Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
Interesting, fascinating, provoking, insightful - or all of the above - GDPR decisions, rulings and other tidbits discussed by two very opinionated people.
…
continue reading
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
How does GDPR, data privacy and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader or InfoSec security expert this is the podcast to learn about what is happening in the UK, EU, US and beyond.
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Privacy On The Ground is where privacy meets real life. Discussions about privacy in relation to government policy, legal compliance, or tech can be complicated and inaccessible. But the meaning of privacy and how data use affects us in our real lives is anything but: It is contextual and tangible. That’s what we aim for with Privacy on the Ground. In this podcast, you’ll hear talks and stories that reflect what privacy means for real people and real lives. Privacy On The Ground is a product ...
…
continue reading
In today's environment of data breaches, identity theft, fraud, and increasing connectivity, HIPAA Privacy and Security rules are a responsibility to your patients and your clients. HIPAA isn't about compliance, it's about patient care.
…
continue reading
Privacy in Practice, brought to you by VeraSafe, is the podcast for actionable insights and real-world strategies for privacy and compliance teams. Hosted by privacy pros Kellie Du Preez and Danie Strachan, each episode unpacks the practical side of compliance and data management, bringing together industry leaders and thought-provoking discussions. Whether you’re leading privacy efforts at your company or just beginning to explore this field, tune in for meaningful conversations that provid ...
…
continue reading
There is tremendous value to simplification. To quote Steve Jobs, “Simple can be harder than complex: You have to work hard to get your thinking clean to make it simple. But it is worth it in the end because once you get there, you can move mountains." In this series, we explore how people and companies achieve simplification.
…
continue reading
The Laundry podcast: Dive deep into the intricacies of financial crime, AML (anti-money laundering), compliance, sanctions, and the ever-evolving landscape of financial regulation. Hosted by Marit Rødevand and Fredrik Riiser – this podcast features renowned experts from sectors such as banking, fintech, compliance, and investigative journalism. Together, they shed light on the industry's trending topics, analyse mainstream news through a compliance-focused lens, and connect the fight against ...
…
continue reading
Control Risks and legal and compliance experts discuss issues ranging from challenging investigations to complex regulatory issues.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Join us for an in-depth exploration of InfoGov.com, the pioneering firm redefining Information Governance for businesses of all sizes. In this episode, we break down how InfoGov.com empowers Independent Professionals and InfoAdvisors™ to help organizations manage their data, protect sensitive information, and navigate the evolving landscape of security, privacy, compliance, and risk. From boutique revenue-sharing models to agnostic advisory services, we’ll discuss what sets InfoGov.com apart ...
…
continue reading
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
…
continue reading
A podcast about data innovation, regulations and data privacy. We will bring you exciting and inspiring stories from the frontiers of data and privacy management. Think AI, fairness, privacy-compliance, synthetic data, data literacy, and more. Hosted by Alexandra Ebert, MOSTLY AI's Chief Trust Officer. If you have any suggestions or questions, send a voice recording or an email to [email protected]!
…
continue reading
Welcome to the podcast: Sustainable Compliance. Are you passionate about data protection, GDPR, information security, and general compliance? Then, this podcast is dedicated to you. We delve into the intricacies of data protection and compliance. Join us as the host, Jacob Høedt Larsen, interviews experts and discusses the latest trends, insights, and advice within the realm of compliance. We also explore how we can reshape the way we think and organise ourselves around compliance, to forge ...
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
1. Gain a deep understanding of data privacy regulations and compliance requirements 2. Learn proven strategies for building a robust privacy framework tailored to your organization’s needs 3. Access practical resources and tools to streamline your data management processes 4. Connect with a community of like-minded business leaders for support and networking opportunities
…
continue reading
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
…
continue reading
Get the most recent and juiciest data protection and privacy news and latest court and DPA decisions from across Europe in GDPR today: the GDPRhub newsletter - the audio version! Produced by NoTies.Consulting, read by Rie Aleksandra Walle - GDPRhub volunteer.
…
continue reading
Join me in conversation with experts around the world as we talk about new privacy laws, global trends in data protection and the impact of these developments.
…
continue reading
An irreverent take on the world. May include interesting views on cybersecurity, data privacy and GRC stuff. But mainly two middle-aged men chewing the fat.
…
continue reading
Cybersecurity, compliance, security policy enforcement, and data privacy remain constant concerns, and a breach could irrevocably impact the profitability and sustainability of your company. Join Maurice Hamilton, CEO of Infinavate, each week as he interviews CEOs and CIOs to discuss real-life solutions to cybersecurity, data management, and advanced digital solutions. If you have concerns about cybersecurity, compliance, security policy enforcement, and data privacy, this podcast is for you ...
…
continue reading
If you work in compliance you will not want to miss our new podcast series. The Compliance Files is a unique podcast series, giving you access to industry insights and key perspectives on how the evolving regulatory landscape is driving change, challenge and opportunity for compliance professionals everywhere.
…
continue reading
Uncovering Hidden Risks explores how enterprises can reduce their risk by moving to a more holistic approach to data protection. Each episode will feature a panel of Microsoft security professionals and community security experts. They’ll dive into topics like data governance, internal and external threats, risk management and compliance, industry trends, and customer challenges. Listen in to the podcast and follow us! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Welcome to the Proceed Podcast, where we explore data and document management in the SAP world. Our goal is to help SAP customers manage their data effectively for reduced costs, improved IT agility, compliance, sustainability, and to drive IT transformation. Join us for expert interviews, case studies, and analysis to gain valuable insights into how you can optimise your data management processes.
