Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
…
continue reading
Interesting, fascinating, provoking, insightful - or all of the above - GDPR decisions, rulings and other tidbits discussed by two very opinionated people.
…
continue reading
How does GDPR, data privacy and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader or InfoSec security expert this is the podcast to learn about what is happening in the UK, EU, US and beyond.
…
continue reading
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading

1
The Medcurity Podcast: HIPAA Compliance | Security | Technology | Healthcare
Medcurity: HIPAA Compliance
Healthcare is complicated. Joe Gellatly and Amanda Hepper are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. Join Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute, and CEO of NCX Group with over 24 years of expertise, for weekly, no-nonsense insights tailored to CEOs, CFOs, and business leaders. From data breaches to actionable cybersecurity and data privacy strategies, we deliver practical steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk into oppor ...
…
continue reading
Join us for an in-depth exploration of InfoGov.com, the pioneering firm redefining Information Governance for businesses of all sizes. In this episode, we break down how InfoGov.com empowers Independent Professionals and InfoAdvisors™ to help organizations manage their data, protect sensitive information, and navigate the evolving landscape of security, privacy, compliance, and risk. From boutique revenue-sharing models to agnostic advisory services, we’ll discuss what sets InfoGov.com apart ...
…
continue reading
There is tremendous value to simplification. To quote Steve Jobs, “Simple can be harder than complex: You have to work hard to get your thinking clean to make it simple. But it is worth it in the end because once you get there, you can move mountains." In this series, we explore how people and companies achieve simplification.
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Privacy in Practice, brought to you by VeraSafe, is the podcast for actionable insights and real-world strategies for privacy and compliance teams. Hosted by privacy pros Kellie Du Preez and Danie Strachan, each episode unpacks the practical side of compliance and data management, bringing together industry leaders and thought-provoking discussions. Whether you’re leading privacy efforts at your company or just beginning to explore this field, tune in for meaningful conversations that provid ...
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
A weekly podcast providing fraud prevention and vendor setup training to protect the vendor master file. Immediate takeaways with actionable steps you can implement today into your vendor onboarding and maintenance process to reduce fraud and regulatory fines. Great tips for the Accounts Payable and Procurement teams to clean-up their vendor data, clean-up their vendor processes so that they can pay the right vendor.
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
FINRA Unscripted is the voice of the nation’s largest non-government securities regulator. We bring together FINRA leaders to discuss existing and emerging regulatory topics that impact the broker-dealer industry. We share best practices for compliance officers, insights into the operations of a 3,500 person self-regulated organization and educational tools and information for investors. Every investor in America relies on one thing: fair financial markets. That is what FINRA works every day ...
…
continue reading
Welcome to the podcast: Sustainable Compliance. Are you passionate about data protection, GDPR, information security, and general compliance? Then, this podcast is dedicated to you. We delve into the intricacies of data protection and compliance. Join us as the host, Jacob Høedt Larsen, interviews experts and discusses the latest trends, insights, and advice within the realm of compliance. We also explore how we can reshape the way we think and organise ourselves around compliance, to forge ...
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading

1
Effortless Wireless Temperature Logging with TempGenius for Reliable 24/7 Monitoring
freezer temperature monitoring
TempGenius offers a cutting-edge WiFi temperature logging solution designed to meet the demands of industries that require accurate, real-time monitoring. This advanced system provides wireless, automated data collection that eliminates the need for manual checks, helping businesses maintain compliance and protect valuable assets. Trusted by hospitals, laboratories, food services, and pharmaceutical companies, TempGenius delivers continuous logging and instant alerts to any connected device, ...
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
The world’s accomplishments depend on data security. Join PKWARE CEO Spencer Kupferman every month as he chats with data security experts on eliminating security gaps, taking control of sensitive data, and meeting the most stringent data compliance requirements. Tune in to find out how industry leaders are eliminating data security gaps and achieving compliance goals.
…
continue reading
Software testing is the most important part of software development, but it is especially significant for healthcare software. Healthcare software applications manage patient data, offer medical services, and ensure compliance with various standards and regulations. Defects or errors in healthcare software can have consequences for patient security, data protection, and functional efficiency.
…
continue reading
Get the most recent and juiciest data protection and privacy news and latest court and DPA decisions from across Europe in GDPR today: the GDPRhub newsletter - the audio version! Produced by NoTies.Consulting, read by Rie Aleksandra Walle - GDPRhub volunteer.
…
continue reading

