Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Open Source Security is a media project to help showcase and educate on open source security. Our goal is to give the community a platform educate both developers and users on how open source security works. There’s a lot of good work happening that doesn’t get attention because there’s no marketing department behind it, they don’t have a developer relations team posting on LinkedIn every two hours. Let’s focus on those people and teams then learn what they do and how they do it. The goal is ...
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Stay up to date with the Nextcloud community!
…
continue reading
David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
The Dynamist, a podcast by the Foundation for American Innovation, brings together the most important thinkers and doers to discuss the future of technology, governance, and innovation. The Dynamist is hosted by Evan Swarztrauber, former Policy Advisor at the Federal Communications Commission. Subscribe now!
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
Allison Sheridan's technology geek podcast with an EVER so slight Apple bias
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
…
continue reading
Welcome to Betatalks the podcast, in which we talk with friends from the development community. We chat not only about technology, but what drives them, inspires them and makes them unique. Rick (Cloud Solution Architect at Microsoft) and Oscar (CTO at Virtual Vaults), invite developers, makers, Open Source maintainers and other amazing people from the .NET and Azure development community. Looking for more content? Have a look at our Betatalks video's.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading

1
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
The New Stack Podcast is all about the developers, software engineers and operations people who build at-scale architectures that change the way we develop and deploy software. For more content from The New Stack, subscribe on YouTube at: https://www.youtube.com/c/TheNewStack
…
continue reading
Signal Jam is a podcast about regaining and maintaining privacy in the face of pervasive corporate and government surveillance. Co-hosts, Jay and Michael, discuss practical steps that anyone can take toward achieving that outcome— no matter how 'tech-savvy' they may be.
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading

1
The NDS Show - An Intelligence Community Podcast covering Geospatial Intelligence, Open Source Intelligence OSINT, Human Intelligence HUMINT, Military & National Security
The NDS Show
Unlock a world of valuable insights and thought-provoking discussions related to the Special Forces, Military, and Intelligence Community (CIA, NSA, NGA, FBI, Military Intelligence). Things we discuss: GEOINT, OSINT, HUMINT, SIGINT, SOF, Special Forces, Military, Veterans Issues, Army, Navy, Marines, Air Force, Entrepreneurship, Geopolitics, News, Politics, Technology, Artificial Intelligence, Augmented Reality, Cloud Computing, Data Analytics, Government Contracting, Defense Contracting, Bu ...
…
continue reading
Calling all .NET developers! Dive into the heart of modern .NET technology with us. We are the go-to podcast for all .NET developers worldwide; providing an audio toolbox for developers who use modern .NET. Our show, previously known as The .NET Core Podcast, is all about keeping you up-to-date and empowered in this ever-evolving field. Tune in for engaging interviews with industry leaders, as we discuss the topics every .NET developer should be well-versed in. From cross-platform wonders to ...
…
continue reading
The Open at Intel podcast is about all things open source, from software to security to artificial intelligence to Linux and beyond. Each episode brings you fresh perspectives with sophisticated, leading-edge, free-ranging conversations from some of the best minds in the open source community.
…
continue reading
Talk Python to Me is a weekly podcast hosted by developer and entrepreneur Michael Kennedy. We dive deep into the popular packages and software developers, data scientists, and incredible hobbyists doing amazing things with Python. If you're new to Python, you'll quickly learn the ins and outs of the community by hearing from the leaders. And if you've been Pythoning for years, you'll learn about your favorite packages and the hot new ones coming out of open source.
…
continue reading
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Marcel Gagne and Evan Leibovitch riff on Linux, Open Source, computers, technology, privacy, the digital economy, movies, video games, the Internet, security, breakfast cereal, and anything else related to the modern, open world.
…
continue reading
Welcome to Open Comments hosted by The Open Group*, where we’ll discuss things openly with our guests from a variety of backgrounds and from different walks of life. Through this podcast, we hope to give you an inside look into a variety of topics with an equal mix of humor and candor. In this series so far, we have touched on the following topics: Healthcare, HR, Diversity + Access to Technology, Cybersecurity, and lots more. We hope you enjoy our show and look forward to bringing more topi ...
…
continue reading
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
…
continue reading
Welcome to Opt Out, where I sit down with passionate people to learn why privacy matters to them, the tools and techniques they’ve found and leveraged, and where we encourage and inspire others towards personal privacy and data-sovereignty.
…
continue reading
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
…
continue reading
Open source is different. How different would the world be if we used open source concepts more widely? This micro podcast looks at the open source philosophy and how open source can change the world. Each episode is just over two minutes long. Watch video versions on YouTube and Twitter.
…
continue reading
Revenera experts are joined by industry leaders for discussions on all the latest talking points in the world of software.
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
Discussing the Open Source, Open Threats? paper with Behzad and Ali
34:59
34:59
Play later
Play later
Lists
Like
Liked
34:59In this episode I chat with the authors of a recent paper on open source security: Open Source, Open Threats? Investigating Security Challenges in Open-Source Software. I chat with Ali Akhavani and Behzad Ousat about their findings. There are interesting data points in the paper such as a 98% increase in reported vulnerabilities compared to a 25% g…
…
continue reading

