Download the App!
show episodes
 
Artwork

1
Adopting Zero Trust

Adopting Zero Trust

Unsubscribe
Unsubscribe
Ежемесячно
 
Buzzword? Architecture? Perhaps a true security approach for modern organizations? Join us as we chat with organizations of all types and sizes to learn about their Zero Trust adoption journey and as we answer these questions along the way.
  continue reading
 
Artwork

1
DrZeroTrust

Dr. Chase Cunningham

Unsubscribe
Unsubscribe
Еженедельно
 
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
  continue reading
 
Artwork

1
Cloudy With a Chance of Trust

Pam Kubiatowski

Unsubscribe
Unsubscribe
Ежемесячно
 
A podcast for digital transformation leaders. Network security experts Pam Kubiatowski and Lisa Lorenzin discuss the latest cyber-attack issues, enterprise security strategies, and current security events so that you can successfully accelerate network and security transformation. You can subscribe to the podcast feed on Apple Podcasts and Spotify.
  continue reading
 
Artwork

1
CXO Voices

CXO REvolutionaries

Unsubscribe
Unsubscribe
Ежедневно+
 
All you need to know about zero trust and digital transformation, from change management best practices to network and cybersecurity modernization and everything in between. Expect fresh stories, new insights, and the latest developments from pioneers on the leading edge of technology.
  continue reading
 
Artwork

1
What's Your Signal?

Cradlepoint

Unsubscribe
Unsubscribe
Ежемесячно
 
Enterprise networking isn’t boring. This stuff is real life, from the retail store of the future to the latest public safety technologies. We chop it up with experts from around the globe and various industries — leaving no stone unturned in a mutual quest for the securest, most reliable network possible. SD-WAN and 5G. SASE and zero trust. Stories from the data center to the most far-flung IoT deployments imaginable. (Podcast brought to you by Cradlepoint, part of Ericsson.) cradlepoint.com
  continue reading
 
Artwork

1
Security Visionaries

Netskope

Unsubscribe
Unsubscribe
Ежемесячно
 
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
  continue reading
 
For many of us, the workplace is more than a single building or facility. That’s what makes workforce IAM so powerful. By managing security through something we all take wherever we go — our identities — it gives users the flexibility they need to stay productive and enables administrators to quickly detect and address risks. HID’s robust, flexible workforce identity and access management solutions provide your workforce with seamless access to the resources they need — no matter where they are.
  continue reading
 
Artwork

1
Security Conversations

Ryan Naraine

Unsubscribe
Unsubscribe
Ежемесячно
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
  continue reading
 
Artwork

1
The CISO's Gambit

Zscaler, Inc.

Unsubscribe
Unsubscribe
Ежемесячно
 
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
  continue reading
 
Artwork

1
Zero-Trust 4 Zero-Gravity

SpiderOak

Unsubscribe
Unsubscribe
Ежемесячно
 
Cybersecurity in space! Join us as we talk about protecting assets in space, hardening existing assets, and models for the new space ecosystem. Hosted by Dave Pearah, CEO of SpiderOak and SpiderOak Mission Systems.
  continue reading
 
Artwork

1
The CIO Evolution

Zscaler, Inc

Unsubscribe
Unsubscribe
Ежемесячно
 
The CIO Evolution, a CXO REvolutionaries podcast sponsored by Zscaler CIOs are a special breed of executive: the Swiss Army Knife of leaders. They lead the innovation agenda and use technology to power the capabilities that deliver business outcomes. This podcast covers the art and science of business transformation and the tools CIOs use: cloud, mobile, AI, zero trust. More importantly, it investigates the true essence of digital leadership.
  continue reading
 
Join MEF CTO Pascal Menezes as he explores thought-provoking perspectives from the leaders and changemakers propelling enterprise digital transformation forward. Each episode delves into leading-edge business insights from top network, cloud, and technology executives and industry analysts—leaving you with key takeaways to help grow your revenue and bring services and solutions to market faster. Executives at the Edge explores topics such as: What is SD-WAN and SASE and what does market grow ...
  continue reading
 
