POPULARITY
Recorded live at the Input Whispers: Jazz and Cigars event in Singapore, this special compilation episode created in partnership with Input PR, brings together four insightful conversations exploring the evolving frontiers of Web3, tokenization, fraud prevention, payments, and digital security.In this exclusive collection, co-host Josh Kriger sits down with some of the leading minds shaping the future of blockchain:Edwin Mata, CEO and co-founder of Brickken, on how Real World Assets (RWAs) and tokenization are revolutionizing capital markets and democratizing investment access.Pascal Podvin, co-founder and CRO of Nsure.ai, on leveraging AI to fight fraud and strengthen KYC in an increasingly complex crypto ecosystem.Konstantins Vasilenko, co-founder and CBDO of Paybis, on simplifying crypto onboarding, bridging fiat and digital currencies, and the global rise of crypto debit cards and stablecoins.Alex Katz, co-founder and CEO of Kerberus, on redefining real-time Web3 security, achieving zero user losses, and setting new standards for digital trust.From tokenized assets to next-generation security and payments, this episode captures the dynamic pulse of Web3 innovation straight from Singapore's vibrant crypto scene.Support us through our Sponsors! ☕
OpenAI has officially transitioned to a for-profit corporation, a move approved by Delaware Attorney General Kathy Jennings. This restructuring allows OpenAI to raise capital more effectively while maintaining oversight from its original non-profit entity. Microsoft now holds a 27% stake in the new structure, valued at over $100 billion, and OpenAI has committed to purchasing $250 billion in Microsoft Azure cloud services. This agreement includes provisions for Artificial General Intelligence (AGI), which will require verification from an independent expert panel before any declarations are made. Critics have raised concerns about the potential compromise of the non-profit's independence under this new arrangement.Research from cybersecurity firm SPLX indicates that AI agents, such as OpenAI's Atlas, are becoming new security threats due to vulnerabilities that allow malicious actors to manipulate their outputs. A survey revealed that only 17.5% of U.S. business leaders have an AI governance program in place, highlighting a significant gap in responsible AI use. The National Institute of Standards and Technology emphasizes the importance of identity governance in managing AI risks, suggesting that organizations must embed identity controls throughout AI deployment to mitigate potential threats.Additionally, a critical vulnerability in Microsoft Windows Server Update Services (WSUS) is currently being exploited, with around 100,000 instances reported in just one week. This vulnerability allows unauthenticated actors to execute arbitrary code on affected systems, raising concerns among cybersecurity experts, especially since Microsoft has not updated its guidance on the matter. Meanwhile, Microsoft 365 Copilot has introduced a new feature enabling users to build applications and automate workflows using natural language, which could lead to governance challenges as employees create their own automations.For Managed Service Providers (MSPs) and IT service leaders, these developments underscore the need for enhanced governance and security measures. The shift of OpenAI to a for-profit model signals a tighter integration with Microsoft, necessitating familiarity with Azure's AI stack. The vulnerabilities associated with AI agents and the WSUS exploit highlight the importance of proactive security measures. MSPs should prioritize establishing governance frameworks around AI usage and ensure robust identity management to mitigate risks associated with these emerging technologies.Four things to know today00:00 OpenAI Officially Becomes a For-Profit Corporation, Cementing $100B Partnership with Microsoft03:30 AI Agents Are Becoming a Security Nightmare—Because No One Knows Who They Really Are07:53 Hackers Are Targeting WSUS Servers — and You Could Be Distributing Malware Without Knowing It09:28 Microsoft's New Copilot Features Turn AI from Assistant to App Creator, Raising Governance Questions This is the Business of Tech. Supported by: https://scalepad.com/dave/https://getflexpoint.com/msp-radio/
