How does GDPR, data privacy and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader or InfoSec security expert this is the podcast to learn about what is happening in the UK, EU, US and beyond.
…
continue reading
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading

1
The Medcurity Podcast: HIPAA Compliance | Security | Technology | Healthcare
Medcurity: HIPAA Compliance
Healthcare is complicated. Joe Gellatly and the Medcurity team are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more. HIPAA laws continue to evolve. Go to hhs.gov for the latest information.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
The FCPA Compliance Report is the longest running podcast in the in compliance and business ethics. Join its award-winning host, Tom Fox, the Voice of Compliance as he visits with top compliance practitioners, key figures from business, the government and law firms in the top podcast dedicated to all things compliance.
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
Privacy in Practice, brought to you by VeraSafe, is the podcast for actionable insights and real-world strategies for privacy and compliance teams. Hosted by privacy pros Kellie Du Preez and Danie Strachan, each episode unpacks the practical side of compliance and data management, bringing together industry leaders and thought-provoking discussions. Whether you’re leading privacy efforts at your company or just beginning to explore this field, tune in for meaningful conversations that provid ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
…
continue reading
FINRA Unscripted is the voice of the nation’s largest non-government securities regulator. We bring together FINRA leaders to discuss existing and emerging regulatory topics that impact the broker-dealer industry. We share best practices for compliance officers, insights into the operations of a 3,500 person self-regulated organization and educational tools and information for investors. Every investor in America relies on one thing: fair financial markets. That is what FINRA works every day ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
There is tremendous value to simplification. To quote Steve Jobs, “Simple can be harder than complex: You have to work hard to get your thinking clean to make it simple. But it is worth it in the end because once you get there, you can move mountains." In this series, we explore how people and companies achieve simplification.
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
The Bare Metal Cyber CISA Prepcast is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impact re ...
…
continue reading
A weekly podcast providing fraud prevention and vendor setup training to protect the vendor master file. Immediate takeaways with actionable steps you can implement today into your vendor onboarding and maintenance process to reduce fraud and regulatory fines. Great tips for the Accounts Payable and Procurement teams to clean-up their vendor data, clean-up their vendor processes so that they can pay the right vendor.
…
continue reading
Welcome truth seeker. You’re here for a reason. Something’s not right. Things don’t make sense. Deep down you know this yet you can’t connect the dots. There are too many nonsensical parts, a barrage of contradictory information floating about. We know. We understand. The Mel K Show is here to help make sense of the senseless. Who’s Mel K? Mel K is a devoted lover of truth, facts, history, God, and America. After graduating with honors from NYU, she spent twenty years in media, film, and inv ...
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
Interesting, fascinating, provoking, insightful - or all of the above - GDPR decisions, rulings and other tidbits discussed by two very opinionated people.
…
continue reading
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. The Cyber Risk Podcast for Business Leaders, hosted by Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute and CEO of NCX Group, delivers weekly, no-nonsense insights tailored to CEOs, CFOs, and decision-makers. From data breaches to practical cybersecurity and data privacy strategies, we offer steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk in ...
…
continue reading
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
…
continue reading
This is the She Said Privacy / He Said Security podcast with Jodi and Justin Daniels. Like any good marriage, Jodi and Justin will debate, evaluate, and sometimes quarrel about how privacy and security impact business in the 21st century.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
The world’s accomplishments depend on data security. Join PKWARE CEO Spencer Kupferman every month as he chats with data security experts on eliminating security gaps, taking control of sensitive data, and meeting the most stringent data compliance requirements. Tune in to find out how industry leaders are eliminating data security gaps and achieving compliance goals.
…
continue reading
TechDaily.ai is your go-to platform for daily podcasts on all things technology. From cutting-edge innovations and industry trends to practical insights and expert interviews, we bring you the latest in the tech world—one episode at a time. Stay informed, stay inspired!
…
continue reading
Software testing is the most important part of software development, but it is especially significant for healthcare software. Healthcare software applications manage patient data, offer medical services, and ensure compliance with various standards and regulations. Defects or errors in healthcare software can have consequences for patient security, data protection, and functional efficiency.
…
continue reading
Get the most recent and juiciest data protection and privacy news and latest court and DPA decisions from across Europe in GDPR today: the GDPRhub newsletter - the audio version! Produced by NoTies.Consulting, read by Rie Aleksandra Walle - GDPRhub volunteer.
…
continue reading
Join us for an in-depth exploration of InfoGov.com, the pioneering firm redefining Information Governance for businesses of all sizes. In this episode, we break down how InfoGov.com empowers Independent Professionals and InfoAdvisors™ to help organizations manage their data, protect sensitive information, and navigate the evolving landscape of security, privacy, compliance, and risk. From boutique revenue-sharing models to agnostic advisory services, we’ll discuss what sets InfoGov.com apart ...
…
continue reading
In the digital age, privacy is more important than ever. But as technology advances, so do the challenges to privacy. We explore the latest trends in privacy and technology, and discuss how businesses can build strong privacy programs that protect their customers' data. We invite top privacy compliance and tech guests to discuss privacy in a fun and interesting manner, covering topics such as data privacy, cybersecurity, and AI. Whether you're a business owner, a privacy professional, or sim ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
…
continue reading
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
…
continue reading
Welcome to the podcast: Sustainable Compliance. Are you passionate about data protection, GDPR, information security, and general compliance? Then, this podcast is dedicated to you. We delve into the intricacies of data protection and compliance. Join us as the host, Jacob Høedt Larsen, interviews experts and discusses the latest trends, insights, and advice within the realm of compliance. We also explore how we can reshape the way we think and organise ourselves around compliance, to forge ...
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Welcome to the Proceed Podcast, where we explore data and document management in the SAP world. Our goal is to help SAP customers manage their data effectively for reduced costs, improved IT agility, compliance, sustainability, and to drive IT transformation. Join us for expert interviews, case studies, and analysis to gain valuable insights into how you can optimise your data management processes.
…
continue reading
Join me in conversation with experts around the world as we talk about new privacy laws, global trends in data protection and the impact of these developments.
…
continue reading