…
continue reading
By the time the California Privacy Rights Act (CPRA) goes into effect on January 1, 2023, employers doing business in California will be required to implement a broad privacy and information security compliance program for the personal information of employees, independent contractors, and job applicants who reside in California. The Littler CPRA Podcast Series is designed to help covered employers attain a basic understanding of their compliance obligations. This series also will examine up ...
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
In 10 minutes daily, The Business of Tech delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering 'Why Do We Care?', channel veteran Dave Sobel brings you up to speed and provides resources to go deeper. With insights and analysis, this focused podcast focuses on the knowledge you need to be effective, profitable, and relevant.
…
continue reading
This is GDPR Beyond Borders, a short-run series where we bring you conversations live from an international forum on GDPR. This forum featured panels and presentations from leading thinkers and practitioners in data privacy and designed specifically for an American B2B marketing audience.
…
continue reading
The Digital Lighthouse is a podcast for CTOs and other tech leaders looking to navigate their organisation through endless disruption and turbulence. Packed full of real life stories and insights, this podcast serves as your guiding light - wherever you are in your journey and whatever challenges you face.
…
continue reading
Welcome to Health+Tech — Our podcast explores issues and trends at the intersection of healthcare, technology and innovation The podcast is presented by the firm’s Digital Health, Technology and Innovation Group, which helps clients navigate transactional, regulatory and compliance challenges in areas such as telehealth, data privacy and security, and health information technology. McGuireWoods is a full-service firm providing legal and public affairs solutions to corporate, individual, and ...
…
continue reading
Welcome to Email After Hours by Sender Score, powered by Validity. By day, we help email senders all over the world boost their email performance. Once we’re off the clock, we interview email marketing experts to talk about email fails, spam, privacy laws, metrics that matter, content that converts—and anything else that keeps senders up at night. Nothing is off-limits. We know what works in email–and we know the road to your next great campaign is getting bumpier by the day. So, we’re makin ...
…
continue reading
InfoSec Battlefield is a premier weekly podcast spearheaded by Carl B. Johnson, the President and vCISO at Cleared Systems. Dive deep into the ever-evolving landscape of cybersecurity and information compliance with Carl as he unpacks the latest threats and challenges. Featuring enlightening conversations with esteemed leaders from the cyber realm and compliance industry, it's your go-to source for insights and expertise. Stay informed, stay secure—tune in every week!
…
continue reading
Andersen in Nigeria is an independent tax, transfer pricing and accounting advisory services firm with a worldwide presence through the member firms and collaborating firms of Andersen Global.
…
continue reading
Welcome to Compliance Therapy™. This informative podcast bridges the gap between regulatory compliance, risk assessment, and cybersecurity best practices, making complex topics accessible for technology, business, and legal leaders. Join us and our renowned guests as they offer valuable insights and actionable strategies to strengthen your organization’s security posture and maintain compliance with key regulations such as NIST, FedRAMP, CMMC, and FISMA. Stay ahead in the rapidly evolving la ...
…
continue reading
https://petronellatech.com and our sponsor at https://compliancearmor.com present Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your ...
…
continue reading
Taxaroo is the cutting-edge tax practice management platform designed to revolutionize the way you run your tax business. Say goodbye to the hassle of managing client data, appointments, and documents manually. With Taxaroo, you can efficiently streamline your operations and focus on what matters most – delivering exceptional tax services. Key Features: Client Management: Easily organize client information, track communications, and access historical data in one central hub. Appointment Sche ...
…
continue reading
Discusses a broad range of technology ethics topics. Hosted by Daniel Smith, Associate Director of Content and Education at CITI Program. New episodes every month. Learn more at about.citiprogram.org.
…
continue reading
In the digital age, privacy is more important than ever. But as technology advances, so do the challenges to privacy. We explore the latest trends in privacy and technology, and discuss how businesses can build strong privacy programs that protect their customers' data. We invite top privacy compliance and tech guests to discuss privacy in a fun and interesting manner, covering topics such as data privacy, cybersecurity, and AI. Whether you're a business owner, a privacy professional, or sim ...
…
continue reading
Join Darren Gallop as he shares his unique perspective on entrepreneurship, cybersecurity, and the intersection of work, life, and travel. A linguist, musician, and world traveler, Darren brings a diverse background to his experiences building a startup. Tune in as he delves into the challenges and triumphs of being an entrepreneur, offers insights on the field of cybersecurity, and reflects on the ways in which his love of language and music have shaped his journey. Whether you're an entrep ...
…
continue reading
The Building Cyber Resilience podcast shifts the focus on cyber safety from fear to action by sharing simple steps that benefit both your team and your customers. Hosts Dr. Ann Irvine and Richard Seiersen talk about the positive outcomes of developing risk management and utilizing data science across industries to create a smarter business. Listen in and learn how you can build a cyber resilient organization in today's technology-driven landscape.
…
continue reading
Greenberg Traurig’s Legal Food Talk Podcast is designed to help industry participants, whether budding entrepreneurs or long standing companies, in-house counsel, and anyone else curious, to stay in touch with the world of food, beverages, dietary supplements, and agribusiness law. Each episode addresses a unique facet of the food, beverage or agribusiness sectors, with some episodes featuring Greenberg Traurig guests or other industry professionals.
…
continue reading
This podcast is about the world of Software Development in particular and technology in general. Here, you will find thoughtful discussions about tech leadership, AI, the future of technology, and success stories told by the people who made them happen. Your host is Lukasz Lazewski, a seasoned software engineer, tech leader, and entrepreneur.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading

