Kill Chain features experts and guests in the platform and vehicle cybersecurity space. Each week we'll discuss the latest in cybersecurity news as well as topics surrounding platform and vehicle cybersecurity.
…
continue reading
In this EM360 podcast, we investigate the cutting edge Cybersecurity issues that organisations are facing today. These discussions are led by the organisations at the forefront of defence as they walk us through the issues people are facing and how to effectively implement prevention strategies.
…
continue reading
This feed is Light Reading's main podcast feed for "The Light Reading Podcast," "The Divide," "The Light Reading Extra," and "What's the Story?" Light Reading provides daily news, analysis and insight for the global communications networking and services industry. The publication was founded in 2000 and, since July 2016, has been a part of Informa Tech, a division of Informa PLC. We're part of a big team providing specialist research, media, events and training for businesses and professiona ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
Platforms are transforming our world. And how they do it is also changing every minute. How can you connect with all the latest developments and hear about the hottest topics and trends? Tune in to our podcast series “On the Platform”. You’ll get first-hand insights and lively debate from some of the most innovative and influential platform thinkers around. The game is changing. Stay in touch with the new rules…before they’re written.
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Each week, we will dive deep into a topic that will benefit you in your cybersecurity career.
…
continue reading
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
…
continue reading
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
SC Media is proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community.
…
continue reading
Executive Platforms builds world-class forums to facilitate the sharing of ideas among the senior leadership of businesses and organizations with common objectives, interests, and challenges. Through conversations with leading experts, The bluEPrint will bring you insightful conversations, analysis and ideas surrounding key topics across multiple industries while uncovering real-world solutions to universal challenges that face leadership professionals in their daily work.
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
A platform where children of immigrant parents have thought provoking conversations about navigating through this thing called life.
…
continue reading
The a16z Podcast discusses tech and culture trends, news, and the future – especially as ‘software eats the world’. It features industry experts, business leaders, and other interesting thinkers and voices from around the world. This podcast is produced by Andreessen Horowitz (aka “a16z”), a Silicon Valley-based venture capital firm. Multiple episodes are released every week; visit a16z.com for more details and to sign up for our newsletters and other content as well!
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
IGEL provides the next-gen edge OS for cloud workspaces. Their solutions offer you extreme CAPEX hardware cost savings, sharply reduced ongoing operating expenses, and a more secure and manageable endpoint management and control platform across nearly any x86 device. We will discuss the endpoint trends in the industry, IGEL updates, and general news.XenTegra is THE preferred IGEL national partner!
…
continue reading
Governance, Risk, and Compliance Academy (GRC) Academy is a training and research platform for GRC professionals, executives, and anyone else who wants to increase their knowledge in the GRC space!
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Level up your business with technology solutions to increase productivity, improve client service, and uncover opportunities for growth. Osaic's technology podcast offers best practices to help you learn, adapt, and implement technology to thrive as an independent financial professional. Visit http://www.osaic.com for additional information. Securities and investment advisory services are offered through the firms: Osaic Wealth, Inc., Triad Advisors, LLC, Osaic Institutions, Inc., and Woodbu ...
…
continue reading
The TribalHub podcast shares stories of tribal leaders who are driving their organizations, businesses that are collaborating with tribes, and leaders in the industry who are savvy about technology. Subscribe on your favorite podcast platform! TribalHub...Connections, Membership, Opportunity.
…
continue reading
Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 31,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, intervi ...
…
continue reading
Podcast in which students in Mr. Lange's Computer Science courses have a platform to discuss what they are currently learning in their classes, innovative development projects students are completing during their Research & Development opportunities, technology related topics that are in the news and new amazing technologies coming into the market.
…
continue reading
Brought to you by HughesON. Visit us at HughesON.com. HughesON is a suite of network services and media solutions by Hughes.
…
continue reading
CXOCIETY (read "society") is the platform for senior business, technology, finance and operations executives to discuss, share and discover the latest in technology, process and people innovation."CXOInsights" by CXOCIETY is the repository of shared insights and experiences by the best, brightest and most experienced professionals globally. Subscribe to "CXOInsights" by CXOCIETY to keep abreast in the latest in all things innovation.
