The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
This is the replay of my monthly CompTIA Security+ Study Group. You can also watch a video version of this podcast from my website at http://www.professormesser.com.
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Fox updates on the latest trends, gadgets and news in the world of technology.
…
continue reading
We Cover the Cyberspace.
…
continue reading
Hosted by cloud computing pioneer David Linthicum, the Cloud Computing Insider podcast gets to the bottom of what cloud computing, and generative AI can bring to your enterprise. New content will focus on what's important to you as a user of cloud computing and generative AI, and the ability to find value the first time.
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Arm CEO Rene Haas takes you behind the boardroom door with technology’s most inspiring visionaries. Tech Unheard lets you listen in on one-on-one conversations with industry leaders, everything from the potential of artificial general intelligence to pre-keynote nerves. Haas and his guests explore the drivers behind each leader’s path and analyze the most pressing trends in their space — plus tell a few entertaining anecdotes of success and failure along the way. Tech Unheard is a podcast fr ...
…
continue reading
This is a podcast all about quantum computing news, basic concepts, and what people in the field are doing. Quantum computing is serious stuff and we talk about serious science, but I try to not take myself too seriously. With that being said, quantum computing is rad as heck. Oh and here's the obligatory phrase " quantum computing podcast " so search engines pick this up. Follow me on Minds to get updates on what I'm working on: https://www.minds.com/1ethanhansen?referrer=1ethanhansen Shoot ...
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Tim Harford and the More or Less team try to make sense of the statistics which surround us. From BBC Radio 4
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
Welcome to Act on Tech, the podcast that empowers you to harness technology to boost your productivity and simplify your life. Hosted by tech enthusiast and entrepreneur Alex, each episode dives into actionable tips, tools, and insights to help you stay ahead in the digital age. Discover practical advice, expert opinions, and cutting-edge trends, all while learning about Alex Custom Tech, a leading MSP dedicated to providing personalized IT solutions for business and residential customers. T ...
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
Geeksblabla is a podcast about technology, computer science, programming. each episode we invite different people to talk about what they do best and share it with you guys!
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Associate Editor, and Rich Nass, EVP, of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology marketplaces in a light ...
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
Join us for interesting conversations about technology and the business of IT.
…
continue reading
Loose Leaf Security is a podcast about making good computer security practice for everyone. We believe you don't need to be a software engineer or security professional to understand how to keep your devices and data safe. In every episode, we tackle a typical security concern or walk you through a recent incident.
…
continue reading
computer help free. blogtvpccareman
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
‘Translating Proteomics’ explores the science of proteomics and its growing impact on biological research, biomarker discovery, drug development, food and energy security, and a range of other timely topics. Hosts Parag Mallick Ph.D. and Andreas Huhmer Ph.D. of Nautilus Biotechnology aim to share their perspectives on important issues in proteomics, deepen your love of science, and prompt you to question assumptions about what may be possible.
…
continue reading
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
…
continue reading
Thought Exercises
…
continue reading

1
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
Welcome to 'Cloudy with a chance of wireless', the podcast that explores the fascinating world of computer networking, brought to you by Zyxel Networks. Join us as we dive into the intricacies of cloud networking, explore the latest wired, wireless technologies, and discuss the ever-important topic of network security for businesses.Our team of experts, with years of experience in the networking industry, share their insights and knowledge on how these technologies are shaping the future of ...
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading

1
Safety ja, Security nein. Analyse eines breit eingesetzten Einsatzmanagmentsystems. (glt25)
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58Wie mit Hilfe des Open Source Werkzeugkastens (mimtproxy, curl, jq, ..) ein behördlich eingesetztes System analysiert und dabei die Sicherheitsversprechen des Herstellers in Frage gestellt wurden.Aufgrund fehlender Sicherheitsmechanismen war (ist?) es für unprivilegierten Benutzeraccounts in der „moPS App Engine“ möglich willkürliche Schreiboperati…
…
continue reading
An interruption to your regular podcast feed: the first episode of a new BBC Radio 4 series investigating the steep rise in autism diagnoses. The Autism Curve looks into the data that has prompted arguments - and conspiracy theories - about what’s behind the rapid rise. It goes on to explore changes in what autism is, who gets to define it, and who…
…
continue reading