1
The 1347 PODCAST -HEALTHCARE FRAUD DETECTION, CORPORATE COMPLIANCE AND ORGANIZATIONAL INTEGRITY
The 1347
The podcast focuses on healthcare fraud detection, corporate compliance, organizational integrity, and research security best practices.
…
continue reading
When it comes to storing vaccines for children, maintaining the correct temperature is critical to preserving their potency and safety. TempGenius offers a state-of-the-art Vaccine Temperature Monitoring System designed to meet CDC and VFC (Vaccines for Children) compliance standards. Ideal for paediatric clinics, hospitals, and pharmacies, this wireless solution ensures continuous, real-time monitoring of vaccine storage units with instant alerts for any temperature deviation. Using advance ...
…
continue reading
Data privacy is a hot sector in the world of business. But it can be hard to break in and have a career that thrives. That’s where our podcast comes in! We interview leading Privacy Pros and share the secrets to success each fortnight. We'll help guide you through the complex world of Data Privacy so that you can focus on achieving your career goals instead of worrying about compliance issues. It's never been easier or more helpful than this! You don't have to go at it alone anymore! It’s ea ...
…
continue reading
Forcepoint, powered by Raytheon, is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide. For more about Forcepoint, visit www.Forcepoint. ...
…
continue reading
The Security Collective is the podcast for leaders tasked with, and interested in, securing technology, people, processes and data for the protection of all. Join best-selling author Claire Pales, together with industry thought leaders who answer your questions about security leadership, trends, technologies, and more. 'The Security Collective' podcast - formerly 'The Secure CIO'
…
continue reading
Uncovering Hidden Risks explores how enterprises can reduce their risk by moving to a more holistic approach to data protection. Each episode will feature a panel of Microsoft security professionals and community security experts. They’ll dive into topics like data governance, internal and external threats, risk management and compliance, industry trends, and customer challenges. Listen in to the podcast and follow us! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
Experience the future of temperature monitoring with TempGenius' cutting-edge wireless temperature logging system. Perfect for industries where precision is paramount, this system ensures that your temperature-sensitive environments are consistently monitored with real-time accuracy. Say goodbye to manual checks and human errors, TempGenius offers seamless integration with your existing systems, providing automated alerts and detailed reports that keep you compliant with regulatory standards ...
…
continue reading
Experience the ultimate in temperature monitoring with the TempGenius Remote Temperature Probe. This advanced device is designed to provide you with accurate and real-time temperature readings, ensuring the safety and integrity of your valuable assets, whether it's in a medical facility, laboratory, food storage, or any other environment where temperature control is critical. Key Features: Precision Monitoring: The TempGenius Remote Temperature Probe offers unparalleled accuracy, allowing yo ...
…
continue reading

