Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
…
continue reading
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
…
continue reading
Pod Save the UK is your weekly fix of political news, big ideas and a shot of inspiration. Each week hosts, comedian Nish Kumar and journalist Coco Khan are joined by politicians, experts, and famous friends to unpick the latest news, look for solutions, and inspire action. From Crooked Media – the creators of Pod Save America – in partnership with Reduced Listening, tune in to new episodes of Pod Save the UK every Thursday wherever you pod.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Security Unlocked presents The BlueHat Podcast From 2020 to 2022, Security Unlocked, hosted by Nic Fillingham and Natalia Godyla, explored the technology and people powering Microsoft's Security solutions. Today, the Security Unlocked feed brings you new episodes from The BlueHat Podcast where hosts Nic Fillingham and Wendy Zenone speak with security researchers, responders, hackers and industry leaders, both inside and outside of Microsoft, working to secure the planet's technology and crea ...
…
continue reading
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Beginner friendly if listened to in order! For anyone interested in an educational podcast about philosophy where you don't need to be a graduate-level philosopher to understand it. In chronological order, the thinkers and ideas that forged the world we live in are broken down and explained.
…
continue reading
Star Link emphasizes in providing corporate organizations with all types of biometric attendance system & access control system and all most all types of softwares to speed up HRs, Admin & Top Most Management with smooth an effective workflow.
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
The regenerative agriculture podcast, in search of practical solutions for ecological security. Produced by 8point9: https://www.8point9.com Farming news, regenerative farming, agroecology, land use, natural capital, land news
…
continue reading
HawkShield is a Singapore-based, data and network security provider. We offer AI-powered data security and privacy services to companies of different sizes and industries. Contact us today. https://www.hawkshield.ai/
…
continue reading
Latest internet technology, trends, and solutions
…
continue reading
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
…
continue reading
We will be doing podcasts about data storage, backup & disaster recovery, and cloud storage solutions
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your ...
…
continue reading
We will discuss all things Cloud with an emphasis on Cloud Security.
…
continue reading
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
Ken Tumolo and his son Nick Tumolo join you on the Tumolo Financial Radio to offer solutions and strategies for your retirement needs. With decades of financial experience, Ken and Nick offer tax recommendations, Social Security maximization, wealth management, retirement income planning and much more.
…
continue reading
Take a listen to the #LighthouseITPodcast every other week as we discuss both cybersecurity and digital marketing news! It's time to stop dreaming IT. Let's start doing IT. #GetLITS
…
continue reading
Talking Security is your go-to podcast for everything related to Microsoft Security and DevSecOps. Hosted by Frans Oudendorp and Pouyan Khabazi, we dive deep into topics like Microsoft Defender, Entra, Intune, Zero Trust, identity protection, security automation, and secure development practices. In each episode, we engage with Microsoft MVPs, product team members, and security experts to explore real-world challenges, practical solutions, and the latest innovations across the Microsoft Secu ...
…
continue reading
Welcome to Retirement Solutions – The Podcast, with Tyson Thacker and Ryan Thacker, where precision meets purpose. This B.O.S.S. podcast is committed to “Building the Optimal System of Security.” Learn how you could craft the ideal retirement blueprint that surpasses mere wealth accumulation. Explore the nuances of retirement planning with expert insights, as Tyson and Ryan navigate the ever-evolving landscape of investments, insurance solutions, and financial planning for retirees and pre-r ...
…
continue reading
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
…
continue reading
For many of us, the workplace is more than a single building or facility. That’s what makes workforce IAM so powerful. By managing security through something we all take wherever we go — our identities — it gives users the flexibility they need to stay productive and enables administrators to quickly detect and address risks. HID’s robust, flexible workforce identity and access management solutions provide your workforce with seamless access to the resources they need — no matter where they are.
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
Welcome to the Dear America Podcast! Join Chad Prather, alongside his co-hosts Todd Spears, and Tony Estrada for a rollicking take on Conservative politics. This trio brings their unique perspectives, sharp wit, and down-home charm to the table as they tackle the latest issues facing the nation. From border security to gun rights, no topic is off-limits for Chad, Todd, and Tony as they serve up unfiltered opinions with a side of humor. Tune in for a wild ride through the heart of conservativ ...
…
continue reading
Akita Security Services in Bedford provides top-tier security solutions, including retail security, K9 protection, event security, and night patrols. Our expert team ensures 24/7 safety, delivering professional and reliable security tailored to your needs. Your safety, our priority.
…
continue reading
CollisionCast is the premier collision repair industry podcast, helping shop owners and operators improve their businesses with real-world solutions to common problems, delivered by leading industry experts and elite shop leaders.
…
continue reading
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
…
continue reading
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
…
continue reading
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
…
continue reading

