Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
A regular conversation with those at the convergence of data privacy, data security, data regulation, records, and governance.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
The State and Popular Culture
…
continue reading
Welcome to a podcast that dives deep into the fascinating crossroads of data, AI, privacy, and cybersecurity. Hosted by data and AI expert Kate Carruthers, this series explores the cutting-edge frontiers of our digital world, where data is forging an entirely new economy. Tune in to stay ahead of the curve and uncover the opportunities, challenges, and innovations shaping our future.
…
continue reading
Jen Psaki tackles the biggest issues of the week and features one-on-one interviews with newsmakers.
…
continue reading
Data Hurdles is a podcast that brings the stories of data professionals to life, showcasing the challenges, triumphs, and insights from those shaping the future of data. Hosted by Michael Burke and Chris Detzel, this podcast dives into the real-world experiences of data experts as they navigate topics like data quality, security, AI, data literacy, and machine learning. Each episode features guest data professionals who share their journeys, lessons learned, and the impact of data on industr ...
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
…
continue reading
A podcast on the journey to discovery through data in information security by Bob Rudis & Jay Jacobs
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading

1
Healthcare NOW Radio Podcast Network - Discussions on healthcare including technology, innovation, policy, data security, telehealth and more. Visit HealthcareNOWRadio.com
Healthcare NOW Radio and Podcast Network - Radio and Podcasts for the Healthcare Industry
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
…
continue reading
Our latest TIAKI thought leadership to help determined leaders achieve differentiation in the global sports ecosystem. Listen to our expert analysis and bold thinking to help you achieve the extraordinary in sport.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Data Center Frontier’s editors are your guide to how next-generation technologies are changing our world, and the critical role the data center industry plays in creating our extraordinary future.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
For those who are interested in the hottest field in a technology world. Whether you are a professional who wants to learn more about privacy, data protection, or cyber law or someone who just finds this fascinating, we have topics for you from data management to cybersecurity to social justice and data ethics and AI. In-depth information on serious privacy topics. This podcast, hosted by Dr. K Royal, Paul Breitbarth and Ralph O'Brien, features open, unscripted discussions with global privac ...
…
continue reading
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
…
continue reading
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
…
continue reading
The Rebel Tech podcast, hosted by Zach Whiting and David Dunmoyer, is a product of the Texas Public Policy Foundation that explores technology and innovation, and its implications on everything from culture, public policy discussions, business, to how we live our lives and interact with one another. The Rebel Tech podcast features prominent guests, ranging from lawmakers to entrepreneurs to thought leaders fighting on the side of humanity on the digital frontier.
…
continue reading
Covering everything from the future of organizational culture to accelerated cloud adoption, in this inaugural podcast series, Splunk thought leaders sit down with Principal Analyst Daniel Newman to discuss the unique intricacies organizations are navigating in an era of rapid digital transformation and how data remains the key solution to thriving in uncertain times.
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
Interesting, fascinating, provoking, insightful - or all of the above - GDPR decisions, rulings and other tidbits discussed by two very opinionated people.
…
continue reading
A gumbo of cybersecurity insights about Data Protection, Data Governance, and Data Backup
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Welcome to "Analyze Happy: Crafting Your Modern Data Estate", the podcast where data meets delight! Dive into the world of modern data estate tools and discover how to harness advanced analytics, data governance, and AI transformation to accelerate growth in your organization. With a spotlight on the Microsoft ecosystem—think Fabric, Azure Databricks, Power Platform, IoT Edge, and Real-Time Intelligence—we’ll explore best practices, actionable insights, and the latest innovations to build a ...
…
continue reading
The Power of Digital Policy is a podcast that teaches you and your organization how to balance the risks and opportunities that come with operating websites, social media, mobile applications, voice assistants, AI and other channels. Through a monthly focus on individual topics, such as accessibility, cookies, copyrights, social media faux pas, data breaches, and data privacy, you will learn how to develop guardrails to maximize digital opportunity and minimize risk. Whether you work for a s ...
…
continue reading
An open show powered by community LINUX Unplugged takes the best attributes of open collaboration and turns it into a weekly show about Linux.
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
computer help free. blogtvpccareman
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
All things data.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading

