, the etiquette for phone calls has changed. WSJ’s Katherine Bindley explains why some people want a text first. Sign up for the WSJ's fr…
…
continue reading
How well is the Biden administration coaxing semiconductor companies to build their chips in the United States? Compared to Taiwan, South Korea, Japan…or even mainland China, things are just okay. Guest: Asa Fitch, reporter for the Wall Street Journal, covering the semiconductor industry. Want more What Next TBD? Subscribe to Slate Plus to access a…
…
continue reading
1
Directly From The CORO Security Modular Booth: Expansion Into The European Market | A Brand Story Conversation From InfoSecurity Europe 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean ...
20:48
20:48
Play later
Play later
Lists
Like
Liked
20:48
Here we are, once again from the bustling show floor at Infosecurity Europe 2024 in London, situated at the Excel Centre. Sean Martin of ITSP Magazine is your host, and he's joined by Dror Liwer, co-founder of CORO Security. Both are excited to dive deep into how CORO is expanding its focus into the European market. Day Three: Nonstop Conversations…
…
continue reading
1
A Conversation with with Abhishek Agrawal from Material Security
54:12
54:12
Play later
Play later
Lists
Like
Liked
54:12
In this conversation, I speak with Abhishek Agrawal, co-founder and CEO of Material Security. We talk about: - Material's Security innovative approach to email security by not just preventing unauthorized access but also containing damage from potential breaches. -Abhishek's background in data infrastructure at Dropbox and how product mangers can b…
…
continue reading
1
UL NO. 435: Making New Things is Post-AI Safety
23:05
23:05
Play later
Play later
Lists
Like
Liked
23:05
Jason Haddix's AI Course, Microsoft Recall analysis, exercise erasing trauma, AI and the jobs problem… Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler See yo…
…
continue reading
1
TNB Tech Minute: Meta Is Bringing Chatbots to WhatsApp
2:32
2:32
Play later
Play later
Lists
Like
Liked
2:32
Plus, an advocacy group has filed privacy complaints about Meta’s artificial intelligence project in Europe. And regulators open an antitrust probe into Microsoft’s deal with an AI startup. Zoe Thomas hosts. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The Wall Street Journal
…
continue reading
1
Whose Vulnerability Is It Anyway? - Josh Bressers - PSW #831
2:43:47
2:43:47
Play later
Play later
Lists
Like
Liked
2:43:47
Josh comes on the show to discuss all things related to vulnerability tracking and scoring, including the current issues with various systems and organizations including NIST, CVE, Mitre, CVSS, NVD, and more! Segment Resources: NVD blog post Josh wrote: https://anchore.com/blog/navigating-the-nvd-quagmire/ Josh's Latest post: https://opensourcesecu…
…
continue reading
1
Whose Vulnerability Is It Anyway? - Josh Bressers - PSW #831
2:43:47
2:43:47
Play later
Play later
Lists
Like
Liked
2:43:47
Josh comes on the show to discuss all things related to vulnerability tracking and scoring, including the current issues with various systems and organizations including NIST, CVE, Mitre, CVSS, NVD, and more! Segment Resources: NVD blog post Josh wrote: https://anchore.com/blog/navigating-the-nvd-quagmire/ Josh's Latest post: https://opensourcesecu…
…
continue reading
1
Meet Phoenix Security | A Brand Story Conversation From Infosecurity Europe 2024 | A Phoenix Security Story with Francesco Cipollone | On Location Coverage with Sean Martin and Marco Ciappelli
20:59
20:59
Play later
Play later
Lists
Like
Liked
20:59
In the dynamic and ever-changing world of cybersecurity, it is crucial to remain at the forefront of addressing vulnerabilities, implementing innovative solutions, and getting to know companies that are making a differences in this industry. At Infosecurity Europe 2024 in London, Sean Martin sits down with Francesco Cipollone, co-founder of Phoenix…
…
continue reading
1
Interest in Identity Security is Spiking - Will Lin - ESW #364
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05
"Identity security has been around forever though", you might be thinking. Allow me to clarify. Identity is the largest cybersecurity product category, but most of it is focused on identity governance, authentication, multi-factor, etc. Very little of it is focused on operational identity security. It's this trend, where we recently (within the las…