1
Cybersecurity, Privacy, Risk Management, Cryptocurrencies, Fintech, Information Technology
Shahid Sharif
Career guidance & consulting services in Information Technology, Cybersecurity, Privacy, Risk Management, Cryptocurrencies, & Fintech #self improvement # productivity #cybersecurity #security #privacy #risk #fintech #blockchain #cryptocurrencies
…
continue reading
Gregg MacInnis, Owner and President of Gmac Family Financial, joins you on Countdown to Retirement to offer up innovative financial strategies, solutions, security, and overall financial health. Listen as Gregg talks about his passion to serve his community and break down financial planning for your retirement.
…
continue reading
CloudNext is your go-to source for cloud innovation and leaders' insight. Your way to stay up-to-date with the latest trends and innovations critical to Cloud, Security, and DevOps success. Pick the brains of C-level executives of renowned companies in tech, sharing their stories of innovation and personal growth. Explore their transformative insights as they fuse personal narratives with strategic advice, revealing how to achieve technological solutions for the challenges & pain points in t ...
…
continue reading
Blueprint Synergy Solutions stands out as a trusted IT service provider committed to delivering end-to-end technology solutions that align with modern business needs. With a deep focus on reliability, efficiency, and scalability, the company supports organisations of all sizes with tailored IT services that reduce downtime, enhance data security, and streamline operations. From infrastructure setup and cloud integration to IT support and managed services, Blueprint Synergy Solutions ensures ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading

1
Smart Solutions for Real Attendance & Access Challenges
4:29
4:29
Play later
Play later
Lists
Like
Liked
4:29Star Link Communication is revolutionizing workforce management by offering AI-powered facial recognition systems to eliminate proxy attendance and ensure data accuracy. To support a smooth upgrade from outdated fingerprint systems, the company provides buyback options. Responding to client feedback, Star Link has enhanced device durability with re…
…
continue reading

1
79-Talking Cloud Podcast-with Adi Golan, Vice President, Solution Engineering, Skyhawk.Security
1:12:01
1:12:01
Play later
Play later
Lists
Like
Liked
1:12:01In this episode of Talking Cloud, I speak with Adi Golan, Vice President of Skyhawk Security, discussing the evolution of cloud security, the challenges faced in the industry, and the innovative solutions being developed to enhance security measures. We explore the role of AI and machine learning in cybersecurity, the complexities of CNAPP, and the…
…
continue reading

1
Automotive HPC Security Challenges and Solutions - Ep 22
22:14
22:14
Play later
Play later
Lists
Like
Liked
22:14With next-generation vehicles rapidly transforming into software-defined platforms powered by High-Performance Computers (HPCs), the approach to automotive security is fundamentally changing. These powerful central processors are critical for everything from infotainment to autonomous driving, but their consolidation also creates a significant sing…
…
continue reading

1
Part 3: Build While Under Fire | Stop Waiting For Peace To Start Building Your Purpose!
30:36
30:36
Play later
Play later
Lists
Like
Liked
30:36Check out our sponsors: ✅ Birch Gold - Text CHAD to 989898 Episode Description: Lay Bricks with One Hand and Fight with the Other: In this raw and relentless episode of The Chad Prather Show, Chad dives deep into the fire with a message straight from the book of Nehemiah: Real leaders don’t wait for calm—they build right in the middle of chaos. Thi…
…
continue reading