This episode is sponsored by HYPR. Visit hypr.com/idac to learn more.In this episode from Authenticate 2025, Jim McDonald and Jeff Steadman are joined by Bojan Simic, Co-Founder and CEO of HYPR, for a sponsored discussion on the evolving landscape of identity and security.Bojan shares his journey from software engineer to cybersecurity leader and dives into the core mission of HYPR: providing fast, consistent, and secure identity controls that complement existing investments. The conversation explores the major themes from the conference, including the push for passkey adoption at scale and the challenge of securely authenticating AI agents.A key focus of the discussion is the concept of "Know Your Employee" (KYE) in a continuous manner, a critical strategy for today's remote and hybrid workforces. Bojan explains how the old paradigm of one-time verification is failing, especially in the face of sophisticated, AI-powered social engineering attacks like those used by Scattered Spider. They discuss the issue of "identity sprawl" across multiple IDPs and why consolidation isn't always the answer. Instead, Bojan advocates for a flexible, best-of-breed approach that provides a consistent authentication experience and leverages existing security tools.Connect with Bojan: https://www.linkedin.com/in/bojansimic/Learn more about HYPR: https://www.hypr.com/idacConnect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at idacpodcast.comChapter Timestamps:00:00 - Introduction at Authenticate 202500:23 - Sponsored Episode Welcome: Bojan Simic, CEO of HYPR01:11 - How Bojan Simic Got into Identity and Cybersecurity02:10 - The Elevator Pitch for HYPR04:03 - The Buzz at Authenticate 2025: Passkeys and Securing AI Agents05:29 - The Trend of Continuous "Know Your Employee" (KYE)07:33 - Is Your MFA Program Enough Anymore?09:44 - Hackers Don't Break In, They Log In: The Scattered Spider Threat11:19 - How AI is Scaling Social Engineering Attacks Globally13:08 - When a Breach Happens, Who's on the Hook? IT, Security, or HR?16:23 - What is the Right Solution for Identity Practitioners?17:05 - The Critical Role of Internal Marketing for Technology Adoption22:27 - The Problem with Identity Sprawl and the Fallacy of IDP Consolidation25:47 - When is it Time to Move On From Your Existing Identity Tools?28:16 - The Role of Document-Based Identity Verification in the Enterprise32:31 - What Makes HYPR's Approach Unique?35:33 - How Do You Measure the Success of an Identity Solution?36:39 - HYPR's Philosophy: Never Leave a User Stranded39:00 - Authentication as a Tier Zero, Always-On Capability40:05 - Is Identity Part of Your Disaster Recovery Plan?41:36 - From the Ring to the C-Suite: Bojan's Past as a Competitive Boxer47:03 - How to Learn More About HYPRKeywords:IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Bojan Simic, HYPR, Passkeys, Know Your Employee, KYE, Continuous Identity, Identity Verification, Authenticate 2025, Phishing Resistant, Social Engineering, Scattered Spider, AI Security, Identity Sprawl, Passwordless Authentication, FIDO, MFA, IDP Consolidation, Zero Trust, Cybersecurity, IAM, Identity and Access Management, Enterprise Security
Everyone is racing to build AI. Almost no one is securing it end to end. I sat down with Vidya Shankaran, CISSP, Field CTO, Commvault and we talked about the real picture. AI risk is not just about models. It is about data, access, and clean recovery. Most teams are missing the biggest gaps.We covered:• The top AI security threats right now and where teams underestimate risk• The AI stack no one is securing in practice• If a CISO asks where to start and how to prioritize controls• Why traditional data access governance is broken• What is at stake if enterprises do not modernize access to sensitive data• How Satori delivers faster access with tighter control• How Commvault protects AI end to end and even recovers vector indexes and configs after an incidentWe also talked about SHIFT 2025 in New York on Nov 11–12. This event will bring together AI security, data access, and resilience with real answers.In-person: https://lnkd.in/dZ6t8nbY?If you cannot attend in person, there is a full virtual experience on Nov 19.Virtual: https://lnkd.in/dz8yhf-cThis was a raw and tactical conversation. If you care about building AI that moves fast with control, you should watch it.SHIFT will set the tone for how enterprises secure AI in 2025.#data #ai #security #shift2025 #theravitshow
What do AI and cybersecurity have to do with business analysis? More than you think.In this episode of Business Analysis Live, I'm joined by Bindu Channaveerappa—consultant, author, and global speaker—to explore the fast-evolving intersection of AI and cybersecurity. We unpack how these two domains collide, what business analysis professionals need to understand about risk, and how we can step into a more strategic role as organizations race to adopt AI. If you've thought that cybersecurity and AI are for tech teams, you'll find that this conversation is packed with insights that will help you rethink your role in the age of intelligent systems.