1
SANS Stormcast Monday, May 5th: Steganography Challenge; Microsoft Makes Passkeys Default and Moves Away from Authenticator as Password Manager; Magento Components Backdoored. (#)
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:57SANS Stormcast Monday, May 5th: Steganography Challenge; Microsoft Makes Passkeys Default and Moves Away from Authenticator as Password Manager; Magento Components Backdoored. Steganography Challenge Didier published a fun steganography challenge. A solution will be offered on Saturday. https://isc.sans.edu/diary/Steganography+Challenge/31910 Micro…
…
continue reading

1
FOX On Games: World of Tanks Controversy | Nintendo's Pokémon Leak
3:40
3:40
Play later
Play later
Lists
Like
Liked
3:40The international controversy surrounding World of Tanks and Russia's asset seizure, alongside Nintendo's pursuit of a Pokémon franchise leaker on Discord. FOX's Eammonn Dignam with details in this "FOX on Games." Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Radio
…
continue reading

1
Joe Bradley: A bit of a winding road. [Chief Scientist] [Career Notes]
7:29
7:29
Play later
Play later
Lists
Like
Liked
7:29Please enjoy this encore of Career Notes. Chief Scientist at LivePerson Joe Bradley takes us down his circuitous career journey that led him back to math. Joe had many ambitions from opera singer to middle school teacher, spent some time at two national labs and went back to his first love of math and physics. He notes that many of the most mathema…
…
continue reading

1
FOX On Games: GTA 6 Delay |Fortnite's Star Wars Celebration
3:08
3:08
Play later
Play later
Lists
Like
Liked
3:08Rockstar's GTA 6 delayed to 2026 and Fortnite's exciting Star Wars event is a great way to celebrate "May The Fourth." FOX's Eammonn Dignam with details in this "FOX On Games." Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Radio
…
continue reading

1
When AI gets a to-do list. [Research Saturday]
24:22
24:22
Play later
Play later
Lists
Like
Liked
24:22This week, we are joined by Shaked Reiner, Security Principal Security Researcher at CyberArk, who is discussing their research on"Agents Under Attack: Threat Modeling Agentic AI." Agentic AI empowers LLMs to take autonomous actions, like browsing the web or executing code, making them more useful—but also more dangerous. Threats like prompt in…
…
continue reading
On the 29th April US President Donald Trump took to the stage in Michigan to celebrate his first 100 days in office. This is a milestone in American politics, but is everything he claims the administration has achieved true? The BBC’s US National Digital Reporter Mike Wendling joins us to fact-check President Trump’s claims on immigration, the stoc…
…
continue reading

1
Uber and Lyft's Senior-Friendly Features: Simplifying Rideshare for All Ages
1:45
1:45
Play later
Play later
Lists
Like
Liked
1:45Uber and Lyft are making rideshare apps more accessible for senior citizens with streamlined features and phone support. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Radio
…
continue reading

1
Security Weekly News Interviews Leaders of NECCDC competition - SWN #473
32:02
32:02
Play later
Play later
Lists
Like
Liked
32:02Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-473
…
continue reading

1
HN779: Do We Really Need the Modern Networking Stack?
55:15
55:15
Play later
Play later
Lists
Like
Liked
55:15On today’s Heavy Networking, a roundtable panel considers whether a modern network needs to be built around underlays and overlays. This isn’t just Ethan yelling at clouds. This is a legitimate question pondering the real-world value of an overlay/underlay approach. Is overlay everywhere overkill, or is that the architecture we need to deliver a sa…
…
continue reading