1
What Would WWIII ACTUALLY Look Like… And How Does It End?! + NYC Dem ARRESTED For Fighting ICE!!
1:16:46
1:16:46
Play later
Play later
Lists
Like
Liked
1:16:46SPONSORS: https://www.birchgold.com/ Text: DEAR to 989898 ✉️Subscribe to the Newsletter!! https://newsletter.grahamallen.com/ 👉 Follow Us on Social Media: • 𝕏 ✍️: https://twitter.com/GrahamAllen_1 • Instagram 📸: https://www.instagram.com/grahamallen1 • Facebook 👍: https://www.facebook.com/GrahamAllenOfficial/ • TikTok 🎬: https://www.tiktok.com/@the…
…
continue reading

1
Securing Journalism on the ‘Data-Greedy’ Internet
39:02
39:02
Play later
Play later
Lists
Like
Liked
39:02Public-interest journalism speaks truth to power, so protecting press freedom is part of protecting democracy. But what does it take to digitally secure journalists’ work in an environment where critics, hackers, oppressive regimes, and others seem to have the free press in their crosshairs? That’s what Harlo Holmes focuses on as Freedom of the Pre…
…
continue reading

1
Hidden Gems, Comfort, and Confidence in Retirement Travel with Laura Murdoch
21:42
21:42
Play later
Play later
Lists
Like
Liked
21:42When it comes to retirement, some of the most meaningful memories are made through travel. In this episode, Tyson and Ryan Thacker sit down once again with Laura Murdoch of Morris Columbus Travel to uncover how retirees can explore the world with confidence, comfort, and joy. From secret beaches in Thailand to polar bear sightings in Canada, Laura …
…
continue reading

1
Vertical vs Horizontal Scaling: What’s the Difference and When to Use Each
17:37
17:37
Play later
Play later
Lists
Like
Liked
17:37Vertical vs Horizontal Scaling: What’s the Difference and When to Use Each https://knowledge.businesscompassllc.com/vertical-vs-horizontal-scaling-whats-the-difference-and-when-to-use-each/ Ever stood in front of your application architecture and thought, “Should I build up or build out?” You’re not alone. Tech leads everywhere face this scaling di…
…
continue reading

1
Mastering ACID in Databases: Atomicity, Consistency, Isolation & Durability
22:37
22:37
Play later
Play later
Lists
Like
Liked
22:37Mastering ACID in Databases: Atomicity, Consistency, Isolation & Durability https://knowledge.businesscompassllc.com/mastering-acid-in-databases-atomicity-consistency-isolation-durability/ Ever lost three hours of database work because of one tiny error? Trust me, you’re not alone. That moment when everything crashes and your perfectly structured d…
…
continue reading

1
What Is a Data Pipeline? Why It’s Crucial for Modern Data Engineering
17:11
17:11
Play later
Play later
Lists
Like
Liked
17:11What Is a Data Pipeline? Why It’s Crucial for Modern Data Engineering https://knowledge.businesscompassllc.com/what-is-a-data-pipeline-why-its-crucial-for-modern-data-engineering/ Ever try drinking from a fire hose? That’s essentially what companies without proper data pipelines are doing with their information—drowning in a torrent they can’t poss…
…
continue reading

1
Kafka vs RabbitMQ vs Pulsar vs Others: A Deep Dive into Modern Message Queues
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22Kafka vs RabbitMQ vs Pulsar vs Others: A Deep Dive into Modern Message Queues https://knowledge.businesscompassllc.com/kafka-vs-rabbitmq-vs-pulsar-vs-others-a-deep-dive-into-modern-message-queues/ You’ve been agonizing over which message queue to pick for your distributed system, haven’t you? Welcome to the club—87% of architects report spending we…
…
continue reading

1
Session vs JWT Explained: Security, Scalability, and Performance Compared
16:48
16:48
Play later
Play later
Lists
Like
Liked
16:48Session vs JWT Explained: Security, Scalability, and Performance Compared https://knowledge.businesscompassllc.com/session-vs-jwt-explained-security-scalability-and-performance-compared/ Ever been slammed with a “token expired” message right when you’re about to complete a critical transaction? Or maybe your app crashed because the authentication s…
…
continue reading