1
Integrating Incident Response: A NIST SP 800-61r3 Guide to Cyber Risk Management
16:55
16:55
Play later
Play later
Lists
Like
Liked
16:55Incident response is a critical part of cybersecurity risk management and should be integrated across organizational operations. This episode explores the recommendations and considerations for incorporating cybersecurity incident response throughout an organization’s cybersecurity risk management activities, as described by the new NIST Special Pu…
…
continue reading

1
Harnessing Generative AI: Boosting Employee Productivity and Data Management with Hunter Jensen
26:34
26:34
Play later
Play later
Lists
Like
Liked
26:34Hunter Jensen, the founder and CEO of Barefoot Solutions, discusses the evolving landscape of artificial intelligence (AI) and its practical applications in business. Barefoot Solutions, a custom software development firm, has been at the forefront of technology innovations for over 20 years, adapting to trends from web development to machine learn…
…
continue reading

1
Beyond the Blueprint: Learning Cyber Resilience Together
20:26
20:26
Play later
Play later
Lists
Like
Liked
20:26Achieving cyber resilience is a complex and dynamic journey with no one-size-fits-all solution. This episode explores how organizations can significantly improve their cyber resilience posture by leveraging the shared experiences, insights, and front-line practices of their peers and the wider ecosystem. Drawing on insights from the Cyber Resilienc…
…
continue reading

1
The Future of Managed Services: AI Integration and M&A Trends with Industry Experts with Abraham Garver and Howard Cohen
36:46
36:46
Play later
Play later
Lists
Like
Liked
36:46This episode features a deep dive into the evolving landscape of managed services, focusing on the insights of industry experts Howard M. Cohen and Abraham Garver. The discussion centers around the significant shift towards service-oriented models within the managed service provider (MSP) sector, highlighting the importance of artificial intelligen…
…
continue reading