1
Security Onion - From Classroom To SOC, Open Source and Education - Matt Gracie
22:32
22:32
Play later
Play later
Lists
Like
Liked
22:32In this episode of the Security Repo Podcast, we’re joined by Matt Gracie, a seasoned blue team expert and senior engineer at Security Onion Solutions. Matt dives deep into the architecture and practical deployment of Security Onion, a powerful open-source enterprise security monitoring tool. He also shares insights from his role as a cybersecurity…
…
continue reading

1
Open Source Security: OSTIF's 10-Year Journey of Collaborative Audits
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30In this episode of "What's in the SOSS," Derek Zimmer and Amir Montezari from the Open Source Technology Improvement Fund (OSTIF) discuss their decade-long mission of providing security resources to open source projects. They focus on collaborative, maintainer-centric security audits that help projects improve their security posture through expert …
…
continue reading

1
Silk Typhoon’s Fake Adobe Update: How China-Backed Hackers Target Diplomats
40:33
40:33
Play later
Play later
Lists
Like
Liked
40:33A new and highly sophisticated cyber espionage campaign attributed to Silk Typhoon—also known as Mustang Panda, TEMP.Hex, or UNC6384—has been uncovered, targeting diplomats and government entities across Southeast Asia. Researchers from Google’s Threat Intelligence Group (GTIG) revealed that the attackers deployed Adversary-in-the-Middle (AitM) tec…
…
continue reading

1
Fear vs FOMO: Kantar’s View on AI Adoption in Marketing
27:32
27:32
Play later
Play later
Lists
Like
Liked
27:32In this episode of Tech Talks Daily, I speak with Jane Ostler from Kantar, the world’s leading marketing data and analytics company, whose clients include Google, Diageo, AB InBev, Unilever, and Kraft Heinz. Jane brings clarity to a debate often clouded by headlines, explaining why AI should be seen as a creative sparring partner, not a rival. She …
…
continue reading

1
FTC Warns Tech Giants: Don’t Weaken Encryption for Foreign Governments
37:13
37:13
Play later
Play later
Lists
Like
Liked
37:13The fight over encryption has entered a new phase. The Federal Trade Commission (FTC), led by Chairman Andrew Ferguson, has issued a strong warning to major U.S. technology companies: resist foreign government demands to weaken encryption. At stake is nothing less than the security of millions of Americans’ private communications, financial data, a…
…
continue reading
A whistle-blower claims DOGE uploaded a sensitive Social Security database to a vulnerable cloud server. Allies push back against North Korean IT scams. ZipLine is a sophisticated phishing campaign targeting U.S.-based manufacturing. Researchers uncover a residential proxy network operating across at least 20 U.S. states. Flock Safety license plate…
…
continue reading

1
Invisible Prompts: How Image Scaling Attacks Break AI Security
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03Researchers have uncovered a new form of indirect prompt injection that leverages a simple but powerful trick: image scaling. This novel attack involves hiding malicious instructions inside high-resolution images, invisible to the human eye. When AI systems automatically downscale these images during preprocessing, the hidden prompt becomes visible…
…
continue reading

