KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
…
continue reading
Cyber Security Compliance and IT Jobs
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Compliance Conversations is a biweekly podcast for healthcare professionals and compliance officers who want to stay on top of the compliance game. Host CJ Wolf has in-depth conversations with industry experts to explore the riddles and complexities of the compliance world. Wolf chats with fellow compliance experts, auditors, physicians and government officials. Compliance Conversations is produced by Healthicity.
…
continue reading
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading

1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
Welcome to The Cyber Business Podcast where we feature top founders and entrepreneurs and share their inspiring stories.
…
continue reading
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
…
continue reading
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
The Bare Metal Cyber CCISO Prepcast is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO 270 ...
…
continue reading
The Pipeliners Podcast is the source of industry information for pipeline professionals. This is a weekly podcast with new episodes released every Tuesday. Each week, host Russel Treat welcomes industry-leading experts and insightful guests to share their knowledge about specific pipeline topics in an informative, conversational setting. Each episode covers topics that include alarm management, compliance, control room management, cybersecurity, HMI and SCADA, inspection, integrity, leak det ...
…
continue reading
Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading

1
Encrypted Ambition: Where Ambition Meets Encryption - Inside The Minds Of Disruptors.
Craig Petronella
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
The Bare Metal Cyber CISA Prepcast is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impact re ...
…
continue reading
A series by reputation specialist Lansons Team Farner and law firm Katten. Join asset management experts David Masters (Lansons), Neil Robson (Katten) and guests as they dissect the top stories and misconduct cases across the industry, impacting reputation, brand trust and integrity.
…
continue reading
Join us as we discuss news and current events, trends, and controversies in the world of cybersecurity. We have strong feelings and they're not limited to FedRAMP, CMMC, FISMA, IRAP, security engineering, or documentation. Anything goes -- some of the things we say are probably even helpful! Interested in having words? Email us at [email protected].
…
continue reading
In this podcast, we delve into various aspects of cybersecurity, inviting global security leads to discuss trends, the impact of new concepts and regulations, talent retention, and more through one-on-one discussions.
…
continue reading
Legal News Wales, with the help of our special guests, explore the tools, insight and processes that can help law firms in Wales become more resilient, competitive and operationally efficient - whatever the climate throws at us. From technology, wellbeing, pricing, compliance, marketing and leadership to recruitment and retention, this podcast covers it all and is ideal for SME legal practices - including barristers chambers.
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
Welcome to ”The Security Podcast of Silicon Valley,” a https://YSecurity.io production that now features a compelling blend of our traditional cybersecurity insights and the innovative new sub-series, ”The Founder’s Guide to Compliance.” Hosted by Jon McLachlan and Sasha Sinkevich, this podcast dives deeper into the human element of cybersecurity, bridging the gap between technical challenges and the human stories behind them. ”The Security Podcast of Silicon Valley” has always been your gat ...
…
continue reading
In the digital age, privacy is more important than ever. But as technology advances, so do the challenges to privacy. We explore the latest trends in privacy and technology, and discuss how businesses can build strong privacy programs that protect their customers' data. We invite top privacy compliance and tech guests to discuss privacy in a fun and interesting manner, covering topics such as data privacy, cybersecurity, and AI. Whether you're a business owner, a privacy professional, or sim ...
…
continue reading
The Bare Metal Cyber CISM Prepcast is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series offers ...
…
continue reading
The CyberGov Podcast is dedicated to providing government contractors with the latest cybersecurity best practices, industry news, and actionable insights. Our mission is to help businesses safeguard their operations, stay informed about emerging threats, and effectively navigate the complexities of providing services to the government. Through expert interviews, in-depth analysis, and practical advice, we aim to build a more secure and resilient government contracting community.”
…
continue reading
Framework is your go-to podcast for mastering cybersecurity frameworks, with a special focus on the NIST Cybersecurity Framework (CSF) and NIST 800-53. This series breaks down each function, category, and subcategory to help professionals, educators, and organizations understand their structure and real-world applications. Each episode delivers clear, practical insights with examples that make cybersecurity frameworks more accessible and actionable. Whether you're new to cybersecurity or loo ...
…
continue reading
Talk to Th3 Doc with Steve Meek is designed for executives seeking to learn from a balance of business and technology experts, focused on helping SMBs through practical, high-level insights. Hosted by Steve 'The Doctor' Meek, an experienced business owner and technology strategist, episodes break down complex topics in General Business, Cybersecurity, Artificial Intelligence and Technical Support, into clear, actionable conversations tailored for leadership decision-making. These include top ...
…
continue reading
With new legal risks and regulatory challenges constantly arising, how can we stay current and be best prepared? Join us for Compliance & Legal Risk, a podcast brought to you by Georgetown Law and EY. In each episode, host Ronald J. Coleman (“RJ”) will interview thought leaders in areas relating to legal risk and regulatory compliance, such as anti-corruption, privacy, cybersecurity, automation, and eDiscovery.
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading

