show episodes
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Artwork
 
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

Unsubscribe
Unsubscribe
Wekelijks
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
Artwork

1
ASecuritySite Podcast

Professor Bill Buchanan OBE

Unsubscribe
Unsubscribe
Maandelijks+
 
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
  continue reading
 
Artwork

1
The Privacy Advisor Podcast

Jedidiah Bracy, IAPP Editorial Director

Unsubscribe
Unsubscribe
Maandelijks
 
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
  continue reading
 
Artwork
 
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
  continue reading
 
Artwork

1
Distilled Security Podcast

Justin Leapline, Joe Wynn, and Rick Yocum

Unsubscribe
Unsubscribe
Maandelijks
 
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Video)

Security Weekly Productions

Unsubscribe
Unsubscribe
Wekelijks+
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Darwin Salazar.
  continue reading
 
The DtSR Podcast is dedicated to the cyber security profession - with news, personalities, topics of interest, and discussion you won't find elsewhere. Running since 2011 - founded by Rafal Los (aka "@Wh1t3Rabbit"), and co-hosted by James Jardine - the weekly show will entertain you while you're learning something. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVtWXjRxNISrhme1MgBj3C2U&si=scHDiTuLXSEQ9qHq On LinkedIn: https://www.linke ...
  continue reading
 
Artwork
 
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy weekly episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Mission.org is a media studio producing content for world-cla ...
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee and more! ClearedJobs.Net is a veteran-owned career site an ...
  continue reading
 
Artwork

1
Razorwire Cyber Security

Razorthorn Security

Unsubscribe
Unsubscribe
Maandelijks+
 
Welcome to the Razorwire podcast where we share information, best practices and up to date news in cyber security and infosec. Our mission is to help you become a better cyber security professional and support our vision of creating an agile community of cyber professionals who are stronger than ever before. This show is first and foremost about sharing knowledge and benefiting from collaboration. We bring you the advice and wisdom of both your host, James Rees, and his guests to build on th ...
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Partially Redacted brings together leaders in engineering, data, AI, security, and privacy to share knowledge, best practices, and real world experiences. Each episode provides an in-depth conversation with an industry expert who dives into their background and experience. They’ll share practical advice and insights about the techniques, tools, and technologies that every company – and every technology professional – should know about. Learn from an amazing array of founders, engineers, arch ...
  continue reading
 
Artwork

1
The Security Podcasts

www.securitymagazine.com

Unsubscribe
Unsubscribe
Maandelijks+
 
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
  continue reading
 
Artwork

1
The Retirement and IRA Show

Jim Saulnier, CFP® & Chris Stein, CFP®

Unsubscribe
Unsubscribe
Wekelijks+
 
What do you get when you combine two knowledgeable CFP® PROFESSIONALS (one also a well-informed COLLEGE FINANCE INSTRUCTOR)? If you mix in relevant financial information and a healthy dose of humor you get the Retirement and IRA Radio Show! JIM SAULNIER, a CERTIFIED FINANCIAL PLANNER™ Professional with Jim Saulnier and Associates who specializes in retirement planning for clients across the country, CHRIS STEIN, a Finance Instructor at Colorado State University who is also a CERTIFIED FINANC ...
  continue reading
 
Artwork

1
Connect

Axis Communications

Unsubscribe
Unsubscribe
Maandelijks
 
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
  continue reading
 
Artwork

1
The Ontic Protective Intelligence Podcast

Ontic, The Ontic Center for Protective Intelligence

Unsubscribe
Unsubscribe
Wekelijks
 
Want a behind-the-scenes look into some of history’s most famous security incidents? Are you a corporate security professional looking to grow your understanding of the industry? Want to learn what it takes to break the bias as a woman in this field? The Ontic Protective Intelligence Podcast brings some of the greatest minds in safety, security, and protection together to shape how we view the industry's future.
  continue reading
 