…
continue reading
1
Routers, Breaches, and Vulnerabilities - PSW #831
1:36:11
1:36:11
Play later
Play later
Lists
Like
Liked
1:36:11
This week: Take on the upstream, how hard is it to patch end-of-life software, hack millions of routers, take over millions of routers, 0-days, and no responses, hack Taylor Swift wristbands, can you detect that covert channel?, and breach reports from Ticketmaster, Snowflake, Santander, and TikTok, and top it all of with C-level DNS servers droppi…
…
continue reading
CSAC recommends key changes to the Joint Cyber Defense Collaborative. Cloud vendor Snowflake says single-factor authentication is to blame in their recent breach. Publishers sue Google over pirated ebooks. The FBI shares LockBit decryption keys. V3B is a phishing as a service campaign targeting banking customers. Commando Cat targets Docker servers…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/what-is-fraudgpt. Hackers have their own version of ChatGPT: a chatbot that can help with malware and phishing called FraudGPT. Here's everything you need to know. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check ex…
…
continue reading
1
Whose Vulnerability Is It Anyway? - Josh Bressers - PSW #831
1:07:52
1:07:52
Play later
Play later
Lists
Like
Liked
1:07:52
Josh comes on the show to discuss all things related to vulnerability tracking and scoring, including the current issues with various systems and organizations including NIST, CVE, Mitre, CVSS, NVD, and more! Segment Resources: NVD blog post Josh wrote: https://anchore.com/blog/navigating-the-nvd-quagmire/ Josh's Latest post: https://opensourcesecu…
…
continue reading
1
E74: Ethena Founder: Growing to a $10B Protocol Valuation in 1 Year
1:02:22
1:02:22
Play later
Play later
Lists
Like
Liked
1:02:22
Ethena Founder: Growing to a $10B Protocol Valuation in 1 Year In this episode, we sit down with Guy Young, the founder of Ethena, to dive deep into the world of crypto and DeFi. Ethena is a groundbreaking synthetic dollar protocol built on Ethereum, and it’s shaking up the space with a crypto-native solution that doesn’t rely on traditional bankin…
…
continue reading
1
Why the video game industry is such a mess
37:51
37:51
Play later
Play later
Lists
Like
Liked
37:51
The art of video game design is flourishing, but it feels like a really grim time to be in the business of making and distributing games. Huge global publishers and tiny indie studios alike are facing huge financial pressures, and it doesn’t seem to be letting up anytime soon. So where did this enormous pressure come from, if consumer interest is h…
…
continue reading
1
#53 Can AI Replace Human Creativity? & Latest Tech Updates (Meta, Klarna GenAI, Apple-OpenAI Partnership & More)
1:21:52
1:21:52
Play later
Play later
Lists
Like
Liked
1:21:52
Welcome to the cozy corner of the tech world where ones and zeros mingle with casual chit-chat. Datatopics Unplugged is your go-to spot for relaxed discussions around tech, news, data, and society. Dive into conversations that should flow as smoothly as your morning coffee (but don't), where industry insights meet laid-back banter. Whether you're a…
…
continue reading
1
A Bug in Apple’s Parental Controls Created an X-Rated Loophole
12:59
12:59
Play later
Play later
Lists
Like
Liked
12:59
A bug in Apple devices lets children visit X-rated websites, even when parental controls were on. WSJ senior personal-tech columnist Joanna Stern joins host Julie Chang to discuss what the company is doing about it. Plus, some artificial intelligence systems are being trained to read emotions — but are they any good at it? WSJ contributor Lisa Feld…
…
continue reading
1
Spotting social engineering in the shadows.
1:01:21
1:01:21
Play later
Play later
Lists
Like
Liked
1:01:21
This week, we are joined by Dr. Chris Pierson CEO at Black Cloak, and he is talking about some of the social engineering attacks his team is tracking. Joe's story follows how Microsoft Threat Intelligence has observed the financially motivated cybercriminal group Storm-1811 misusing the client management tool Quick Assist in social engineering atta…
…
continue reading
1
Intel Lunar Lake, Google Issues, Win10 getting more features + more!