1
From Risk Acceptance to Community Building: Inside Security With Sean Juroviesky
19:32
19:32
Play later
Play later
Lists
Like
Liked
19:32In this episode of the Security Repo Podcast, Sean Juroviesky joins us to share their journey through cybersecurity, from finding community in BurbSec to giving talks at major conferences like DEF CON and BlueTeamCon. Sean dives deep into the realities of risk management, executive sign-off processes, and the critical importance of understanding bu…
…
continue reading

1
Healthcare Services Group Breach Exposes 624,000 Individuals’ Sensitive Data
1:04:53
1:04:53
Play later
Play later
Lists
Like
Liked
1:04:53The healthcare sector has been rocked yet again by a massive cybersecurity incident. Healthcare Services Group (HCSG), a provider of dining and laundry services to healthcare facilities, disclosed a data breach that compromised the personal information of over 624,000 individuals. Between late September and early October 2024, hackers gained unauth…
…
continue reading

1
Auchan Data Breach: Hundreds of Thousands of Loyalty Accounts Compromised
40:09
40:09
Play later
Play later
Lists
Like
Liked
40:09French retail giant Auchan has confirmed a massive data breach that compromised the personal details of hundreds of thousands of customers. The stolen data includes names, addresses, phone numbers, email addresses, and loyalty card numbers—though banking details, passwords, and PINs were reportedly not affected. Despite this, the breach is serious …
…
continue reading

1
Embedded Executive: Quantum Cryptography Must Be Part of Your Vocabulary | Infineon
11:49
11:49
Play later
Play later
Lists
Like
Liked
11:49We’re in the era of quantum computing. That brings with it a lot of great things. But at the same time, it brings some not so good things. Once again, we’re in a race to stay ahead of the bad guys to keep our systems secure. Folks like the experts at Infineon are doing what they can to do just that. And the best part is that they are trying to insu…
…
continue reading
This week Dave and Gunnar talk about smart glasses and AI existential dread! Follow Up Duperheroes! I Previewed These Emotion-Tracking Smart Glasses, and They Seem Weirdly Useful Someone Built an Ad Blocker for Real Life, and I Can't Wait to Try It 'Positive review only': Researchers hide AI prompts in papers Someone trapped an LLM on inferior hard…
…
continue reading

1
Risky Business #804 -- Phrack's DPRK hacker is probably a Chinese APT guy
53:32
53:32
Play later
Play later
Lists
Like
Liked
53:32On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Australia expels Iranian ambassador Hackers sabotage Iranian shipping satcoms APT hacker got doxxed in Phrack. Kind of. They’re probably Chinese, not DPRK? Trail of Bits uses image-downscaling to sneak prompts into Google Gemini The Com’s King Bob ge…
…
continue reading

1
Docker Desktop Vulnerability: Why Containers Aren’t as Safe as You Think
46:31
46:31
Play later
Play later
Lists
Like
Liked
46:31A critical vulnerability in Docker Desktop, CVE-2025-9074, has shaken the container security world. Scoring 9.3 on the CVSS scale, this flaw exposed an unauthenticated Docker Engine API (192.168.65.7:2375) to any container running on Windows and macOS. With nothing more than a few HTTP requests—or even three lines of Python code—attackers could esc…
…
continue reading

1
AlgoSec on AI, Automation, and the Next Era of Network Management
22:30
22:30
Play later
Play later
Lists
Like
Liked
22:30The enterprise network is under pressure like never before. Hybrid environments, cloud migrations, edge deployments, and the sudden surge in AI workloads have made it increasingly difficult to keep application connectivity secure and reliable. The old model of device-by-device, rule-based network management can’t keep up with today’s hyperconnected…
…
continue reading