The Intelligence Jumpstart with Jane DOE is the National Intelligence University’s podcast produced by NI Press. It explores relevant national security topics through collegial conversations that provide listeners with transparency and insight into issues that affect the U.S. Intelligence Community today. You don’t have to be a professional intelligence officer to listen, you just have to subscribe to get your own Intelligence Jumpstart.
  continue reading
 
Providing financial planning strategies for oil and gas professionals. Justin and Jared talk through ideas to optimize investments, lower future taxes, and grow your wealth. If you work at or recently retired from a large Oil & Gas company, this podcast is for you. Justin Brownlee and Jared Machen are CERTIFIED FINANCIAL PLANNER™ professionals with Brownlee Wealth Management, a fee-only firm dedicated to those in the Oil & Gas profession. Learn more and subscribe today at brownleewealthmanag ...
  continue reading
 
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman and Paul Robichaux, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Artwork

1
Security Heroes

Athena Security

Unsubscribe
Unsubscribe
Maandelijks
 
In a world full of negative news the goal of this podcast is to shed some light on the positive and to recognize and give attention to the people who are the true Heroes in society. I am Lisa Falzone your Security Heroes podcast host. Our aim, connects listeners to real-life heroes in the security world. We explore the challenges and successful strategies of these heroic figures to resolve issues which unravel under highly stressful conditions. Sponsored by Athena Security.
  continue reading
 
Artwork
 
Welcome to the forefront of safeguarding! Join us on The Security Spectrum Podcast as we delve into the dynamic realm of Physical Security, AI, and Video Analytics. From discussing the latest advancements in surveillance technologies to exploring innovative strategies for protecting assets, our podcast is your essential guide to navigating the evolving landscape of security. Whether you're a seasoned industry professional or an intrigued newcomer, tune in for insightful discussions, expert i ...
  continue reading
 
Artwork

1
Philippine Stock Market Weekly

First Metro Securities and Podcast Network Asia

Unsubscribe
Unsubscribe
Maandelijks+
 
This is the Philippine Stock Market Weekly podcast series by FirstMetroSec, where we will be featuring timely and relevant discussions on the Philippine stock market and economy, in the hope of providing investing and trading guidance to Filipinos. Enjoying our episodes? Don't forget to follow the podcast, rate us 5 stars and hit the notification bell. Connect with us through social media with the handle, @firstmetrosec. #YourFutureFirst Website: www.firstmetrosec.com.ph Email: events@firstm ...
  continue reading
 
Uncle Marv’s IT Business Podcast is a show designed for IT professionals and Managed Service Providers. The podcast aims to provide actionable advice and tips that help IT businesses grow and thrive in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, and industry pioneers who share their experiences, insights, and strategies for success. These discussions often cover topics such as: - Cloud computing and AI advancements - M ...
  continue reading
 
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
  continue reading
 
Artwork

1
The Cognitive Crucible

Information Professionals Association

Unsubscribe
Unsubscribe
Maandelijks+
 
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
  continue reading
 
Artwork

1
Navigating Neuropsychology

John Bellone & Ryan Van Patten - NavNeuro

Unsubscribe
Unsubscribe
Maandelijks+
 
Join John and Ryan as they explore the field of neuropsychology through the presentation of cutting edge scientific findings, discussion of important topic areas, and interviews with experts in a variety of relevant fields. The three main objectives of the podcast are to 1) Provide interesting, relevant, and easily-accessible information for students and professionals in neuropsychology, as well as anyone who is interested in brain-behavior relationships. 2) Begin working towards unification ...
  continue reading
 
This series in partnership with the American Medical Association brings healthcare professionals timely, relevant, and emerging information that impacts daily practice and the changing world of medicine. Featuring insights from health care leaders, this Perspectives with the AMA series is a must for any healthcare professional who wants to stay up to date on the latest issues and trending topics in the space, including value-based care, telehealth, the opioid epidemic, Medicare payment, cybe ...
  continue reading
 