1
IBM and Intel Earnings Reveal Challenges; $22M Fintech Raise Targets MSP Billing Pain
16:21
16:21
Play later
Play later
Lists
Like
Liked
16:21IBM and Intel have recently reported their earnings, revealing significant challenges despite some positive figures. IBM exceeded earnings expectations with a revenue of $14.54 billion, but its net income fell sharply due to the U.S. government's cost-cutting measures, resulting in a loss of $100 million from canceled contracts. Meanwhile, Intel re…
…
continue reading

1
EDPB 2024: Guarding EU Data Privacy in a Rapidly Changing Digital World
15:35
15:35
Play later
Play later
Lists
Like
Liked
15:35Join us as we delve into the European Data Protection Board's (EDPB) 2024 Annual Report to understand how they championed data protection in a year marked by significant technological and regulatory shifts. This episode will cover the key milestones and priorities outlined in the EDPB's 2024-2027 Strategy, designed to strengthen, modernise, and har…
…
continue reading

1
They Got Hit. They Just Didn’t Tell You. - Ep 506
48:43
48:43
Play later
Play later
Lists
Like
Liked
48:43Turns out, “they got hit, they just didn’t tell you” isn’t just a snarky title—it’s a terrifying reality. The Black Fog report basically says, “Hey, the cybersecurity iceberg is way bigger below the surface.” From undisclosed data heists to the rapid rise of ransomware attacks, this is your reminder that you don’t want to be the next plot twist in …
…
continue reading

1
The Compliance Crunch: New Rules, Big Risks for SMBs
4:51
4:51
Play later
Play later
Lists
Like
Liked
4:51In the rapidly evolving world of cybersecurity, small and medium businesses are facing a critical turning point. This episode of The Daily Threat dives deep into the landmark April 2025 regulations that are reshaping how SMBs handle data breaches and cybersecurity compliance. We unpack the new mandatory disclosure rules that could make or break bus…
…
continue reading

1
Maryland's New IT Tax, Microsoft's Copilot Revolution, and Cynomi's Cybersecurity Growth Surge
12:12
12:12
Play later
Play later
Lists
Like
Liked
12:12Maryland has introduced a new 3% sales tax on data and information technology services, set to take effect on July 1, 2025. This legislation expands the definition of taxable services to include essential IT offerings such as cloud storage, IT consulting, and cybersecurity. Experts warn that this tax could lead to increased costs for businesses, po…
…
continue reading

1
The 2024 IC3 Report: Unpacking Record Cybercrime Losses
14:02
14:02
Play later
Play later
Lists
Like
Liked
14:02Join us as we delve into the key findings of the FBI's 2024 Internet Crime Complaint Center (IC3) Annual Report. This year marks the 25th anniversary of IC3, which serves as the primary destination for the public to report cyber-enabled crime and fraud. The report reveals a staggering new record for losses reported to IC3, totaling $16.6 billion in…
…
continue reading

1
DMA Fines Hit Meta & Apple | UK Law Firm Penalized | NOYB Slams GDPR Reform Proposal
12:04
12:04
Play later
Play later
Lists
Like
Liked
12:04Send us a text 📢 Privacy Corner Newsletter: April 24, 2025 🔹 EU Fines Meta & Apple Under DMA – The European Commission hits Meta with a €200M fine and Apple with €500M for violating the Digital Markets Act. This challenges the future of “consent-or-pay” models across Europe. 🔹 UK Law Firm Fined Over Ransomware Handling – ICO fines a UK law firm £60…
…
continue reading

1
Spamageddon Episode One Email After Hours x Do This, Not That
10:28
10:28
Play later
Play later
Lists
Like
Liked
10:28In today's episode, we'll tackle these myths: Are spam trigger words like “free” the reason your emails land in spam? What are Gmail and Yahoo’s bulk sender requirements? Once you've met these, is your deliverability safe? Do increased unsubscribes hurt your deliverability? Find out which myths hold true and which ones go up in flames in Episode 1 …
…
continue reading

1
E119: What you don't know about defending suspects of financial crime
34:56
34:56
Play later
Play later
Lists
Like
Liked
34:56Everyone has the right to a fair trial. That also includes: alleged shady oligarchs, bribers, money launderers, sanction evaders, and dodgy dealers. So: who represents them? You might imagine a Better Call Saul style situation – but your perception may be wrong. Our expert host, Marit Rødevand, is joined by Paul Felberg, Head of White Collar Defens…
…
continue reading