1
Arch Linux Website, Forums, and AUR Targeted in Sustained Cyber Assault
40:04
40:04
Play later
Play later
Lists
Like
Liked
40:04The Arch Linux community has just endured more than a week of turbulence as a massive distributed denial-of-service (DDoS) attack disrupted its most critical services, including the main website, the Arch User Repository (AUR), and community forums. Beginning in mid-August 2025, the sustained volumetric and protocol-level assault overwhelmed hostin…
…
continue reading
A cyberattack disrupts state systems in Nevada. A China-linked threat actor targets Southeast Asian diplomats. A new attack method hides malicious prompts inside images processed by AI systems.Experts ponder preventing AI agents from going rogue. A new study finds AI is hitting entry-level jobs hardest. Michigan’s Supreme Court upholds limits on ce…
…
continue reading

1
Data I/O Ransomware Attack: Supply Chain Cybersecurity in Crisis
37:08
37:08
Play later
Play later
Lists
Like
Liked
37:08Cyberattacks against supply chains are no longer isolated disruptions—they are systemic threats with the power to cascade across industries and nations. The recent ransomware attack on Data I/O, a chip programming firm whose customers include global giants like Apple, Microsoft, Amazon, and Bosch, demonstrates how one breach can disrupt manufacturi…
…
continue reading
Seth and Ken return with a new episode summarizing their experience at DEF CON 33 and all things Las Vegas over the past month. This includes panels, talks, workshops, happy hours, and even corporate (boo) events. This is followed by discussion of a few research items that came out of the conference, including James Kettle's HTTP1.1 Must Die talk. …
…
continue reading

1
BianLian Ransomware Strikes Aspire Rural Health: 138,000 Patients Exposed
44:33
44:33
Play later
Play later
Lists
Like
Liked
44:33The U.S. healthcare sector continues to face relentless cyberattacks, and rural hospitals are increasingly at the center of this crisis. The recent Aspire Rural Health System breach in Michigan—attributed to the BianLian ransomware group—exposed the personal and medical data of nearly 140,000 patients and staff. From Social Security numbers and fin…
…
continue reading

1
The Invisible Majority: How Social Media Erases 90% of Voices | Dr. Claire Robertson
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:0890% of Twitter users are represented by only 3% of tweets. When you scroll through your feed and form opinions about what "people are saying" about politics, you're not seeing the voices of nine out of ten users. You're seeing the loudest, most extreme 10% who create 97% of all political content on the platform. In this episode of SecureTalk, host …
…
continue reading

1
OneFlip: How a Single Bit-Flip Can Hack AI Models
49:40
49:40
Play later
Play later
Lists
Like
Liked
49:40Artificial Intelligence (AI) models are shaping the future of industries from healthcare and finance to autonomous vehicles and national infrastructure. But with this rise comes a hidden battlefield: adversarial attacks designed to manipulate AI systems in subtle yet devastating ways. One of the most alarming threats is the OneFlip attack, a method…
…
continue reading

1
Securing AI: A Conversation with Sarah Evans on OpenSSF's AI/ML Initiatives
14:59
14:59
Play later
Play later
Lists
Like
Liked
14:59In this episode of "What's in the SOSS," we welcome back Sarah Evans, Distinguished Engineer at Dell Technologies and a key figure in the OpenSSF's AI/ML working group. Sarah discusses the critical work being done to extend secure software development practices to the rapidly evolving field of AI. She dives into the AI Model Signing project, the gr…
…
continue reading

1
Claroty on Combating Model Poisoning and Adversarial Prompts
35:29
35:29
Play later
Play later
Lists
Like
Liked
35:29AI is rapidly becoming part of the healthcare system, powering everything from diagnostic tools and medical devices to patient monitoring and hospital operations. But while the potential is extraordinary, the risks are equally stark. Many hospitals are adopting AI without the safeguards needed to protect patient safety, leaving critical systems exp…
…
continue reading
Farmers Insurance discloses a data breach affecting over a million people. Agentic AI tools fall for common scams. A new bill in Congress looks to revive letters of marque for the digital age. Cybercriminals target macOS users with the Shamos infostealer. New Android spyware masquerades as antivirus to target Russian business executives. CISA seeks…
…
continue reading

