show episodes
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
  continue reading
 
Artwork

1
Browsing Security

LayerX Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
  continue reading
 
Artwork

1
Pod Save the UK

Crooked Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Pod Save the UK is your weekly fix of political news, big ideas and a shot of inspiration. Each week hosts, comedian Nish Kumar and journalist Coco Khan are joined by politicians, experts, and famous friends to unpick the latest news, look for solutions, and inspire action. From Crooked Media – the creators of Pod Save America – in partnership with Reduced Listening, tune in to new episodes of Pod Save the UK every Thursday wherever you pod.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Security Unlocked presents The BlueHat Podcast From 2020 to 2022, Security Unlocked, hosted by Nic Fillingham and Natalia Godyla, explored the technology and people powering Microsoft's Security solutions. Today, the Security Unlocked feed brings you new episodes from The BlueHat Podcast where hosts Nic Fillingham and Wendy Zenone speak with security researchers, responders, hackers and industry leaders, both inside and outside of Microsoft, working to secure the planet's technology and crea ...
  continue reading
 
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
  continue reading
 
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
  continue reading
 
Artwork

1
Foreign Policy Live

Foreign Policy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
Artwork

1
Philosophize This!

Stephen West

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Beginner friendly if listened to in order! For anyone interested in an educational podcast about philosophy where you don't need to be a graduate-level philosopher to understand it. In chronological order, the thinkers and ideas that forged the world we live in are broken down and explained.
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
  continue reading
 
Artwork

1
Farm Gate

ffinlo Costain

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The regenerative agriculture podcast, in search of practical solutions for ecological security. Produced by 8point9: https://www.8point9.com Farming news, regenerative farming, agroecology, land use, natural capital, land news
  continue reading
 
HawkShield is a Singapore-based, data and network security provider. We offer AI-powered data security and privacy services to companies of different sizes and industries. Contact us today. https://www.hawkshield.ai/
  continue reading
 
Artwork
 
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
  continue reading
 
Artwork

1
Dirty South Security Podcast

VerSprite Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
  continue reading
 
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your ...
  continue reading
 
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
  continue reading
 
Artwork

1
AWS Podcast

Amazon Web Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
  continue reading
 
Ken Tumolo and his son Nick Tumolo join you on the Tumolo Financial Radio to offer solutions and strategies for your retirement needs. With decades of financial experience, Ken and Nick offer tax recommendations, Social Security maximization, wealth management, retirement income planning and much more.
  continue reading
 
Talking Security is your go-to podcast for everything related to Microsoft Security and DevSecOps. Hosted by Frans Oudendorp and Pouyan Khabazi, we dive deep into topics like Microsoft Defender, Entra, Intune, Zero Trust, identity protection, security automation, and secure development practices. In each episode, we engage with Microsoft MVPs, product team members, and security experts to explore real-world challenges, practical solutions, and the latest innovations across the Microsoft Secu ...
  continue reading
 
Artwork

1
Retirement Solutions - The Podcast

Tyson Thacker and Ryan Thacker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Retirement Solutions – The Podcast, with Tyson Thacker and Ryan Thacker, where precision meets purpose. This B.O.S.S. podcast is committed to “Building the Optimal System of Security.” Learn how you could craft the ideal retirement blueprint that surpasses mere wealth accumulation. Explore the nuances of retirement planning with expert insights, as Tyson and Ryan navigate the ever-evolving landscape of investments, insurance solutions, and financial planning for retirees and pre-r ...
  continue reading
 
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
  continue reading
 
For many of us, the workplace is more than a single building or facility. That’s what makes workforce IAM so powerful. By managing security through something we all take wherever we go — our identities — it gives users the flexibility they need to stay productive and enables administrators to quickly detect and address risks. HID’s robust, flexible workforce identity and access management solutions provide your workforce with seamless access to the resources they need — no matter where they are.
  continue reading
 
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
  continue reading
 
Artwork

1
Dear America Podcast

Dear America Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Dear America Podcast! Join Chad Prather, alongside his co-hosts Todd Spears, and Tony Estrada for a rollicking take on Conservative politics. This trio brings their unique perspectives, sharp wit, and down-home charm to the table as they tackle the latest issues facing the nation. From border security to gun rights, no topic is off-limits for Chad, Todd, and Tony as they serve up unfiltered opinions with a side of humor. Tune in for a wild ride through the heart of conservativ ...
  continue reading
 