1
Mel K & Joaquin Flores | How Unions Lost Their Way: The Misguided Monoliths of Organizing | 8-23-25
1:00:11
1:00:11
Play later
Play later
Lists
Like
Liked
1:00:11In this powerful episode of The Mel K Show, I welcome back geopolitical analyst Joaquin Flores, a man with decades of experience studying the intricacies of international banking, unions, and global power structures. Joining us from Belgrade, Joaquin brings a unique perspective on current events and explains why what we are witnessing today is trul…
…
continue reading

1
Mel K w/ Ian Trottier & John Donovan | High Stakes Treason: How John Brennan Compromised American Security for Millions | 8-22-25
1:09:52
1:09:52
Play later
Play later
Lists
Like
Liked
1:09:52This episode is not about partisan politics. It is about exposing corruption, defending the Constitution, and ensuring that those who betray the trust of the American people are held accountable. Zach Vorhies and John Donovan are shining a light where others refuse to look, and their work deserves the attention of every citizen who cares about the …
…
continue reading

1
Breaking Barriers: IPv6 Adoption and DNS Transformation with Tommy Jensen
47:48
47:48
Play later
Play later
Lists
Like
Liked
47:48In today's episode of the Defender's Log, we welcome special guest Tommy Jensen, an internet technologist with expertise in IPv6, Zero Trust, and standards. The episode covers Jensen's career journey from an AppleCare contractor to a pivotal role in advancing internet technologies. The discussion delves into the importance and challenges of migrati…
…
continue reading

1
MORNINGS WITH MEL K - The Season Of Treason: America’s Future On the Ropes 8-22-25
1:25:00
1:25:00
Play later
Play later
Lists
Like
Liked
1:25:00We The People must stand strong, stay united, resolute, calm, and focus on the mission. Order Mel’s New Book: Americans Anonymous: Restoring Power to the People One Citizen at a Time https://themelkshow.com/book The Show’s Partners Page: https://themelkshow.com/partners/ Consider Making A Donation: https://themelkshow.com/donate/ Beverly Hills Prec…
…
continue reading

1
Mel K & Patrick Byrne | Deep Rig Exposed: Tracking Election Fraud's Global Tentacles | 8-21-25
59:17
59:17
Play later
Play later
Lists
Like
Liked
59:17In this very special episode of The Mel K Show, I am joined once again by one of my favorite truth tellers and thinkers, Patrick Byrne. Known to many as the brilliant mind behind Overstock.com and to others as a man who has risked everything to expose corruption at the highest levels, Patrick always brings a unique perspective that cuts through the…
…
continue reading

1
Cloud Security: Protecting Data in a Multicloud World
24:45
24:45
Play later
Play later
Lists
Like
Liked
24:45Data breaches are no longer a possibility—they're a certainty if you're not prepared. In this critical deep dive, we cut through the noise around cloud data security and reveal exactly how to protect your digital assets in today’s complex, fast-moving multicloud environments. In this episode, you’ll learn: Why the shared responsibility model is oft…
…
continue reading

1
Cloud IAM : Securing Identity in a Borderless World
24:33
24:33
Play later
Play later
Lists
Like
Liked
24:33The digital gatekeeper is here—and it’s not your firewall. In this foundational deep dive, we unravel identity and access management (IAM) in the cloud—why it's no longer just a security component but the core of cloud strategy. Join the conversation as we explore: How the perimeter model has collapsed in today’s cloud-first world Critical IAM prin…
…
continue reading