Artwork

1
Better Together

Tech Demand

Unsubscribe
Unsubscribe
Ежемесячно
 
With thousands of organizations using Microsoft software solutions, One Identity and Microsoft have come together to make Zero Trust Active Directory Security within reach. Cybersecurity starts with identity management. For CISOs and other IT security leaders, this is at the forefront of their minds as they seek solutions to prevent breaches and enable Zero Trust. This podcast series focuses on how Microsoft and One Identity solutions work together to create a Zero Trust security model. Hear ...
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
Artwork

1
Fed Gov Today

Francis Rose

Unsubscribe
Unsubscribe
Еженедельно
 
Veteran host Francis Rose gives Federal government decision-makers news and information about management, workforce, IT, and acquisition, to help those leaders do their jobs better.
  continue reading
 
Artwork

1
CSO Perspectives (public)

N2K Networks

Unsubscribe
Unsubscribe
Ежемесячно+
 
Encore seasons of the popular CyberWire Pro podcast hosted by Chief Analyst, Rick Howard. Join Rick and the Hash Table experts as they discuss the ideas, strategies and technologies that senior cybersecurity executives wrestle with on a daily basis. For the latest seasons ad-free along with essays, transcripts, and bonus content, sign up for CyberWire Pro.
  continue reading
 
"Net Zero: What’s innovation got to do with it?" is a limited podcast series which includes interviews with experts – from scientists to business leaders – about the role of a critical ingredient in tackling the climate crisis: innovation. In each episode, hosts Simon Retallack and Nina Foster from the Carbon Trust’s Net Zero Intelligence Unit quiz guests about how they’ve deployed innovation to drive urgent change. The series will explore how innovation has unlocked other urgent global prob ...
  continue reading
 
Artwork

1
Third Party Threat Hunters

Gregory Rasner

Unsubscribe
Unsubscribe
Ежемесячно
 
A dialogue with leaders in Cybersecurity and Third-Party Risk Management led a leader in the field: Gregory Rasner (author, "Cybersecurity & Third-Party Risk: Third-Party Threat Hunting" and "Zero Trust and Third-Party Risk: Reduce the Blast Radius")
  continue reading
 
Artwork

1
under CTRL

Tresorit

Unsubscribe
Unsubscribe
Ежемесячно
 
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at podcast@tresorit.com.
  continue reading
 
Kelly O'Dwyer-Manuel & David Brossard discuss the latest in fine-grained, policy-based authorization, and the latest developments and challenges enterprises face in their access control journey. Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect A ...
  continue reading
 
Artwork

1
GRC Academy

Jacob Hill

Unsubscribe
Unsubscribe
Ежемесячно
 
Governance, Risk, and Compliance Academy (GRC) Academy is a training and research platform for GRC professionals, executives, and anyone else who wants to increase their knowledge in the GRC space!
  continue reading
 
Artwork

1
Cybberssecurity Podcast

Nathanael Dick and Andrew Nuxoll

Unsubscribe
Unsubscribe
Ежемесячно
 
Join us on a cybersecurity journey like no other! In our podcast, we dive into the dynamic world of cybersecurity, exploring the latest topics and trends. We blend insightful discussions with a touch of humor and real-world anecdotes to keep you informed, entertained, and one step ahead of the cyber threats lurking out there. Tune in for a unique blend of cybersecurity insights and a dash of 'BS' – because learning about security doesn't have to be dry and boring!
  continue reading
 