Artwork
 
Akita Security Services in Bedford provides top-tier security solutions, including retail security, K9 protection, event security, and night patrols. Our expert team ensures 24/7 safety, delivering professional and reliable security tailored to your needs. Your safety, our priority.
  continue reading
 
Artwork

1
CollisionCast

FenderBender

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
CollisionCast is the premier collision repair industry podcast, helping shop owners and operators improve their businesses with real-world solutions to common problems, delivered by leading industry experts and elite shop leaders.
  continue reading
 
Artwork

1
How to Fix the Internet

Electronic Frontier Foundation (EFF)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
  continue reading
 
Artwork
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Artwork

1
Simply ICS Cyber

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
  continue reading
 
Gregg MacInnis, Owner and President of Gmac Family Financial, joins you on Countdown to Retirement to offer up innovative financial strategies, solutions, security, and overall financial health. Listen as Gregg talks about his passion to serve his community and break down financial planning for your retirement.
  continue reading
 
Artwork

1
CloudNext

GlobalDots

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
CloudNext is your go-to source for cloud innovation and leaders' insight. Your way to stay up-to-date with the latest trends and innovations critical to Cloud, Security, and DevOps success. Pick the brains of C-level executives of renowned companies in tech, sharing their stories of innovation and personal growth. Explore their transformative insights as they fuse personal narratives with strategic advice, revealing how to achieve technological solutions for the challenges & pain points in t ...
  continue reading
 
Artwork

1
IT Service Provider

Managed IT Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Blueprint Synergy Solutions stands out as a trusted IT service provider committed to delivering end-to-end technology solutions that align with modern business needs. With a deep focus on reliability, efficiency, and scalability, the company supports organisations of all sizes with tailored IT services that reduce downtime, enhance data security, and streamline operations. From infrastructure setup and cloud integration to IT support and managed services, Blueprint Synergy Solutions ensures ...
  continue reading
 
Loading …
show series
 
Star Link Communication is revolutionizing workforce management by offering AI-powered facial recognition systems to eliminate proxy attendance and ensure data accuracy. To support a smooth upgrade from outdated fingerprint systems, the company provides buyback options. Responding to client feedback, Star Link has enhanced device durability with re…
  continue reading
 
In this episode of Talking Cloud, I speak with Adi Golan, Vice President of Skyhawk Security, discussing the evolution of cloud security, the challenges faced in the industry, and the innovative solutions being developed to enhance security measures. We explore the role of AI and machine learning in cybersecurity, the complexities of CNAPP, and the…
  continue reading
 
With next-generation vehicles rapidly transforming into software-defined platforms powered by High-Performance Computers (HPCs), the approach to automotive security is fundamentally changing. These powerful central processors are critical for everything from infotainment to autonomous driving, but their consolidation also creates a significant sing…
  continue reading
 
Check out our sponsors: ✅ Birch Gold - Text CHAD to 989898 Episode Description: Lay Bricks with One Hand and Fight with the Other: In this raw and relentless episode of The Chad Prather Show, Chad dives deep into the fire with a message straight from the book of Nehemiah: Real leaders don’t wait for calm—they build right in the middle of chaos. Thi…
  continue reading
 
SPONSORS: https://www.birchgold.com/ Text: DEAR to 989898 ✉️Subscribe to the Newsletter!! https://newsletter.grahamallen.com/ 👉 Follow Us on Social Media: • 𝕏 ✍️: https://twitter.com/GrahamAllen_1 • Instagram 📸: https://www.instagram.com/grahamallen1 • Facebook 👍: https://www.facebook.com/GrahamAllenOfficial/ • TikTok 🎬: https://www.tiktok.com/@the…
  continue reading
 
Public-interest journalism speaks truth to power, so protecting press freedom is part of protecting democracy. But what does it take to digitally secure journalists’ work in an environment where critics, hackers, oppressive regimes, and others seem to have the free press in their crosshairs? That’s what Harlo Holmes focuses on as Freedom of the Pre…
  continue reading
 
When it comes to retirement, some of the most meaningful memories are made through travel. In this episode, Tyson and Ryan Thacker sit down once again with Laura Murdoch of Morris Columbus Travel to uncover how retirees can explore the world with confidence, comfort, and joy. From secret beaches in Thailand to polar bear sightings in Canada, Laura …
  continue reading
 