1
Mastering Linux Performance: Essential Tools for Monitoring and Optimization
15:23
15:23
Play later
Play later
Lists
Like
Liked
15:23Mastering Linux Performance: Essential Tools for Monitoring and Optimization https://knowledge.businesscompassllc.com/mastering-linux-performance-essential-tools-for-monitoring-and-optimization/ Your server’s running fine today, but what about tomorrow when it’s processing 3x the load? Or when that new update triggers a memory leak you didn’t see c…
…
continue reading

1
HTTP/1.1, HTTP/2, and HTTP/3 Compared: Speed, Security, and Performance Explained
14:28
14:28
Play later
Play later
Lists
Like
Liked
14:28HTTP/1.1, HTTP/2, and HTTP/3 Compared: Speed, Security, and Performance Explained https://knowledge.businesscompassllc.com/http-1-1-http-2-and-http-3-compared-speed-security-and-performance-explained/ Ever been stuck waiting for a web page to load and wondered why the internet feels like it’s running on dial-up? The culprit might be the very backbo…
…
continue reading

1
The Science of Search Engines: How Google Finds What You Need
13:39
13:39
Play later
Play later
Lists
Like
Liked
13:39The Science of Search Engines: How Google Finds What You Need https://knowledge.businesscompassllc.com/the-science-of-search-engines-how-google-finds-what-you-need/ Ever googled something and wondered, “How the heck did it know what I wanted?” You’re not alone. Every day, Google processes over 8.5 billion searches from people desperately seeking an…
…
continue reading

1
Introduction to Generative AI: How Machines Create Text, Art, and More
14:37
14:37
Play later
Play later
Lists
Like
Liked
14:37Introduction to Generative AI: How Machines Create Text, Art, and More https://knowledge.businesscompassllc.com/introduction-to-generative-ai-how-machines-create-text-art-and-more/ Ever watched an AI generate a Renaissance-style portrait of your pet goldfish in under 10 seconds? Five years ago, that would’ve sounded like science fiction. Now it’s j…
…
continue reading

1
Web Applications Explained: A Comprehensive Guide for Beginners and Developers
17:46
17:46
Play later
Play later
Lists
Like
Liked
17:46Web Applications Explained: A Comprehensive Guide for Beginners and Developers https://knowledge.businesscompassllc.com/web-applications-explained-a-comprehensive-guide-for-beginners-and-developers/ Ever stared at your favorite app and wondered, “How the heck does this actually work?” You’re not alone. Millions of people use web applications daily …
…
continue reading

1
Cut the Noise, Ditch the Nonsense, Earn the Trust
33:55
33:55
Play later
Play later
Lists
Like
Liked
33:55In this episode of Threat Vector, host David Moulton sits down with Tyler Shields, Principal Analyst at ESG, entrepreneur, and cybersecurity marketing expert, to discuss the fine line between thought leadership and echo chambers in the industry. Tyler breaks down what true thought leadership looks like, how marketing can cut through the noise, and …
…
continue reading

1
Shock, Punish, Repeat: How Not to Train Humans for Cyber Risk
17:48
17:48
Play later
Play later
Lists
Like
Liked
17:48What if everything we’ve been doing in cybersecurity awareness training is not just outdated — but harmful? In this episode of Reimagining Cyber, Rob Aragao, Chief Security Strategist at OpenText, talks with Craig Taylor, co-founder and CISO at CyberHoot, who makes a bold claim: punishment-based training is not only ineffective — it’s counterproduc…
…
continue reading

1
ESX Exclusive: Smart Marketing for Security Dealers with SD Marketing VP David Morgan
23:08
23:08
Play later
Play later
Lists
Like
Liked
23:08Security Business Editor-in-Chief Paul Rothman is live at ESX 2025 with David Morgan of Security Dealer Marketing for a show floor snapshot about AI and changing marketing strategies for security integrators. Security Dealer Marketing provides security dealers with the strategies they need to market their brands. David Morgan, Vice President and co…
…
continue reading