1
Revenue Cycle Optimized: Staying Ahead in the AI Arms Race with Payors
29:46
29:46
Play later
Play later
Lists
Like
Liked
29:46Staying Ahead In The AI Arms Race With PayorsAs artificial intelligence takes a front seat in revenue cycle operations, providers are confronting a fast-changing landscape shaped by payor-driven automation. Denials are being issued in seconds. Post-payment reviews are ramping up. And compliance, once a back-office function, is now a strategic neces…
…
continue reading

1
Fabric vs. Databricks: Securing Confidential Data in the Modern Azure Stack
36:20
36:20
Play later
Play later
Lists
Like
Liked
36:20Send us a text In this episode, we dive deep into how Microsoft Fabric stacks up against Azure Databricks' Unity Catalog when managing confidential and highly regulated data like Personally Identifiable Information (PII). You'll learn: The current state of Fabric's governance features, including Purview integration, access control via Azure AD, and…
…
continue reading

1
teissTalk: Mitigating human cyber-risks with data and behavioural sciences
45:38
45:38
Play later
Play later
Lists
Like
Liked
45:38Which behaviours increase risk and how we can measurably change them Driving employee engagement without incentives Which real-time interventions encourage safer employee behaviours Jonathan Craven, Host, teissTalk https://www.linkedin.com/in/jonathanbcraven/ Rebecca Stephenson, Specialist Lead Lecturer, Highlands College https://www.linkedin.com/i…
…
continue reading

1
Data flows, privacy risks and foreign surveillance of Australians with Johnny Ryan
42:42
42:42
Play later
Play later
Lists
Like
Liked
42:42Dr Miah Hammond-Errey is joined by Dr Johnny Ryan, Director of Enforce at the Irish Council for Civil Liberties and a leading authority on surveillance, data rights, and privacy. Drawing on his extensive experience in the ad tech industry and digital rights advocacy, Dr Ryan explains how real-time bidding (RTB)—the backbone of online advertising—ro…
…
continue reading

1
DCIM (Data Center Infrastructure Management) and its Role in Data Center Security
17:25
17:25
Play later
Play later
Lists
Like
Liked
17:25Explore the critical intersection of Data Center Infrastructure Management (DCIM), Common Data Center Security issues and Zero Trust Architecture (ZTA) with a special focus on how our innovative OpenData solution can help. As data centers face increasing security threats and regulatory pressures, understanding how to effectively integrate DCIM into…
…
continue reading

1
'A huge freaking deal': Psaki sounds alarm on Supreme Court letting DOGE access social security data
41:39
41:39
Play later
Play later
Lists
Like
Liked
41:39Even as the feud between Donald Trump and Elon Musk threatens untold chaos, the Supreme Court ruled in favor of DOGE in granting access to Americans' personal Social Security data. Jen Psaki, Ronan Farrow, Senator Elissa Slotkin, and Rep. Melanie Stansbury discuss the dangers and the level of concern among American voters.…
…
continue reading

1
300: Why Data Classification Might Be Your Biggest Security Risk – Data Management Veteran
24:08
24:08
Play later
Play later
Lists
Like
Liked
24:08Anand Athavale, Data Management veteran joins to explain why separating regulatory data (like PII) from security-sensitive data (like passwords and keys) is mission-critical. Learn how ransomware’s evolution has blurred roles between compliance and security, and why top-down policy, automation, and AI must reshape your data strategy now.…
…
continue reading
Viasat confirms it was breached by Salt Typhoon. Microsoft’s June 2025 security update giveth, and Microsoft’s June 2025 security update taketh away. Local privilege escalation flaws grant root access on major Linux distributions. BeyondTrust patches a critical remote code execution flaw. SMS low cost routing exposes users to serious risks. Erie In…
…
continue reading