Vertical vs Horizontal Scaling: What’s the Difference and When to Use Each https://knowledge.businesscompassllc.com/vertical-vs-horizontal-scaling-whats-the-difference-and-when-to-use-each/ Ever stood in front of your application architecture and thought, “Should I build up or build out?” You’re not alone. Tech leads everywhere face this scaling di…
  continue reading
 
Mastering ACID in Databases: Atomicity, Consistency, Isolation & Durability https://knowledge.businesscompassllc.com/mastering-acid-in-databases-atomicity-consistency-isolation-durability/ Ever lost three hours of database work because of one tiny error? Trust me, you’re not alone. That moment when everything crashes and your perfectly structured d…
  continue reading
 
What Is a Data Pipeline? Why It’s Crucial for Modern Data Engineering https://knowledge.businesscompassllc.com/what-is-a-data-pipeline-why-its-crucial-for-modern-data-engineering/ Ever try drinking from a fire hose? That’s essentially what companies without proper data pipelines are doing with their information—drowning in a torrent they can’t poss…
  continue reading
 
Kafka vs RabbitMQ vs Pulsar vs Others: A Deep Dive into Modern Message Queues https://knowledge.businesscompassllc.com/kafka-vs-rabbitmq-vs-pulsar-vs-others-a-deep-dive-into-modern-message-queues/ You’ve been agonizing over which message queue to pick for your distributed system, haven’t you? Welcome to the club—87% of architects report spending we…
  continue reading
 
Session vs JWT Explained: Security, Scalability, and Performance Compared https://knowledge.businesscompassllc.com/session-vs-jwt-explained-security-scalability-and-performance-compared/ Ever been slammed with a “token expired” message right when you’re about to complete a critical transaction? Or maybe your app crashed because the authentication s…
  continue reading
 
Mastering Linux Performance: Essential Tools for Monitoring and Optimization https://knowledge.businesscompassllc.com/mastering-linux-performance-essential-tools-for-monitoring-and-optimization/ Your server’s running fine today, but what about tomorrow when it’s processing 3x the load? Or when that new update triggers a memory leak you didn’t see c…
  continue reading
 
HTTP/1.1, HTTP/2, and HTTP/3 Compared: Speed, Security, and Performance Explained https://knowledge.businesscompassllc.com/http-1-1-http-2-and-http-3-compared-speed-security-and-performance-explained/ Ever been stuck waiting for a web page to load and wondered why the internet feels like it’s running on dial-up? The culprit might be the very backbo…
  continue reading
 
The Science of Search Engines: How Google Finds What You Need https://knowledge.businesscompassllc.com/the-science-of-search-engines-how-google-finds-what-you-need/ Ever googled something and wondered, “How the heck did it know what I wanted?” You’re not alone. Every day, Google processes over 8.5 billion searches from people desperately seeking an…
  continue reading
 
Introduction to Generative AI: How Machines Create Text, Art, and More https://knowledge.businesscompassllc.com/introduction-to-generative-ai-how-machines-create-text-art-and-more/ Ever watched an AI generate a Renaissance-style portrait of your pet goldfish in under 10 seconds? Five years ago, that would’ve sounded like science fiction. Now it’s j…
  continue reading
 
Web Applications Explained: A Comprehensive Guide for Beginners and Developers https://knowledge.businesscompassllc.com/web-applications-explained-a-comprehensive-guide-for-beginners-and-developers/ Ever stared at your favorite app and wondered, “How the heck does this actually work?” You’re not alone. Millions of people use web applications daily …
  continue reading
 
In this episode of Threat Vector, host David Moulton sits down with Tyler Shields, Principal Analyst at ESG, entrepreneur, and cybersecurity marketing expert, to discuss the fine line between thought leadership and echo chambers in the industry. Tyler breaks down what true thought leadership looks like, how marketing can cut through the noise, and …
  continue reading
 
What if everything we’ve been doing in cybersecurity awareness training is not just outdated — but harmful? In this episode of Reimagining Cyber, Rob Aragao, Chief Security Strategist at OpenText, talks with Craig Taylor, co-founder and CISO at CyberHoot, who makes a bold claim: punishment-based training is not only ineffective — it’s counterproduc…
  continue reading
 
Security Business Editor-in-Chief Paul Rothman is live at ESX 2025 with David Morgan of Security Dealer Marketing for a show floor snapshot about AI and changing marketing strategies for security integrators. Security Dealer Marketing provides security dealers with the strategies they need to market their brands. David Morgan, Vice President and co…
  continue reading
 