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
  continue reading
 
Artwork

1
Ransomware Battleground

Syya Yasotornrat

Unsubscribe
Unsubscribe
Ежемесячно
 
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
  continue reading
 
Artwork

1
Error Code

Robert Vamosi

Unsubscribe
Unsubscribe
Ежемесячно+
 
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
  continue reading
 
Artwork

1
Slaven's Selection

Slaven

Unsubscribe
Unsubscribe
Еженедельно
 
Science, History and Everything in Between. Slaven's Selection is written and edited by a former journalist, columnist, television reporter, editor, fiction and poetry author. If you like science, space exploration, nature, technology, and history as I do, you will find something for yourself here. This podcast is for all of you forever curious. Stay selective!
  continue reading
 
Artwork

1
Resilient Cyber

Chris Hughes

Unsubscribe
Unsubscribe
Ежемесячно+
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
  continue reading
 
Artwork

1
MSP 1337

Chris Johnson

Unsubscribe
Unsubscribe
Еженедельно
 
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference. Support this podcast: https://podcasters.spotify.com/pod/show/msp1337/support
  continue reading
 
Artwork

1
WE'RE IN!

Synack

Unsubscribe
Unsubscribe
Ежемесячно
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
  continue reading
 
Artwork

1
Cyber Focus

The McCrary Institute

Unsubscribe
Unsubscribe
Еженедельно
 
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
  continue reading
 
Artwork

1
Cybertraps Podcast

Frederick Lane & Jethro Jones

Unsubscribe
Unsubscribe
Ежемесячно
 
We explore the risks arising from the use and misuse of digital devices and electronic communication tools. We interview experts in the fields of cybersafety, cybersecurity, privacy, parenting, and technology and share the wisdom of these experts with you!
  continue reading
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

Unsubscribe
Unsubscribe
Еженедельно
 
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
  continue reading
 
Artwork

1
The TribalHub Podcast

TribalHub

Unsubscribe
Unsubscribe
Ежемесячно
 
The TribalHub podcast shares stories of tribal leaders who are driving their organizations, businesses that are collaborating with tribes, and leaders in the industry who are savvy about technology. Subscribe on your favorite podcast platform! TribalHub...Connections, Membership, Opportunity.
  continue reading
 
Artwork

1
Zero Knowledge

Zero Knowledge Podcast

Unsubscribe
Unsubscribe
Еженедельно
 
Zero Knowledge is a podcast which goes deep into the tech that will power the emerging decentralised web and the community building this. Covering the latest in zero knowledge research and applications, the open web as well as future technologies and paradigms that promise to change the way we interact — and transact — with one another online. Zero Knowledge is hosted by Anna Rose Follow the show at @ZeroKnowledgefm (https://twitter.com/zeroknowledgefm) or @AnnaRRose (https://twitter.com/Ann ...
  continue reading
 
Artwork

1
Federal Executive Forum

Federal News Network | Hubbard Radio

Unsubscribe
Unsubscribe
Ежемесячно
 
The Federal Executive Forum teams leaders in the government market to provide best-of-breed thought leadership media programs that deliver access to the government market, develop a high level of mindshare, and strengthen brands.
  continue reading
 
Artwork

1
Creating Influence

Eric Maddox

Unsubscribe
Unsubscribe
Ежемесячно
 
Eric Maddox is the Army interrogator who, while attached to a Delta Force team in Tikrit, Iraq, collected the intelligence which led to the capture of Saddam Hussein. He subsequently became the first civilian interrogator for the Defense Intelligence Agency and went on to conduct over 2700 interrogations. Eric has repeatedly been able to influence those who have zero trust in him, to make the decision to give him information, even more than he asked, without using torture. Eric honed his sys ...
  continue reading
 
Loading …
show series
 
In this premier episode, host Sam Curry, global VP and CISO in residence at Zscaler and guest Afsaan Kermani, VP of information technology at Akumin, explain what it takes to deliver zero-trust-based cybersecurity in healthcare and to protect sensitive patient data. From leading cultural shifts in IT to staying ahead of the cyber threat landscape a…
  continue reading
 
In this conversation, I discuss various cybersecurity incidents and trends affecting organizations, including CrowdStrike's stock performance, foreign influence in U.S. elections, cybersecurity failures at Sellafield, and the impact of cyber incidents on critical infrastructure. The conversation also covers recent breaches at ADT and American Water…
  continue reading
 