-The United States and China are ready to move forward on a TikTok deal, according to Treasury Secretary Scott Bessent. -A high school student in Baltimore County, Maryland was reportedly handcuffed and searched after an AI security system flagged his bag of chips as a possible firearm. -OpenAI is working on a new tool that would generate music based on text and audio prompts, according to a report in The Information. Such a tool could be used to add music to existing videos, or to add guitar accompaniment to an existing vocal track, sources said. Learn more about your ad choices. Visit podcastchoices.com/adchoices
This episode features Chidi Alams, CIO of Just Born — the company behind candy classics like Peeps, Mike and Ike, and Hot Tamales.Chidi shares how his team is using AI, automation, and smarter data systems to modernize operations, strengthen supply chain resilience, and double the business impact of technology. It's a conversation about what it really means to run IT like a growth engine — not just keeping the lights on, but driving strategy, efficiency, and innovation.Plus, much more:Chidi's take on “physical AI” in manufacturingHow the CIO role is evolving into a more strategic leadership positionWhy a values-driven tech culture might be the secret to long-term successWhether you're a CIO, IT leader, or simply curious about how AI and data are reshaping business, this episode delivers grounded, real-world insights. About the Guest: Chidi Alams, CIO at Just Born, Inc., is a transformation executive with a proven track record of leading strategic initiatives that drive operational excellence, organic growth, and digital innovation. His experience includes both Fortune 500 and private equity-backed companies.Timestamps:02:10 Transitioning Between Industries03:26 Role and Responsibilities of a CIO06:05 Business Transformation and Strategy08:12 Managing Peak Seasons and Supply Chain14:26 Leveraging Data and AI21:20 Talent Acquisition and Company Culture27:51 Future of Technology and CIO RoleGuest Highlights:“ A lot of how we ran the business, even during the peak season, was a tremendous amount of tribal knowledge. We can't scale based on tribal knowledge, right? So having data systems, particularly as we bring in new people into the organization, helps us to be more predictive and meet demand during peak season.”“ CIOs have to become more business centric. When you look at what's happening in large enterprises, you're seeing a fragmentation of technology leadership. I do believe that there will be a convergence at some point.”“ I'm extremely interested and have been tracking what I think is a very important trend, not just in CPG but in retail and any consumer space — even pharma — and that is how can we leverage large language models that are trained for CPG to help drive product innovation. It's already happening.”Get Connected:Chidi Alams on LinkedInYousuf Kahn on LinkedInIan Faison on LinkedInHungry for more tech talk? Check out past episodes at ciopod.com: Ep 61 - What Manufacturing Can Teach You About Scaling Enterprise AIEp 60 - Why the Smartest CIOs Are Becoming Business StrategistsEp 59 - CIO Leadership in AI Security and InnovationLearn more about Caspian Studios: caspianstudios.com Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Voices is a new mini-series from Humanitarian AI Today. In daily five-minute flashpods we pass the mic to humanitarian experts and technology pioneers, to hear about new projects, events, and perspectives on topics of importance to the humanitarian community. In this flashpod, Chelsea McMurray, founder of the AI security startup Dorcha, joins Humanitarian AI Today producer Brent Phillips to discuss international human rights law, AI security, and the threat landscape facing humanitarian actors. They begin with Chelsea's background in human rights law and the recent disregard for international norms that should underpin ethical AI governance. The casual conversation then pivots to AI security and the specific threats humanitarian organizations face. Chelsea explains how her startup addresses data privacy vulnerabilities and prompt injection attacks, by giving users greater control over their personal information. Protecting such sensitive data is especially critical in the humanitarian sector, where information leaks can endanger field staff and the vulnerable populations they serve. Substack notes: https://humanitarianaitoday.substack.com/p/chelsea-mcmurray-on-ai-security-and