SPONSORS: Home Title Lock: Go to https://www.hometitlelock.com/ And use code GRAHAM Call American Financing today and start feeling that relief. 888-675-forty ninety Or visit www.AmericanFinancing.Net/Chad ✉️Subscribe to the Newsletter!! https://newsletter.grahamallen.com/ 👉 Follow Us on Social Media: • 𝕏 ✍️: https://twitter.com/GrahamAllen_1 • Ins…
  continue reading
 
Check out our sponsors: ✅ Birch Gold - Text CHAD to 989898 ✅ Allied Oil - https://alliedoilfield.com/ Episode Description: In Part 2 of the Stand Your Ground series, Chad Prather delivers a no-excuses message that’ll punch fear in the face: If you’re still clinging to Plan B, you’re not committed to Plan A. Drawing from the story of Elisha, Chad un…
  continue reading
 
In this episode of the Defending The Edge Podcast with DefendEdge, we discuss the recent cyber attacks from ConnestWise to Google Calendar. In a recent update, CISA has updated the way of reporting, and the intelligence community is aiming to create a shared threat actor glossary. Deepfake technology is becoming increasingly advanced and alarming. …
  continue reading
 
SSH Explained: How Secure Shell Works Behind the Scenes https://knowledge.businesscompassllc.com/ssh-explained-how-secure-shell-works-behind-the-scenes/ Ever clicked “connect” to a remote server and wondered what magic happens next? While you’re sipping coffee, SSH is frantically encrypting your data, swapping cryptographic keys, and building secur…
  continue reading
 
How API Pagination Makes Scrolling Through Billions of Products Seamless https://knowledge.businesscompassllc.com/how-api-pagination-makes-scrolling-through-billions-of-products-seamless/ Ever tried loading a page with a billion results? Your browser would literally catch fire, your RAM would scream for mercy, and you’d be staring at a spinning whe…
  continue reading
 
Apache Kafka Basics Explained – Topics, Brokers, and Event Streams https://knowledge.businesscompassllc.com/apache-kafka-basics-explained-topics-brokers-and-event-streams/ Ever stared at a massive firehose of data wondering how on earth companies like Netflix handle millions of streaming events per second without imploding? That’s where Apache Kafk…
  continue reading
 
SDK vs API: What They Are and How They Work Together https://knowledge.businesscompassllc.com/sdk-vs-api-what-they-are-and-how-they-work-together/ You’re staring at a chunk of code, pulling your hair out, wondering why your app integration keeps failing. The culprit? Confusion between SDKs and APIs that’s costing you precious development time.…
  continue reading
 
Load Balancers Explained – What They Are and Why They Matter in System Design https://knowledge.businesscompassllc.com/load-balancers-explained-what-they-are-and-why-they-matter-in-system-design/ Ever tried to push through those stadium turnstiles when 60,000 fans are rushing in for kickoff? That’s your server without load balancing – overwhelmed, …
  continue reading
 
The Role of Docker in System Design – Scalability, Portability & Speed https://knowledge.businesscompassllc.com/the-role-of-docker-in-system-design-scalability-portability-speed/ Ever found yourself wrestling with the same code that runs perfectly on your machine but crashes spectacularly in production? You’re not alone. That frustrating “but it wo…
  continue reading
 
Understanding Garbage Collectors in Java, Python & Go – Key Differences & Mechanisms https://knowledge.businesscompassllc.com/understanding-garbage-collectors-in-java-python-go-key-differences-mechanisms/ Ever spent three hours debugging an app that kept crashing, only to realize it was running out of memory because your garbage collector couldn’t …
  continue reading
 
What Are AI Agents? A Deep Dive into the Brains Behind Autonomous Systems https://knowledge.businesscompassllc.com/what-are-ai-agents-a-deep-dive-into-the-brains-behind-autonomous-systems/ Ever had your phone recommend the perfect song, or watched a self-driving car smoothly navigate traffic? Behind those magical moments are AI agents – and they’re…
  continue reading
 
Most Popular API Architecture Styles Compared: REST, GraphQL, gRPC & More https://knowledge.businesscompassllc.com/most-popular-api-architecture-styles-compared-rest-graphql-grpc-more/ Ever stared at your screen, wondering why your API choice is making your developers want to quit? You’re not alone. A recent survey showed 68% of tech leads regret t…
  continue reading
 