9:19
9:19
Play later
Play later
Lists
Like
Liked
9:19
Timestamps: 0:00 i keep hearing drums 0:08 Intel Lunar Lake 1:59 Google privacy, legal execs leave 3:22 Windows 10 getting new features? 5:20 QUICK BITS INTRO 5:25 Nvidia small form factor guidelines 5:59 Google WON'T confiscate your Pixel 6:37 London medical system under cyberattack 7:17 Meta training AI with user data 7:49 Zoom CEO: use AI to ski…
…
continue reading
Explore the latest in technology, social media, consumer electronics, digital culture and more.By ABC listen
…
continue reading
1
Crashing robo-taxis, and name-dropping rappers
36:28
36:28
Play later
Play later
Lists
Like
Liked
36:28
Drones, some coloured cardboard, and a piece of tinfoil may be all the kit you need to crash a robot-driven taxi, and a rapper is accused of using Justin Bieber's name to defraud a TV company. All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault. Warning…
…
continue reading
1
Randomly Rambling About Random Things, Including the Randomness of Randomware (Ransomware) | An Infosecurity Europe 2024 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli
13:36
13:36
Play later
Play later
Lists
Like
Liked
13:36
Randomly Rambling About Random Things, Including the Randomness of Randomware | An Infosecurity Europe 2024 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli WATCH THE VIDEO: https://youtu.be/ccKG5KUdEII ____________________________ Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity P…
…
continue reading
1
TNB Tech Minute: Nvidia Joins Apple and Microsoft in the $3 Trillion Club
2:35
2:35
Play later
Play later
Lists
Like
Liked
2:35
Plus, TSMC-backed Vanguard and NXP plan $7.8 billion joint venture to build a chip plant in Singapore. And we exclusively report that Amazon is poised to win big from the NBA’s TV broadcast rights deal. Danny Lewis hosts. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The Wall Street Journal
…
continue reading
OpenAI insiders describe a culture of recklessness and secrecy. Concerns over Uganda’s biometric ID system. Sophos uncovers a Chinese cyberespionage operation called Crimson Palace. Poland aims to sure up cyber defenses against Russia. Zyxel warns of critical vulnerabilities in legacy NAS products. Arctic Wolf tracks an amateurish ransomware varian…
…
continue reading
1
Maximising Your Budget Effectively in Turbulent Times – An SME Focus | An Infosecurity Europe 2024 Conversation with Don Gibson and Emma Philpott | On Location Coverage with Sean Martin and Marco Ciappelli ...
30:36
30:36
Play later
Play later
Lists
Like
Liked
30:36
Guests: Don Gibson, CISO, Kinly On LinkedIn | https://www.linkedin.com/in/don-gibson-cyber/ Emma Philpott, CEO, IASME Consortium On LinkedIn | https://www.linkedin.com/in/emphilpott/ ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmaga…
…
continue reading
1
AI's Role in Cybersecurity and Society | An Infosecurity Europe 2024 Conversation with Ian Hill | On Location Coverage with Sean Martin and Marco Ciappelli
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08
Guest: Ian Hill, Director of Information and Cyber Security at Upp Corporation [@getonupp] On LinkedIn | https://www.linkedin.com/in/ian-hill-95123897/ ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | https://www.itspmagazine…
…
continue reading
1
The Difference Between Fraud and Scams with Uri Rivner
54:20
54:20
Play later
Play later
Lists
Like
Liked
54:20
Moving money has never been easier. We no longer need to go into a bank, fill out a slip, and hand it to a teller to receive our money. We can now transfer money instantly. Scammers are taking advantage of unfamiliar technology to either hack in and take our money or to deceive you into sending it to them yourself. Deciding if the bank is responsib…
…
continue reading
1
New York Set to Restrict Social-Media Algorithms for Teens
12:35
12:35
Play later
Play later
Lists
Like
Liked
12:35
New York plans to prohibit social media companies from using algorithms to steer content to minors. WSJ reporter Jimmy Vielkind joins host Julie Chang to discuss the state’s new proposed legislation. Plus, WSJ contributor Tomio Geron on the growing popularity of personal-finance apps and ways to protect your data. Sign up for the WSJ's free Technol…
…
continue reading
1
SN 977: A Large Language Model in Every Pot - Problems With Recall, End of ICQ, Email @ GRC
1:55:29
1:55:29
Play later
Play later
Lists
Like
Liked
1:55:29
"Tornado Notes" Email @ GRC Have I Been Pwned? A new "supply chain" attack vector Another CA in the DogHouse ICQ to shutter its service Steve reviews "Déjà vu" Hide my email Security in Windows SpinRite update A Large Language Model in Every Pot Show Notes - https://www.grc.com/sn/SN-977-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or sub…
…
continue reading
1
The Latest Insights in Cybersecurity Resilience and The Ongoing Battle Against DDoS Attacks | A Brand Story Conversation From Infosecurity Europe 2024 | An Akamai Story with Richard Meeus | On Location ...
24:57
24:57
Play later
Play later
Lists
Like
Liked
24:57
Welcome to a brand-new episode of On Location with Sean Martin and Marco Ciappelli at Infosecurity Europe 2024 in London. Today, Sean hosts a very special guest, Richard Meeus, Director of Security Technology and Strategy, EMEA at Akamai, who will provide us with valuable insights into cybersecurity resilience and the evolving landscape of distribu…
…
continue reading
1
Gold Pressed Latinum, VBScript, ORBS, Rockwell, Chrome, SKY, Aaran Leyland, and More - SWN #389
36:17
36:17
Play later
Play later
Lists
Like
Liked
36:17
Gold Pressed Latinum, VBScript, ORBS, Rockwell, Chrome, SKY, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-389
…
continue reading