AI Chat: ChatGPT & AI News, Artificial Intelligence, OpenAI, Machine Learning
Jaeden interviews Jonathan Mortensen, founder and CEO of Confidence Security, a company focused on providing a privacy layer for AI applications. They discuss the growing concerns around data privacy in AI, the innovative solutions offered by Confidence Security, and the potential markets for their technology, including enterprises and sovereign AI. The conversation also covers integration options, the competitive landscape, and the risks associated with prompt injection in AI systems.Get the top 40+ AI Models for $20 at AI Box: https://aibox.aiAI Chat YouTube Channel: https://www.youtube.com/@JaedenSchaferJoin my AI Hustle Community: https://www.skool.com/aihustleTo recommend a guest email: guests(@)podcaststudio.comLearn more about confident security: https://confident.security/Chapters00:00 Introduction to AI Privacy and Security03:39 Understanding the Concerns of AI Data Breaches07:33 Confident Security's Innovative Approach11:04 Integration and Implementation of AI Solutions15:52 Competitive Landscape in AI Privacy Solutions20:36 Common Misconceptions in AI Security
Cisco's Vijoy Pandey - SVP & GM of Outshift by Cisco - explains how AI agents and quantum networks could completely redefine how software, infrastructure, and security function in the next decade.You'll learn:→ What “Agentic AI” and the “Internet of Agents” actually are→ How Cisco open-sourced the Internet of Agents framework and why decentralization matters→ The security threat of “store-now, decrypt-later” attacks—and how post-quantum cryptography will defend against them→ How Outshift's “freedom to fail” model fuels real innovation inside a Fortune-500 company→ Why the next generation of software will blur the line between humans, AI agents, and machines→ The vision behind Cisco's Quantum Internet—and two real-world use cases you can see today: Quantum Sync and Quantum AlertAbout Today's Guest:Meet Vijoy Pandey, the mind behind Cisco's Outshift—a team pushing the boundaries of what's next in AI, quantum computing, and the future internet. With 80+ patents to his name and a career spent redefining how systems connect and think, he's one of the few leaders truly building the next era of computing before the rest of us even see it coming.Key Moments:00:00 Meet Vijoy Pandey & Outshift's mission04:30 The two hardest problems in computer science: Superintelligence & Quantum Computing06:30 Why “freedom to fail” is Cisco's innovation superpower10:20 Inside the Outshift model: incubating like a startup inside Cisco21:00 What is Agentic AI? The rise of the Internet of Agents27:00 AGNTCY.org and open-sourcing the Internet of Agents32:00 What would an Internet of Agents actually look like?38:19 Responsible AI & governance: putting guardrails in early49:40 What is quantum computing? What is quantum networking?55:27 The vision for a global Quantum InternetWatch Next: https://youtu.be/-Jb2tWsAVwI?si=l79rdEGxB-i-Wrrn -- This episode of IT Visionaries is brought to you by Meter - the company building better networks. Businesses today are frustrated with outdated providers, rigid pricing, and fragmented tools. Meter changes that with a single integrated solution that covers everything wired, wireless, and even cellular networking. They design the hardware, write the firmware, build the software, and manage it all so your team doesn't have to.That means you get fast, secure, and scalable connectivity without the complexity of juggling multiple providers. Thanks to meter for sponsoring. Go to meter.com/itv to book a demo.---IT Visionaries is made by the team at Mission.org. Learn more about our media studio and network of podcasts at mission.org. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
In today's episode, Les sits down with Will Pearce and Brad Palm from Dreadnode, one of the nation's most advanced offensive AI and cybersecurity companies. Based in the Rocky Mountain West, Dreadnode is redefining how we think about digital defense — by taking the offensive. Will and Brad share their experiences leading red teams at Microsoft, NVIDIA, and within the U.S. Marine Corps, and how those lessons now shape their mission to secure the future of artificial intelligence.From battlefield drones and AI-enabled cyberattacks to the regulatory frameworks that will define the next era of warfare, this conversation explores what happens when AI becomes both a weapon and a shield.Here's a