1
The 1347 PODCAST -HEALTHCARE FRAUD DETECTION, CORPORATE COMPLIANCE AND ORGANIZATIONAL INTEGRITY
The 1347
The podcast focuses on healthcare fraud detection, corporate compliance, organizational integrity, and research security best practices.
…
continue reading
If you work in compliance you will not want to miss our new podcast series. The Compliance Files is a unique podcast series, giving you access to industry insights and key perspectives on how the evolving regulatory landscape is driving change, challenge and opportunity for compliance professionals everywhere.
…
continue reading
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
www.hoaunlimited.com HOA Unlimited- is a leading firm in the homeowner's Association industry specializing in providing exceptional customer service, hospitality, and professional Homeowner's Association management services. Our firm has dedicated its time experience with knowledge to being one of the best management companies, and we have a proven track record backed by multiple years of experience, great relationships, resources, and talented managers. Our Firm Effective Operations: Organi ...
…
continue reading
The Clarkslegal Law Bites offers guidance and insightful discussions on the latest topics for businesses and individuals covering employment, immigration, corporate, construction, property, litigation and more.
…
continue reading
The Financial Forward podcast dives deep into the world of consumer finance, banking regulation, and financial technology. Hosted by Jim McCarthy, a founding member of the CFPB and a leading expert in financial regulation and risk management, this podcast unpacks the latest trends shaping the financial industry. Each episode features insightful conversations with top industry leaders, breaking down credit card policies, fintech innovations, CFPB regulations, banking compliance, and financial ...
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Welcome to the Proceed Podcast, where we explore data and document management in the SAP world. Our goal is to help SAP customers manage their data effectively for reduced costs, improved IT agility, compliance, sustainability, and to drive IT transformation. Join us for expert interviews, case studies, and analysis to gain valuable insights into how you can optimise your data management processes.
…
continue reading
Join me in conversation with experts around the world as we talk about new privacy laws, global trends in data protection and the impact of these developments.
…
continue reading
Forcepoint, powered by Raytheon, is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.Forcepoint. ...
…
continue reading
In the digital age, privacy is more important than ever. But as technology advances, so do the challenges to privacy. We explore the latest trends in privacy and technology, and discuss how businesses can build strong privacy programs that protect their customers' data. We invite top privacy compliance and tech guests to discuss privacy in a fun and interesting manner, covering topics such as data privacy, cybersecurity, and AI. Whether you're a business owner, a privacy professional, or sim ...
…
continue reading
TempGenius is your trusted partner for state-of-the-art storage monitoring solutions. Designed to ensure optimal conditions for sensitive products, TempGenius provides accurate, real-time monitoring of temperature, humidity, and other critical storage parameters. Whether you're managing healthcare facilities, food storage, or industrial settings, TempGenius helps maintain compliance and safeguard your inventory. With advanced alert systems, cloud-based data access, and seamless integration i ...
…
continue reading
The Security Collective is the podcast for leaders tasked with, and interested in, securing technology, people, processes and data for the protection of all. Join best-selling author Claire Pales, together with industry thought leaders who answer your questions about security leadership, trends, technologies, and more. 'The Security Collective' podcast - formerly 'The Secure CIO'
…
continue reading
TempGenius offers state-of-the-art temperature monitoring systems designed to meet the highest standards of safety and efficiency. Trusted by industries ranging from healthcare to food services, TempGenius provides robust, wireless solutions that ensure 24/7, real-time temperature tracking. These systems help maintain compliance with regulatory requirements, minimize risk, and protect valuable assets through automatic alerts and data logging. With user-friendly interfaces and customizable fe ...
…
continue reading
Uncovering Hidden Risks explores how enterprises can reduce their risk by moving to a more holistic approach to data protection. Each episode will feature a panel of Microsoft security professionals and community security experts. They’ll dive into topics like data governance, internal and external threats, risk management and compliance, industry trends, and customer challenges. Listen in to the podcast and follow us! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Experience unparalleled control over your environment with the TempGenius Wireless Environmental Monitor. Safeguard your assets, products, or research with cutting-edge temperature monitoring technology. This state-of-the-art device provides real-time, accurate temperature data, ensuring optimal conditions for your critical operations. Wirelessly connect to the TempGenius system and receive instant alerts on your smartphone or computer, allowing you to proactively manage temperature fluctuat ...
…
continue reading
Tired of feeling out of the loop on Open Banking and Finance? Frustrated by having to sift through countless sources for the latest insights, updates, and connections? The landscape can feel daunting, but navigating it doesn’t have to be tough. That's why we're here! Open Banking Excellence: Industry Insights is here to be your knowledge resource hub, guiding you through the latest developments, trends, and innovations in the Open Banking world.
…
continue reading
Experience the future of temperature monitoring with TempGenius' cutting-edge wireless temperature logging system. Perfect for industries where precision is paramount, this system ensures that your temperature-sensitive environments are consistently monitored with real-time accuracy. Say goodbye to manual checks and human errors, TempGenius offers seamless integration with your existing systems, providing automated alerts and detailed reports that keep you compliant with regulatory standards ...
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
Experience the ultimate in temperature monitoring with the TempGenius Remote Temperature Probe. This advanced device is designed to provide you with accurate and real-time temperature readings, ensuring the safety and integrity of your valuable assets, whether it's in a medical facility, laboratory, food storage, or any other environment where temperature control is critical. Key Features: Precision Monitoring: The TempGenius Remote Temperature Probe offers unparalleled accuracy, allowing yo ...
…
continue reading
Are you an online expert or digital entrepreneur struggling to scale your business? Does it feel like you're constantly pouring money into ads without seeing the explosive growth you've been promised? You're not alone. In today's crowded digital landscape, standing out and turning ad spend into profitable revenue can seem like an impossible task. The harsh reality is that most online businesses fail to crack the code of effective advertising. They waste countless hours and dollars on poorly ...
…
continue reading

