show episodes
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Artwork

1
IoT Security Podcast

Phosphorus Cybersecurity

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join one of our hosts, Alex Nehmy, Eric Johansen, and James McCarthy, each month as they speak with the biggest names and the biggest brains in cybersecurity, including CISOs, analysts, security researchers, and other industry thought lea ...
  continue reading
 
Welcome to Lighting it Up, where host Jennifer Cox brings you into insightful conversations with powerful, innovative, and inspiring people from the tech world and beyond. This podcast highlights the journeys, challenges, and successes of those who are shaping the future—covering everything from navigating neurodiversity to leading with impact. Each episode features candid discussions, practical advice, and fresh perspectives on thriving in today’s fast-evolving landscape. Whether you’re a s ...
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork

1
Cyber Sitrep

Corvus Technologies, Digital Beachhead

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Cyber Sitrep brings you all the latest cybersecurity news, commentary, and threat intelligence. Focused on small to midsize businesses who we feel have been left behind. Hosted by Eric from Corvus Technologies and Mike from Digital Beachhead who bring their unique perspective based on their military and cybersecurity experience. If you want to understand more about how cybersecurity is important to your organization, enjoy funny tales or just want to learn more about the field of cybersecuri ...
  continue reading
 
The federal government spends $90 billion on technology every year. If you are a tech innovator and want to expand your share of the market, this is the podcast for you to find new opportunities for growth. Every week, Federal Tech Podcast sits down with successful innovators who have solved complex computer system problems for federal agencies. They cover topics like Artificial Intelligence, Zero Trust, and the Hybrid Cloud. You can listen to the technical issues that concern federal agenci ...
  continue reading
 
Welcome to The Rocheston Cybersecurity Podcast, your go-to podcast for demystifying cybersecurity concepts in a global context. Hosted by Haja Mo who has a passion for cybersecurity education, this podcast breaks down complex topics into easy-to-understand explanations, ensuring that listeners of all backgrounds can grasp essential cybersecurity principles. In each episode, we delve into various cybersecurity concepts, making it easy for everyone to understand. Whether you're a tech enthusia ...
  continue reading
 
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: [email protected] Twitter: @emsisoft Facebook: @Emsisoft
  continue reading
 
Humans are the key to solving our cybersecurity challenges…but first we need them to be Well Aware. The Well Aware Security Show is hosted by George Finney, CISO for SMU and author of the award winning book, Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future. Security is in your DNA…so be Well Aware!
  continue reading
 
Are you a cybersecurity professional who wants to be updated with the latest industry news, emerging threats and challenges but you've got no time to wade through white papers or the tech press? Are you a passionate person about cybersecurity who just wants to learn more on how to protect information? We've got you covered. The Cyberstar Talk's Podcast allows you to stay up to date as you’re going on with your daily grind. This channel will provide you with a bunch of exclusive and best inte ...
  continue reading
 
Artwork

1
Security Masterminds

Security Masterminds

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
  continue reading
 
Artwork
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
  continue reading
 
Artwork
 
🎙️ Dive into the world of cybersecurity with Cubic Lighthouse Podcast - your expert companion in navigating the latest developments and crucial topics in the field. We dissect complexities, provide strategic insights, and ensure you stay abreast of cutting-edge trends. Whether you're a seasoned professional or a cybersecurity enthusiast, join us for concise expertise and actionable intelligence to enhance your security posture. 🌐🔐
  continue reading
 
Manufacturing is challenging, but if you are connected to a community of leaders, you can elevate your skills, solve your problems and grow your business! MakingChips was launched in 2014 to equip and inspire the metalworking nation. Hundreds of episodes and a million downloads later, it’s an industry-leading source of information, inspiration, and entertainment for manufacturing leaders of all types. It’s hosted by Nick Goellner, Mike Payne, and Paul Van Metre. They’re joined by a rotating ...
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
Artwork