1
MORNINGS WITH MEL K - Inverted World Turned Upside down: The Truth Has No Agenda But For Justice 8-21-25
1:39:47
1:39:47
Play later
Play later
Lists
Like
Liked
1:39:47We The People must stand strong, stay united, resolute, calm, and focus on the mission. Order Mel’s New Book: Americans Anonymous: Restoring Power to the People One Citizen at a Time https://themelkshow.com/book The Show’s Partners Page: https://themelkshow.com/partners/ Consider Making A Donation: https://themelkshow.com/donate/ Beverly Hills Prec…
…
continue reading

1
Designing for Breakage: What Cybersecurity Leaders Must Plan For
39:34
39:34
Play later
Play later
Lists
Like
Liked
39:34As quantum computing accelerates toward real-world impact, organizations must stop viewing post-quantum cryptography as a one-time technical upgrade. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen sits down with Yolanda Reid, former Associate Partner at IBM Consulting and U.S. Department of Defense leader, to exp…
…
continue reading

1
Episode 352: Recurring Vendor Validations: Ensure Post-Onboarding Compliance – In 5 Steps
33:35
33:35
Play later
Play later
Lists
Like
Liked
33:35Validating vendor information and checking that they are not on any applicable sanction lists is a part of your vendor on-boarding process, but what about after the on-boarding process? Today’s episode is a webinar that not only has a five-step process for recurring vendor validations, but lots of five downloads to help you get started. Keep listen…
…
continue reading

1
The Blueprint for a Global Privacy and Security Program
30:31
30:31
Play later
Play later
Lists
Like
Liked
30:31Robert S. Jett III (“Bob”) serves as the first Global Chief Data Privacy Officer at Bunge, where he leads global privacy initiatives and supports key projects in digital transformation, AI, and data management. With over 30 years of legal and in-house counsel experience across manufacturing, insurance, and financial services, he has built and manag…
…
continue reading

1
Productionizing AI: AWS Bedrock, MCP & Agentic Workflows for Startups
57:14
57:14
Play later
Play later
Lists
Like
Liked
57:14What does it really take to move from a GenAI prototype to a production-ready system? In this episode, AWS AI Engineering Specialist Dennis Traub breaks down the hard truths behind scaling, securing, and monitoring AI systems — and why the future belongs to startups who learn how to productionize AI fast. What You’ll Learn in This Episode: Why most…
…
continue reading

1
Zero Trust, Ransomware, and AI Risks with Daniel Schwartz | Medcurity Podcast 104
18:34
18:34
Play later
Play later
Lists
Like
Liked
18:34In this episode, Joe Gellatly and Daniel Schwartz discuss today’s most pressing security challenges—including zero trust, ransomware evolution, data loss prevention, and the risks tied to AI-powered “fast fashion” software. They share what teams can do now to stay secure without waiting for regulations to catch up. Connect with Daniel Schwartz on L…
…
continue reading

1
Streamlining the Compliance Journey - An End-to-End Approach
58:15
58:15
Play later
Play later
Lists
Like
Liked
58:15Is your compliance strategy making life easier or just adding more chaos? Welcome to Razorwire, where we take you to the heart of cybersecurity with voices that have seen it all. I’m Jim, your host and in this episode, I’m joined by Martin Davies (Audit Alliance Manager at Drata) and Patrick Sullivan (VP of Strategy and Innovation at A-LIGN). Toget…
…
continue reading

1
Cloud Compliance & AI in Action: Real Enterprise Security Tactics
44:35
44:35
Play later
Play later
Lists
Like
Liked
44:35In this episode of the techaily.ai Deep Dive, we're cutting through the noise to tackle two of the most mission-critical topics in tech today: cloud compliance and the real-world deployment of advanced AI within enterprise systems. You’ll learn: The shocking scale of cloud vulnerabilities—80% of companies breached. Why 60% of all corporate data now…
…
continue reading