1
Space Under Pressure: Geopolitical Threats and the Evolving Cosmos (2025)
27:41
27:41
Play later
Play later
Lists
Like
Liked
27:41Drawing on open-source information and eight years of collected data, the CSIS Aerospace Security Project's 2025 Space Threat Assessment explores the key developments in foreign counterspace weapons and the evolving security landscape in Earth orbit. This assessment highlights how space is becoming a more dangerous place and is increasingly woven i…
…
continue reading

1
The Price of Protection: Budgeting for Essential Cyber Hygiene (CIS IG1)
14:26
14:26
Play later
Play later
Lists
Like
Liked
14:26This episode explores the costs associated with implementing essential cyber hygiene as outlined by the CIS Critical Security Controls Implementation Group 1 (IG1). We delve into the different approaches enterprises can take – utilizing on-premises tools, leveraging Cloud Service Providers (CSPs), or partnering with Managed Service Providers (MSPs)…
…
continue reading
🎙️ Episode Title: The Silent Threat to Your Bottom Line Podcast: Bite Size Security with Mike Fitzpatrick Episode Summary: In this episode, Mike Fitzpatrick, CEO of NCX Group, pulls back the curtain on one of the most underestimated risks to your business: the assumption that cybersecurity is “just an IT problem.” Mike shares real-world insights fr…
…
continue reading

1
Episode 336: World Password Day’s Ultimate Advice for Maintaining Passwords
16:03
16:03
Play later
Play later
Lists
Like
Liked
16:03World Password Day is the 1st Thursday in May every year. For the ultimate and not surprising advice this year from the National Cybersecurity Alliance…. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulat…
…
continue reading