1
ARE WE AT WAR?! Trump Prepares to Attack IRAN!! + Tucker Turns on Trump!!
1:11:35
1:11:35
Play later
Play later
Lists
Like
Liked
1:11:35SPONSORS: Home Title Lock: Go to https://www.hometitlelock.com/ And use code GRAHAM Call American Financing today and start feeling that relief. 888-675-forty ninety Or visit www.AmericanFinancing.Net/Chad ✉️Subscribe to the Newsletter!! https://newsletter.grahamallen.com/ 👉 Follow Us on Social Media: • 𝕏 ✍️: https://twitter.com/GrahamAllen_1 • Ins…
…
continue reading

1
Part 2: Burn the Plow | Go All In or Stay Stuck Forever!
30:23
30:23
Play later
Play later
Lists
Like
Liked
30:23Check out our sponsors: ✅ Birch Gold - Text CHAD to 989898 ✅ Allied Oil - https://alliedoilfield.com/ Episode Description: In Part 2 of the Stand Your Ground series, Chad Prather delivers a no-excuses message that’ll punch fear in the face: If you’re still clinging to Plan B, you’re not committed to Plan A. Drawing from the story of Elisha, Chad un…
…
continue reading
In this episode of the Defending The Edge Podcast with DefendEdge, we discuss the recent cyber attacks from ConnestWise to Google Calendar. In a recent update, CISA has updated the way of reporting, and the intelligence community is aiming to create a shared threat actor glossary. Deepfake technology is becoming increasingly advanced and alarming. …
…
continue reading

1
SSH Explained: How Secure Shell Works Behind the Scenes
15:29
15:29
Play later
Play later
Lists
Like
Liked
15:29SSH Explained: How Secure Shell Works Behind the Scenes https://knowledge.businesscompassllc.com/ssh-explained-how-secure-shell-works-behind-the-scenes/ Ever clicked “connect” to a remote server and wondered what magic happens next? While you’re sipping coffee, SSH is frantically encrypting your data, swapping cryptographic keys, and building secur…
…
continue reading

1
How API Pagination Makes Scrolling Through Billions of Products Seamless
17:31
17:31
Play later
Play later
Lists
Like
Liked
17:31How API Pagination Makes Scrolling Through Billions of Products Seamless https://knowledge.businesscompassllc.com/how-api-pagination-makes-scrolling-through-billions-of-products-seamless/ Ever tried loading a page with a billion results? Your browser would literally catch fire, your RAM would scream for mercy, and you’d be staring at a spinning whe…
…
continue reading

1
Apache Kafka Basics Explained – Topics, Brokers, and Event Streams
14:08
14:08
Play later
Play later
Lists
Like
Liked
14:08Apache Kafka Basics Explained – Topics, Brokers, and Event Streams https://knowledge.businesscompassllc.com/apache-kafka-basics-explained-topics-brokers-and-event-streams/ Ever stared at a massive firehose of data wondering how on earth companies like Netflix handle millions of streaming events per second without imploding? That’s where Apache Kafk…
…
continue reading

1
SDK vs API: What They Are and How They Work Together
17:59
17:59
Play later
Play later
Lists
Like
Liked
17:59SDK vs API: What They Are and How They Work Together https://knowledge.businesscompassllc.com/sdk-vs-api-what-they-are-and-how-they-work-together/ You’re staring at a chunk of code, pulling your hair out, wondering why your app integration keeps failing. The culprit? Confusion between SDKs and APIs that’s costing you precious development time.…
…
continue reading

1
Load Balancers Explained – What They Are and Why They Matter in System Design
17:09
17:09
Play later
Play later
Lists
Like
Liked
17:09Load Balancers Explained – What They Are and Why They Matter in System Design https://knowledge.businesscompassllc.com/load-balancers-explained-what-they-are-and-why-they-matter-in-system-design/ Ever tried to push through those stadium turnstiles when 60,000 fans are rushing in for kickoff? That’s your server without load balancing – overwhelmed, …
…
continue reading

1
The Role of Docker in System Design – Scalability, Portability & Speed
10:13
10:13
Play later
Play later
Lists
Like
Liked
10:13The Role of Docker in System Design – Scalability, Portability & Speed https://knowledge.businesscompassllc.com/the-role-of-docker-in-system-design-scalability-portability-speed/ Ever found yourself wrestling with the same code that runs perfectly on your machine but crashes spectacularly in production? You’re not alone. That frustrating “but it wo…
…
continue reading