1
Episode 12: One Year of Distilled Security, Auditor Quality, and Starting Your Own Company
1:38:10
1:38:10
Play later
Play later
Lists
Like
Liked
1:38:10Join us as we reflect on: One Year of Podcasting: The crew celebrates a full year of episodes, favorite topics, behind-the-scenes production, and where the show is headed next—including a new studio setup and future sponsors. Audit Quality and Risk: A deep dive into the evolution of cybersecurity audits, the growing influence of low-cost providers,…
…
continue reading

1
TNO027: Seeing the Internet With Doug Madory
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02Doug Madory has been called “The Man Who Can See the Internet.” Doug has developed a reputation for identifying significant developments in the global layout of the internet. He joins us today to discuss his role in analyzing internet data to identify trends and insights. He shares his journey from a data QA position to... Read more »…
…
continue reading
Cloud certifications are valuable tools in today's IT landscape, but they come with important caveats. As the chief cloud strategy officer for Deloitte Consulting, I've seen how implementing innovative technologies helps clients operate more effectively. However, certifications should be viewed as part of a broader strategy. From my experience work…
…
continue reading
Cybersecurity tips
…
continue reading

1
Hackers vulneraron la página de Buquebus Turismo. La mayor informacion en la web sobre el hecho aqui! gov.eth @adanielhill
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Este video:📽️Video sin editar de gov.eth sobre los recientes hackeos a servidores en Uruguay🇺🇾💻: su versión de los hechos. Está frustrado😡 tras perder tiempo con periodistas . 📷Por favor difundir para que la gente no se quede solo con la versión de los medios tradicionales.📺😇Yo, Alberto Daniel Hill, no estoy involucrado en estos eventos. 😇@Observad…
…
continue reading

1
To Hell and Back" - my talk @ekoparty 2022 - with English subtitles!
48:33
48:33
Play later
Play later
Lists
Like
Liked
48:33El audio original es el español. Para spotify, el video tiene subtitulos en Ingles In 2014, Alberto Daniel Hill, a cybersecurity expert, discovered a security vulnerability on a medical provider's website. While reporting on the issue, he became the first person imprisoned in Uruguay for a computer-related crime—a crime he did not commit and that l…
…
continue reading

1
Visa's AI Agents: Revolutionizing Shopping with Artificial Intelligence
1:45
1:45
Play later
Play later
Lists
Like
Liked
1:45Visa's groundbreaking AI initiative, enabling smart agents to make purchases on your behalf, and the future of digital commerce. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Radio
…
continue reading

1
SANS Stormcast Thursday, May 1st: More Steganography; Malicious Python Packages GMail C2; BEC to Steal Rent Payments (#)
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16SANS Stormcast Thursday, May 1st: More Steganography; Malicious Python Packages GMail C2; BEC to Steal Rent Payments Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using…
…
continue reading
Okay Charlie your turn
…
continue reading

1
AI Tips, Tricks, and Traps! - PSW #872
1:37:21
1:37:21
Play later
Play later
Lists
Like
Liked
1:37:21The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
…
continue reading

1
AI Tips, Tricks, and Traps! - PSW #872
1:37:21
1:37:21
Play later
Play later
Lists
Like
Liked
1:37:21The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
…
continue reading

1
IPB174: How Enterprise IPv6 Requirements Are Shaping Microsoft Windows
38:44
38:44
Play later
Play later
Lists
Like
Liked
38:44Today we talk with Tommy Jensen, a Senior Technical PM Strategist at Microsoft, about IPv6 support in Windows. Tommy shares what he hears from enterprises that are moving toward IPv6-mostly, strategies for dealing with older applications and devices that expect IPv4, and how the customer conversations he’s having about IPv6 now are more engaged and…
…
continue reading
Good luck Greg (& some news)
…
continue reading
Updates from RSAC 2025. Former NSA cyber chief Rob Joyce warns that AI is rapidly approaching the ability to develop high-level software exploits. An FBI official warns that China is the top threat to U.S. critical infrastructure. Mandiant and Google raise alarms over widespread infiltration of global companies by North Korean IT workers. France ac…
…
continue reading