1
Cybility Savvy

Michala Liavaag

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Bite-sized information about cybersecurity for not-for-profit boards and leaders. In each episode we help leaders of not-for-profits to understand the information security risks to their organisations and they leave with at least one actionable insight that they can put into practice. It also features interviews with not-for-profit leaders sharing their cybersecurity journey, insights and lessons learned.
  continue reading
 
Artwork

1
AWS Industrial Insights

Amazon Web Services

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Visionary leaders from industrial companies share their insights on technology, innovation, and leadership. This podcast is for industrial business leaders who are looking to make data-driven decisions and learn from those who have experienced similar challenges.
  continue reading
 
Artwork

1
8th Layer Insights

Perry Carpenter | N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
  continue reading
 
Thriving With Technology is the podcast from techwellness.com. Our Mission is to bring awareness, balance and health to our relationship with tech. Our new reality makes that harder than ever, BUT, it's not impossible. We’ll help you find it without having to abandon the technology that makes life easy, convenient and connected. Join the movement today at techwellness.com
  continue reading
 
CSIAC's Mission Mission Statement CSIAC is chartered to leverage the best practices and expertise from government, industry, and academia in order to promote technology domain awareness and solve the most critically challenging scientific and technical problems in the following areas: Cybersecurity and Information Assurance, Software Engineering, Modeling and Simulation, and Knowledge Management/Information Sharing.
  continue reading
 
Artwork

1
TopCyberPro

TopCyberPro

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at: Website: https://topcyberpro.com/ Facebook: https://www.facebook.com/TopCyberPro/ Instagram: https://www.instagram.com/topcyberpro/ Twitter: https://twitter.com/TopCyberPro TikTok: https://www.tiktok.com/@topcyberpro LinkedIn: https://www.linkedin.com/company/to ...
  continue reading
 
Artwork

1
UAB TechKnow

University of Alabama at Birmingham

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to UAB TechKnow! We are here to help the UAB community better connect with technology on campus. We introduce tips to keep you secure and cover things like new software and updates.
  continue reading
 
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
  continue reading
 
Artwork
 
Welcome to my Cyber Security Podcast. To give you a better idea of what you can expect, I’ll be covering a wide range of topics in the cyber security field, including what you can do to protect yourself from cyber threats. This podcast is for everyone, from the most experienced cybersecurity professional to the complete beginner. So stay tuned for the latest updates in cyber security!
  continue reading
 
This Podcast is Hosted by Raghu Krishna. He wants to bring in interesting people who he has meet and feel that they have intresting story to tell to the world. Not all of the interviews have to be from celebrities to give some advice or for people to watch/hear. Every person has a story to tell and a lesson that we all can learn from.
  continue reading
 
Artwork

1
The GOHSEP Get a Game Plan Podcast

Louisiana Governor's Office of Homeland Security and Emergency Preparedness

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The GOHSEP Get a Game Plan Podcast highlights key issues in emergency management, we have timely interviews with subject matter experts at all levels of government along with practical information to help you become more resilient before the next disaster strikes.
  continue reading
 
Artwork

1
Meraki Unboxed

Cisco Meraki

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Join us as we chat with experts from inside and outside Cisco Meraki. Hear about the latest in technology and the people and culture that drive the business. We’d love to hear your feedback—share it with us at community.meraki.com.
  continue reading
 
Artwork

1
Simplifying Cyber

Aaron Pritz, Cody Rivers

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
  continue reading
 
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
  continue reading
 
Unhackable - a virtually impossible state of being only made plausible through consistent cybersecurity best practices by everyone simultaneously. This is Unhackable, the authoritative Security podcast about deception and personal security. Can you ever be truly Unhackable? No, nobody can. But every episode is designed to help you move forward using actionable cybersecurity best practices that are within reach of everyone. We help you take the steps needed to solve your most important Cybers ...
  continue reading
 