1
Data Makes the World Go Round (with Noël Luke)
33:07
33:07
Play later
Play later
Lists
Like
Liked
33:07Send us a text It's been a while since we last talked about cross-border data transfers, but that does not mean that all issues have resolved themselves. And while the focus may still largely be on the EU-US relations for data transfers, the core developments actually relate to the Global Cross-Border Privacy Rules. Therefore, on this week of Serio…
…
continue reading

1
Scattered Spider Targets US Insurance, Microsoft Zero-Day, Major Database Breach, and AI Poison Pill
11:14
11:14
Play later
Play later
Lists
Like
Liked
11:14In this episode, host Jim Love delves into recent cybersecurity threats and breakthroughs. The notorious Scattered Spider hacker group has shifted its focus to US insurance companies after attacking UK retailers earlier this year. Microsoft's urgent security updates address active zero-day vulnerabilities that allow complete system control. Researc…
…
continue reading

1
Outrage grows over ICE overreach as public gets wise to Trump's dirty tactics to round up immigrants
41:28
41:28
Play later
Play later
Lists
Like
Liked
41:28Jen Psaki reports on yet another public official being arrested by ICE in the course of their heavy-handed tactics in rounding up immigrants. But each new instance of abuse of power by ICE is met with more vocal outrage and louder public protests.By NBC News
…
continue reading
Here comes SQL Server 2025! While at Build, Richard chatted with Bob Ward about releasing a preview version of SQL Server 2025. Bob discusses SQL Server 2025 as an AI-ready enterprise database with numerous capabilities specifically tailored to your organization's AI needs, including a new vector data type. This includes making REST API calls to Az…
…
continue reading
A House oversight committee requests DOGE documents from Microsoft. Predatory Sparrow claims a cyberattack on an Iranian bank. Microsoft says data that happens in Europe will stay in Europe. A complex malware campaign is using heavily obfuscated Visual Basic files to deploy RATs. A widely used CMS platform suffers potential RCE bugs. North Korea’s …
…
continue reading

1
DFSP # 487 Unmasking Malicious Activity with 4688
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51
…
continue reading

1
We Checked the “Yes” Box for Cybersecurity. What Else Do We Have to Do?
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24All links and images can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is Alex Hall, CISO, Gensler. In this episode: Evaluating secure messaging beyond the app Reframing compliance as a business enabler Incremental security inv…
…
continue reading

1
Know Anyone’s True Interests in 60 Seconds — Even Their Biases!
5:58
5:58
Play later
Play later
Lists
Like
Liked
5:58Bias is everywhere—on the surface and deep under it. But what if you could spot it… before it affects your life? In this episode of ask socialprofiler, we explore how our AI-powered platform uncovers people’s real interests, values, and even subtle biases—just from public social media data. No guesswork. No invasions. Just digital facts. 🔍 Whether …
…
continue reading

1
Leading with People, Process, and Performance in Digital Transformation
31:49
31:49
Play later
Play later
Lists
Like
Liked
31:49Join us for an insightful conversation with Jenny Zhan, the newly appointed EdgeConneX Chief Transformation Officer, as she shares her unique perspective on leading organizational change in today’s fast-paced, competitive environment. Transitioning from her previous role as Chief Accounting Officer to spearheading digital transformation efforts, Zh…
…
continue reading

1
PII, Purview, and Private Endpoints: Governing Data in Hybrid Databricks-Fabric Setups
31:19
31:19
Play later
Play later
Lists
Like
Liked
31:19Send us a text In this deep-dive episode, we explore the complexities—and solutions—of managing data governance across a hybrid architecture combining Azure Databricks with Unity Catalog and Microsoft Fabric with OneLake. If your organization handles PII across cloud platforms, this conversation is for you. We unpack: Why the lack of private endpoi…
…
continue reading

1
Android 16's Dark Side Threatens Every Custom ROM
39:42
39:42
Play later
Play later
Lists
Like
Liked
39:42Episode 229: Android 16 is out but will make life harder for custom ROMs, passkey portability is in the works, a dating app based on your search history, and more! Welcome to the Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest security & privacy news. 🔎 EasyOptOuts is the easy, affordable, and effective way …
…
continue reading