1
Data Security Simplified: Protecting at Rest, in Transit & In Use
45:48
45:48
Play later
Play later
Lists
Like
Liked
45:48In today’s hyperconnected world, securing your data isn’t optional—it’s a must. In this TechDaily.ai episode, powered by StoneFly, we dismantle the jargon and layer-by-layer explain how data is protected in its three critical states: at rest, in transit, and in use. What you’ll learn: Why "data in use" demands special security—and how confidential …
…
continue reading

1
The Defender’s Paradox: Cloud Security in 2025 & Beyond
44:13
44:13
Play later
Play later
Lists
Like
Liked
44:13In cloud security, attackers only need to be right once—defenders must be right every time. In this TechDaily.ai deep dive, we confront that reality head-on. The 2025 cloud landscape is dynamic, complex, and riddled with hidden vulnerabilities—from neglected assets to identity explosions and AI attack surfaces. We break down the Defender’s Paradox …
…
continue reading

1
SQL vs NoSQL in the Cloud: Costs, Scale & the Future of Data
20:14
20:14
Play later
Play later
Lists
Like
Liked
20:14In this strategic deep dive from TechDaily.ai, we break down everything you need to know about managing cloud databases in 2025 and beyond. From SQL vs. NoSQL to serverless trends, cost-saving tactics, and the emerging demands of AI, compliance, and sovereignty, this episode delivers real insight—not just buzzwords. What’s inside: SQL vs. NoSQL exp…
…
continue reading

1
Serverless vs. Containers: What to Use, When & Why It Matters
17:57
17:57
Play later
Play later
Lists
Like
Liked
17:57Cloud-native apps demand cloud-smart decisions. In this in-depth episode of TechDaily.ai, we break down one of the most fundamental cloud architecture choices: serverless computing vs. containers. From cold starts to Kubernetes, cost models to control, we explore the real-world tradeoffs between these two powerful paradigms—and how to combine them …
…
continue reading

1
Cloud Storage Smarts: Block, Object, File & Cost-Saving Tactics
21:11
21:11
Play later
Play later
Lists
Like
Liked
21:11Cloud storage isn’t just a technical decision—it’s a strategic one that shapes your AI readiness, resilience, and bottom line. In this jam-packed episode of TechDaily.ai, we unpack the real-world tradeoffs between block, object, and file storage—and how to use each to your advantage. Whether you're scaling an AI workload, managing sensitive data, o…
…
continue reading

1
Mastering Cloud Networking: AWS, Hybrid Cloud & Peering Explained
1:22:25
1:22:25
Play later
Play later
Lists
Like
Liked
1:22:25Modern networking is no longer just cables and routers—it’s the critical backbone of every enterprise’s cloud journey. In this epic deep dive, the techdaily.ai team unpacks the architecture, tools, and strategies that power today’s cloud-native and hybrid infrastructures. From AWS multi-account strategies and Control Tower best practices to VPC pee…
…
continue reading

1
Beginning of the End: The Fall of the International Money Laundering Network
1:29:33
1:29:33
Play later
Play later
Lists
Like
Liked
1:29:33We The People must stand strong, stay united, resolute, calm, and focus on the mission. Order Mel’s New Book: Americans Anonymous: Restoring Power to the People One Citizen at a Time https://themelkshow.com/book The Show’s Partners Page: https://themelkshow.com/partners/ Consider Making A Donation: https://themelkshow.com/donate/ Beverly Hills Prec…
…
continue reading

1
MORNINGS WITH MEL K -Buckle Up! The Old Guard Will Not Go Quietly 8-18-25
1:31:47
1:31:47
Play later
Play later
Lists
Like
Liked
1:31:47We The People must stand strong, stay united, resolute, calm, and focus on the mission. Order Mel’s New Book: Americans Anonymous: Restoring Power to the People One Citizen at a Time https://themelkshow.com/book The Show’s Partners Page: https://themelkshow.com/partners/ Consider Making A Donation: https://themelkshow.com/donate/ Beverly Hills Prec…
…
continue reading

1
#733: Amazon Connect - So Many Cool New Capabilities For You to Use!
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05In this episode of the AWS Podcast, we explore the evolving world of contact centers and Amazon Connect. The discussion covers why contact centers remain critical to both business and public sector operations, and how they're transforming from traditional cost centers into valuable sources of business intelligence. Key highlights include Amazon Con…
…
continue reading