1
Pareto: Customizable On-Chain Private Credit Marketplace - Matteo Pandolfi
1:08:21
1:08:21
Play later
Play later
Lists
Like
Liked
1:08:21Built primarily for institutional-grade clients, Pareto delivers customizable on-chain credit markets designed to expand DeFi liquidity and TradFi tokenization through structured yield strategies tailored to diverse risk profiles. Pareto allows its users to construct individualized credit lines in specific risk-ajusted tranches, with custom: intere…
…
continue reading

1
#734: AWS News: OpenAI, Amazon Elastic VMware Service, and Lots More.
42:53
42:53
Play later
Play later
Lists
Like
Liked
42:53A bumper crop of new and improved things for you to take advantage of.By Amazon Web Services
…
continue reading

1
The Deepfake Hiring Crisis: AI Fraud in Job Interviews
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24What happens when your next hire isn't who they claim to be? In this eye-opening episode of The Audit, we dive deep into the alarming world of AI-powered hiring fraud with Justin Marciano and Paul Vann from Validia. From North Korean operatives using deepfakes to infiltrate Fortune 500 companies to proxy interviews becoming the new normal, this con…
…
continue reading

1
Wide World of Cyber: Microsoft's China Entanglement
45:43
45:43
Play later
Play later
Lists
Like
Liked
45:43The Wide World of Cyber podcast is back! In this episode host Patrick Gray chats with Alex Stamos and Chris Krebs about Microsoft’s entanglement in China. Redmond has been using Chinese engineers to do everything from remotely support US DoD private cloud systems to maintain the on premise version of the SharePoint code base. It’s all blown up in t…
…
continue reading

1
NC #1059 PETLIBRO Capsule Fountain, Tesla Sentry Mode FTW, Tage on Teaching at a Tech College
1:18:04
1:18:04
Play later
Play later
Lists
Like
Liked
1:18:04Clean Pet Water with PETLIBRO Capsule Fountain It Could Have Been Worse — Tesla Sentry Mode is My Witness Support the Show Tage Bushman on Teaching at a Technical College (no blog post) Transcript of NC_2025_08_24 Join the Conversation: [email protected] podfeet.com/slack Support the Show: Patreon Donation Apple Pay or Credit Card one-time donati…
…
continue reading

1
Are Your Passwords Safe From This New Exploit?
29:47
29:47
Play later
Play later
Lists
Like
Liked
29:47Episode 238: A new vulnerability affects nearly every major password manager on the market, a definitive resolution to the Apple/UK Backdoor saga, Mozilla finally refocuses on Firefox, and more. Welcome to the Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest security & privacy news. 📷 Ente is the zero-knowled…
…
continue reading

1
From Deliverables to Outcomes: Emergn’s New Playbook for Digital Success
22:19
22:19
Play later
Play later
Lists
Like
Liked
22:19In November, Alex Adamopoulos, CEO of Emergn, joined me on Tech Talks Daily to talk about transformation fatigue and why so many well-intentioned change programs leave people drained rather than inspired. This time, he’s back with a sharper question: if traditional transformation is broken, what actually works? His answer is refreshingly direct. Pr…
…
continue reading

1
3397: From Wallets to Agents: The Next Chapter for Magic Labs
40:24
40:24
Play later
Play later
Lists
Like
Liked
40:24In this episode of Tech Talks Daily, Neil sits down with Sean Li, co-founder and CEO of Magic Labs, to explore the intersection of crypto wallets, artificial intelligence, and the future of autonomous finance. Sean shares how Magic Labs has already onboarded over 50 million crypto wallets by pioneering simple login methods using email and SMS. Now,…
…
continue reading

1
Julian Waits: Find a way to help society. [Serial Entrepreneur] [Career Notes]
11:04
11:04
Play later
Play later
Lists
Like
Liked
11:04Please enjoy this encore of Career Notes. Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Ba…
…
continue reading