1
The Journey and Insights of a Successful Fractional CISO | Interview with Terry Ziemniak
49:55
49:55
Play later
Play later
Lists
Like
Liked
49:55In this episode of the Secure and Simple Podcast, we sit down with Terry Ziemniak, an experienced fractional CISO with over a decade in the field. Terry shares his unique career journey from traditional cybersecurity roles to becoming a trusted fractional CISO. We discuss the key differences between full-time and fractional CISOs, how to balance mu…
…
continue reading

1
The AI Revolution in Human Risk Management: Beyond Compliance
10:19
10:19
Play later
Play later
Lists
Like
Liked
10:19Traditional security awareness training (SAT) has often proven ineffective, with only 15% of participants actually changing their behavior and a significant majority of data breaches, predicted to be 90% in 2024, involving a human element. Artificial intelligence (AI) is fundamentally transforming SAT by enabling personalized learning experiences, …
…
continue reading

1
Beyond the Human: AI, Automation, and the Secretless Future of Machine Identity
11:43
11:43
Play later
Play later
Lists
Like
Liked
11:43As machine identities exponentially outnumber human ones, creating a vast and vulnerable attack surface by 2025, organizations face unprecedented cybersecurity challenges. This podcast explores how artificial intelligence (AI) and advanced automation are becoming critical for managing the lifecycle of these digital credentials, from detecting anoma…
…
continue reading

1
Convocourses podcast GRC is ripe for a Revolution
1:19:31
1:19:31
Play later
Play later
Lists
Like
Liked
1:19:31I just read an article by Chris Hughes called: GRC is Ripe For a Revolution. The name alone pissed me off. but as i read it, I realized he has some great points.. - https://www.resilientcyber.io/p/grc-is-ripe-for-a-revolution He talks about GRC being outdated, antiquated, and ineffective. There are too many frameworks and its too slow. It needs to …
…
continue reading

1
3369: Precisely Explains Why AI Fails Without Data Integrity
25:16
25:16
Play later
Play later
Lists
Like
Liked
25:16In today’s episode of Tech Talks Daily, I sat down with Andy Bell, Head of Data Product Management at Precisely, to explore a challenge that many organizations continue to underestimate: the role of data integrity in AI strategies. With only 12 percent of businesses expressing confidence in the quality of their AI data, it's clear that the rush to …
…
continue reading

1
Cyber Compliance Checklist Every SMB Must Know | Micheal Senkbeil |Ep. 106
52:57
52:57
Play later
Play later
Lists
Like
Liked
52:57Is your SMB truly ready for today's cyber threats?In Episode 106 of Talk To Th3 Doc, Steve Meek is joined by cybersecurity strategist Michael Senkbeil to unpack the must-know compliance checklist for small and mid-sized businesses.Whether you're working toward CMMC, navigating cyber insurance requirements, or just trying to lock down your business,…
…
continue reading

1
Cybersecurity: Unifying Defenses, Empowering Humans, and Optimizing Spend in 2025
22:15
22:15
Play later
Play later
Lists
Like
Liked
22:15This episode explores the critical juncture where human behavior meets technological defense in cybersecurity, highlighting how a significant 68% of breaches are human-driven due to factors like ineffective training and a poor security experience. We delve into the growing imperative for organizations to shift from complex "tool sprawl" with dozens…
…
continue reading

1
3368: Nerdio Builds a Remote-First Unicorn Focused on Azure Optimization
22:00
22:00
Play later
Play later
Lists
Like
Liked
22:00In this episode of Tech Talks Daily, I sat down with Joseph Landes, co-founder and Chief Revenue Officer at Nerdio, to explore how one conversation at a Microsoft conference led to a billion-dollar cloud automation company. From his 23-year career at Microsoft to building a fully remote team now supporting over five million users, Joseph’s story bl…
…
continue reading