1
Recorded Future’s Alexander Leslie on the ‘MarkoPolo’ traffer team
32:57
32:57
Play later
Play later
Lists
Like
Liked
32:57In this episode, Greg talks with Alexander Leslie, Threat Intelligence Analyst for Recorded Future’s Insikt Group and his research on “Marko Polo” – a notorious cybercriminal empire that orchestrates an array of scams, primarily using infostealer malware. Discover how this sophisticated syndicate has victimized tens of thousands worldwide and raked…
…
continue reading

1
Este HACKER Estuvo en la CARCEL Alberto Hill Cafe & Pizza Podcast #0023
1:12:48
1:12:48
Play later
Play later
Lists
Like
Liked
1:12:48Este HACKER Estuvo en la CARCEL Alberto Hill Cafe & Pizza Podcast #0023 "Esta noche se viene al podcast el gran @ADanielHill hablaremos de su paso por la carcel, de #hacking y de el #cibercrimern no os lo podeis perder !"https://x.com/ADanielHill/status/1918005504808567117
…
continue reading

1
N4N024: DNS Security, Record Types, and Reverse DNS
49:19
49:19
Play later
Play later
Lists
Like
Liked
49:19This week we continue with DNS. In our last episode we covered the basics; today we expand our scope to cover topics such as security for DNS, reverse DNS, and DNS record types. For dessert this week, a serving of Raspberry Pi and Happy Eyeballs. Episode Links: DNS: Turning Names into Numbers – N Is... Read more »…
…
continue reading

1
How do you gain “experience” in cyber without a job in cyber? [CISO Persepctives]
41:47
41:47
Play later
Play later
Lists
Like
Liked
41:47We're sharing a episode from another N2K show we thought you might like. It's the third episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: While the cybersecurity industry has expanded and grown in recent years, newcomers still struggle to gain relevant "experience" before officially beginning their cyber car…
…
continue reading

1
CR096 TechnoVision 2025: Your gateway to cutting-edge innovation with Data-Powered Innovation Jam podcast
1:31:45
1:31:45
Play later
Play later
Lists
Like
Liked
1:31:45TechnoVision 2025 by Capgemini helps business leaders and technologists understand and prioritize emerging technologies. It provides a clear view of tech trends, guiding decision-makers to enhance organizational effectiveness. TechnoVision acts as a beacon in the evolving technology landscape. In this very special episode, Dave, Esmee, and Rob talk…
…
continue reading
In this compact midweek episode, Uncle Marv opens by explaining his upcoming client office move in Tampa, which involves coordinating with cable providers, moving copiers, handling door access systems, and managing ISP cutover with limited preparation time. He then covers significant industry news from the recent Kaseya Connect 2025 conference, inc…
…
continue reading

1
SANS Stormcast Thursday, May 1st: Sonicwall Attacks; Cached Windows RDP Credentials (#)
6:29
6:29
Play later
Play later
Lists
Like
Liked
6:29SANS Stormcast Thursday, May 1st: Sonicwall Attacks; Cached Windows RDP Credentials Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API “login” and “domain” endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sa…
…
continue reading
L2TP VPN has been a trusted standard for years, but its end of life is quickly approaching. In this episode, we explore why L2TP is being phased out, the security concerns behind the change, and what your options are moving forward. We’re joined by special guest Daniele Barill, EMEA Security Market Development Manager, to dive deeper into the topic…
…
continue reading

1
Meta's Standalone AI App: Personalized Assistance from Social Insights
1:45
1:45
Play later
Play later
Lists
Like
Liked
1:45Meta's new standalone AI app, unveiled at LLAMACON, offering personalized assistance by leveraging insights from your social media activity. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Radio
…
continue reading
DHS Secretary Kristi Noem justifies budget cuts in her RSAC keynote. The EFF pens an open letter to Trump backing Chris Krebs. Scattered Spider is credited with the Marks & Spencer cyberattack. Researchers discover a critical flaw in Apple’s AirPlay protocol. The latest CISA advisories. On our Industry Voices segment, we are joined by Neil Gad, Chi…
…
continue reading