1
Accountability in Times of Crisis: A Conversation with Tom Fox and Sam Silverstein
56:26
56:26
Play later
Play later
Lists
Like
Liked
56:26Welcome to the award-winning FCPA Compliance Report, the longest-running podcast in compliance. In this episode, Tom Fox welcomes back Sam Silverstein in a conversation on the role of accountability in managing business disruptions and natural disasters. Drawing from personal experiences and professional insights, they delve into the strategic fram…
…
continue reading

1
Mel K & Andrew Sorchini | Fast Moving International Financial Reset is Here | 8-17-25
37:25
37:25
Play later
Play later
Lists
Like
Liked
37:25To learn more about Beverly Hills Precious Metals, please visit https://melkgold.com Or https://bh-pm.com Promo Code MelK In this timely episode of The Mel K Show, I am joined once again by my dear friend and trusted expert on precious metals, Andrew Sorchini. Andrew has just returned from another whirlwind trip across the globe, and he brings with…
…
continue reading

1
Mel K & Mike L | Free Energy & A Better Way Forward | 8-17-25
1:02:12
1:02:12
Play later
Play later
Lists
Like
Liked
1:02:12Follow Mike L on Truth Social: https://truthsocial.com/@mikeLaL In this fascinating episode of The Mel K Show, I welcome back my great friend Mike LaLond. It has been a while since we have had him on, but he has been busy working behind the scenes and is finally back to share what he has been uncovering. Our discussion dives into one of our most ta…
…
continue reading

1
Mel K & Mary Holland | Children's Health Defense Continues to Defend and Protect | 8-16-25
48:18
48:18
Play later
Play later
Lists
Like
Liked
48:18Children's Health Defense https://childrenshealthdefense.org Follow Mary Holland: https://x.com/maryhollandnyc In this important episode of The Mel K Show, I am honored to welcome Mary Holland, President of Children’s Health Defense. Mary has been on the front lines for decades, working to protect children from environmental toxins, corporate negli…
…
continue reading
In this episode, Jennifer Oelenberger, President of EHR Concepts, joins us to share the MIPS 2025 framework in plain language—along with strategies to improve category scores, avoid common pitfalls, and make MIPS part of your everyday workflow. Learn more about Medcurity: https://medcurity.com Visit EHR Concepts: https://ehrconcepts.com #Healthcare…
…
continue reading

1
Mel K & Tim James | Watch the Water: You are how you eat?? | 8-16-24
37:40
37:40
Play later
Play later
Lists
Like
Liked
37:40Chemical Free Body - Purify Your Life https://chemicalfreebody.com/pages/the-mel-k-show-landing-page 🔹 Welcome to The Mel K Show 🔹 This is where truth has no filter. Every week, I sit down with warriors, whistleblowers, and freedom-loving experts to expose what the mainstream won’t touch, from global corruption and historical deception to spiritual…
…
continue reading

1
Mel K & Frank | American Graffiti: Taking Back Our Common Culture | 8-15-25
41:31
41:31
Play later
Play later
Lists
Like
Liked
41:31In this uplifting and insightful episode of The Mel K Show, I welcome back my friend Frank, the voice and heart behind the popular show Quite Frankly. During the most challenging days of the global shutdowns, Frank was one of the people who kept me going. Every night, no matter how chaotic things became, his show delivered truth, perspective, and t…
…
continue reading

1
Compliance Checklist for UK Data (Use and Access) Act
54:10
54:10
Play later
Play later
Lists
Like
Liked
54:10Send us a text The UK Data (Use and Access) Act (DUAA) is the most significant UK privacy law change since GDPR—raising maximum fines from £500,000 to £17.5M and expanding enforcement to cookies, DSARs, children’s data, international transfers, and automated decision-making. In this session, privacy law expert Robert Bateman explains: Key DUAA chan…
…
continue reading