1
Ransomware Reloaded: U.S. Faces a Cybercrime Surge
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35FBI warns of rising ransomware attacks as small businesses and critical infrastructure remain prime targets.By QIT Solutions
…
continue reading

1
Zendesk Shifts to Outcome-Based Pricing; CISA Faces Resignations Amid Budget Cuts and Cyber Threats
15:31
15:31
Play later
Play later
Lists
Like
Liked
15:31Zendesk has made a significant shift in its pricing model by moving away from traditional seat licenses to an outcome-based pricing structure. This change, articulated by CEO Tom Eggemeier, means that customers will only pay when an AI agent successfully resolves a business problem. This approach aligns with a broader industry trend towards consump…
…
continue reading

1
AI explained: Introduction to Reed Smith's AI Glossary
14:56
14:56
Play later
Play later
Lists
Like
Liked
14:56Have you ever found yourself in a perplexing situation because of a lack of common understanding of key AI concepts? You're not alone. In this episode of "AI explained," we delve into Reed Smith's new Glossary of AI Terms with Reed Smith guests Richard Robbins, director of applied artificial intelligence, and Marcin Krieger, records and e-discovery…
…
continue reading

1
Webinar Audio - Implementing UOOM (Universal Opt-Out Signals), Consent, and other AdTech Compliance Issues.
50:29
50:29
Play later
Play later
Lists
Like
Liked
50:29Listen to Meru Data's podcast as we dive into the complexities of implementing Universal Opt-Out Mechanisms (UOOM) in today’s privacy landscape. In this insightful episode, Meru Data CEO and founder Priya Keshav leads a deep-dive conversation into the challenges and best practices around UOOM. As data privacy regulations tighten and scrutiny increa…
…
continue reading

1
The 2025 Cyber Crossroads: Balancing AI Innovation with IoT Security and Evolving Threats
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37Navigate the complex cybersecurity landscape of Q2 and Summer 2025 as we delve into the escalating convergence of AI-driven cyberattacks, the persistent vulnerabilities of the expanding Internet of Things (IoT), and the challenges of establishing robust security and governance frameworks. Based on recent Q1 2025 incident data and expert projections…
…
continue reading

1
Massive DeepSeek Data Breach Exposes AI Secrets—Are You Next?
3:17
3:17
Play later
Play later
Lists
Like
Liked
3:17In a shocking revelation, The Daily Threat exposes the massive data breach at DeepSeek, a prominent AI company, where over a million sensitive records were left completely unprotected on a public database. This gripping episode uncovers how a simple configuration error exposed critical chat logs, API keys, and backend metadata, turning the AI compa…
…
continue reading

1
Ransomware Hits SMBs Hard, Google OAuth Exploited, Gladinet's Security Flaw, and AI Scraping Issues
15:27
15:27
Play later
Play later
Lists
Like
Liked
15:27Ransomware attacks targeting small and medium-sized businesses (SMBs) have reached alarming levels, with a recent UK government survey revealing that 1% of organizations reported such incidents, affecting approximately 19,000 entities. This marks a significant increase from the previous year, highlighting a troubling trend where nation-state actors…
…
continue reading

1
Beyond the Blinky Lights: Why Security Governance Drives Technology with Bryant Tow
46:50
46:50
Play later
Play later
Lists
Like
Liked
46:50In this eye-opening episode of SecureTalk, host Justin Beals welcomes Bryant Tow, Chief Security Officer at LeapFrog Services, to discuss why technology alone can't solve cybersecurity challenges. Bryant reveals how the "Ring of Security" concept shows that up to half of your attack surface lies outside of technology—in governance, policies, people…
…
continue reading

1
E045 - Dialed In: Telemarketing, Compliance, and Consumer Protection
48:12
48:12
Play later
Play later
Lists
Like
Liked
48:12Telemarketing compliance isn’t exactly the hottest topic in tech circles… but maybe it should be. In this episode, Milou and Brian sit down with Kevin Mayfield, Manager of Marketing Compliance at CompliancePoint, to dig into the often-overlooked world of do-not-call laws, TCPA risks, and the real impact of telemarketing rules on tech companies (yes…
…
continue reading