1
How to Make Real CMMC Progress: Even if Compliance Isn’t Your Full-Time Job
45:44
45:44
Play later
Play later
Lists
Like
Liked
45:44Submit any questions you would like answered on the podcast! Schedule your free SPRS Roadmap Session and get a step-by-step plan to close gaps and stay defensible: 👉 https://cmmccomplianceguide.com/free-sprs-roadmap Is CMMC just one of many hats you wear at your company? You’re not alone and you’re not out of luck. In this episode of the CMMC Compl…
…
continue reading

1
GRC vs AI vs Cloud Cybersec Pros Experience Convocourses Podcast
1:27:49
1:27:49
Play later
Play later
Lists
Like
Liked
1:27:49 @professorblackops-cybersec1168 and I talk about GRC, AI, and Cloud. We are both contractors working for the US govt. There are many changes happening in real time. Not gonna lie, 2025 is batshit crazy! And its not slowing down. Here are some of the topics: I just passed the AWS CCP & AZ900? What cloud skills and tech should sharpen? What is the …
…
continue reading

1
Soap Box: Why AI can't fix bad security products
37:11
37:11
Play later
Play later
Lists
Like
Liked
37:11In this Soap Box edition of the show Patrick Gray chats with the CEO of email security company Sublime Security, Josh Kamdjou. They talk about where AI is useful, where it isn’t, and why AI can’t save vendors from their bad product design choices. This episode is also available on Youtube. Show notes…
…
continue reading

1
Cybersecurity as a Service: Unpacking the Costs, Maximizing the Value
26:06
26:06
Play later
Play later
Lists
Like
Liked
26:06In today's complex digital world, understanding the financial side of cybersecurity is crucial. This episode delves into Cybersecurity as a Service (CaaS), exploring the various factors that influence its cost, from service scope and company size to pricing models and the level of customization required. Discover how CaaS provides cost-effective ac…
…
continue reading

1
3367: CGS Reinvents Workplace Training With AI-Powered Role Play
27:19
27:19
Play later
Play later
Lists
Like
Liked
27:19The training room is changing, and it's not going back. In this episode, I sat down with Phil Friedman, the founder and CEO of CGS Inc., to explore how AI, avatars, and immersive simulations are rewriting the playbook on workplace training. With over four decades at the helm of CGS—a company he built from scratch after immigrating to the US—Phil br…
…
continue reading

1
Cyber Leadership and SOC use cases : Best Practices with Fernando Cocaro
13:27
13:27
Play later
Play later
Lists
Like
Liked
13:27In this episode, Nico welcomes Fernando for an in-depth discussion about transitioning from traditional SIEMs to NextGen platforms. Fernando stresses the importance of aligning SIEM migration with business strategies and outcomes. He emphasizes the need to define a clear business case, select platforms that meet modern detection needs, and execute …
…
continue reading

1
Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year’s Hacker Conference | An ITSPmagazine Webinar: On Location Coverage with Sean ...
1:00:22
1:00:22
Play later
Play later
Lists
Like
Liked
1:00:22In this thought leadership session, ITSPmagazine co-founders Sean Martin and Marco Ciappelli moderate a dynamic conversation with five industry leaders offering their take on what will dominate the show floor and side-stage chatter at Black Hat USA 2025. Leslie Kesselring, Founder of Kesselring Communications, surfaces how media coverage is shiftin…
…
continue reading

1
Hidden Security Vulnerabilities in Healthcare Portals
25:02
25:02
Play later
Play later
Lists
Like
Liked
25:02In this episode of Compliance Conversations, CJ Wolf, MD, is joined by Rui Ribeiro, Co-Founder and CEO of Jscrambler, to dive into the client-side security threats healthcare organizations often overlook. From patient portals to embedded video players, Rui explains how browser-based vulnerabilities are creating new risks that healthcare teams need …
…
continue reading
Send us a text In 2025, that almost sounds impossible. But on this week’s Secure Insights, we're joined by WIRESPEED Co-Founder Tim to explore exactly that. In this episode, we take a deep dive into how Wirespeed is building a next-generation Managed Detection and Response (MDR) platform—without leaning on the AI hype. Instead, they’re zeroed in on…
…
continue reading

1
teissTalk: Advancing compliance maturity in an age of DORA & NIS2
45:42
45:42
Play later
Play later
Lists
Like
Liked
45:42Protecting against sophisticated AI-powered attacks on APIs - identifying anomalies and threats Meeting API compliance and data protection challenges with emerging technologies Moving towards a mature posture for API security Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Satyam Rastogi, Director of Information Security & …
…
continue reading

