The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
A regular conversation with those at the convergence of data privacy, data security, data regulation, records, and governance.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Hosted by Carlos L Chacon, the SQL Data Partners Podcast focuses on Microsoft data platform related topics mixed with a sprinkling of professional development. Carlos and guests discuss new and familiar features and ideas and how you might apply them in your environments. Visit our website for episode show notes at marathonus.com/podcast and leave a comment if you have a topic you think we should discuss. We’ll see YOU on the SQL Trail.
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
A podcast on the journey to discovery through data in information security by Bob Rudis & Jay Jacobs
…
continue reading
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
…
continue reading

1
Healthcare NOW Radio Podcast Network - Discussions on healthcare including technology, innovation, policy, data security, telehealth and more. Visit HealthcareNOWRadio.com
Healthcare NOW Radio and Podcast Network - Radio and Podcasts for the Healthcare Industry
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
…
continue reading
Cybersecurity, compliance, security policy enforcement, and data privacy remain constant concerns, and a breach could irrevocably impact the profitability and sustainability of your company. Join Maurice Hamilton, CEO of Infinavate, each week as he interviews CEOs and CIOs to discuss real-life solutions to cybersecurity, data management, and advanced digital solutions. If you have concerns about cybersecurity, compliance, security policy enforcement, and data privacy, this podcast is for you ...
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
For those who are interested in the hottest field in a technology world. Whether you are a professional who wants to learn more about privacy, data protection, or cyber law or someone who just finds this fascinating, we have topics for you from data management to cybersecurity to social justice and data ethics and AI. In-depth information on serious privacy topics. This podcast, hosted by Dr. K Royal, Paul Breitbarth and Ralph O'Brien, features open, unscripted discussions with global privac ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Welcome to "The Interconnectedness of Things," the podcast where we explore the seamless integration of technology in our modern world. Hosted by Dr. Andrew Hutson and Emily Nava of QFlow Systems, each episode delves into the dynamic interplay of enterprise solutions, innovative software, and the transformative power of technology in various industries. With expert insights, real-world case studies, and thoughtful discussions, "The Interconnectedness of Things" offers a comprehensive look at ...
…
continue reading
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Covering everything from the future of organizational culture to accelerated cloud adoption, in this inaugural podcast series, Splunk thought leaders sit down with Principal Analyst Daniel Newman to discuss the unique intricacies organizations are navigating in an era of rapid digital transformation and how data remains the key solution to thriving in uncertain times.
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Signal Jam is a podcast about regaining and maintaining privacy in the face of pervasive corporate and government surveillance. Co-hosts, Jay and Michael, discuss practical steps that anyone can take toward achieving that outcome— no matter how 'tech-savvy' they may be.
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth, Bailey Harmon, and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Master the CompTIA Server+ exam with Audio Course—your audio companion for server hardware, administration, security, and troubleshooting. Every episode simplifies exam objectives into practical insights you can apply in real-world IT environments. Produced by BareMetalCyber.com, where you’ll find more prepcasts, books, and resources to power your certification success.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
A series of episodes that look at databases and the world from a data professional's viewpoint. Written and recorded by Steve Jones, editor of SQLServerCentral and The Voice of the DBA.
…
continue reading
DTX Unplugged delves into the major challenges and innovations shaping business transformation, embodying our event's focus on the critical intersection of people, process, and technology. While rooted in the DTX ethos, this will be an industry-focused platform, tackling key issues, spotlighting groundbreaking innovations, and raising awareness for important topics across the sector.
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
The Water Data Podcast is a talk show on the science, systems, and stories of water hosted by Veena Srinivasan. Every other Tuesday, sit down and listen to researchers, innovators, government officials and business leaders working on the forefront of water systems. Veena Srinivasan is an award-winning socio-hydrologist as well as the founder and Executive Director of WELL Labs, a water systems research and innovation centre based in Bengaluru, India. The Water Data Podcast features discussio ...
…
continue reading
computer help free. blogtvpccareman
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Welcome to a podcast that dives deep into the fascinating crossroads of data, AI, privacy, and cybersecurity. Hosted by data and AI expert Kate Carruthers, this series explores the cutting-edge frontiers of our digital world, where data is forging an entirely new economy. Tune in to stay ahead of the curve and uncover the opportunities, challenges, and innovations shaping our future.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading

1
Health Cent$: Mark Gaunya Founding Principal & CEO, Captivated Health: Principal, Borislow I
28:43
28:43
Play later
Play later
Lists
Like
Liked
28:43On this episode, host Adam Russo welcomes Mark Gaunya, Founding Principal & CEO, Captivated Health; Principal, Borislow Insurance.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and …
…
continue reading

1
#84 - Is Your Data Secure When You Use AI?
28:52
28:52
Play later
Play later
Lists
Like
Liked
28:52Is Your Data Secure When You Use AI? Navy intel veteran, engineer, and attorney Cordell Robinson reveals how AI handles your data, what to share, and practical steps to protect privacy, comply with standards, and avoid mistakes.By Extra Something Media
…
continue reading

1
Exploring Rowhammer, ECC, and the Future of Secure Data Storage with JB Baker
43:13
43:13
Play later
Play later
Lists
Like
Liked
43:13Welcome to a brand new episode of To The Point Cybersecurity, brought to you by Forcepoint! This week, hosts Rachael Lyon and Jonathan Knepher dive into a side of cybersecurity that doesn’t often get the spotlight: the ever-evolving world of memory, storage, and hardware security. They’re joined by JB Baker, Vice President of Marketing and Product …
…
continue reading
This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company. A newly identified Chinese APT group has been observed deploying a sophisticated, fileless malware framework called EggStreme against a…
…
continue reading
Send us a text On this episode of Serious Privacy, Paul Breitbarth brings us news from the Global Privacy Assembly held in Korea and Dr. K Royal has fun with privacy trivia! Ralph O'Brien is out this week. Open offer to all fans... if you answered all the questions correctly, send oneof us your address and we will send you a sticker for playing Tri…
…
continue reading
CISA gives federal agencies 24 hours to patch a critical Cisco firewall bug. Researchers uncover the first known malicious MCP server used in a supply chain attack. The New York SIM card threat may have been overblown. Microsoft tags a new variant of the XCSSET macOS malware. An exposed auto insurance claims database puts PII at risk. Amazon will p…
…
continue reading

1
68. The ADA Website Lawsuit Trap That's Bankrupting Small Businesses
31:35
31:35
Play later
Play later
Lists
Like
Liked
31:35Hosts: Justin Shelley - https://www.phoenixitadvisors.com/ | Mario Zaki - https://www.mazteck.com/ Small businesses making under $500K are the #1 target for ADA website compliance lawsuits - and most business owners have never heard of this threat. In this eye-opening episode, Justin and Mario break down the "digital ambulance chasing" epidemic tha…
…
continue reading
Today marks the launch of RecordPoint's new AI governance solution, RexCommand, a free tool to operationalize AI policy, enforce governance across the AI lifecycle, and prove compliance, all from one platform. RecordPoint's Head of Product Joe Pearce joins the podcast to talk through what we've built, the problems it solves, and how RexCommand help…
…
continue reading

1
Digital Health Talks: Virtual Care in Acute Settings From Observation to Nursing
28:33
28:33
Play later
Play later
Lists
Like
Liked
28:33Virtual Care in Acute Settings: From Observation to Nursing - Technology Solutions for Hospital Risk PreventionJoin Dr. Christine Gall from Colette Health as she explores how virtual care platforms are transforming acute care delivery in hospitals and health systems. Starting with virtual observation as the entry point for falls prevention and pati…
…
continue reading
I get a regular email from Quora, with questions that I might be able to answer or might be of interest to me. There are some database questions, some Tesla ones, and others, but recently I caught an interesting one that asked: why are most people broke? To be fair, there are a lot of questions that appear to be trolling, not people seeking answers…
…
continue reading