Innovation in compliance brings you interviews with industry leading experts who are changing the way practitioners approach compliance. Host Tom Fox, the Compliance Evangelist and Voice of Compliance is driving the conversation about compliance into the 2020s and beyond with his focus on innovations for the compliance practitioner and the compliance profession. If you want to learn how to bring business solutions to compliance problems to more fully operationalize compliance, this is the po ...
  continue reading
 
Artwork

1
That Tech Pod

Laura Milstein, Gabriela Schulte and Kevin Albert

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Welcome to That Tech Pod, a podcast co-hosted by Laura Milstein, Gabi Schulte and Kevin Albert. Each Tuesday, That Tech Pod will feature in depth discussions about data privacy, cybersecurity, eDiscovery, and tech innovations with heavy hitters in the industry. Subscribe so you don't miss an episode! Visit thattechpod.com for more information.
  continue reading
 
Community IT offers free webinars monthly to promote learning within our nonprofit technology community. Our podcast is appropriate for a varied level of technology expertise. Community IT is vendor-agnostic and our webinars cover a range of topics and discussions. Something on your mind you don’t see covered here? Contact us to suggest a topic! http://www.communityit.com
  continue reading
 
Artwork
 
Let's build a deeper planet together. I am your host Daryl Ledyard (a.k.a. D-A-R-Y-L), and I challenge you to Think Deeper, Love Deeper and Live Deeper in your everyday lives. In this podcast, I will challenge you to build a deep, rich, and more balanced life by exploring mind, body and spirit. My mission is to help others to elevate and grow through inspired thought, awareness, and service to others on their journey. If you would like to be a guest contact @darylledyard on Instagram. If you ...
  continue reading
 
Artwork

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple

Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
  continue reading
 
Welcome to “Behind The Scenes with Sonda”, a podcast with focus on tackling the challenges in the healthcare billing world and beyond! Every episode, Sonda will explore and expose the issues in medical billing: talking about bigger issues that come to light from large insurance carriers, showcasing the difficulties and barriers to overcome to get providers paid, and sharing more on the overall business of healthcare, specifically surrounding inequities often not seen by the general public. ‘ ...
  continue reading
 
Cybercriminals are evolving—are you keeping up? Don’t Be A Sitting Duck is the podcast for business leaders and professionals who want to stay one step ahead of the latest cyber threats. In each bite-sized episode, we dive into real-world cyber breaches, phishing scams, and ransomware attacks, sharing actionable advice to help you protect your business. Looking for more insights and resources? Visit sittingduck.com.au to explore educational content designed to help you navigate today’s compl ...
  continue reading
 
Loading …
show series
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Artificial Intelligence can be applied to code generation, predictive analytics, and what is called “generative” AI. " Generative means the AI can look at a library of information (Large Language Model) and create…
  continue reading
 
📲 Got a DM from the “FBI” on Telegram? 🚨 Did someone named “Jaimie Quin” claim they run IC3? ⚠️ It’s a scam. Full stop. The FBI just issued an alert warning the public: They are NOT direct messaging victims on Telegram or any other social media app. A scammer posing as “Jaimie Quin” is pretending to be the head of the FBI’s Internet Crime Complaint…
  continue reading
 
Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters 00:00 Introduction to the Challenges of Securing Critical Infrastructure 03:11 Vulnerabilities and Weaknesses in Critical Infrastructure 10:0…
  continue reading
 
👀 Could your next Google search lead you into a cyber trap? 🔐 Are you sure that “HR login” link isn’t a fake? 🚨 The FBI just issued a Public Service Announcement warning EVERYONE — yes, even you — that cybercriminals are now targeting employee self-service websites (like payroll, benefits, and HR portals). Here’s how it works: ⚠️ Fraudsters buy sea…
  continue reading
 
📬 Would you fall for a fake Google subpoena? 🛡️ What if it passed every security check — and looked 100% real? 🚨 A new phishing tactic is slipping past traditional defenses — and it’s terrifyingly convincing. 🕵️‍♂️ Recent reports reveal cybercriminals are sending fake emails that mimic legal subpoenas from Google. ✅ No misspellings ✅ No suspicious …
  continue reading
 