1
AlphaEvolve superhuman AI from guy in IT perspective
1:05:24
1:05:24
Play later
Play later
Lists
Like
Liked
1:05:24works cited: https://deepmind.google/discover/blog/alphaevolve-a-gemini-powered-coding-agent-for-designing-advanced-algorithms/ (alphabet) https://ai-2027.com/ (Daniel Kokotajlo, Scott Alexander and others) https://www.amazon.com/Coming-Wave-Technology-Twenty-first-Centurys-ebook/dp/B0BSKW45KB (mustafa suleyman) Where I am currently learning: https…
…
continue reading

1
Why Startup Exec Hires Fail — Avoid €250K Mistakes with Diagnostic Hiring
29:20
29:20
Play later
Play later
Lists
Like
Liked
29:20What if every second leadership hire in your startup fails — costing you up to €250,000? In this episode of Startuprad.io, we uncover why so many startup executive hires flop and how diagnostic hiring is rewriting the rules of leadership selection. What You'll Learn: Why more than 50% of startup VP and C-level hires fail within 18 months The real-w…
…
continue reading

1
Ubiquiti in 2025: MSP Ready? (EP 886)
1:00:30
1:00:30
Play later
Play later
Lists
Like
Liked
1:00:30Thinking about adding Ubiquiti to your MSP stack? Hear my firsthand experience deploying their latest network and security hardware, plus insights from an industry pro managing thousands of devices. We cut through the marketing hype, evaluating features, pitfalls, and integration strategies. Hear the honest pros and cons comparing Ubiquiti with Syn…
…
continue reading

1
3366: Harvard Medical School: The Promise and Peril of CRISPR With Neal Baer
31:21
31:21
Play later
Play later
Lists
Like
Liked
31:21When we think about gene editing, the conversation often feels trapped between scientific journals and ethical debates too complex for public forums. In this episode, I spoke with Neal Baer, a rare voice who bridges both worlds. Known to many as an award-winning television showrunner for series like ER, Law & Order SVU, and Designated Survivor, Nea…
…
continue reading

1
Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Conversation with Sean Metcalf | Redefining CyberSecurity with Sean Martin
31:48
31:48
Play later
Play later
Lists
Like
Liked
31:48⬥GUEST⬥ Sean Metcalf, Identity Security Architect at TrustedSec | On LinkedIn: https://www.linkedin.com/in/seanmmetcalf/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ Sean Metcalf, a frequen…
…
continue reading

1
Your Digital Shadow: Identity, Money, and Control
50:53
50:53
Play later
Play later
Lists
Like
Liked
50:53Explore the rapidly emerging world of mandatory digital identity and financial tracking through Central Bank Digital Currencies (CBDCs), which are creating an unprecedented global infrastructure for monitoring, scoring, and controlling human digital interaction. Uncover how these systems are eroding privacy and anonymity, linking online activity to…
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-missionBy KirkpatrickPrice
…
continue reading
Artificial Intelligence is reshaping the MSP landscape, and no one knows it better than Gregg Lalle of Synthreo. Tune in as Gregg breaks down how MSPs can move beyond automation to build intelligent AI agents that help clients grow their businesses and improve operational efficiency. Synthreo isn't just another AI tool. Gregg explains how their no-…
…
continue reading

1
2025 Job market Shocks AI tariffs Government cuts Economic Uncertainty
1:15:44
1:15:44
Play later
Play later
Lists
Like
Liked
1:15:44SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.tiktok.com/@convocourses Facebook: htt…
…
continue reading

1
Risky Business #800 — The SharePoint bug may have leaked from Microsoft MAPP
53:37
53:37
Play later
Play later
Lists
Like
Liked
53:37On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: Did the SharePoint bug leak out of the Microsoft MAPP program? Expel retracts its FIDO bypass writeup The mess surrounding the women-only dating-safety app Tea gets worse Broadcom customers struggle to get patches for VMWare hypervisor escapes Aeroflot gets hac…
…
continue reading

1
Balancing Compliance and Cloud Strategy in Finance with Jean-Philippe Gerbi
31:49
31:49
Play later
Play later
Lists
Like
Liked
31:49Guest Introduction Jean-Philippe Gerbi is the Chief Information Officer at Metropolitan Commercial Bank, where he oversees technology strategy in a highly regulated and security-sensitive environment. With deep experience in building scalable and secure infrastructures for financial institutions, Gerbi takes a pragmatic and risk-aware approach to d…
…
continue reading