1
Why Cybersecurity Training Isn’t Working — And What To Do Instead | Human-Centered Cybersecurity Series with Co-Host Julie Haney and Guest Dr. Aunshul Rege | Redefining CyberSecurity with Sean Martin
45:26
45:26
Play later
Play later
Lists
Like
Liked
45:26⬥GUEST⬥ Aunshul Rege, Director at The CARE Lab at Temple University | On Linkedin: https://www.linkedin.com/in/aunshul-rege-26526b59/ ⬥CO-HOST⬥ Julie Haney, Computer scientist and Human-Centered Cybersecurity Program Lead, National Institute of Standards and Technology | On LinkedIn: https://www.linkedin.com/in/julie-haney-037449119/ ⬥HOST⬥ Host: S…
…
continue reading
Fortra flags a critical flaw in its GoAnywhere Managed File Transfer (MFT) solution. Cisco patches a critical vulnerability in its IOS and IOS XE software. Cloudflare thwarts yet another record DDoS attack. Rhysida ransomware gang claims the Maryland Transit cyberattack. The new “Obscura” ransomware strain spreads via domain controllers. Retailers’…
…
continue reading

1
AI Agents for Privacy: Automating PIAs, Contract Risk & Website Compliance | Privado.ai
48:03
48:03
Play later
Play later
Lists
Like
Liked
48:03Send us a text Manual privacy work is breaking under new regulations. Watch how Privado.ai’s AI Agents for Privacy replace repetitive tasks with automation — giving privacy teams real-time risk visibility and compliance proof. 🔹 Assessment Agent – Auto-populate PIAs, DPIAs & RoPAs by analyzing product docs, JIRA tickets & technical specs. 🔹 Contrac…
…
continue reading
Companeros, all good things must come to an end. While the details of what is next is uncertain, my time with the podcast is coming to an end. A quick thank you and a glimpse of what is next.
…
continue reading

1
How Can Security Vendors Better Stand Out?
37:33
37:33
Play later
Play later
Lists
Like
Liked
37:33All links and images can be found on CISO Series. Check out this post by David Mundy of Tuskira for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining them is Jason Taule, CISO, Luminis Health. In this episo…
…
continue reading

1
3 Biggest Cybersecurity Threats & What IT Leaders Need To Know
36:04
36:04
Play later
Play later
Lists
Like
Liked
36:04Cybersecurity isn’t just about firewalls and passwords anymore. It’s an all-out battle where hackers run businesses with customer support desks, insider threats can be disguised as your newest hire, and artificial intelligence is both the weapon and the shield. In this special episode of IT Visionaries, host Chris Brandt switches roles and sits in …
…
continue reading
This week, while Dave Bittner is out, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and …
…
continue reading
British authorities arrest a man in connection with the Collins Aerospace ransomware attack. CISA says attackers breached a U.S. federal civilian executive branch agency last year. Researchers uncover two high-severity vulnerabilities in Supermicro server motherboards. A Las Vegas casino operator confirms a cyber attack. Analysts track multiple lar…
…
continue reading

1
Tackling Turnover with Smart Automation: Upholding the Mission in Government
28:35
28:35
Play later
Play later
Lists
Like
Liked
28:35Share Your Thoughts With Us! In this episode of The Interconnectedness of Things, host Emily Nava sits down with Dr. Andrew Hutson, COO of QFlow Systems, to explore how federal agencies can stay mission-focused amid workforce challenges like staff turnover, early retirements, and shrinking budgets. They unpack the concept of “corporate amnesia” cau…
…
continue reading

1
Q&A: The Risks of Cloud-Based Password Managers
33:26
33:26
Play later
Play later
Lists
Like
Liked
33:26Q&A240: Are there any good reasons not to use a cloud-based password manager? Which phone should you use for a day job? What routers do we recommend? These questions and more on this week's Q&A. Join our next Q&A on Patreon: https://www.patreon.com/collection/415684?view=expanded or XMR Chat: https://xmrchat.com/surveillancepod Welcome to the Surve…
…
continue reading