1
2025 Q1 Cyber Shockwave: Ransomware Records, AI Threats, and the Regulatory Reckoning
21:31
21:31
Play later
Play later
Lists
Like
Liked
21:31The first four months of 2025 witnessed an alarming surge in global cybersecurity incidents, with ransomware attacks reaching unprecedented levels. Join us as we dissect the key trends, including the evolution of ransomware tactics like double extortion, the increasing sophistication of social engineering fueled by AI and deepfakes, and the persist…
…
continue reading

1
🚨Microsoft Entra Lockouts: A Token Logging Mishap Causes Chaos
3:38
3:38
Play later
Play later
Lists
Like
Liked
3:38Chaos erupts in the Microsoft Entra ecosystem as a simple logging mishap triggers widespread account lockouts across organizations. In this gripping episode of The Daily Threat, we dissect a critical incident where internal token logging practices inadvertently invalidated user credentials, exposing the fragile nature of identity management systems…
…
continue reading

1
SMBs Boost AI Budgets, Europe Shifts from US Cloud, US Manufacturing Sentiment Declines
11:46
11:46
Play later
Play later
Lists
Like
Liked
11:46Small to medium-sized businesses (SMBs) are increasingly turning to third-party service providers to enhance their capabilities in artificial intelligence (AI) and hybrid cloud solutions. A recent Forrester report, commissioned by Crayon, indicates that 31% of surveyed leaders from Australia, New Zealand, India, and Southeast Asia plan to combine i…
…
continue reading

1
Navigating Privacy Risks with the NIST Privacy Framework 1.1
16:59
16:59
Play later
Play later
Lists
Like
Liked
16:59This podcast delves into the NIST Privacy Framework 1.1, a voluntary tool developed to help organizations identify and manage privacy risk while fostering innovation and protecting individuals' privacy. We explore its three core components: Core, Organizational Profiles, and Tiers, and how they enable organizations to understand, assess, prioritize…
…
continue reading

1
Remote Access Gets a Reality Check and AnyDesk Patch Drops After Active Exploits
6:13
6:13
Play later
Play later
Lists
Like
Liked
6:13In this critical cybersecurity update, The Daily Threat dives deep into the latest AnyDesk vulnerability that’s sending shockwaves through remote access technology. Discover how a zero-day exploit could potentially compromise thousands of remote desktop sessions, giving attackers unprecedented control over business networks. Our experts break down …
…
continue reading

1
Beyond the Firewall: The Offensive Cybersecurity Edge
13:24
13:24
Play later
Play later
Lists
Like
Liked
13:24Dive into the dynamic world of offensive cybersecurity with insights from leading experts and real-world scenarios. We explore the critical role of techniques like penetration testing, adversary simulation, and red team exercises in proactively identifying vulnerabilities and strengthening defenses against evolving cyber threats. Understand how ado…
…
continue reading

1
How AI is Transforming Medical Translation: A Translator's Journey and Strategies with Jason Willis Lee
15:51
15:51
Play later
Play later
Lists
Like
Liked
15:51Jason Willis Lee, a specialized medical translator, discusses the impact of AI on the translation industry, particularly in the medical field. With a background in medicine and extensive experience in translating clinical trials, medical reports, and academic research, he has witnessed firsthand the disruption caused by AI technologies. While machi…
…
continue reading

1
AI on Trial: Decoding the Intersection of Artificial Intelligence and Harm
21:17
21:17
Play later
Play later
Lists
Like
Liked
21:17Explore the rapidly evolving landscape where artificial intelligence intersects with criminality and societal risks. Drawing on expert research, this podcast delves into the transformative potential of AI-enabled crime, from sophisticated financial fraud using deepfakes to the generation of child sexual abuse material, and the challenges this poses…
…
continue reading

1
AI Governance Insights: Legal, Ethical, and Data Strategies for Managed Service Providers with Brad Gross and Juliette Powell
39:19
39:19
Play later
Play later
Lists
Like
Liked
39:19The podcast features a discussion on the intersection of artificial intelligence (AI), law, and ethics, with insights from attorney Brad Gross and AI governance expert Juliette Powell. As AI becomes increasingly integrated into the services provided by managed service providers (MSPs) and technology companies, the risks associated with compliance a…
…
continue reading