1
Darknet drug marketplace closed for business.
37:24
37:24
Play later
Play later
Lists
Like
Liked
37:24International law enforcement takes down a darknet drug marketplace. The Washington Post is investigating a cyberattack targeting several journalists' email accounts. Anubis ransomware adds destructive capabilities. The GrayAlpha threat group uses fake browser update pages to deliver advanced malware. Researchers uncover a stealthy malware campaign…
…
continue reading
Artificial Intelligence is taking over. But I don’t mean that in a Skynet kinda way. It’s simply becoming ubiquitous because companies are insisting on inserting the technology into all their products, even if it’s not useful – or not even safe. Unfortunately, the breathless reporting on dangers of AI is also getting way out of hand, including stor…
…
continue reading

1
The Invisible Threats: OT Meets IT in Modern Manufacturing
39:50
39:50
Play later
Play later
Lists
Like
Liked
39:50Think you can manage industrial systems like your IT infrastructure? Think again. In this episode of The Audit, Dino Busalachi unpacks the high-stakes complexity of OT-IT convergence—and why your trusty IT playbook flatlines on the plant floor. Join the IT Audit Labs crew as we dive into the chaos of managing 10,000+ industrial assets across a spra…
…
continue reading

1
Cybersecurity Today: WestJet Cyber Incident, Anubis Ransomware Evolution, Discord Exploits, and Google Cloud Outage
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30Host David Shipley discusses several critical cybersecurity incidents and developments. WestJet, Canada's second-largest airline, faced a cybersecurity breach impacting its mobile app and internal systems. The airline is working with law enforcement to investigate while emphasizing the integrity of its flight operations. Additionally, the Anubis ra…
…
continue reading

1
Cities of the Future or Hacker’s Paradise? The Cybersecurity Risks of Smart Cities
18:26
18:26
Play later
Play later
Lists
Like
Liked
18:26Join us as we explore the concept of smart cities—municipalities enhanced by connected technology like sensors, cameras, and automated systems to improve services and infrastructure. We discuss the inherent vulnerabilities that come with these advancements, including cybersecurity threats and real-life incidents such as hacked crosswalk signals fea…
…
continue reading

1
Danabot: The Malware Operation That infected Itself
1:30:37
1:30:37
Play later
Play later
Lists
Like
Liked
1:30:37In this episode: the inside story of Danabot, the malware-as-a-service platform that thrived in the shadows for nearly a decade—until a critical mistake exposed its creators. Just last week, U.S. prosecutors unsealed charges against sixteen alleged operators, using evidence pulled not from a takedown, but from Danabot’s own infection logs. Plus: a …
…
continue reading

1
Ask the Educator: Inside the HSPA Certification Exam Process
15:28
15:28
Play later
Play later
Lists
Like
Liked
15:28Episode 140: Inside the HSPA Certification Exam ProcessWhat goes into creating a certification exam? Quite a bit more than you might think. On this episode, Kevin and Adam sit down with HSPA’s Siri Sorenson to unpack the process behind certification exams—from their development to delivery. Tune in to learn why certification matters, which options …
…
continue reading

1
HealthLaw HotSpot: Money, Mindset & Medicine: Financial Planning for Healthcare Professionals
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50Host Ericka Adler sits down with Treasa Moran, Financial Advisor at Anchor Point Wealth Advisors, to discuss the unique financial challenges and opportunities facing healthcare professionals. From managing student debt and planning for retirement, to understanding the emotional side of money, this episode is packed with insights for physicians, den…
…
continue reading
We spent the week learning keybindings, installing dependencies, and cramming for bonus points. Today, we score up and see how we did in the TUI Challenge. Sponsored By: Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Management: 1Password…
…
continue reading

1
Introducing Tresorit Engage – Secure, customizable workspaces for seamless client and partner collaboration
19:05
19:05
Play later
Play later
Lists
Like
Liked
19:05Join us for an insider’s view at why and how we built Tresorit Engage — our latest solution designed to streamline external collaboration with clients and partners.We’ll walk you through the journey that led to Engage Rooms and how it helps businesses run projects at full speed and collaborate with full confidence. We’ll look into how to spin up da…
…
continue reading