closer look at the episode:From Red Teams to FoundersWill Pearce, former leader of AI Red Teams at Microsoft and NVIDIA, discusses his journey from penetration testing and consulting to building Dreadnode.Describes how the offensive use of AI is a natural extension of red teaming — “offense leads defense.”Brad Palm's Path from the BattlefieldBrad Palm, a Marine Corps veteran and former red team leader, shares how military principles of mobility, attack, and defense translate into cyber warfare.Offensive cyber as a transformational moment — comparing AI's impact to the leap from muskets to machine guns.The Rise of Offensive AIWill breaks down the offensive AI landscape, from code scanning and model manipulation to adversarial attacks on computer vision systems.How more “eyes,” even artificial ones, find more vulnerabilities — accelerating both innovation and exposure.Building a Platform for Cyber ML OpsDreadnode's platform enables organizations to build, evaluate, and deploy AI models and agents with security in mind.Unlike “AI-in-a-box” startups, their approach mirrors ML Ops infrastructure — prioritizing transparency, testing, and adaptability.Their mission: help clients build their own capabilities, rather than just buy black-box solutions.A Collaborative Cybersecurity CommunityWill and Brad note that in AI security, collaboration beats competition.“If you have confidence in your abilities, you don't need to hide anything.”Despite growing investment and consolidation, the founders believe the industry is still expanding rapidly — with room for innovation and partnership.Human + AI: The Future of the BattlefieldBrad connects his defense background to current AI developments, pointing to autonomous drones in Ukraine as examples of real-time AI-driven warfare.Raises ethical and practical questions about “human-in-the-loop” systems and the urgency of explainable, auditable AI in combat environments.Will expands on how regulatory frameworks and rules of engagement must evolve to keep pace with privately developed AI systems.Offensive AI Conference & What's NextHosting Offensive AI Con in San Diego — the first of its kind dedicated to offensive AI research and community building.The team continues to release state-of-the-art research drops, collaborating with cyber threat intel groups and enterprise partners.Above all, the founders share a deep appreciation for their team culture: detail-oriented, relentlessly curious, and dedicated to “winning every day.”Resources:Website: https://dreadnode.io/ Will Pearce - https://www.linkedin.com/in/will-pearce-a62331135/Brad Palm - https://www.linkedin.com/in/bradpalm/Dreadnode LinkedIn: https://www.linkedin.com/company/dreadnode
At WebexOne, Cisco unveiled the ultimate flex: AI so powerful it's practically rewriting the rulebook for secure, intelligent meetings. Jabra and Huddly are keeping it real, no gimmicks, just AI that actually makes conferencing work better.The video version of this podcast can be found here.Join host Tim Albright and his industry expert guests for another must-watch AVWeek episode covering critical topics from the commercial AV world. This week's discussion tackles what really emerged from Cisco's WebexOne event beyond the partnership headlines and defines what AI Security and AI features conferencing actually needs (versus what vendors think sounds impressive).Host: Tim AlbrightGuests:Jason Haynie – Q2Kristin Bidwell – Audiovisual Consulting TeamKelly Teel – Kelly on LinkedInThis Week In AV:rAVe Pubs – Cisco's AI Collaboration ToolsAV Magazine – ISE Launching SparkAV Network – Ross Video Acquires ioversalAV Network – Avidex Acquires CSS New EnglandRoundtable Topics:UC Today – Cisco Microsoft and More In on AI ToolsAV Buyers Club – Jabra & Huddly Launch AI ToolsEngadget – Microsoft wants 'Vibes based' workingSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