”Digital Defenders” is a must-listen podcast for anyone interested in staying ahead in the ever-evolving field of cybersecurity. Hosted by industry veterans, each episode delves into the latest threats, emerging technologies, and cybersecurity strategies. From interviews with leading experts to deep dives into case studies of significant security breaches, this podcast provides a comprehensive overview of the landscape. Whether you’re a professional in the field, a business owner concerned a ...
  continue reading
 
Kirsten Poon, an accomplished IT professional based in Edmonton, brings over a decade of expertise in designing, implementing, and managing sophisticated IT systems and infrastructures. Renowned for a results-driven approach, Kirsten Poon excels in optimizing performance, enhancing security, and crafting innovative solutions that align seamlessly with business objectives. Her leadership in managing complex projects and cross-functional teams is complemented by a commitment to staying ahead o ...
  continue reading
 
Loading …
show series
 
In This Episode: We cover a range of timely topics, including: • Matt Walker, Managing Director of Security and Compliance at Goosehead Insurance: Discusses the challenges of threat exposure management and strategies for cloud security. • Dr. Harvey Castro, ER Doctor and Keynote Speaker: Shares his journey of integrating AI into healthcare, from re…
  continue reading
 
Aaron was already a skilled bug hunter and working at HackerOne as a triage analyst at the time. What he discovered can't even be described as a software bug or a vulnerability. This type of finding has probably resulted in more security incidents and breaches than any other category: the unintentional misconfiguration. There's a lot of conversatio…
  continue reading
 
Golden Key Group (GKG) provides HR resources to many federal agencies and the military. Keeping a spotlight on the human throughout the hiring process is a key focus for Jennie Sikes, Director Talent Acquisition & Management. Jennie shares the importance of emotional intelligence in your career, the GKG company culture, and why starting a job on th…
  continue reading
 
For more information and show notes visit: https://www.bwmplanning.com/post/87 In this episode of Financial Planning for Oil & Gas Professionals, hosts Justin Brownlee and Jared Machen dive into the recent updates to the SECURE Act, focusing on changes affecting non-spouse beneficiaries and the implications for Required Minimum Distributions (RMDs)…
  continue reading
 
The Cyber Kill Chain framework outlines the seven distinct stages of a cyberattack, starting with reconnaissance where attackers gather information about their target and ending with action on objectives where the attacker achieves their ultimate goal. Each stage represents a critical point of vulnerability, from weaponizing malware to exploiting v…
  continue reading
 
The source provides information about PLAUD NOTE, a voice recorder powered by ChatGPT that offers features like one-press recording, transcription, and summarization. The text highlights the product's key benefits, including its ability to transcribe audio recordings into accurate text and generate summaries using AI, making it a valuable tool for …
  continue reading
 
Jim and Chris sit down to discuss listener questions relating to Social Security benefits then return to a question from last week to take a deeper look at Roth IRA Annuity payments… (18:00) A listener asks if he might be able to collect full Social Security benefits while working part-time for a local government job. (25:45) Georgette hopes for so…
  continue reading
 
The text is a transcript from a YouTube video about a cybersecurity tabletop exercise called "Operation Data Lock." The exercise simulates a ransomware attack on a fictional financial services firm, highlighting the importance of preparedness and rapid response in the face of cyber threats. The video demonstrates the critical steps involved in mana…
  continue reading
 
In the show this week, Steve Goodman and Rich Dean are joined by Rod Trent. Rod discusses his extensive background in content creation and his current role at Microsoft, focusing on the evolution of AI in cybersecurity, particularly through the lens of Copilot for Security. The discussion covers the challenges of AI adoption, the importance of aski…
  continue reading
 
The provided text is an excerpt from the online publication Uncrate.com, which focuses on curated lifestyle products and experiences. It highlights various items, including the Tesla Cybercab, a self-driving taxi set to be released in 2026, as well as luxury cars from Rolls-Royce and Bentley. Additionally, the excerpt features a selection of "Featu…
  continue reading
 