1
Google's Ad Monopoly Ruling, AI Compliance Tools, and Apple's Privacy-First AI Strategy
14:23
14:23
Play later
Play later
Lists
Like
Liked
14:23A federal judge has ruled that Google acted illegally to maintain a monopoly in online advertising technology, which could lead to significant changes within the company. The ruling, made by Judge Leone Branchima of the U.S. District Court for the Eastern District of Virginia, found that Google unlawfully built dominance in the ad tech market, impa…
…
continue reading

1
Quantum Leap Security: Navigating the Post-Quantum Cryptography Era
9:45
9:45
Play later
Play later
Lists
Like
Liked
9:45We delve into the urgent need for organizations to prepare for the era of quantum computing, which threatens to break today's standard encryption methods. We examine the "harvest now, break later" (HNDL) threat, where malicious actors are already collecting encrypted data for future decryption by quantum computers. Drawing upon information from sou…
…
continue reading

1
HSCC Makes Bold Cyber Rx Move Before Congress - Ep 505
53:52
53:52
Play later
Play later
Lists
Like
Liked
53:52Imagine your hospital gets hacked—the MRIs are down, billing’s frozen, and suddenly you’re faxing patient records like it’s 1999. No, that’s not a “Twilight Zone” rerun—it’s real life in health care. This week, we’re diving into what the Health Sector Coordinating Council (HSCC) is doing about it, including their recent trip to Congress to lay it a…
…
continue reading

1
Microsoft Defender Cracks Down—You Can’t Turn It Off
3:03
3:03
Play later
Play later
Lists
Like
Liked
3:03Microsoft Defender is changing the game for cybersecurity, and IT professionals need to pay attention. In a bold move, Microsoft has removed the ability to disable real-time protection directly from the Windows Security app, forcing a more stringent security approach across organizations. This episode dives deep into the implications of this update…
…
continue reading

1
CVE Program Saved, CISA Nomination Blocked, OpenAI's AI Models Released, SolarWinds Goes Private
14:58
14:58
Play later
Play later
Lists
Like
Liked
14:58The U.S. government has renewed funding for the Common Vulnerabilities and Exposures (CVE) Program, a critical database for tracking cybersecurity flaws, just hours before its funding was set to expire. Established 25 years ago, the CVE program assigns unique identifiers to security vulnerabilities, facilitating consistent communication across the …
…
continue reading

1
Wage Inflation Trends, Remote Work Insights, and Retention Strategies for MSPs in 2025 with Peter Kujawa
22:51
22:51
Play later
Play later
Lists
Like
Liked
22:51Peter Kujawa from Service Leadership discusses the findings of the 2025 Annual IT Solution Provider Compensation Report, focusing on the trends in wage inflation and employee retention within the managed service provider (MSP) sector. The report reveals that wage inflation peaked in 2022 but has since improved, largely due to the cooling off of the…
…
continue reading

1
The AI and Influence Front - (dis/mis)Information
23:04
23:04
Play later
Play later
Lists
Like
Liked
23:04Explore the escalating threats posed by artificial intelligence incidents, sophisticated disinformation campaigns like the Doppelgänger network targeting nations from France to Israel, and the cyber espionage activities of threat actors such as UAC-0050 and UAC-0006 as revealed by Intrinsec's analysis. We delve into the tactics, infrastructure, and…
…
continue reading

1
Vibe Coding: Creativity Meets Risk in the Age of AI-Driven Development | A Conversation with Izar Tarandach | Redefining CyberSecurity with Sean Martin
35:52
35:52
Play later
Play later
Lists
Like
Liked
35:52⬥GUEST⬥ Izar Tarandach, Sr. Principal Security Architect for a large media company | On LinkedIn: https://www.linkedin.com/in/izartarandach/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ In …
…
continue reading

1
Crisis-Proof Your Email Campaigns: Adeola Sole's Contingency Blueprint
28:37
28:37
Play later
Play later
Lists
Like
Liked
28:37In this episode of Email After Hours, hosts Danielle Gallant and Guy Hanson welcome Adeola Sole, an expert in CRM and email marketing, to explore the critical aspects of contingency planning in email campaigns and how to handle unexpected challenges like a pro. What You'll Learn: - How to build a comprehensive contingency plan that covers multiple …
…
continue reading