…
continue reading
Technology, AI, machine learning and algorithms. Come join the discussion on Discord! https://discord.gg/4UNKGf3
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Welcome to MN Health Security, a premier podcast and security content delivery platform developed by William Muenchow. At MN Health Security, our mission is to bring you closer to the forefront of healthcare technology and security. We delve into a wide range of topics that are shaping the future of Minnesota healthcare IT. Each episode features in-depth discussions with industry experts, thought leaders, and innovators, providing valuable insights, expert opinions, and the latest informatio ...
…
continue reading
This is the BetweenTheLines podcast. Focusing on providing a platform for opinions and engaging conversations surrounding the tech industry, while dismantling facade’s and getting straight to the facts.
…
continue reading
Unhackable - a virtually impossible state of being only made plausible through consistent cybersecurity best practices by everyone simultaneously. This is Unhackable, the authoritative Security podcast about deception and personal security. Can you ever be truly Unhackable? No, nobody can. But every episode is designed to help you move forward using actionable cybersecurity best practices that are within reach of everyone. We help you take the steps needed to solve your most important Cybers ...
…
continue reading
#BITTechTalk
…
continue reading
Kelly O'Dwyer-Manuel & David Brossard discuss the latest in fine-grained, policy-based authorization, and the latest developments and challenges enterprises face in their access control journey. Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect A ...
…
continue reading
Hello Combi-Nation! Our industry fee complicated sometimes. Drugs, devices, clinical trials, submissions, sterilization validation, design control, risk management, market access reimbursement, the list goes on. My name is Subhi Saadeh. I've spent over a decade in medical device, pharma, and combination product development. My goal is mastery, so this podcast is to ask questions I have to people who may have the answers. Whether you're background is Pharma, Device or both, I invite you to li ...
…
continue reading
Tech Disruptors by Bloomberg Intelligence features conversations with thought leaders and management teams on disruptive trends. Topics covered in this series include cloud, e-commerce, cybersecurity, AI, 5G, streaming, advertising, EVs, automation, crypto, fintech, AR/VR, metaverse and Web 3.0. This podcast is intended for professional investors only. It is being prepared solely for informational purposes only and does not constitute an offer or investment advice.
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
Futurum Tech Webcast Leading tech analysts from The Futurum Group share weekly deep dives on the latest tech news, new products and services, mergers, earnings, regulations, and more. The Futurum Tech Webcast will keep you current on what’s happening in the tech space — from startups to industry leaders, emerging tech, and what’s ahead for industries across the globe, along with interviews with tech industry leaders and experts. Subscribe now and stay connected to this exciting journey into ...
…
continue reading
As a third-generation educator, it is easy to say that teaching and training are in the blood for Ron Slee. From his beginnings as a coach, through his time at McGill University, Ron developed a foundation for the work he does today. From working within dealerships, to operating a consulting company, creating a training business and running twenty groups, Ron has been directly involved in this Industry since 1969. Ron has been known as the industry expert for years, and has brought this expe ...
…
continue reading
Welcome to Healthcare Nation, the podcast for enthusiasts passionate about the healthcare sector and eager to explore its current state and future trajectory. Join us as we delve into the heart of the healthcare, biotech, and MedTech industries with the help of top thought leaders. I'm your host, Rick Gannotta, with over four decades of experience in healthcare, spanning from the hospital bedside to the boardroom, C-Suite roles in renowned health systems, advising game-changing startups and ...
…
continue reading
Abnormal Engineering Stories explores what it's like leading engineering teams and systems featuring tech industry leaders with real world, hands-on operating experience. Hosted by Kevin Wang, Head of Engineering at Abnormal Security. Abnormal Security is defining the next generation of email security defense. Our platform uses machine learning and artificial intelligence to baseline communication content, user identity, and behavioral signals in real-time and at-scale in order to detect the ...
…
continue reading
Devo Talks is a podcast brought to you by Devolutions that is dedicated to sharing the latest advances, ideas, and trends in the world of business, technology, and cybersecurity. It also provides a platform for tech professionals, entrepreneurs, and IT influencers to share some of their stories, experiences, and insights with the rest of the community.
…
continue reading
This podcast is hosted by Advisor Perspectives, one of the leading publications for financial advisors. Our podcast series brings you short interviews with top thought leaders in financial advice, planning, investments and economics. Each episode focuses on a specific issue facing financial advisors. Listeners will learn the key trends affecting the way they and their competitors operate and the steps advisors can take grow their practices and deliver better service to their clients.