1
Ransomware on the Rise: Why SMBs Are Today’s Prime Target
5:56
5:56
Play later
Play later
Lists
Like
Liked
5:56In the digital battleground of cybersecurity, small and medium businesses are now the ultimate prey for ransomware attackers, with a staggering 126% surge in targeted attacks. This explosive episode of The Daily Threat exposes the alarming tactics cybercriminals are using to exploit SMBs’ vulnerabilities, turning them into prime targets for devasta…
…
continue reading

1
Überblick über das Webinar: Rechtskonform und wettbewerbsfähig bleiben: NIS2-Konformität für KMU im Unternehmens-Ökosystem
35:48
35:48
Play later
Play later
Lists
Like
Liked
35:48Überblick über das Webinar: Rechtskonform und wettbewerbsfähig bleiben: NIS2-Konformität für KMU im Unternehmens-Ökosystem Die zweite EU-Richtlinie zur Netzwerk- und Informationssicherheit (NIS 2) ist nun in Kraft und von der Richtlinie betroffene Großunternehmen arbeiten intensiv daran, deren strenge Auflagen zu erfüllen. Was sind jedoch die Konse…
…
continue reading

1
Beyond Prompt Injection: AI’s Real Security Gaps
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02Send us a text In Part 1 of this two-part MLSecOps Podcast, Principal Security Consultant Gavin Klondike joins Dan and Marcello to break down the real threats facing AI systems today. From prompt injection misconceptions to indirect exfiltration via markdown and the failures of ML Ops security practices, Gavin unpacks what the industry gets wrong—a…
…
continue reading

1
GTIG 2024 Zero-Days: Espionage, Enterprise, and the Shifting Landscape
13:16
13:16
Play later
Play later
Lists
Like
Liked
13:16Join us as we dive into Google Threat Intelligence Group's (GTIG) comprehensive analysis of zero-day exploitation in 2024. Drawing directly from the latest research, this episode explores the 75 zero-day vulnerabilities tracked in the wild. While the overall number saw a slight decrease from 2023, the analysis reveals a steady upward trend over the…
…
continue reading

1
The Future of APIs in the Age of AI Agents A Conversation with Postman's Sam Chehab
46:01
46:01
Play later
Play later
Lists
Like
Liked
46:01In this episode of SecureTalk, host Justin Beals explores the evolving world of API technology and security with Sam Chehab, Head of Security at Postman - the platform used by over 35 million developers and 90% of Fortune 500 companies. Episode Insights: Postman's Strategic Position: Learn why Sam joined Postman in September 2024 and how they're po…
…
continue reading

1
Verizon DBIR 2025: Navigating Third-Party Risk and the Human Factor
12:11
12:11
Play later
Play later
Lists
Like
Liked
12:11Join us as we unpack the critical insights from the Verizon 2025 Data Breach Investigations Report. This episode dives deep into the report's most prominent themes, highlighting the ever-increasing involvement of third parties in data breaches and the persistent influence of the human element, which was involved in 60% of breaches this year. We exp…
…
continue reading

1
From Awareness to Action: The Blueprint for Quantum-Resilient Security | Garfield Jones
30:23
30:23
Play later
Play later
Lists
Like
Liked
30:23Quantum migration isn’t a future concern, it’s a present-tense priority. In this episode of Shielded: The Last Line of Cyber Defense, Johannes Lintzen and Dr. Garfield Jones take a deep dive into the practical challenges of post-quantum migration, focusing on how organizations can apply the APA framework (Awareness, Preparedness, Action) to make th…
…
continue reading
In this episode of Socializing Security, the hosts dive into the question of whether the cloud is safe. They discuss the evolution of cloud security, comparing it to on-premises solutions, and emphasize the importance of understanding the shared responsibility model between cloud providers and users. The conversation also covers different types of …
…
continue reading