"The next five years are gonna be wild." That's the verdict from Forrester Principal Analyst Allie Mellen on the state of Security Operations. This episode dives into the "massive reset" that is transforming the SOC, driven by the rise of generative AI and a revolution in data management.Allie explains why the traditional L1, L2, L3 SOC model, long considered a "rite of passage" that leads to burnout is being replaced by a more agile and effective Detection Engineering structure. As a self-proclaimed "AI skeptic," she cuts through the marketing hype to reveal what's real and what's not, arguing that while we are "not really at the point of agentic" AI, the real value lies in specialized triage and investigation agents.Guest Socials - Allie's Linkedin Podcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter - Cloud Security BootCampIf you are interested in AI Cybersecurity, you can check out our sister podcast - AI Security PodcastQuestions asked:(00:00) Introduction(02:35) Who is Allie Mellen?(03:15) What is Security Operations in 2025? The SIEM & XDR Shakeup(06:20) The Rise of Security Data Lakes & Data Pipeline Tools(09:20) A "Great Reset" is Coming for the SOC(10:30) Why the L1/L2/L3 Model is a Burnout Machine(13:25) The Future is Detection Engineering: An "Infinite Loop of Improvement"(17:10) Using AI Hallucinations as a Feature for New Detections(18:30) AI in the SOC: Separating Hype from Reality(22:30) What is "Agentic AI" (and Are We There Yet?)(26:20) "No One Knows How to Secure AI": The Detection & Response Challenge(28:10) The Critical Role of Observability Data for AI Security(31:30) Are SOC Teams Actually Using AI Today?(34:30) How to Build a SOC Team in the AI Era: Uplift & Upskill(39:20) The 3 Things to Look for When Buying Security AI Tools(41:40) Final Questions: Reading, Cooking, and SushiResources:You can read Allie's blogs here
In this insightful episode of The Future of ERP, Ryan Throop from IBM joins hosts Richard Howells and Oyku Ilgar to explore the critical role of cybersecurity in the cloud ERP landscape. As businesses move from traditional on-premise solutions to cloud-centric environments, cybersecurity challenges grow more complex. Ryan shares how AI-driven threat detection and shared security models empower organizations to protect sensitive data while boosting operational efficiency. Listener takeaways include the importance of security awareness training, the evolving role of AI in security operations, and the growing emphasis on integrating ERP systems into broader identity governance frameworks. With compelling insights on managing insider threats, third-party risks, and emerging technologies, this episode is a must-hear for any business leader or IT professional focused on digital transformation success. Stay secure, stay innovative, and join the conversation!
Kris Kamber is CEO of SPLX AI. SPLX performs security testing and red teaming for AI agents, helping organizations detect vulnerabilities in their constantly expanding agent deployments. Before SPLX, Kris worked a handful of sales jobs, starting in telecom before hustling his way into Zscaler. I enjoyed asking him about the specific lessons from working in sales such as setting metrics and compensation. He's the first person who has described to me a workplace filled with arrogant and cocky people and also illustrated why he was attracted to that environment. We also touched on how he met his co-founder through a conversation on a plane and what compelled him to build a company at the intersection of AI and cybersecurity given his background.SPLX Website
In this episode, we talk about practical guardrails for LLMs with data scientist Nicholas Brathwaite. We focus on how to stop PII leaks, retrieve data, and evaluate safety with real limits. We weigh managed solutions like AWS Bedrock against open-source approaches and discuss when to skip LLMs altogether.• Why guardrails matter for PII, secrets, and access control• Where to place controls across prompt, training, and output• Prompt injection, jailbreaks, and adversarial handling• RAG design with vector DB separation and permissions• Evaluation methods, risk scoring, and cost trade-offs• AWS Bedrock guardrails vs open-source customization• Domain-adapted safety models and policy matching• When deterministic systems beat LLM complexityThis episode is part of our "AI in Practice” series, where we invite guests to talk about the reality of their work in AI. From hands-on development to scientific research, be sure to check out other episodes under this heading in our listings.Related research:Building trustworthy AI: Guardrail technologies and strategies (N. Brathwaite)Nic's GitHubWhat did you think? Let us know.Do you have a question or a discussion topic for the AI Fundamentalists? Connect with them to comment on your favorite topics: LinkedIn - Episode summaries, shares of cited articles, and more. YouTube - Was it something that we said? Good. Share your favorite quotes. Visit our page - see past episodes and submit your feedback! It continues to inspire future episodes.