We are interrupting our regularly scheduled podcast series to introduce you to a new series we developed: GRC Uncensored. This pilot season will elevate conversations about GRC that are often buried under millions of dollars in marketing spend. No boring talks about controls or frameworks, just unfiltered discussions with auditors and practitioners…
  continue reading
 
In this episode of PodSights, we tackle the critical importance of IT security and risk management in today's rapidly evolving digital landscape. Discover how adopting a zero-trust security model can transform your access strategies, requiring verification for every user and device. Learn why identity and access management is crucial, and how role-…
  continue reading
 
In this week’s Cyber Focus, host Frank Cilluffo speaks with Dave Luber, the Director of Cybersecurity at the NSA. Luber shares insights from his extensive career, spanning 37 years in the intelligence community. The discussion focuses on the NSA's dual mission in signals intelligence and cybersecurity, its collaboration with industry through the Cy…
  continue reading
 
The zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticin…
  continue reading
 
Nasboi’s rise to fame has been a rollercoaster, but switching lanes from comedy to music? That’s a different game entirely. How easy is it to transition a strong comedy brand into a musical brand and still get people to take you seriously? In this episode of Zero Conditions, the multi-talented entertainer breaks it all down. From cracking ribs to d…
  continue reading
 
Stevie Caldwell, Senior Engineering Technical Lead at Fairwinds, joins host Priyanka Raghavan to discuss zero-trust network reference architecture. The episode begins with high-level definitions of zero-trust architecture, zero-trust reference architecture, and the pillars of Zero Trust. Stevie describes four open-source implementations of the Zero…
  continue reading
 
Kavitha Mariappan, Zscaler EVP of customer experience and transformation and Ian Tan, chief transformation officer at SM Prime Holdings, dive into how one of the leading integrated property developers in Southeast Asia is using zero trust to address IT modernization and security challenges. Tune in to this episode to learn how: Understanding the co…
  continue reading
 
Industrial Control Systems (ICS) and Operational Technology (OT) used to stand apart from traditional IT. But those worlds are converging, and IT pros, including infosec teams and network engineers, need to become familiar with the operational challenges and quirks of ICS/OT systems. On today’s Packet Protector, guest Mike Holcomb demystifies ICS a…
  continue reading
 
What is your company's will? This Fireside Chat with Matt Lee tackles the Acceptable Use Policy, Written information security plan, Roles, and responsibilities. Please give us feedback, as we have a pretty healthy disagreement on a few items and are hoping that you, the listener, can help us find a new path forward. --- Support this podcast: https:…
  continue reading
 
In today’s uncertain macroeconomic environment, security and risk leaders need practical guidance on managing existing spending and new budgetary requests. Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team at Forrester Research, joins Business Security Weekly to review Forrester's Budget Planning Guide 2025: Security And…
  continue reading
 
In the leadership and communications segment, The CEO’s Role in Setting Tone at the Top, CISOs, C-suite remain at odds over corporate cyber resilience, Warren Buffett's Secret To Success? Run It 'Like A Small Family Business,' Says One Of His CEOs, and more! Show Notes: https://securityweekly.com/bsw-368…
  continue reading
 
ServiceNow veteran and Zscaler CTO in Residence Venkat Lakshminarayanan returns to the show for part 2 on self-healing infrastructure. Venkat and host Pamela Kubiatowski discuss organizational considerations when pursuing highly resilient network architecture, including convincing leaders of the business benefits, equipping IT teams with the skills…
  continue reading
 
In today’s uncertain macroeconomic environment, security and risk leaders need practical guidance on managing existing spending and new budgetary requests. Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team at Forrester Research, joins Business Security Weekly to review Forrester's Budget Planning Guide 2025: Security And…
  continue reading
 