1
Ransomware Reality Check: Cleo Breach Puts Third-Party Risks in the Spotlight
4:50
4:50
Play later
Play later
Lists
Like
Liked
4:50In a stark wake-up call for businesses across the U.S., the recent Cleo ransomware breach exposes the critical vulnerabilities lurking in third-party vendor networks. This eye-opening episode of The Daily Threat dissects the sophisticated attack that sent shockwaves through the cybersecurity landscape, revealing how even seemingly secure organizati…
…
continue reading

1
Inside the DARPA AI Cyber Challenge: Securing Tomorrow’s Critical Infrastructure Through AI and Healthy Competition | An RSAC Conference 2025 Conversation with Andrew Carney | On Location Coverage with ...
27:35
27:35
Play later
Play later
Lists
Like
Liked
27:35During RSAC Conference 2025, Andrew Carney, Program Manager at DARPA, and (remotely via video) Dr. Kathleen Fisher, Professor at Tufts University and Program Manager for the AI Cyber Challenge (AIxCC), guide attendees through an immersive experience called Northbridge—a fictional city designed to showcase the critical role of AI in securing infrast…
…
continue reading

1
The State of EU Cybersecurity: Threats, Trends, and the Evolving Landscape
16:21
16:21
Play later
Play later
Lists
Like
Liked
16:21Explore the complex and widespread cybersecurity threat landscape currently facing the European Union. This episode delves into the findings of recent reports, highlighting how geopolitical tensions and the rapid pace of digitisation are fueling a surge in malicious cyber activity. We discuss the substantial threat level assessed for the EU, meanin…
…
continue reading

1
#718: From cost center to value creator: How IT automation creates business value
30:52
30:52
Play later
Play later
Lists
Like
Liked
30:52Learn how organizations are transforming IT from a cost center to a value generator through automation, AI, and smart business process optimization, featuring real success stories from AWS Solution Architects Adrian SanMiguel and Greg Harris.Innovate faster with an AWS Genai Competency Partner: https://aws.amazon.com/ai/generative-ai/partners/…
…
continue reading

1
Integrating Incident Response: A NIST SP 800-61r3 Guide to Cyber Risk Management
16:55
16:55
Play later
Play later
Lists
Like
Liked
16:55Incident response is a critical part of cybersecurity risk management and should be integrated across organizational operations. This episode explores the recommendations and considerations for incorporating cybersecurity incident response throughout an organization’s cybersecurity risk management activities, as described by the new NIST Special Pu…
…
continue reading

1
Beyond the Blueprint: Learning Cyber Resilience Together
20:26
20:26
Play later
Play later
Lists
Like
Liked
20:26Achieving cyber resilience is a complex and dynamic journey with no one-size-fits-all solution. This episode explores how organizations can significantly improve their cyber resilience posture by leveraging the shared experiences, insights, and front-line practices of their peers and the wider ecosystem. Drawing on insights from the Cyber Resilienc…
…
continue reading

1
EDPB 2024: Guarding EU Data Privacy in a Rapidly Changing Digital World
15:35
15:35
Play later
Play later
Lists
Like
Liked
15:35Join us as we delve into the European Data Protection Board's (EDPB) 2024 Annual Report to understand how they championed data protection in a year marked by significant technological and regulatory shifts. This episode will cover the key milestones and priorities outlined in the EDPB's 2024-2027 Strategy, designed to strengthen, modernise, and har…
…
continue reading

1
The Compliance Crunch: New Rules, Big Risks for SMBs
4:51
4:51
Play later
Play later
Lists
Like
Liked
4:51In the rapidly evolving world of cybersecurity, small and medium businesses are facing a critical turning point. This episode of The Daily Threat dives deep into the landmark April 2025 regulations that are reshaping how SMBs handle data breaches and cybersecurity compliance. We unpack the new mandatory disclosure rules that could make or break bus…
…
continue reading

1
The 2024 IC3 Report: Unpacking Record Cybercrime Losses
14:02
14:02
Play later
Play later
Lists
Like
Liked
14:02Join us as we delve into the key findings of the FBI's 2024 Internet Crime Complaint Center (IC3) Annual Report. This year marks the 25th anniversary of IC3, which serves as the primary destination for the public to report cyber-enabled crime and fraud. The report reveals a staggering new record for losses reported to IC3, totaling $16.6 billion in…
…
continue reading