1
Understanding Garbage Collectors in Java, Python & Go – Key Differences & Mechanisms
14:16
14:16
Play later
Play later
Lists
Like
Liked
14:16Understanding Garbage Collectors in Java, Python & Go – Key Differences & Mechanisms https://knowledge.businesscompassllc.com/understanding-garbage-collectors-in-java-python-go-key-differences-mechanisms/ Ever spent three hours debugging an app that kept crashing, only to realize it was running out of memory because your garbage collector couldn’t …
…
continue reading

1
What Are AI Agents? A Deep Dive into the Brains Behind Autonomous Systems
19:17
19:17
Play later
Play later
Lists
Like
Liked
19:17What Are AI Agents? A Deep Dive into the Brains Behind Autonomous Systems https://knowledge.businesscompassllc.com/what-are-ai-agents-a-deep-dive-into-the-brains-behind-autonomous-systems/ Ever had your phone recommend the perfect song, or watched a self-driving car smoothly navigate traffic? Behind those magical moments are AI agents – and they’re…
…
continue reading

1
Most Popular API Architecture Styles Compared: REST, GraphQL, gRPC & More
16:45
16:45
Play later
Play later
Lists
Like
Liked
16:45Most Popular API Architecture Styles Compared: REST, GraphQL, gRPC & More https://knowledge.businesscompassllc.com/most-popular-api-architecture-styles-compared-rest-graphql-grpc-more/ Ever stared at your screen, wondering why your API choice is making your developers want to quit? You’re not alone. A recent survey showed 68% of tech leads regret t…
…
continue reading

1
GraphQL Demystified – Single Endpoint, Efficient Payloads, and Frontend Freedom
16:31
16:31
Play later
Play later
Lists
Like
Liked
16:31GraphQL Demystified – Single Endpoint, Efficient Payloads, and Frontend Freedom https://knowledge.businesscompassllc.com/graphql-demystified-single-endpoint-efficient-payloads-and-frontend-freedom/ Ever been stuck waiting for multiple endpoints to load while your UI looks like a half-finished puzzle? You’re not alone. 75% of frontend developers rep…
…
continue reading

1
We Checked the “Yes” Box for Cybersecurity. What Else Do We Have to Do?
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24All links and images can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is Alex Hall, CISO, Gensler. In this episode: Evaluating secure messaging beyond the app Reframing compliance as a business enabler Incremental security inv…
…
continue reading

1
Why Flip Phones Might Save Your Retirement
12:11
12:11
Play later
Play later
Lists
Like
Liked
12:11What do flip phones and retirement planning have in common? Simplicity. Ken and Nick Tumolo explore how ditching smartphones can improve mental health—and how simplifying your finances can do the same. From consolidating 19 accounts into 6, to avoiding costly beneficiary mistakes, they share real stories and practical tips for streamlining your ret…
…
continue reading
Can large carnivores become an asset rather than a liability for livestock farmers? Could there be a net benefit for farmers sharing their landscapes? ...And were wolves really single-handedly responsible for changing the shape of the rivers in Yellowstone National Park? ffinlo Costain meets Jonny Hanson, Nuffield Scholar, and author of Living with…
…
continue reading

1
How the Iran-Israel Conflict Is Reshaping the Middle East
42:26
42:26
Play later
Play later
Lists
Like
Liked
42:26Conflict broke out between Israel and Iran on Friday, with Israel launching an attack on Iran’s nuclear and military facilities and Iran responding in turn. Vali Nasr, a Middle East expert and professor at Johns Hopkins University, sits down with Ravi Agrawal to discuss. Nasr is the author, most recently, of Iran’s Grand Strategy: A Political Histo…
…
continue reading

1
Security Series - Episode 1: Securing the Remote Workforce: Building Resilient Cyber Defenses Against Network Threats
39:46
39:46
Play later
Play later
Lists
Like
Liked
39:46The importance of securing remote workplaces in today's networking threat landscape.By Zyxel Networks
…
continue reading