…
continue reading
Welcome to the Channel CEO podcast, which brings together thought leaders and innovators revolutionizing the IT industry. Host Kevin Lancaster is a serial tech entrepreneur, angel investor, and strategic advisor to several high-growth tech companies focused on the channel. We sit down with “IT superheroes” each week to cover various topics. I will cover topics ranging from social selling and marketing to creating influence. And we will dig deep into their journey as entrepreneurs, how they v ...
…
continue reading
Uncovering Hidden Risks explores how enterprises can reduce their risk by moving to a more holistic approach to data protection. Each episode will feature a panel of Microsoft security professionals and community security experts. They’ll dive into topics like data governance, internal and external threats, risk management and compliance, industry trends, and customer challenges. Listen in to the podcast and follow us!
…
continue reading
SC Media is proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Digital—that vast ocean of 0s and 1s that surrounds us all—has ushered in a new world of commerce. It’s a sandbox for innovation, with access to a world of game-changing technology, that is forging a new generation of digital leaders who have stepped up to shape the future of business. They are change agents. Innovators. Visionaries. And the status quo simply isn’t enough. On Decoding Digital, hear from inspirational thought leaders who share professional and personal stories about navigatin ...
…
continue reading
If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been a consultant, practitioner, founder, and runs Security Weekly Labs. Tyler h ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Endpoint Strategies to Achieve Cybersecurity Compliance — A Conversation with Romanus Prabhu of ManageEngine
22:20
22:20
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
22:20
In the run-up to the 2024 edition of the North American Information Security Summit we spoke with security evangelist Romanus Prabhu of Manage Engine about how data security and cybersecurity professionals need to rethink and reevaluate their systems to account for new threats. The reality is protection can never get in the way businesses operate, …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Do We Need Penetration Testing and Vulnerability Scanning? - Adrian Sanabria, Josh Bressers - PSW #833
1:00:55
1:00:55
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:00:55
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Show Notes: https://securityweekly.com/psw-8…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
5G Factor: BT, Vodafone, Altice Show Deft CSP Moves
29:37
29:37
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
29:37
In this episode of The 5G Factor, our series that focuses on all things across the 5G ecosystem, we review key 5G ecosystem developments including recent deft moves by top-tier communications service providers (CSPs) such as BT Group and ServiceNow expanding their relation to vastly improve the CX and workforce experience, Vodafone Germany and FlyN…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Showtime #2: HPE, Pure Accelerate and FinOPsX - Infrastructure Matters, Episode 45
30:24
30:24
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
30:24
In this episode of Infrastructure Matters, hosts Krista Macomber, Steven Dickens, and Camberley Bates discuss their busy week attending various tech conferences. We hear highlights from HPE Discover, emphasizing HPE's advancements in AI and their collaboration with Nvidia. An inside look at Pure Accelerate 2024, focusing on AI, cybersecurity, and a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Impacts to DevSecOps as it Relates to the Software Release Cycles | DevOps Dialogues: Insights & Innovations
15:41
15:41
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
15:41
On this episode of DevOps Dialogues: Insights & Innovations, host Paul Nashawaty is joined by Jack Poller of Paradigm Technica and Mitch Ashley, analyst and founder of Techstrong Research and Chief Technology Advisor at The Futurum Group, for a discussion on the SDLC and the impacts of security as it is integrated into the pipeline. Their discussio…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How AWS is Building Data Centers for the New Age of Generative AI
40:47
40:47
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
40:47
“We’re seeing a big increase in GPU capacity demands and we expect the data centers over the next couple of years will need to support higher power densities giving us the ability to run very large clusters of GPUs,” says AWS Global Data Centers VP Kevin Miller. In this episode of Bloomberg Intelligence’s Tech Disruptors podcast, Miller talks with …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CYFIRMA Research- Digital Warfare: Pakistan-Based Terrorist Organizations Utilize Digital Platforms in J&K for Psy Ops
4:01
4:01
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
4:01
CYFIRMA's latest investigation reveals how terrorist groups in Kashmir are still exploiting digital platforms to spread propaganda and influence people. Their psychological operations (Psy Ops) aim to manipulate public perception, spread fear, and destabilize the region. Despite a reduction in physical presence, groups like TRF and Kashmir Tigers a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
142 - Material Qualification in Drugs vs. Devices, PPAP, APQP, Quality Tools and Purchasing Controls with Ben Locwin
30:26
30:26
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