1
DMA Fines Hit Meta & Apple | UK Law Firm Penalized | NOYB Slams GDPR Reform Proposal
12:04
12:04
Play later
Play later
Lists
Like
Liked
12:04Send us a text 📢 Privacy Corner Newsletter: April 24, 2025 🔹 EU Fines Meta & Apple Under DMA – The European Commission hits Meta with a €200M fine and Apple with €500M for violating the Digital Markets Act. This challenges the future of “consent-or-pay” models across Europe. 🔹 UK Law Firm Fined Over Ransomware Handling – ICO fines a UK law firm £60…
…
continue reading

1
Episode 335: Why the Vendor Process Is Key to Preventing ACH, Wire and Check Payment Fraud
25:20
25:20
Play later
Play later
Lists
Like
Liked
25:20Invoice automation is great for invoice processing and even has artificial intelligence tools that can help spot attempted fraud – but it’s really the vendor setup and maintenance process that will save you from making fraudulent electronic and check payments. Keep listening. Check out my website www.debrarrichardson.com if you need help implementi…
…
continue reading

1
Ransomware Reloaded: U.S. Faces a Cybercrime Surge
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35FBI warns of rising ransomware attacks as small businesses and critical infrastructure remain prime targets.By QIT Solutions
…
continue reading

1
2025 HIPAA Essentials in 5 Minutes | Medcurity Live 090
5:28
5:28
Play later
Play later
Lists
Like
Liked
5:28In five minutes, we break down what HIPAA really expects from your organization in 2025. From your Security Risk Analysis to employee training, access controls, audit logs, and business associate agreements—this is the real-world checklist regulators are looking for. We’ll explain each core requirement, how enforcement is evolving, and offer practi…
…
continue reading

1
AI explained: Introduction to Reed Smith's AI Glossary
14:56
14:56
Play later
Play later
Lists
Like
Liked
14:56Have you ever found yourself in a perplexing situation because of a lack of common understanding of key AI concepts? You're not alone. In this episode of "AI explained," we delve into Reed Smith's new Glossary of AI Terms with Reed Smith guests Richard Robbins, director of applied artificial intelligence, and Marcin Krieger, records and e-discovery…
…
continue reading

1
Webinar Audio - Implementing UOOM (Universal Opt-Out Signals), Consent, and other AdTech Compliance Issues.
50:29
50:29
Play later
Play later
Lists
Like
Liked
50:29Listen to Meru Data's podcast as we dive into the complexities of implementing Universal Opt-Out Mechanisms (UOOM) in today’s privacy landscape. In this insightful episode, Meru Data CEO and founder Priya Keshav leads a deep-dive conversation into the challenges and best practices around UOOM. As data privacy regulations tighten and scrutiny increa…
…
continue reading

1
The 2025 Cyber Crossroads: Balancing AI Innovation with IoT Security and Evolving Threats
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37Navigate the complex cybersecurity landscape of Q2 and Summer 2025 as we delve into the escalating convergence of AI-driven cyberattacks, the persistent vulnerabilities of the expanding Internet of Things (IoT), and the challenges of establishing robust security and governance frameworks. Based on recent Q1 2025 incident data and expert projections…
…
continue reading

1
Massive DeepSeek Data Breach Exposes AI Secrets—Are You Next?
3:17
3:17
Play later
Play later
Lists
Like
Liked
3:17In a shocking revelation, The Daily Threat exposes the massive data breach at DeepSeek, a prominent AI company, where over a million sensitive records were left completely unprotected on a public database. This gripping episode uncovers how a simple configuration error exposed critical chat logs, API keys, and backend metadata, turning the AI compa…
…
continue reading