1
InfoSec Beat: Inside Avanade – Protecting the Enterprise with the Microsoft Platform
27:05
27:05
Play later
Play later
Lists
Like
Liked
27:05As CISO of Avanade—a joint venture between Accenture and Microsoft—Bob Bruns is in a unique position. He has firsthand insight into Microsoft’s security roadmap from both implementation and innovation perspectives. In this episode, Bob shares his thinking on key security topics with Accenture CISO Kris Burkhardt. Listen to a CISO-to-CISO discussion…
…
continue reading

1
Risky Business #808 -- Insane megabug in Entra left all tenants exposed
52:37
52:37
Play later
Play later
Lists
Like
Liked
52:37On this week’s show Patrick Gray and special guest Rob Joyce discuss the week’s cybersecurity news, including: Secret Service raids a SIM farm in New York MI6 launches a dark web portal Are the 2023 Scattered Spider kids finally getting their comeuppance? Production halt continues for Jaguar Land Rover GitHub tightens its security after Shai-Hulud …
…
continue reading

1
SN 1044: The EU's Online Age Verification - Consumer Reports vs. Microsoft
3:01:56
3:01:56
Play later
Play later
Lists
Like
Liked
3:01:56Consumer Reports on Windows 10 updates. Waste (not fraud or abuse) within DoD Cyberoperations. China's DeepSeek produces deliberately flawed code. WebAssembly v3.0 officially released. Firefox v143 updates and new features. Firefox for Android now offers DoH. A nearly terminal flaw in Microsoft's Entra ID. Chrome hits its 6th 0-day this year. Emerg…
…
continue reading

1
Managing Vendor Incidents with Mandi Walls
31:45
31:45
Play later
Play later
Lists
Like
Liked
31:45You're down - is it your servers, or someone else's? While at the Kansas City Developers Conference, Richard sits down with Mandi Walls from Pager Duty about her experiences dealing with incidents involving vendor services. It might be your cloud provider, or some other SaaS element of a pipeline, or even an open-source library dependency in an imp…
…
continue reading

1
What's My Tagline?: Video Podcasting – Changing How We Think about Traditional Podcasting
26:49
26:49
Play later
Play later
Lists
Like
Liked
26:49On this episode Carol chats with good friend and colleague, Jared Johnson, Marketing & Digital Transformation Advisor and Founder, of the Healthcare Rap Podcast & Community. He joins her to talk about how YouTube, Apple and Spotify and the rise of video podcasting, are changing our traditional views about podcasting. Learn more about Jared Johnson …
…
continue reading
As I get older, I find that time is the most valuable commodity I have. It's the one thing that I need more of, but I can't get it. Even if I find more efficient ways of doing things, it seems there's an endless list of things at work and on the ranch that need to be done. It seems to be the same for most of my friends in other jobs, whether in med…
…
continue reading
The Secret Service dismantles an illegal network. Jaguar Land Rover (JLR) extends the shutdown production plants. The EU probes tech giants over online scams. Iranian APT Nimbus Manticore expands operations in Europe. North Korean Kimsuky deploys a shortcut-based espionage campaign. Github and Ruby Central roll out supply-chain security upgrades. L…
…
continue reading

1
Breaking Down the Human Side of Advanced Cyber Attacks and Social Engineering with Margaret Cunningham Part 2
41:36
41:36
Play later
Play later
Lists
Like
Liked
41:36Welcome back to To the Point Cybersecurity! In this episode, hosts Rachael Lyon and Jonathan Knepher continue their fascinating conversation with Dr. Margaret Cunningham, Technical Director of Security and AI Strategy at Darktrace. With a background in applied experimental psychology and deep expertise in human-centered security, Dr. Cunningham div…
…
continue reading
Please enjoy this encore of Word Notes. A subset of security orchestration, the management of identities across an organization's set of digital islands. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestrationBy N2K Networks
…
continue reading