1
Part 1: Wake the Lion | You Weren’t Made to Survive — You Were Made to Lead
39:05
39:05
Play later
Play later
Lists
Like
Liked
39:05Check out our sponsors: ✅ Patriot Protect - http://patriot-protect.com/chad ✅ Allied Oil - https://alliedoilfield.com/ Episode Description: In this powerful kickoff to the Stand Your Ground series, Chad Prather lays it all on the line with a message every warrior-hearted man and woman needs to hear: You weren’t created to blend in—you were born to …
…
continue reading

1
WW3?! Israel STRIKES Iran!! + Judge BLOCKS Trumps National Guard In LA!! WHAT IS HAPPENING‼️
1:11:40
1:11:40
Play later
Play later
Lists
Like
Liked
1:11:40SPONSORS: https://www.birchgold.com/ Text: DEAR to 989898 Home Title Lock: Go to https://www.hometitlelock.com/ And use code GRAHAM ✉️Subscribe to the Newsletter!! https://newsletter.grahamallen.com/ 👉 Follow Us on Social Media: • 𝕏 ✍️: https://twitter.com/GrahamAllen_1 • Instagram 📸: https://www.instagram.com/grahamallen1 • Facebook 👍: https://www…
…
continue reading

1
Did Trump Just Open The Door To War?! + NEW INFO On MN Assassination!!
1:12:56
1:12:56
Play later
Play later
Lists
Like
Liked
1:12:56SPONSORS: Go to https://www.blackoutcoffee.com/ for NON-WOKE Coffee!! https://www.birchgold.com/ Text: DEAR to 989898 ✉️Subscribe to the Newsletter!! https://newsletter.grahamallen.com/ 👉 Follow Us on Social Media: • 𝕏 ✍️: https://twitter.com/GrahamAllen_1 • Instagram 📸: https://www.instagram.com/grahamallen1 • Facebook 👍: https://www.facebook.com/…
…
continue reading

1
#725: AWS News: FSx for Lustre introduces cost-saving storage tiers, MCP servers enhance AI development tools, and more
39:59
39:59
Play later
Play later
Lists
Like
Liked
39:59Explore FSx for Lustre's new intelligent storage tiering that delivers cost savings and unlimited scalability for file storage in the cloud. Plus, discover how the new Model Context Protocol (MCP) servers are revolutionizing AI-assisted development across ECS, EKS, and serverless platforms with real-time contextual responses and automated resource …
…
continue reading

1
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Yotam Segev, Matthew Warner, Rob Allen - ESW #411
1:19:04
1:19:04
Play later
Play later
Lists
Like
Liked
1:19:04Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
…
continue reading

1
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411
1:19:04
1:19:04
Play later
Play later
Lists
Like
Liked
1:19:04Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
…
continue reading

1
AI-Powered Enterprise Data Protection Solutions: Smarter, Faster, Safer
0:54
0:54
Play later
Play later
Lists
Like
Liked
0:54As cyber threats grow more advanced, traditional security methods are no longer sufficient. AI-powered enterprise data protection solutions offer smarter, faster, and safer defense by continuously monitoring activity, predicting threats, and automating responses. Singapore-based HawkShield leads in this space with its AI-driven platform that protec…
…
continue reading

1
CAP Theorem Explained: Choosing the Right Database for Distributed Systems
15:25
15:25
Play later
Play later
Lists
Like
Liked
15:25CAP Theorem Explained: Choosing the Right Database for Distributed Systems https://knowledge.businesscompassllc.com/cap-theorem-explained-choosing-the-right-database-for-distributed-systems/ Ever spent an entire weekend debugging a distributed database issue only to discover it’s not a bug but a fundamental trade-off you never considered? You’re no…
…
continue reading

1
Centralized vs Distributed Systems: Key Concepts Explained with Java Example
18:10
18:10
Play later
Play later
Lists
Like
Liked
18:10Centralized vs Distributed Systems: Key Concepts Explained with Java Example https://knowledge.businesscompassllc.com/centralized-vs-distributed-systems-key-concepts-explained-with-java-example/ Ever spent hours debugging a distributed system only to wish you’d gone with a simpler centralized approach? Or maybe you built a monolith that’s now buckl…
…
continue reading