1
Beyond the Blinky Lights: Why Security Governance Drives Technology with Bryant Tow
46:50
46:50
Play later
Play later
Lists
Like
Liked
46:50In this eye-opening episode of SecureTalk, host Justin Beals welcomes Bryant Tow, Chief Security Officer at LeapFrog Services, to discuss why technology alone can't solve cybersecurity challenges. Bryant reveals how the "Ring of Security" concept shows that up to half of your attack surface lies outside of technology—in governance, policies, people…
…
continue reading

1
E045 - Dialed In: Telemarketing, Compliance, and Consumer Protection
48:12
48:12
Play later
Play later
Lists
Like
Liked
48:12Telemarketing compliance isn’t exactly the hottest topic in tech circles… but maybe it should be. In this episode, Milou and Brian sit down with Kevin Mayfield, Manager of Marketing Compliance at CompliancePoint, to dig into the often-overlooked world of do-not-call laws, TCPA risks, and the real impact of telemarketing rules on tech companies (yes…
…
continue reading

1
2025 Q1 Cyber Shockwave: Ransomware Records, AI Threats, and the Regulatory Reckoning
21:31
21:31
Play later
Play later
Lists
Like
Liked
21:31The first four months of 2025 witnessed an alarming surge in global cybersecurity incidents, with ransomware attacks reaching unprecedented levels. Join us as we dissect the key trends, including the evolution of ransomware tactics like double extortion, the increasing sophistication of social engineering fueled by AI and deepfakes, and the persist…
…
continue reading

1
🚨Microsoft Entra Lockouts: A Token Logging Mishap Causes Chaos
3:38
3:38
Play later
Play later
Lists
Like
Liked
3:38Chaos erupts in the Microsoft Entra ecosystem as a simple logging mishap triggers widespread account lockouts across organizations. In this gripping episode of The Daily Threat, we dissect a critical incident where internal token logging practices inadvertently invalidated user credentials, exposing the fragile nature of identity management systems…
…
continue reading

1
What’s Hot in AI Security at RSA Conference 2025?
24:14
24:14
Play later
Play later
Lists
Like
Liked
24:14Send us a text What’s really hot at RSA Conference 2025? MLSecOps Community Manager Madi Vorbrich sits down with Protect AI Co‑Founder Daryan “D” Dehghanpisheh for a rapid rundown of must‑see sessions, booth events, and emerging AI‑security trends—from GenAI agents to zero‑trust AI and million‑model scans. Use this episode to build a bullet‑proof R…
…
continue reading

1
Navigating Privacy Risks with the NIST Privacy Framework 1.1
16:59
16:59
Play later
Play later
Lists
Like
Liked
16:59This podcast delves into the NIST Privacy Framework 1.1, a voluntary tool developed to help organizations identify and manage privacy risk while fostering innovation and protecting individuals' privacy. We explore its three core components: Core, Organizational Profiles, and Tiers, and how they enable organizations to understand, assess, prioritize…
…
continue reading

1
#717: Conversational AI with Amazon Nova Sonic, Amazon Bedrock Guardrails announces new capabilities
38:03
38:03
Play later
Play later
Lists
Like
Liked
38:03Learn about the latest new FM in the Nova family that simplifies conversational AI with low latency, and build safely with new capabilities for Amazon Bedrock Guardrails.00:00 - Intro, 00:27 - Amazon Nova Sonic, 03:13 - Amazon Bedrock Guardrails, 05:23 - Analytics, 08:18 - Application Integration, 08:37 - Artificial Intelligence, 12:06 - Business A…
…
continue reading

1
Remote Access Gets a Reality Check and AnyDesk Patch Drops After Active Exploits
6:13
6:13
Play later
Play later
Lists
Like
Liked
6:13In this critical cybersecurity update, The Daily Threat dives deep into the latest AnyDesk vulnerability that’s sending shockwaves through remote access technology. Discover how a zero-day exploit could potentially compromise thousands of remote desktop sessions, giving attackers unprecedented control over business networks. Our experts break down …
…
continue reading