1
3365: BlackLine on Why AI Is Changing the Nature of Tech Leadership
28:25
28:25
Play later
Play later
Lists
Like
Liked
28:25In this episode of Tech Talks Daily, I welcomed back Sumit Johar, CIO at BlackLine, for a timely conversation about how AI is transforming finance operations from the inside out. When we last spoke earlier this year, AI was still in the early stages of enterprise experimentation. Just a few months later, everything has shifted. Sumit shared how AI …
…
continue reading
Mobile devices blur the boundaries between personal and work devices and are packed with sensitive information, making them popular targets for malware, spyware, and data collection. On today’s Packet Protector we dig into strategies for managing threats to mobile devices with guest Akili Akridge. Akili started his career pulling burner phones off …
…
continue reading

1
Augment Code: AI Agents, Engineered to Ship (with Scott Dietzen)
37:51
37:51
Play later
Play later
Lists
Like
Liked
37:51AI isn’t just writing code—it’s joining the team. Scott Dietzen, Board Member at Augment Code, explains how Augment’s AI agents are changing the way enterprise software is built, secured, and scaled. These aren’t copilots for toy projects—they’re context-aware agents designed for real-world codebases and real production work. Scott: www.linkedin.co…
…
continue reading

1
The Insider Threat: How a US Soldier Planned for Years to Kill His Own Unit
55:05
55:05
Play later
Play later
Lists
Like
Liked
55:05The most dangerous threats don't break down the door - they already have the keys. March 23, 2003, Kuwait: Command Sergeant Major Bart Womack was loading ammunition and watching Tiger Woods play golf at 1 AM when a grenade rolled into his tent. What followed was every leader's worst nightmare - discovering that one of your own had been planning to …
…
continue reading

1
Shadows in the Stream: Detecting AI's Disinformation Game
1:01:03
1:01:03
Play later
Play later
Lists
Like
Liked
1:01:03This podcast delves into the complex world of AI-powered disinformation, exploring how sophisticated tactics like typosquatting are employed to clone legitimate media websites and disseminate false narratives at scale, as seen in campaigns like "Doppelgänger". We uncover how malicious actors leverage generative AI to produce convincing deepfakes, A…
…
continue reading

1
Encore: Hugh Thompson on Building the RSA Conference
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34Please enjoy this encore episode of Afternoon Cyber Tea while Ann Johnson and team are taking a break. Dr. Hugh Thompson, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann on this week's episode of Afternoon Cyber Tea. They discuss what goes into planning the world’s largest cybersecurity conference—from the…
…
continue reading

1
Convocourses Applying for Jobs Live
1:50:06
1:50:06
Play later
Play later
Lists
Like
Liked
1:50:06SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.tiktok.com/@convocourses Facebook: htt…
…
continue reading

1
Episode 399: Leadership in the High Reliability Organization with Mike Mercer
39:39
39:39
Play later
Play later
Lists
Like
Liked
39:39In this episode of the Pipeliners Podcast, Russel Treat is joined by Mike Mercer from the High Reliability Group to explore what it means to be a high-reliability organization (HRO). The conversation covers how leadership, culture, and standardized processes contribute to safety and performance in high-consequence industries like nuclear and pipeli…
…
continue reading

1
3364: MongoDB Simplifies AI Development With Integrated Vector Search
34:54
34:54
Play later
Play later
Lists
Like
Liked
34:54In this episode of Tech Talks Daily, I sat down with Boris Bialek, VP and Field CTO at MongoDB, for a conversation that moved well beyond databases. As AI continues to accelerate across sectors, MongoDB is positioning itself at the intersection of modern data architecture and intelligent application development. Boris shared how his team is simplif…
…
continue reading

1
Cybersecurity News: Vikings Vishing Lost $240K, Scattered Spider & F1 Racing
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13Dallas Turner's $240,000 fraud loss isn't just celebrity news—it's a wake-up call for anyone with a bank account. When even NFL linebackers fall victim to social engineering, what does that mean for the rest of us? In this episode of The Audit, co-hosts Joshua Schmidt, Eric Brown, and Nick Mellem break down the sophisticated tactics behind this mas…
…
continue reading