2025 Nonprofit Cybersecurity Incident Report: Keeping Your Nonprofit Secure Community IT CTO and cybersecurity expert Matt Eshleman delivered our annual report on trend lines and took questions live and online in this popular annual webinar. In part 1, Matt discusses the landscape and background of cybersecurity attacks nonprofits face now, goes ov…
  continue reading
 
Once again, we're back with all the answers. Traditional vulnerability management comes with many pitfalls, and we're counting down the solutions to all the problems you might be running into. Ivanti's Chris Goettl and Robert Waters break down the back five on our list: a periodic approach to remediation, poor prioritization, lack of business conte…
  continue reading
 
Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in em…
  continue reading
 
Innovation comes in many areas, and compliance professionals must be ready for and embrace it. Join Tom Fox, the Voice of Compliance, as he visits with top innovative minds, thinkers, and creators in the award-winning Innovation in Compliance podcast. This series is introduced by Tom Fox and hosted by Roxanne Petraeus. Ethena sponsors this special …
  continue reading
 
David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know. Chapters 00:00 The Reality of Cybercri…
  continue reading
 
What can the largest diamond heist in history teach us about modern cybersecurity? When $100 million in diamonds vanished from Belgium's supposedly impenetrable Diamond Center vault, it wasn't cutting-edge technology that failed—it was people and processes. Join host Aaron Pritz and senior cybersecurity consultant Rebecca as they unpack the fascina…
  continue reading
 
Cybercriminals are impersonating trusted business executives and financial experts to trap unsuspecting investors. These scammers are creating fake investment firms with fraudulent registration details, professional-looking websites and manipulated social media engagement to appear legitimate. They are actively using Telegram channels, WhatsApp gro…
  continue reading
 
What does airport security have to do with protecting your online identity? 🛫💻 Plenty, actually. In this episode, we chat with Dan Tinari from Yale’s Information Security Office, who breaks down identity and access management (IAM) in a way that actually makes sense—and might even make you smile. 😄 Whether you're logging in at Yale or keeping your …
  continue reading
 
The CYFIRMA research team provides a comprehensive analysis of how diplomacy, defense, and digital strategy are colliding: As trade friction intensifies especially under the 2025 U.S. tariff regime, cyberspace is becoming the frontier of quiet competition between traditional allies. While full-scale cyber warfare remains unlikely, behind-the-scenes…
  continue reading
 
Innovation comes in many areas, and compliance professionals must be ready for and embrace it. Join Tom Fox, the Voice of Compliance, as he visits with top innovative minds, thinkers, and creators in the award-winning Innovation in Compliance podcast. In this episode, Tom visits with Kerri Reuter, AVP, Legal Counsel at SageSure. Reuter shares her e…
  continue reading
 
In this heartfelt season finale, Darnley takes a step back to reflect on the journey so far — from quiet beginnings during the COVID-19 shutdowns to building a global community of digital thinkers, privacy advocates, and cyber-curious minds. Join us as we reminisce about standout moments from Season 5, and real stories that brought cybersecurity in…
  continue reading
 
U.S. President Donald Trump, once a critic but now a supporter of TikTok, is granting the app’s China-based parent company, ByteDance, a second 75-day extension to finalize a deal that would transfer ownership of TikTok to an American entity. While the legislation allowed only one extension for a sale, the U.S. Congress has yet to push back against…
  continue reading
 
This week on That Tech Pod, Laura and Kevin sit down with tech veteran and AI thought leader Ken Gavranovic, CEO of Product Genius, for a lively and insightful conversation that spans AI, ethics, innovation and pop culture. Ken opens up about his challenging childhood, sharing how it sparked a passion for technology and a desire to build tools that…
  continue reading
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com The federal government needs to share information on a wide variety of platforms and must provide methods to ensure this transmission is secure. Of course, the hard part is the “how” part of this data transfer. Ti…
  continue reading
 