1
Beyond the Firewall: The Offensive Cybersecurity Edge
13:24
13:24
Play later
Play later
Lists
Like
Liked
13:24Dive into the dynamic world of offensive cybersecurity with insights from leading experts and real-world scenarios. We explore the critical role of techniques like penetration testing, adversary simulation, and red team exercises in proactively identifying vulnerabilities and strengthening defenses against evolving cyber threats. Understand how ado…
…
continue reading

1
AI on Trial: Decoding the Intersection of Artificial Intelligence and Harm
21:17
21:17
Play later
Play later
Lists
Like
Liked
21:17Explore the rapidly evolving landscape where artificial intelligence intersects with criminality and societal risks. Drawing on expert research, this podcast delves into the transformative potential of AI-enabled crime, from sophisticated financial fraud using deepfakes to the generation of child sexual abuse material, and the challenges this poses…
…
continue reading

1
American Fintech Council - Ian Moloney Talks the Future of Our Industry
1:01:41
1:01:41
Play later
Play later
Lists
Like
Liked
1:01:41Send us a text Guest: Ian Moloney, Head of Policy & Regulatory Affairs, American Fintech Council Host: Jim McCarthy, Chairman of McCarthy Hatch and Founding Member of the CFPB Podcast: Financial Forward 🔑 Key Topics: What the American Fintech Council Stands For Ian describes the AFC's role as a bridge between regulators and innovators, ensuring fin…
…
continue reading

1
Quantum Leap Security: Navigating the Post-Quantum Cryptography Era
9:45
9:45
Play later
Play later
Lists
Like
Liked
9:45We delve into the urgent need for organizations to prepare for the era of quantum computing, which threatens to break today's standard encryption methods. We examine the "harvest now, break later" (HNDL) threat, where malicious actors are already collecting encrypted data for future decryption by quantum computers. Drawing upon information from sou…
…
continue reading

1
Microsoft Defender Cracks Down—You Can’t Turn It Off
3:03
3:03
Play later
Play later
Lists
Like
Liked
3:03Microsoft Defender is changing the game for cybersecurity, and IT professionals need to pay attention. In a bold move, Microsoft has removed the ability to disable real-time protection directly from the Windows Security app, forcing a more stringent security approach across organizations. This episode dives deep into the implications of this update…
…
continue reading

1
The AI and Influence Front - (dis/mis)Information
23:04
23:04
Play later
Play later
Lists
Like
Liked
23:04Explore the escalating threats posed by artificial intelligence incidents, sophisticated disinformation campaigns like the Doppelgänger network targeting nations from France to Israel, and the cyber espionage activities of threat actors such as UAC-0050 and UAC-0006 as revealed by Intrinsec's analysis. We delve into the tactics, infrastructure, and…
…
continue reading

1
Vibe Coding: Creativity Meets Risk in the Age of AI-Driven Development | A Conversation with Izar Tarandach | Redefining CyberSecurity with Sean Martin
35:52
35:52
Play later
Play later
Lists
Like
Liked
35:52⬥GUEST⬥ Izar Tarandach, Sr. Principal Security Architect for a large media company | On LinkedIn: https://www.linkedin.com/in/izartarandach/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ In …
…
continue reading

1
Episode 334: Flipping the Script - Two Tactics Vendors Are Using to Secure Their Bank Info With Clients (You)
22:26
22:26
Play later
Play later
Lists
Like
Liked
22:26Vendor team members need to be vigilant when collecting and confirming bank account information. Now, some vendors are doing the same. If you want to hear what tactics the vendors are using to secure their banking information and how it benefits vendor teams…. Keep listening. Check out my website www.debrarrichardson.com if you need help implementi…
…
continue reading

1
Unpacking the Cloud Security Alliance AI Controls Matrix
35:53
35:53
Play later
Play later
Lists
Like
Liked
35:53Send us a text In this episode of the MLSecOps Podcast, we sit down with three expert contributors from the Cloud Security Alliance’s AI Controls Matrix working group. They reveal how this newly released framework addresses emerging AI threats—like model poisoning and adversarial manipulation—through robust technical controls, detailed implementati…
…
continue reading