30:26
On this episode of the podcast, I was joined by Ben Locwin, Executive SME at Black Diamond Networks. Ben and I discuss: 01:53 Material Qualification Discussion Begins02:23 Material Qualification in Drugs vs. Devices04:00 Quality Standards in Different Industries08:54 Quality Tools and Their Applications11:22 Material Qualification and Supplier Mana…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity's Past, Present, and AI-Driven Future
43:43
43:43
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
43:43
Is it time to hand over cybersecurity to machines amidst the exponential rise in cyber threats and breaches? We trace the evolution of cybersecurity from minimal measures in 1995 to today's overwhelmed DevSecOps. Travis McPeak, CEO and Co-founder of Resourcely, kicks off our discussion by discussing the historical shifts in the industry. Kevin Tian…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Book | Conspiracy Ignited | A Conversation With Author Raymond Paul Johnson | Audio Signals Podcast With Marco Ciappelli
36:01
36:01
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
36:01
Guest: Raymond Paul Johnson, Novelist On LinkedIn | https://RaymondPaulJohnson.com On Twitter | https://twitter.com/RPJohnsonBooks On Website | https://RaymondPaulJohnson.com On Facebook | https://www.Facebook.com/RaymondPaulJohnsonThrillerWriter On Instagram | https://www.Instagram.com/raymondpauljohnson_author _____________________________ Host: …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Mastering Cybersecurity: Jainam's Enlightening Journey Through Graduate Studies and Beyond | A Conversation with Jainam Basra | Off the Record with Saman — Student Abroad Podcast
54:29
54:29
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
54:29
Guest: Jainam Basra, Cybersecurity Analyst and Technuf On LinkedIn | https://www.linkedin.com/in/jainam-basra/ ________________________________ Host: Saman Fatima On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/saman-fatima ________________________________ This Episode’s Sponsors Are you interested in sponsoring an I…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
PodChats for FutureIoT: Transforming the frontline workforce
32:51
32:51
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:51
For years, we’ve been told that consumer behaviour is changing and that businesses must adopt or go out of business. PwC says the pandemic accelerated workforce transformation even as digital adoption became one of the central tenets of our lives. Fast forward to 2024, we see a workforce that demands empowerment from their employers. Talent has rea…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Shared Responsibility Models, AI in Offensive Security, Apple's Private Cloud Compute - ASW #289
24:10
24:10
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
24:10
Thoughts on shared responsibility models after the Snowflake credential attacks, looking at AI's current and future role in offensive security, secure by design lessons from Apple's Private Cloud Computer, and more! Show Notes: https://securityweekly.com/asw-289
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet - SWN #394
30:16
30:16
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
30:16
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-394
…
continue reading
![Artwork](/static/images/128pixel.png)
1
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
37:01
37:01
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
37:01
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Importance of Cyber Peace | A Conversation with Gabrielle Botbol | The Soulful CXO Podcast with Dr. Rebecca Wynn
25:30
25:30
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
25:30
Guest: Gabrielle Botbol, Offensive Security Advisor, Desjardins Website: https://csbygb.github.io/ LinkedIn: https://www.linkedin.com/in/gabriellebotbol/ Twitter/X: https://twitter.com/Gabrielle_BGB Host: Dr. Rebecca Wynn On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/rebecca-wynn ________________________________ Th…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CISOs Advising Cybersecurity Companies, Get on Board! - Bob West - CSP #180
28:16
28:16
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
28:16
Advisory Boards - helping cybersecurity companies grow is foundational to helping enterprises select best in class tools to protect their environments. If done properly, scaling cybersecurity companies can have a positive global impact on how information is protected and minimizing business disruption. Visit https://cisostoriespodcast.com for all t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CISOs Advising Cybersecurity Companies, Get on Board! - Bob West - CSP #180
28:16
28:16
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
28:16
Advisory Boards - helping cybersecurity companies grow is foundational to helping enterprises select best in class tools to protect their environments. If done properly, scaling cybersecurity companies can have a positive global impact on how information is protected and minimizing business disruption. Show Notes: https://cisostoriespodcast.com/csp…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Daniela Ottini of Sanofi — How AI is Helping the Pharmaceutical Industry Reinvent Itself and Build Smart Factories
7:42
7:42
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
7:42