1
Mark Nunnikhoven: Providing clarity about security. [Cloud strategy]
8:53
8:53
Play later
Play later
Lists
Like
Liked
8:53Please enjoy this encore of Career Notes. Distinguished Cloud Strategist at Lacework, Mark Nunnikhoven, has gone from taking technology to its limits for his own understanding to providing clarity about security for others. Mark fell in love with his Commodore 128 and once he realized he could bend the machine to his will, it set him on the path to…
…
continue reading

1
VBC Insights: Advancing Post Hospital Recovery Through Value Based Models
26:21
26:21
Play later
Play later
Lists
Like
Liked
26:21As hospitals and health systems continue to evolve in value-based care, optimizing the post-acute recovery process has become a top priority. On this episode Dan is joined by Diane Shifley, Assistant Vice President of Population Health and Post-Acute Services at a major Chicago health system to discuss how robust transitions-in-care programs can dr…
…
continue reading

1
The Virtual Shift: Adam Russo on The MAHA Report
25:38
25:38
Play later
Play later
Lists
Like
Liked
25:38On this episode Tom invites Adam V. Russo, Esq., Co-Founder and Chief Executive Officer of The Phia Group, LLC. and founder and managing partner of The Law Offices of Russo & Minchoff. Adam and Tom discuss the newly released MAHA report that will drive HHS policy on making Americans health again. Tom also announces Adam's new show on Healthcare NOW…
…
continue reading

1
The Secret CISO: Navigating the Human and Technical Challenges in Cybersecurity
51:57
51:57
Play later
Play later
Lists
Like
Liked
51:57In this episode of 'Cybersecurity Today,' hosts John Pinard and Jim Love introduce their unique show, 'The Secret CISO,' which aims to dive deep into the lives and thoughts of CISOs and similar roles, beyond the usual interview-style format. The guest for this episode is Priya Mouli, CISO at Sheridan College, who shares her journey from engineering…
…
continue reading
This week, Dave is joined by Ziv Karliner, Pillar Security’s Co-Founder and CTO, sharing details on their work on "New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents." Vibe Coding - where developers use AI assistants like GitHub Copilot and Cursor to generate code almost instantly - has become central to how e…
…
continue reading

1
Trump gets played as world leaders he admires see through his theatrics
42:01
42:01
Play later
Play later
Lists
Like
Liked
42:01Jen Psaki looks at the effort Donald Trump is putting into trying to make himself look like a third world tough guy even as the tough guy world leaders he admires keep making it clear they don't respect him.By NBC News
…
continue reading

1
This Just In: HIMSS25 with Dr. Eric Quiñones and Nicole Roskill
25:31
25:31
Play later
Play later
Lists
Like
Liked
25:31Host Justin Barnes recorded live at HIMSS25 in Las Vegas. Stay tuned for the next few weeks to hear all his guests.This week his guests are Dr. Eric Quiñones, Chief Healthcare Advisor at World Wide Technology, and Nicole Roskill, Director of Partnerships at Help Scout.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smar…
…
continue reading

1
Talking the Walk: Karly Rowe and Inovalon at HFMA 2025
24:05
24:05
Play later
Play later
Lists
Like
Liked
24:05Host Tom Testa sits down with Karly Rowe, President Provider Business Unit at Inovalon a company that provides cloud-based SaaS solutions empowering data-driven healthcare. Inovalon will be attending HFMA 2025 in Denver launching their new product. Their team will showcase and demo the new registration workflow product at Booth 207 during the HFMA …
…
continue reading
Cloudflare says yesterday’s widespread outage was not caused by a cyberattack. Predator mobile spyware remains highly active. Microsoft is investigating ongoing Microsoft 365 authentication services issues. An account takeover campaign targets Entra ID users by abusing a popular pen testing tool. Palo Alto Networks documents a JavaScript obfuscatio…
…
continue reading
Send us a text On this week of Serious Privacy, Paul Breitbarth is away so Ralph O’Brien of Reinbo Consulting, and Dr. K Royal bring you a full docket of privacy news. And it is a doozy of a week! Powered by TrustArc Powered by TrustArc If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @serio…
…
continue reading