In the enterprise security news, Eon, Resolve AI, Harmonic and more raise funding Dragos acquires Network Perception Prevalent acquires Miratech The latest DFIR reports A spicy security product review Secure by Whatever New threats Hot takes All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw…
  continue reading
 
In the enterprise security news, Eon, Resolve AI, Harmonic and more raise funding Dragos acquires Network Perception Prevalent acquires Miratech The latest DFIR reports A spicy security product review Secure by Whatever New threats Hot takes All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw…
  continue reading
 
Cybercab, Golden Jackal, Mamba 2FA, Multi Microsoft, iPhone thieves, esims, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-421
  continue reading
 
Yuriy Polyakov is the Vice President of Cryptography and a Principal Scientist at Duality Technologies. His research interests include applied lattice-based cryptography, fully homomorphic encryption, and privacy-preserving machine learning. He is also a co-founder of the open-source PALISADE Homomorphic Encryption Software Library, and a co-founde…
  continue reading
 
Kurt Rohloff is an Associate Professor of Computer Science at the New Jersey Institute of Technology (NJIT) and a co-founder and CTO of Duality Technologies. He is also a co-founder of the open-source PALISADE Homomorphic Encryption Software Library, and a co-founder of the OpenFHE library.Door Prof Bill Buchanan OBE FRSE
  continue reading
 
The provided text compares the Apple iPhone 16 and Huawei Mate XT, highlighting their key features and differences. Both phones offer powerful performance, high-quality cameras, and advanced operating systems. The iPhone 16 excels in its traditional sleek design, powerful processor, and robust app ecosystem, while the Huawei Mate XT stands out with…
  continue reading
 
The Sports Rabbi and Roy Jankelowitz looked back at Israel’s 4-1 loss to France in Nations League action while also speaking about the direction the National Team is taking with a match against Italy coming up. Next up was Maccabi Tel Aviv basketball, their loss at Monaco and the departure of Jordan Loyd plus we discussed Hapoel Jerusalem, Holon, D…
  continue reading
 
For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing skills, tips, techniques, and intel that security professionals have to share. Sadly, a natural corporate reluctance to share information viewed as privileged and private has historically had a chillin…
  continue reading
 
Aaron was already a skilled bug hunter and working at HackerOne as a triage analyst at the time. What he discovered can't even be described as a software bug or a vulnerability. This type of finding has probably resulted in more security incidents and breaches than any other category: the unintentional misconfiguration. There's a lot of conversatio…
  continue reading
 
In this special recruiter-focused series, our hosts Kathleen Smith and Rachel Bozeman discuss lessons learned from our Security Cleared Jobs: Who’s Hiring & How podcast guests. 5:13 Dorion Baker shared the importance of long-term relationships and nurturing cleared talent. 9:54 Jess Mathias of Core4ce calls candidates at every stage of the process.…
  continue reading
 
For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing skills, tips, techniques, and intel that security professionals have to share. Sadly, a natural corporate reluctance to share information viewed as privileged and private has historically had a chillin…
  continue reading
 
For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing skills, tips, techniques, and intel that security professionals have to share. Sadly, a natural corporate reluctance to share information viewed as privileged and private has historically had a chillin…
  continue reading
 
Introduction to Aaron Painter and Nametag: Uncle Marv introduces Aaron Painter, highlighting his role as CEO of Nametag, a platform dedicated to enhancing identity verification processes to prevent impersonation and fraud. The North Korean Hacker Incident: The conversation kicks off with a discussion about the notorious case of a North Korean hacke…
  continue reading
 
The article reports that Akira and Fog ransomware gangs are exploiting a critical vulnerability in Veeam Backup & Replication (VBR) software. This vulnerability, tracked as CVE-2024-40711, allows attackers to gain remote code execution (RCE) on vulnerable servers. This allows them to access and encrypt sensitive data, leading to ransomware attacks.…
  continue reading
 