Take a Network Break! This week we cover a new Juniper announcement and discuss how the company is bringing its security portfolio under its AI umbrella, Aryaka adding CASB to its SASE menu, and whether the FTC’s prescriptive security requirements for Marriott will actually lead to better security. Cisco invests in a GPU-as-a-Service startup, steal…
  continue reading
 
Join host Emily Wearmouth on the Security Visionaries podcast for her engaging conversation with Phil Miller, Divisional CISO at LPL Financial, about democratizing security. Learn more about his unique approach to making security an understandable and shared responsibility, as well as how this democratized approach relates to the idea of “security …
  continue reading
 
This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. In this episode, Jethro Jones interviews Michaele Armstrong from the Evergreen Bioscience Innovation Cluster. They discuss Evergreen's mission, the impo…
  continue reading
 
On today’s episode, guest James Henderson joins the Packet Pushers to discuss Cisco’s Network Service Orchestrator (NSO). NSO’s role in network automation, its declarative management approach, and the challenges it presents are some of the things James shares with the hosts. They also cover operational requirements, deployment challenges, and perfo…
  continue reading
 
Join the Zero Conditions hosts as they dive into interesting conversations around pop culture, Afrobeats, lifestyle, global music, and lots more. Get ready for engaging discussions and exciting insights into the world of entertainment! Brought to you by Chivas Regal.zeroconditionspod
  continue reading
 
Three Buddy Problem - Episode 16: We break down the new GCHQ advisory on the history and tactics of Russia’s APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge…
  continue reading
 
One of the biggest challenges in collecting cybersecurity metrics is scoping down objectives and determining what kinds of data to gather. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Bill Nichols, who leads the SEI’s Software Engineering Measurements and Analysis Group, discusses the importance of cyber…
  continue reading
 
Meter CEO Anil Varanasi joins Scott Robohn on this sponsored episode of Total Network Operations to talk about Meter’s vision for networking and network operations. In this podcast, recorded the day before Meter’s first public MeterUp event, Anil and Scott discuss Meter’s approach to building new networking equipment, vertical integration of their …
  continue reading
 
In this podcast, we will delve into the key elements of NIS2 and explore its far-reaching impact on organizations. Our experts will provide a comprehensive overview of the Directive and highlight the steps organizations need to take to achieve compliance. What you will learn: Understanding of the core objectives and requirements of NIS2, and which …
  continue reading
 
Steve Smith, founder and principal architect at Nimble Pros, joins host Jeff Doolittle for a conversation about software quality. The episode begins with a discussion of why software quality matters for businesses, customers, and developers. Steve explains some patterns and practices that help teams design for quality. They discuss in detail the pr…
  continue reading
 
As election day in the US approaches, fragmented information spheres, disinformation and geopolitics loom, supercharged by emerging technologies, from AI to deepfakes.   Join Control Risks experts Nicolas Reys and Barnaby Fletcher as they explore how generative AI, large-scale misinformation and disinformation, and digital threats are shaping the e…
  continue reading
 
Layoffs are a sensitive topic in the tech industry. Host Laura Santamaria discusses the emotional and practical impacts on employees and leaders. She also covers the signs of potential layoffs, and strategies for job searching post-layoff while maintaining perspective. She concludes with a tips for leaders to more effectively lead their teams throu…
  continue reading
 
When Avon Fire and Rescue Service learned that its secondary connectivity bearer would be withdrawn, the clock started ticking. Under pressure to find a fast, ultra-resilient replacement for their soon-to-be-decommissioned technology, Avon landed on cellular solutions to bolster connectivity at fire stations. We chatted with Avon Systems Manager Jo…
  continue reading
 
In this episode of the TribalHub podcast, Michelle Bouschor sits down with Patrick Tinklenberg, Vice President of IT, Sycuan Casino, Toni Pepper, CEO, Pepper Consulting LLC and Robin Villareal, CIO, Gila River Resorts & Casinos, to discuss how they promote cybersecurity awareness at their properties. From employee education and communication to fun…
  continue reading
 