At the 2024 edition of the Pharma Manufacturing World Summit we spoke with Daniela Ottini, Sanofi’s SVP, Manufacturing and Supply Head of Specialty Care, as a follow-up to a keynote presentation she gave the day before showcasing Sanofi’s ongoing transformation that is turning science into reality for patients. We explore how one of the giants of p…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Divide: How Colorado is preparing to award $826M for BEAD
27:28
27:28
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
27:28
This week: Brandy Reitter, executive director for Colorado's broadband office, on Internet access and adoption challenges, and next steps for the state's BEAD program now that Colorado's initial proposal received NTIA approval. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI at Work 2024: C-suite Perspectives on Artificial Intelligence - Bhawna Singh - BSW #354
32:31
32:31
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:31
In the age of AI, driving a business forward requires balancing three very significant considerations: growth through innovation, productivity through operational efficiency, and trust through security. To better understand how AI impacts the intersection of security, innovation, and operational efficiency, Okta commissioned an AlphaSights survey o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Building a Successful API Security Strategy - Luke Babarinde - BSW #354
32:41
32:41
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:41
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity as a Profit Center: Transforming Risk into Opportunity | A Conversation with Robert Fernandes | Redefining CyberSecurity with Sean Martin
31:49
31:49
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:49
Guest: Robert Fernandes, Chief Information Security Officer, The Investment Center, Inc. On LinkedIn | https://www.linkedin.com/in/robert-fernandes-cybersecurity/ ____________________________ Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | https://www.it…
…
continue reading
Welcome to Cybersecurity Growth. A show for aspiring and existing cybersecurity leaders. Intro Agenda Who are you wearing? Nerd Zone Microsoft Patch Tuesday for June Rockstar Games Veeam vulnerability Microsoft researcher alerted the business of the SolarWinds hack, but was ignored Hot topic 2024 Verizon DBIR Introduction Key Findings Top Threat Ac…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Do you really know how GPUs work? (Ep. 259)
36:17
36:17
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
36:17
Join us in this exciting episode of the Data Science at Home podcast. It's all about GPUs. We'll take you on a journey through the inner workings of these powerful processors, explaining how they handle complex computations and drive everything from gaming graphics to scientific simulations. Whether you're a budding programmer or a tech enthusiast,…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault
58:32
58:32
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
58:32
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault
58:32
58:32
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
58:32
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity In College - SWN Vault
38:26
38:26
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
38:26
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Developing a Global Network of Computer Security Incident Response Teams (CSIRTs)
30:51
30:51
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
30:51
Cybersecurity risks aren’t just a national concern. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), the CERT division’s Tracy Bills, senior cybersecurity operations researcher and team lead, and James Lord, security operations technical manager, discuss the SEI’s work developing Computer Security Incident R…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
For digital inclusion, broadband access is just the beginning
33:28
33:28
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
33:28
South Bend, Indiana's Madi Rogers explains how broadband access is just one aspect of reaching the goal of digital inclusion. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Demystifying Microsegmentation | 7 Minutes on ITSPmagazine | A Zero Networks Story with Benny Lakunishok
7:07
7:07
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
7:07
Earlier this year, the NSA released updated zero-trust guidance in which microsegmentation is listed as a daunting, advanced endeavor, only suitable to the most mature organizations. Zero Networks is committed to challenging this sentiment. While some may hesitate, thinking microsegmentation is beyond their reach, we urge organizations to reconside…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault
44:48
44:48
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
44:48
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault
44:48
44:48
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
44:48
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI Development: Can Ethics Keep Up with Innovation? | A Conversation with Eric Permenter, Pam Kamath, Darryl Hawkins, and Taiye Lambo | Redefining CyberSecurity with Sean Martin
1:05:38
1:05:38
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:05:38
Guests: Taiye Lambo, Founder of Holistic Information Security Practitioner Institute (HISPI), Founder and Chief Technology Officer of CloudeAssurance, Inc. On LinkedIn | https://www.linkedin.com/in/taiyelambo/ Pam Kamath, Founder, Adaptive.AI On LinkedIn | https://www.linkedin.com/in/pamkamath/ Aric Perminter, CEO, Lynx Technology Partners, LLC. On…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault
32:22
32:22
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:22
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
…
continue reading