1
When Artificial Intelligence Becomes the Baseline: Will We Even Know What Reality Is AInymore? | A Black Hat USA 2025 Recap | A Musing On the Future of Cybersecurity with Sean Martin and TAPE3 | Read by ...
6:27
6:27
Play later
Play later
Lists
Like
Liked
6:27At Black Hat USA 2025, artificial intelligence wasn’t the shiny new thing — it was the baseline. Nearly every product launch, feature update, and hallway conversation had an “AI-powered” stamp on it. But when AI becomes the lowest common denominator for security, the questions shift. In this episode, I read my latest opinion piece exploring what ha…
…
continue reading

1
MORNINGS WITH MEL K - Signal to Noise: All Eyes on Alaska 8/15/25
1:40:04
1:40:04
Play later
Play later
Lists
Like
Liked
1:40:04We The People must stand strong, stay united, resolute, calm, and focus on the mission. Order Mel’s New Book: Americans Anonymous: Restoring Power to the People One Citizen at a Time https://themelkshow.com/book The Show’s Partners Page: https://themelkshow.com/partners/ Consider Making A Donation: https://themelkshow.com/donate/ Beverly Hills Prec…
…
continue reading

1
Mel K & Matt Ehret | TRUMP/PUTIN 2025: Flipping Brzezinski’s Chessboard | 8-14-25
1:12:41
1:12:41
Play later
Play later
Lists
Like
Liked
1:12:41In this thought-provoking episode of The Mel K Show, I am joined by my friend and brilliant historian, Matt Ehret, to discuss an upcoming summit that could have profound global significance. Donald Trump and Vladimir Putin are set to meet in Alaska, and Matt brings his deep geopolitical and historical insight to unpack what this means for both the …
…
continue reading

1
MORNINGS WITH MEL K - The Constitution vs Big Tech/IC Mass Surveillance & Data Collection 8-14-25
1:40:35
1:40:35
Play later
Play later
Lists
Like
Liked
1:40:35We The People must stand strong, stay united, resolute, calm, and focus on the mission. Go to http://takelean.com and enter code MELK20 to get 20% off. Order Mel’s New Book: Americans Anonymous: Restoring Power to the People One Citizen at a Time https://themelkshow.com/book The Show’s Partners Page: https://themelkshow.com/partners/ Consider Makin…
…
continue reading

1
From NIST Standards to Action: A Year of PQC Migration
30:50
30:50
Play later
Play later
Lists
Like
Liked
30:50One year ago, NIST released its long‑awaited post‑quantum cryptography standards, marking the official start of the migration to quantum‑safe security. It was the moment everyone had been “waiting for” but did it really kickstart the shift? In this anniversary episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen brings back so…
…
continue reading

1
Episode 351: What To Do When Your Company Wants to Do Business With An Inactive Vendor
31:26
31:26
Play later
Play later
Lists
Like
Liked
31:26A vendor in your vendor master file is inactive – and for good reason, because the last time your company paid that vendor was four years ago. Now your company wants to use that vendor again – don’t just change the status that can lead to failed payments and bad vendor data. Why and what should you do instead? ` Keep listening. Check out my website…
…
continue reading

1
Why 91% of Cyberattacks Start with Email and How to Protect Yourself with Stefan Cink
16:51
16:51
Play later
Play later
Lists
Like
Liked
16:51In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Stefan Cink, Director of Business and Professional Services at NoSpamProxy, to break down the real vulnerabilities in email security and strategies to protect yourself.By GMO GlobalSign Limited
…
continue reading

1
Navigating Privacy Compliance When AI Changes Everything
36:14
36:14
Play later
Play later
Lists
Like
Liked
36:14Mason Clutter is a Partner and Privacy Lead at Frost Brown Todd Attorneys, previously serving as Chief Privacy Officer for the US Department of Homeland Security. Mason’s practice is at the intersection of privacy, security, and technology. She works with clients to operationalize privacy and security, helping them achieve their goals and build and…
…
continue reading