1
Re-Spin: The dark secrets of North Korea's cyber army
36:30
36:30
Play later
Play later
Lists
Like
Liked
36:30For the Easter break – we are diving into The Laundry archives and bringing you one of our favourite episodes of the podcast to date! In this episode: our expert host, Marit Rødevand, is joined by Geoff White, investigative journalist, to reveal: The dark secrets of North Korea's cyber army. The pair discuss explore the inner workings of the elite …
…
continue reading
This podcast we are exploring the critical cybersecurity challenges facing today's interconnected urban environments. We delve into the evolving threats arising from smart city infrastructure and the Internet of Things (IoT), including ransomware attacks on critical infrastructure, the expanded attack surface created by interconnected devices, and …
…
continue reading

1
How Privacy Engineers Deliver ROI | #BridgePrivacySummit
28:14
28:14
Play later
Play later
Lists
Like
Liked
28:14Send us a text Privacy engineering is a growing field that requires a blend of regulatory knowledge and technical skills. Privacy engineers are tasked with collaborating across privacy and engineering teams to ensure compliance while maintaining technical excellence. In this panel, experienced privacy engineers share how they built their expertise,…
…
continue reading

1
Analysis and Lessons from Kiteworks Top 11 Data Breaches in 2024 Report
51:45
51:45
Play later
Play later
Lists
Like
Liked
51:45In this insightful episode, cybersecurity experts Mike Crandall and Arun DeSouza join host Patrick Spencer to analyze Kiteworks' Top 11 Data Breaches in 2024 Report. Rather than just focusing on the number of records breached, the report introduces a sophisticated algorithm with seven key factors to score breaches on a scale of 1-10. This method pr…
…
continue reading

1
AI Code Hallucinations Risk Security, Intel Sells Altera, SSL Certificates Shortened, Tariffs Return
13:31
13:31
Play later
Play later
Lists
Like
Liked
13:31AI-powered code generation tools are raising significant security concerns within the software supply chain. Recent research indicates that a notable percentage of package suggestions from both commercial and open-source models are non-existent, a phenomenon referred to as "hallucination." This issue allows malicious actors to exploit these fictiti…
…
continue reading

1
How AI Governance Tools Put Policy into Practice in Canada and Chile
21:13
21:13
Play later
Play later
Lists
Like
Liked
21:13There’s no shortage of principles and policies for governing AI from governments and NGOs around the world. But how do they put those principles and policies into practice? It’s that practical side of AI governance that has been a key focus of our work at World Privacy Forum for more than two years. Rather than look only at government policies, in …
…
continue reading

1
From Burning Servers to Enterprise Resilience: The Evolution of Internet Security With Akamai
45:39
45:39
Play later
Play later
Lists
Like
Liked
45:39In this eye-opening episode of SecureTalk, host Justin Beals welcomes Joe Gronemeyer, Solutions Engineer at Akamai Technologies, for a masterclass in how internet security has evolved from basic content delivery to sophisticated edge protection powering 30% of global web traffic. From stories of literally burning servers in 1999 to today's quantum-…
…
continue reading

1
AI vs. the Expanding Attack Surface: Proactive Defense Strategies
18:07
18:07
Play later
Play later
Lists
Like
Liked
18:07Is your attack surface spiraling out of control with multi-cloud, SaaS, and third-party integrations? Join us as we delve into how AI-powered automation is becoming critical for modern Attack Surface Management (ASM). We'll explore the challenges organizations face in achieving comprehensive visibility and how AI provides viable solutions for enhan…
…
continue reading

1
E044 - Digital Hostage Crisis (Brian goes SOLO for an episode)
28:53
28:53
Play later
Play later
Lists
Like
Liked
28:53In this episode of Socializing Security, Brian goes SOLO for an episode and breaks down the complex world of cybersecurity, exploring how cyber warfare, espionage, and ransomware are reshaping the digital landscape. From real-world impacts of data breaches to the silent threat of cyber spies, we uncover why your personal security matters more than …
…
continue reading

1
Economic Turmoil: Tariffs Hit Small Businesses Hard While CIOs Push Cloud Spending Beyond Limits
18:03
18:03
Play later
Play later
Lists
Like
Liked
18:03The podcast discusses the significant impact of recent tariff policies on the technology sector and small businesses in the U.S. Consumer sentiment has sharply declined, with a notable 11% drop reported in April, driven by fears of rising inflation and economic uncertainty. The Trump administration's decision to exempt certain electronics from new …
…
continue reading