1
SAP + Databricks: Real-Time Insights Without Replication — Unlocking AI with Business Data Cloud
26:37
26:37
Play later
Play later
Lists
Like
Liked
26:37Send us a text n this episode, we dive deep into SAP’s strategic integration with Databricks—powered by SAP Business Data Cloud (BDC)—to explore how enterprises are unlocking AI, machine learning, and real-time analytics on top of their most critical business data without costly data replication. We’ll break down: What SAP Business Data Cloud is an…
…
continue reading

1
Healing with Data: Navigating Healthcare Governance & Compliance in 2025
26:05
26:05
Play later
Play later
Lists
Like
Liked
26:05Send us a text In this episode, we explore the evolving landscape of healthcare data governance and regulatory compliance. From HIPAA and GDPR to emerging cybersecurity mandates, we unpack the critical frameworks shaping how patient data is protected in mid-sized to enterprise healthcare organizations. Tune in to learn: What HIPAA, HITECH, GDPR, an…
…
continue reading

1
AI Readiness: Beyond the Hype — What Fortune 500s Must Get Right
18:27
18:27
Play later
Play later
Lists
Like
Liked
18:27Send us a text In this episode, we unpack what it truly means to be AI-ready in today’s enterprise landscape. While many companies rush into “shiny AI use cases,” we go deeper—breaking down the three pillars of readiness: data quality, infrastructure maturity, and human capital. But that’s just the starting point. Drawing from the latest Cisco AI R…
…
continue reading

1
The Databricks-Fabric Connection: Paths, Pitfalls, and Possibilities
18:21
18:21
Play later
Play later
Lists
Like
Liked
18:21Send us a text In this deep-dive episode, we unpack the technical and strategic implications of integrating Databricks with Microsoft Fabric. As enterprises increasingly operate across hybrid data ecosystems, ensuring seamless interoperability between platforms is critical. This episode covers the full landscape—OneLake mounting techniques, Delta S…
…
continue reading

1
AI Security Threats: Echo Leak, MCP Vulnerabilities, Meta's Privacy Scandal, and the 'Peep Show'
12:55
12:55
Play later
Play later
Lists
Like
Liked
12:55In this episode of Cybersecurity Today, host Jim Love discusses critical AI-related security issues, such as the Echo Leak vulnerability in Microsoft's AI, MCP's universal integration risks, and Meta's privacy violations in Europe. The episode also explores the dangers of internet-exposed cameras as discovered by BitSight, highlighting the urgent n…
…
continue reading

1
Israel bombs Iran and a federal judge upends Trump's use of the National Guard in L.A.
58:35
58:35
Play later
Play later
Lists
Like
Liked
58:35Jen Psaki covers breaking news of an attack by Israel on Iran, while at the same time a federal judge issued a temporary stay on Donald Trump's use of the National Guard in Los Angeles and California Governor Gavin Newsom addresses the press.By NBC News
…
continue reading

1
Digital Health Talks: Breaking Free from Healthcare's Escape Room
28:04
28:04
Play later
Play later
Lists
Like
Liked
28:04Breaking Free from Healthcare's Escape Room: Tom Lawry on AI Strategy and Systemic HopeTom Lawry, Microsoft's former Director for AI in Health and Life Sciences and author of the new book Health Care Nation, joins us to discuss moving beyond healthcare fatalism toward actionable reform. Named one of 20 people transforming healthcare through practic…
…
continue reading
Interpol’s Operation Secure dismantles a major cybercrime network, and Singapore takes down scam centers. GitLab patches multiple vulnerabilities in its DevSecOps platform. Researchers unveil a covert method for exfiltrating data using smartwatches. EchoLeak allows for data exfiltration from Microsoft Copilot. Journalists are confirmed targets of P…
…
continue reading