Stuxnet: The Cyber Weapon That Changed Warfare Forever Journey deep into the Natanz nuclear facility in Iran, a fortress of concrete and steel, where the world's first known cyber weapon, Stuxnet, unleashed unprecedented physical destruction without a single bomb. Discover how this sophisticated malware evaded top-notch defenses, wreaked havoc on c…
  continue reading
 
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Shawn Bowen, VP and deputy CISO - Gaming, Microsoft. Joining us is Adam Fletcher, CSO, Blackstone. In this epi…
  continue reading
 
Industry expert, Eric Seaman, explains why telecom wholesale in LATAM needs automation to handle growing bandwidth and market changes. As an independent advisor and member of MEF’s LATAM Executive Council, he offers deep insight into why, despite its benefits, challenges like legacy systems and security concerns are hindering adoption. Can LATAM co…
  continue reading
 
On this edition of Fed Gov Today with Francis Rose, sponsored by the Women’s Center, we dive into key themes in healthcare data innovation and workforce resilience. Jesus Caban, Chief Data Scientist at the Program Executive Office for Defense Healthcare Management Systems (PEO DHMS), discusses the evolution of healthcare data sharing in the Departm…
  continue reading
 
Ivan Pepelnjak joins host Eric Chou to reflect on his extensive career, his decision to reduce his content creation, and offer advice for young engineers. They discuss the evolution of networking technologies, emphasizing the importance of mastering Linux and obtaining relevant certifications. Ivan highlights the significance of creating profession…
  continue reading
 
Summary This week Anna chats with Mikerah Quintyne-Collins from HashCloak and Stoffel Labs. They discuss how Mikerah got her start in the crypto space and then dive into the work she did at ChainSafe and eventually at HashCloak. They cover Mikerah’s work on privacy preserving tech like ZK, TEE and MPC and learn about what drives her tweet game and …
  continue reading
 
In this episode of Cyber Focus, host Frank Cilluffo talks with Bob Kolasky, Senior Vice President at Exeter and former head of the National Risk Management Center at CISA. The conversation covers key topics related to supply chain risk, security, and national defense. Bob provides insights into the evolving threats within supply chains, especially …
  continue reading
 
In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz,…
  continue reading
 
In this episode of PodSights, we explore the thrilling developments in augmented reality with a focus on the highly anticipated Apple Glasses, expected to launch by 2026 or 2027. We delve into the rumors surrounding features like advanced microLED displays for stunning visuals, custom prescription lenses for everyday users, and intuitive gesture co…
  continue reading
 
In this episode, we dive into the groundbreaking impact of 5G technology on the future of driverless cars. Discover how this ultra-fast connectivity transforms vehicles into smart machines capable of real-time communication with one another, infrastructure, and even pedestrians. We explore the impressive benefits of reduced latency, enabling cars t…
  continue reading
 
If you are in IT, you are probably not thinking about the risks associated with the Otis Elevator or the Coke machine. Maybe you should. Chester Wisnieski, the director and global field CTO at Sophos, points out that IoT devices, big and small, create an outsized threat to any organization. And that’s why IoT vendors need to secure these devices, e…
  continue reading
 
In the leadership and communications segment, PwC Urges Boards to Give CISOs a Seat at the Table, CISO Salary Surge: Fewer Job Changes, Bigger Paychecks for Experienced Cybersecurity Leaders, Fostering a cybersecurity-first culture: Key leadership insights for building resilient businesses, and more! Show Notes: https://securityweekly.com/bsw-367…
  continue reading
 
From CompTIA MSP Community to the larger IT Community at large. Dawn Sizer of 3rd Element Consulting and Henry Timm of Phantom Technology Solutions are great CompTIA community members who volunteer their time for not just CompTIA but other great communities that make us all better together. This is a great conversation around what is available to y…
  continue reading
 
Loading …

Краткое руководство