In this special episode of Lighting It Up, Jennifer Cox sits down with Jenny Rogers—renowned executive coach, author, and champion for women’s growth—to explore what happens when we dare to step outside our comfort zones. Jenny shares candid insights on how motherhood reshaped her identity, the challenges and joys of building connections as a new p…
  continue reading
 
Stay ahead of evolving ransomware threats with CYFIRMA’s Monthly Ransomware Report – March 2025. The month of March saw shifting dynamics, with Safepay experiencing a huge surge of 223%, while RansomHub and Akira declined. Babuk2 has possibly leveraged fake extortion claims. Manufacturing, IT, and Consumer sectors remained prime targets as total in…
  continue reading
 
Dreaming of owning your own machine shop but hitting a wall when it comes to the money? You’re not alone—and you’re definitely not out of options. In this episode of MakingChips’ Machine Shop MBA series, host Mike Payne sits down with Jon Hughes, Principal and CFO Consultant at CliftonLarsonAllen (CLA), to unpack what it really takes to fund a manu…
  continue reading
 
Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military into cybersecurity today, new approaches to enter cybersecurity, how start a career in cybersecurity today,…
  continue reading
 
Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Ha…
  continue reading
 
Most small manufacturers don’t realize they’re being quietly supported by one of the most impactful public-private partnerships in the country. The Manufacturing Extension Partnership (MEP) has long been the hidden backbone behind training programs, grant facilitation, process improvements, and critical tech upgrades for shops across the U.S. But r…
  continue reading
 
In early 2025, Oracle faced two significant cybersecurity breaches that exposed sensitive data and raised serious concerns about its security practices. The first breach involved outdated Cerner servers, compromising healthcare data, while the second targeted an inactive legacy system, leading to the theft of client credentials. Both incidents high…
  continue reading
 
In today’s interview, Carolyn talks with Tiff Parker, an IT Business Manager at Community IT. They talk about her background, how she got into a technology career, and what brought her to Community IT in this role. Tiff reflects on her early interest in GIS Geo Information Systems mapping, her years as an “accidental techie” at a nonprofit with inc…
  continue reading
 
Show Notes: River flooding in Louisiana can include several factors. Much of the country drains into the Mississippi River Basin. That means there will be impacts on major rivers like the Mississippi and the Atchafalaya. There can also be local impacts based on local weather events on smaller rivers and other regions of the state during the spring.…
  continue reading
 
Innovation comes in many areas, and compliance professionals must be ready for and embrace it. Join Tom Fox, the Voice of Compliance, as he visits with top innovative minds, thinkers, and creators in the award-winning Innovation in Compliance podcast. In this concluding episode of a three-part series, Tom Fox visits with Jen Hardy, Chief Operations…
  continue reading
 
This episode dives into the fascinating journey of Microsoft operating systems—from their raw, code-heavy origins to the sleek, intuitive platforms we depend on today. Darnley reflects over the last 50 years on the digital operating systems laid by pioneers like Microsoft and how their innovations transformed personal computing over the decades. Cl…
  continue reading
 
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com In traditional commercial selling, a company seeks to understand its business problems and then presents a solution that would save time and money. Understanding federal requirements has a few more barriers than s…
  continue reading
 
Hunting Down Hackers. True Crime Stories with Huntress/YouTube Leader John Hammond. Video episode here: https://youtu.be/CMOu0o9FvFQ Examples with advice from top security content creator JOHN HAMMOND. Understanding the Cyber Crime Mind To Protect Business, top security content creator insight, recent true cyber crime examples, new findings on cybe…
  continue reading
 
Innovation comes in many areas, and compliance professionals must be ready for and embrace it. Join Tom Fox, the Voice of Compliance, as he visits with top innovative minds, thinkers, and creators in the award-winning Innovation in Compliance podcast. In this part 2 of the 3-part series, Tom Fox and Irina Alexander, founder & CEO of the Academy of …
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play