1
The existing state of regulation. [CISO Perspectives]
39:30
39:30
Play later
Play later
Lists
Like
Liked
39:30Regulation is a double-edged sword. While it helps create structure, establish accountability, and set standards, it also creates unnecessary hurdles, slower response times, and overly rigid systems. With every administration, policy goals and subsequently regulatory stances change, which can have major impacts on business operations. In this episo…
…
continue reading

1
Unscripted the AMCP Podcast: AMCP Special Edition with Susan Cantrell
28:10
28:10
Play later
Play later
Lists
Like
Liked
28:10On this milestone episode of Unscripted, the AMCP Podcast, they celebrate the 30th anniversary of the Journal of Managed Care & Specialty Pharmacy (JMCP). Host Susan Cantrell, AMCP CEO, is joined by Laura Happe, PharmD, MPH, Editor-in-Chief of JMCP, and Pat Gleason, PharmD, BCPS, FCCP, FAMCP, Assistant Vice President, Health Outcomes at Prime Thera…
…
continue reading

1
HealthLaw HotSpot: Terms of Use and Privacy Policies: Protecting Your Healthcare Practice
13:44
13:44
Play later
Play later
Lists
Like
Liked
13:44Host Ericka Adler welcomes Roetzel shareholder Scott Brown for an insightful discussion about protecting your healthcare practice online. They explore why clear, customized Terms of Use and Privacy Policies are essential for any healthcare website or app, and how these documents work together to safeguard your practice and your users. Episode highl…
…
continue reading

1
Ask the Educator: Are Your Endoscopes Dry?
15:30
15:30
Play later
Play later
Lists
Like
Liked
15:30With endoscopy under the spotlight, one of the toughest challenges departments face is proper drying. On this episode, they sit down with Healthmark’s endoscopy specialist, Dyan Darga, to unpack best practices and key takeaways from her July 2025 webinar on endoscope drying.Find all of our network podcasts on your favorite podcast platforms and be …
…
continue reading

1
Revenue Cycle Optimized: Agentic AI in Action, Live Demo of the Document Capture AI Platform
31:12
31:12
Play later
Play later
Lists
Like
Liked
31:12Manual intake workflows are one of the biggest slowdowns in healthcare. Every day, staff spend hours chasing down documents, retyping data, or figuring out what’s missing—before a patient can even be scheduled. In this episode, Stuart Newsome, VP of RCM Insights at Infinx, shows how agentic AI can change that.Find all of our network podcasts on you…
…
continue reading

1
Brutally Honest Security | Episode 1: September 22, 2025
2:25:01
2:25:01
Play later
Play later
Lists
Like
Liked
2:25:01When it comes to cybersecurity, sugarcoating is not an option. Brutally Honest Security cuts through the noise with raw, unfiltered insights from Eric Taylor — a seasoned digital forensics and incident response (DFIR) expert known for his “no-holds-barred” style. Each episode dives straight into the heart of information security: 🔥 Ransomware updat…
…
continue reading
A major ransomware attack disrupts airport operations across Europe. Congress is on the verge of letting major cyber legislation expire. A critical flaw nearly allowed total compromise of every Entra ID tenant. Automaker Stellantis confirms a data breach. Fortra patches a critical flaw in its GoAnywhere MFT software. Europol leads a major operation…
…
continue reading
Here are the stories we discuss this week: https://natlawreview.com/article/qantas-airways-cuts-executive-pay-after-cyber-incident-governance-signal-industry https://www.securityweek.com/ransomware-losses-climb-as-ai-pushes-phishing-to-new-heights https://www.bleepingcomputer.com/news/security/hackers-left-empty-handed-after-massive-npm-supply-chai…
…
continue reading
In our quest to clean up and secure our data, today I will give you several clever and useful techniques for uncovering old, forgotten online accounts. We’ll scrape the bottom of the barrel to complete our list of accounts so that we can upgrade their security, see what data they have, and remove anything we no longer want floating around out there…
…
continue reading