"Code of Honor: Embracing Ethics in Cybersecurity" by Ed Skoudis is a book that explores the ethical challenges faced by cybersecurity professionals in today's digital landscape. The book delves into the complex moral dilemmas that arise in the field of cybersecurity, offering guidance on how to navigate these issues while maintaining integrity. Th…
  continue reading
 
"Code of Honor: Embracing Ethics in Cybersecurity" by Ed Skoudis is a book that explores the ethical challenges faced by cybersecurity professionals in today's digital landscape. The book delves into the complex moral dilemmas that arise in the field of cybersecurity, offering guidance on how to navigate these issues while maintaining integrity. Th…
  continue reading
 
FraudGPT is a dangerous AI tool that has emerged on the dark web, designed specifically for cybercriminal activity. It is a subscription-based service offering access to sophisticated malicious tools like phishing, cracking, and carding, posing a significant threat to cybersecurity. FraudGPT's capabilities extend beyond mass phishing, as it can cre…
  continue reading
 
The text is an excerpt from an online magazine and shop called Uncrate, focusing on luxury goods for men. The excerpt features a specific watch, the Richard Mille RM 65-01 McLaren Automatic Split-Seconds Chronograph W1, alongside other luxury watches and products like a Nike Tech Windrunner Hoodie, a Joymode Sexual Performance Booster, and an HP La…
  continue reading
 
Apple Vision Pro is a new head-mounted spatial computer from Apple that seamlessly blends the digital world with the physical world. With this device, users can work, watch videos, relive memories, and connect with others in revolutionary ways. It features a high-resolution micro-OLED display system, advanced Spatial Audio, and a sophisticated arra…
  continue reading
 
The text provides a detailed overview of the iPhone 16 Pro and iPhone 16 Pro Max, highlighting new features and design improvements. It focuses on Apple Intelligence, a personal intelligence system designed to help users write, express themselves, and get things done effortlessly. The text also covers the new Camera Control feature, which allows fo…
  continue reading
 
Stuxnet: The Cyber Weapon That Changed Warfare Forever Journey deep into the Natanz nuclear facility in Iran, a fortress of concrete and steel, where the world's first known cyber weapon, Stuxnet, unleashed unprecedented physical destruction without a single bomb. Discover how this sophisticated malware evaded top-notch defenses, wreaked havoc on c…
  continue reading
 
Uncle Marv kicks off the show by introducing Tim Coach and his new position at Cynomi. Tim explains the company's name, inspired by the manta ray from Finding Nemo, symbolizing protection and guidance in cybersecurity. The conversation dives into Cynomi's VCISO platform, which simplifies security assessments and compliance roadmaps for MSPs. Tim hi…
  continue reading
 
Uncle Marv kicks off with the latest on Hurricane Milton, now a Category 4 storm with 155 mph winds, expected to make landfall near Sarasota around 10-12 PM. He emphasizes the storm's massive size, affecting areas from the Panhandle to the Keys. Using the Windy.com app, Marv illustrates the storm's path and potential impacts. He shares emergency nu…
  continue reading
 
The source provides an overview of the Kindle Edition of The 6th Protocol, a novel by Nguyen Tai Nguyen. The story follows a group of individuals who must work together to stop a rogue IRA agent from unleashing a deadly encryption virus on the world. The novel explores themes of power, betrayal, and the struggle for control in a world where technol…
  continue reading
 
Unit 8200 is a highly classified Israeli cyber warfare unit with a long history dating back to the founding of Israel. Known for its size, scope, and sophistication, the unit's primary focus is signals intelligence (SIGINT), which involves intercepting and analyzing electronic communications. Unit 8200 is responsible for a wide range of activities,…
  continue reading
 
Meta has released a new open-source AI model called Llama 3.1, which is designed to compete with ChatGPT. The model is trained on a massive dataset and is capable of a range of tasks, including generating synthetic data and transferring knowledge to smaller models. Llama 3.1 powers Meta's AI assistant and is also available for developers to use. Wh…
  continue reading
 
Loading …

Korte handleiding