GraphQL Demystified – Single Endpoint, Efficient Payloads, and Frontend Freedom https://knowledge.businesscompassllc.com/graphql-demystified-single-endpoint-efficient-payloads-and-frontend-freedom/ Ever been stuck waiting for multiple endpoints to load while your UI looks like a half-finished puzzle? You’re not alone. 75% of frontend developers rep…
  continue reading
 
All links and images can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is Alex Hall, CISO, Gensler. In this episode: Evaluating secure messaging beyond the app Reframing compliance as a business enabler Incremental security inv…
  continue reading
 
What do flip phones and retirement planning have in common? Simplicity. Ken and Nick Tumolo explore how ditching smartphones can improve mental health—and how simplifying your finances can do the same. From consolidating 19 accounts into 6, to avoiding costly beneficiary mistakes, they share real stories and practical tips for streamlining your ret…
  continue reading
 
Can large carnivores become an asset rather than a liability for livestock farmers? Could there be a net benefit for farmers sharing their landscapes? ...And were wolves really single-handedly responsible for changing the shape of the rivers in Yellowstone National Park? ffinlo Costain meets Jonny Hanson, Nuffield Scholar, and author of Living with…
  continue reading
 
Conflict broke out between Israel and Iran on Friday, with Israel launching an attack on Iran’s nuclear and military facilities and Iran responding in turn. Vali Nasr, a Middle East expert and professor at Johns Hopkins University, sits down with Ravi Agrawal to discuss. Nasr is the author, most recently, of Iran’s Grand Strategy: A Political Histo…
  continue reading
 
Check out our sponsors: ✅ Patriot Protect - http://patriot-protect.com/chad ✅ Allied Oil - https://alliedoilfield.com/ Episode Description: In this powerful kickoff to the Stand Your Ground series, Chad Prather lays it all on the line with a message every warrior-hearted man and woman needs to hear: You weren’t created to blend in—you were born to …
  continue reading
 
SPONSORS: https://www.birchgold.com/ Text: DEAR to 989898 Home Title Lock: Go to https://www.hometitlelock.com/ And use code GRAHAM ✉️Subscribe to the Newsletter!! https://newsletter.grahamallen.com/ 👉 Follow Us on Social Media: • 𝕏 ✍️: https://twitter.com/GrahamAllen_1 • Instagram 📸: https://www.instagram.com/grahamallen1 • Facebook 👍: https://www…
  continue reading
 
SPONSORS: Go to https://www.blackoutcoffee.com/ for NON-WOKE Coffee!! https://www.birchgold.com/ Text: DEAR to 989898 ✉️Subscribe to the Newsletter!! https://newsletter.grahamallen.com/ 👉 Follow Us on Social Media: • 𝕏 ✍️: https://twitter.com/GrahamAllen_1 • Instagram 📸: https://www.instagram.com/grahamallen1 • Facebook 👍: https://www.facebook.com/…
  continue reading
 
Explore FSx for Lustre's new intelligent storage tiering that delivers cost savings and unlimited scalability for file storage in the cloud. Plus, discover how the new Model Context Protocol (MCP) servers are revolutionizing AI-assisted development across ECS, EKS, and serverless platforms with real-time contextual responses and automated resource …
  continue reading
 
Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
  continue reading
 
Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
  continue reading
 
As cyber threats grow more advanced, traditional security methods are no longer sufficient. AI-powered enterprise data protection solutions offer smarter, faster, and safer defense by continuously monitoring activity, predicting threats, and automating responses. Singapore-based HawkShield leads in this space with its AI-driven platform that protec…
  continue reading
 
CAP Theorem Explained: Choosing the Right Database for Distributed Systems https://knowledge.businesscompassllc.com/cap-theorem-explained-choosing-the-right-database-for-distributed-systems/ Ever spent an entire weekend debugging a distributed database issue only to discover it’s not a bug but a fundamental trade-off you never considered? You’re no…
  continue reading
 
Centralized vs Distributed Systems: Key Concepts Explained with Java Example https://knowledge.businesscompassllc.com/centralized-vs-distributed-systems-key-concepts-explained-with-java-example/ Ever spent hours debugging a distributed system only to wish you’d gone with a simpler centralized approach? Or maybe you built a monolith that’s now buckl…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play