1
Cybersecurity News: Grok AI Hijacked for Malware, Wi-Fi Heart Rate Hacks, Starlink Competition
14:39
14:39
Play later
Play later
Lists
Like
Liked
14:39Cybercriminals are exploiting X's Grok AI to bypass ad protections and spread malware to millions—while researchers discover your home Wi-Fi can now monitor your heart rate. This week's news breakdown covers the attack vectors you need to know about. Join co-hosts Joshua Schmidt, Eric Brown, and Nick Mellem as they dive into the latest cybersecurit…
…
continue reading
I studied economics in university, which isn't that close to database work, though I did have to work through linear regression problems by hand. I always enjoyed mathematics, so this wasn't a hardship. Until I purchased a PC that was capable of letting me do graphs and calculations in PASCAL and BASIC. Then I realized that my enjoyment wasn't that…
…
continue reading

1
Roselle Safran: So much opportunity. [Entrepreneur] [Career Notes]
8:37
8:37
Play later
Play later
Lists
Like
Liked
8:37Please enjoy this encore of Career Notes. CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again. With a degree in civil engineering, Roselle veered off into a more technical role at a startup and she says "caught the startup bug." After convincing a hiring mana…
…
continue reading

1
The Healthtech Marketing Show: AI Quick Take: Mastering Prompt Engineering
22:38
22:38
Play later
Play later
Lists
Like
Liked
22:38AI Quick Take: Mastering Prompt EngineeringOn this episode host Adam Turinas explores the critical concept of prompt engineering. This skill is fundamental in transforming how you use AI tools like ChatGPT, Claude, and Perplexity in your professional work. Most people are using these robust AI systems like glorified search engines, but to unlock th…
…
continue reading

1
PopHealth Week: From Battlefield to Beckley: Neil Markey on Psychedelics, PTSD, and Purpose
27:28
27:28
Play later
Play later
Lists
Like
Liked
27:28Join guest host Jim Tate and Gregg Masters for a compelling special series exploring the frontiers of psychedelics—where legal, ceremonial, and therapeutic contexts intersect with public health innovation. On this episode, they sit down with Neil Markey, Co‑Founder and CEO of Beckley Retreats, to uncover how their immersive, legally sanctioned five…
…
continue reading
S1E4: AI in Remote Patient CareOn this episode, host Dr. Heather Bassett welcomes board certified OB-GYN, Dr. Eve Cunningham, Chief Medical Officer at Cadence. Evs is a nationally recognized leader and passionate about virtual care, and remote patient monitoring with a particular focus on how AI can support those models, she also co-founded Medpear…
…
continue reading

1
VBC Insights: Concierge Medicine and the Law: Insights for Full and Hybrid Practices
27:37
27:37
Play later
Play later
Lists
Like
Liked
27:37Host Dan Marino is joined by Christina Kuta, a healthcare attorney specializing in regulatory and transactional healthcare law. Together, they explore the growing shift toward concierge medicine and address common misperceptions surrounding full and hybrid concierge models. They discuss key legal and contractual considerations—ranging from commerci…
…
continue reading

1
Browser attacks without downloads. [Research Saturday]
21:45
21:45
Play later
Play later
Lists
Like
Liked
21:45Today we are joined by Nati Tal, Head of Guardio Labs, discussing their work “CAPTCHAgeddon” or unmasking the viral evolution of the ClickFix browser-based threat. CAPTCHAgeddon — Shaked Chen’s deep dive into the ClickFix fake-captcha wave — reveals how a red-team trick morphed into a dominant, download-free browser threat that tricks users into pa…
…
continue reading

1
Trending NOW: Lamont Thurston, Founder and CEO of BENERē
26:57
26:57
Play later
Play later
Lists
Like
Liked
26:57S3E10: What's Trending NOW is Reinventing Supplemental Health Benefits: How Group Captive Insurance Creates Transparency and Returns Value to Employees. On this episode host Shahid Shah is joined by Lamont Thurston, founder and CEO of BENERē, a company that is changing the way people think about supplemental coverage, one claim at a time. Lamont sh…
…
continue reading