1
How Startups Can Use GenAI Without Breaking GDPR or Trust
48:10
48:10
Play later
Play later
Lists
Like
Liked
48:10Startups love GenAI. But most founders are using it unsafely — and exposing their team, their customers, and their legal risk without even realizing it. In this episode of Startuprad.io, we sat down with Dennis Traub, AI Engineering Specialist at AWS, to unpack what safe adoption of Generative AI really means for founders, CTOs, and product leads. …
…
continue reading

1
Why Addressing Network Vulnerabilities Can’t Wait | Medcurity Live 103
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03In this episode, we talk about Network Vulnerability Assessments (NVAs)—how they pinpoint weaknesses like open ports and unsafe accounts before attackers can exploit them, and why they’re key to shutting down easy entry points. We also walk through Medcurity’s new NVA Dashboard, now live in the platform. Instead of static PDFs, you get a real-time,…
…
continue reading

1
Anticipating Justice: Where are the Indictments?
1:34:18
1:34:18
Play later
Play later
Lists
Like
Liked
1:34:18We The People must stand strong, stay united, resolute, calm, and focus on the mission. JUVENON www.bloodflow7.com/melk Order Mel’s New Book: Americans Anonymous: Restoring Power to the People One Citizen at a Time https://themelkshow.com/book The Show’s Partners Page: https://themelkshow.com/partners/ Consider Making A Donation: https://themelksho…
…
continue reading

1
Containers, Kubernetes & CI/CD: The Core of Cloud-Native Development
20:54
20:54
Play later
Play later
Lists
Like
Liked
20:54What do containers, Kubernetes, and CI/CD pipelines have in common? They’re the technologies quietly powering the most agile, scalable, and resilient software systems today. In this deep dive from TechDaily.ai, we take you behind the scenes of modern application delivery—from dependency nightmares and “it works on my machine” to fully automated pip…
…
continue reading

1
Virtualization & Hypervisors: The Hidden Engine of Modern IT
19:53
19:53
Play later
Play later
Lists
Like
Liked
19:53Virtualization isn’t just a tech term—it’s the core innovation powering everything from cloud computing to AI to modern disaster recovery. In this deep dive on Techaily.ai, we break down the unsung architecture that keeps the digital world spinning. 💡 What you’ll learn: What virtualization really is—and how it shaped the modern cloud The key differ…
…
continue reading

1
Mastering VPCs & Load Balancing: Building Resilient Cloud Networks
17:57
17:57
Play later
Play later
Lists
Like
Liked
17:57Behind every fast, secure, and scalable app lies a cloud architecture designed for resilience—and this week on Techdaily.ai, we’re breaking it all down. From virtual private clouds (VPCs) to load balancing and VPC peering, this episode explores the unsung infrastructure powering today's digital experiences. 🔍 What we cover: What a VPC really is, an…
…
continue reading

1
Cloud Computing Explained: IaaS, PaaS, SaaS & What’s Next
26:29
26:29
Play later
Play later
Lists
Like
Liked
26:29In this deep dive, we break it all down with clarity and precision. Whether you're a startup founder, enterprise IT lead, or simply cloud-curious, this episode gives you a practical, strategic map of the entire cloud landscape—without the fluff. You’ll get answers to questions like: What are the key differences between IaaS, PaaS, SaaS, and the eme…
…
continue reading

1
Zero Trust in Practice: Modern Security in a Perimeterless World
18:11
18:11
Play later
Play later
Lists
Like
Liked
18:11Cybersecurity is evolving—and the old “castle and moat” model no longer holds up. In this eye-opening episode of Techaily.ai, we explore zero trust architecture—the strategic shift reshaping how organizations protect data in an increasingly cloud-first, remote-enabled world. 🔐 What we cover: Why zero trust is a necessary response to skyrocketing cy…
…
continue reading

1
Cloud Strategy Decoded: AI Surge, Sovereignty & Sustainability
31:19
31:19
Play later
Play later
Lists
Like
Liked
31:19Cloud computing has moved far beyond “renting servers.” It’s now the backbone of digital agility, competitive advantage, and operational resilience. In this deep dive, we explore the seismic shifts redefining cloud strategy through 2029, from AI-driven workloads to the realities of multicloud, sustainability pressures, and digital sovereignty. Insi…
…
continue reading