1
3396: How Boson Protocol Is Creating the Infrastructure for AI-Driven Trade
36:33
36:33
Play later
Play later
Lists
Like
Liked
36:33In this episode of Tech Talks Daily, I’m joined for the third time by Justin Banon, the founder of Boson Protocol. A lot has changed since his last appearance. What started as a bold idea to decentralize e-commerce has now evolved into an ambitious, AI-first infrastructure aiming to redefine how we buy, sell, and interact with value itself. Justin …
…
continue reading

1
Beyond the smoke screen. [Research Saturday]
22:22
22:22
Play later
Play later
Lists
Like
Liked
22:22This week, we are joined by Dr. Renée Burton, VP of Infoblox Threat Intel, who is discussing their work on VexTrio, a notorious traffic distribution system (TDS) involved in digital fraud. The VexTrio investigation uncovers a massive global ad fraud and scam operation powered by just 250 virtual machines, tying it directly to named individuals and …
…
continue reading

1
3395: Communication Skills Every Tech Leader Needs
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38What do you do when your technical brilliance doesn’t translate into clear, compelling communication? That’s where Salvatore Manzi comes in. With a background in business communication and a career spent coaching leaders across tech, finance, and global policy, Salvatore helps bold thinkers bring clarity and connection to even the most complex idea…
…
continue reading
The FTC warns one country’s “online safety” may be another’s “censorship.” A new bipartisan bill aims to reduce barriers to federal cyber jobs. MURKY PANDA targets government, technology, academia, legal, and professional services in North America. MITRE updates their hardware weaknesses list. Customs and Border Protection conducts a record number …
…
continue reading

1
A Conversation with Michael Brown About Designing AI Systems
50:06
50:06
Play later
Play later
Lists
Like
Liked
50:06In this episode of Unsupervised Learning, I sit down with Michael Brown, Principal Security Engineer at Trail of Bits, to dive deep into the design and lessons learned from the AI Cyber Challenge (AIxCC). Michael led the team behind Buttercup, an AI-driven system that secured 2nd place overall. We discuss: -The design philosophy behind Buttercup an…
…
continue reading

1
MCP Security Risks Multiply With Each New Agent Connection
47:25
47:25
Play later
Play later
Lists
Like
Liked
47:25Anthropic's Model Context Protocol (MCP) has become the standard for connecting AI agents to tools and data, but its security has lagged behind. In The New Stack Agents podcast, Tzvika Shneider, CEO of API security startup Pynt, discussed the growing risks MCP introduces. Shneider sees MCP as a natural evolution from traditional APIs to LLMs and no…
…
continue reading

1
#517: Agentic Al Programming with Python
1:17:01
1:17:01
Play later
Play later
Lists
Like
Liked
1:17:01Agentic AI programming is what happens when coding assistants stop acting like autocomplete and start collaborating on real work. In this episode, we cut through the hype and incentives to define “agentic,” then get hands-on with how tools like Cursor, Claude Code, and LangChain actually behave inside an established codebase. Our guest, Matt Makai,…
…
continue reading

1
3394: How Pet Media Group Is Using Tech to Protect Animals and Buyers
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58The global pet industry has long been riddled with problems. From low-welfare breeding practices to online scams, the darker side of pet rehoming often goes unchecked. But what if there was a way to combine animal protection with a sustainable, profitable business model? In this episode of Tech Talks Daily, I speak with Axel Lagercrantz, co-founder…
…
continue reading
Zero-day clickjacking flaws affect major password managers. The FBI warns that Russian state-backed hackers are exploiting a long-known Cisco flaw. Apple releases emergency patches for a zero-day flaw in the Image I/O framework. Home Depot faces a proposed class action lawsuit accusing it of secretly using facial recognition at self-checkout kiosks…
…
continue reading

1
Why Your ‘Data Exhaust’ Is Your Most Valuable Asset
30:42
30:42
Play later
Play later
Lists
Like
Liked
30:42Rahul Auradkar, executive VP and GM at Salesforce, grew up in India with a deep passion for cricket, where his love for the game sparked an early interest in data. This fascination with statistics laid the foundation for his current work leading Salesforce’s Data Cloud and Einstein (Unified Data Services) team. Auradkar reflects on how structured d…
…
continue reading