1
From Milestone to Mandate: What the Latest CMMC Update Means for Your MSP & Your Clients
1:00:28
1:00:28
Play later
Play later
Lists
Like
Liked
1:00:28Big news for the defense and MSP community: The 48 CFR CMMC final rule has officially reached OMB review. This is the second-to-last milestone before publication in the Federal Register — and we’re expecting to see the final rule land by October with no 60-day delay. Translation? The phased rollout begins Q4 2025. If you work with defense contracto…
…
continue reading

1
Why Engineers Hate Compliance—And Why They’re Not Wrong
16:26
16:26
Play later
Play later
Lists
Like
Liked
16:26Welcome to Part 1 of our Compliance Engineering Mini-Series, a focused look at what it means to build secure, auditable systems by design. In this kickoff episode, 38North Director of Engineering Larry Spector joins Chris Davis to talk about a familiar tension: engineers want to move fast, and compliance gets in the way. But what if the engineers a…
…
continue reading

1
The Guarded Agent: Securing AI in Every Operational Environment
21:14
21:14
Play later
Play later
Lists
Like
Liked
21:14Agentic AI systems significantly extend their capabilities by interfacing with diverse external environments through tools and function calls, including API access, code execution, databases, web browsers, and critical operational systems. However, each of these "agencies" introduces unique and severe security concerns, such as tool misuse (T2), pr…
…
continue reading

1
Driving the Future: Rivian’s Gerard Dwyer on Smarter Systems and Bold Innovation
1:11:25
1:11:25
Play later
Play later
Lists
Like
Liked
1:11:25Guest Introduction Gerard Dwyer serves as the Chief Information Officer at Rivian, a pioneering electric vehicle company reshaping automotive technology. With a global background that spans from Ireland to Silicon Valley, Gerard’s career journey includes executive roles at Google, Waymo, and Swisscom, as well as impactful work in South Africa durin…
…
continue reading

1
Application security Developers Guide to secure code
1:20:47
1:20:47
Play later
Play later
Lists
Like
Liked
1:20:47SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.tiktok.com/@convocourses Facebook: htt…
…
continue reading

1
3363: ABB on Building a Smarter and More Resilient Power Grid
22:20
22:20
Play later
Play later
Lists
Like
Liked
22:20When we think about innovation in technology, power grids rarely enter the spotlight. Yet, they are the foundation for everything from artificial intelligence to electric vehicles and data centers. In this episode, I spoke with Adrian Guggisberg, President of the Smart Power Division at ABB, to unpack the evolving role of electrical power distribut…
…
continue reading

1
3362: Inside LVT’s Mission to Deter Crime Before It Happens With Tech
31:29
31:29
Play later
Play later
Lists
Like
Liked
31:29In a digital-first world where cybersecurity often dominates headlines, the conversation around physical security can sometimes feel like an afterthought. But what if technology could bring a new level of intelligence, proactivity, and efficiency to protecting real-world environments? In this episode, I sat down with Ryan Porter, co-founder and CEO…
…
continue reading

1
DC3's Collaborative Edge: Safeguarding Cyberspace Through Strategic Partnerships
20:43
20:43
Play later
Play later
Lists
Like
Liked
20:43As a Federal Cyber Center and Center of Excellence, the Department of Defense Cyber Crime Center (DC3) proactively builds and leverages strategic partnerships across the globe to enable insight and action in cyberspace and beyond. These vital collaborations span U.S. government entities, international allies, law enforcement agencies, the private s…
…
continue reading

1
Applying for jobs in cybersecurity update 2025
1:35:11
1:35:11
Play later
Play later
Lists
Like
Liked
1:35:11SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.tiktok.com/@convocourses Facebook: htt…
…
continue reading

1
3361: Why AidKit Built a Tech Platform for Equitable Aid Distribution
24:15
24:15
Play later
Play later
Lists
Like
Liked
24:15In today’s episode of Tech Talks Daily, I connected with Brittany Christenson, CEO of AidKit, to explore how cutting-edge technology is being used not to disrupt markets or chase margins, but to deliver real, measurable social impact. AidKit is a public benefit corporation building infrastructure that helps vulnerable communities access aid quickly…
…
continue reading

1
The Brussels Effect: Exporting Digital Censorship
15:31
15:31
Play later
Play later
Lists
Like
Liked
15:31The EU's Digital Services Act (DSA) is presented as a comprehensive digital censorship law, ostensibly designed for online safety, but criticized for targeting core political speech, humor, and satire, even when not illegal. This report uncovers how European regulators leverage the DSA to compel American social media companies to change their globa…
…
continue reading