Serve No Master : Escape the 9-5, Fire Your Boss, Achieve Financial Freedom
Welcome to the Artificial Intelligence Podcast with Jonathan Green! In this episode, we delve into the ever-evolving domain of AI and cybersecurity with our insightful guest, Jason McKinley, an expert in cybersecurity transformation.Jason shares his unique insights on the current state of AI security and the challenges posed by our rapidly digitalizing society. He discusses the nuanced landscape where speed of technology adoption often outpaces the necessary security measures, leading to vulnerabilities within organizations. Jason emphasizes the importance of slowing down to establish robust security baselines before accelerating innovation.Notable Quotes:"The biggest risk is... moving too fast. We're very much from a pace of technology change right now... We want to slow down just a little bit and then go faster." - [Jason McKinley]"If you aren't using AI, you're wrong because your employees are, you just might not know it yet." - [Jason McKinley]"Security should not trump the operations... You still have to be able to get the job done." - [Jason McKinley]Jason also explores the cultural shifts in businesses where convenience often overrides security protocols and discusses the pitfalls of merging personal and professional digital spaces. He offers strategic advice on creating a cybersecurity culture within organizations, emphasizing the critical role of executive commitment and beginning security practices early in the business lifecycle.Connect with Jason McKinley:LinkedIn: https://www.linkedin.com/in/jasonmckinleyatg/ To reach Jason directly, visit his booking link on the LinkedIn profile or the company's website for further consultations and insights.This episode is a must-listen for anyone interested in the intersection of technology and security, offering practical strategies to protect your digital assets in an age where AI continues to reshape the business landscape. If you're ready to take cybersecurity seriously, Jason's insights are invaluable!Connect with Jonathan Green The Bestseller: ChatGPT Profits Free Gift: The Master Prompt for ChatGPT Free Book on Amazon: Fire Your Boss Podcast Website: https://artificialintelligencepod.com/ Subscribe, Rate, and Review: https://artificialintelligencepod.com/itunes Video Episodes: https://www.youtube.com/@ArtificialIntelligencePodcast
Modern digital supply chains are increasingly complex and vulnerable. In this episode of Security Matters, host David Puner is joined by Retsef Levi, professor of operations management at the MIT Sloan School of Management, to explore how organizations can “sense the signals” of hidden risks lurking within their software supply chains, from open source dependencies to third-party integrations and AI-driven automation.Professor Levi, a leading expert in cyber resilience and complex systems, explains why traditional prevention isn't enough and how attackers exploit unseen pathways to infiltrate even the most secure enterprises. The conversation covers the critical need for transparency, continuous monitoring, and rapid detection and recovery in an era where software is built from countless unknown components.Key topics include:How to sense early warning signs of supply chain attacksThe role of AI and automation in both risk and defenseBest practices for mapping and securing your digital ecosystemWhy resilience—not just prevention—must be at the core of your security strategyWhether you're a CISO, IT leader or security practitioner, this episode will help you rethink your approach to digital supply chain risk and prepare your organization for what's next.Subscribe to Security Matters for expert insights on identity security, cyber resilience and the evolving threat landscape.
In this episode of Acta Non Verba, host Marcus Aurelius Anderson sits down with Sam Alaimo, former Navy SEAL, co-founder of ZeroEyes, writer, and host of the Nobel Podcast. Together, they explore the practical application of philosophy, the power of adversity, the transition from military to civilian life, and the importance of honest introspection. Sam shares his journey from the SEAL teams to entrepreneurship and writing, offering deep insights on leadership, resilience, and living a life of action. Episode Highlights: [8:58] The Power of Adversity and StoicismSam and Marcus discuss how adversity shapes character, the role of stoicism, and the importance of honest self-reflection. [29:32] Transitioning from Military to Civilian LifeSam shares the challenges of leaving the SEAL teams, finding new purpose, and building a meaningful life after service. [1:02:12] Leadership and Building ZeroEyesSam talks about founding ZeroEyes, tackling gun violence, and the importance of frontline leadership and mission-driven work. Guest Bio & Contact Info Sam Alaimo is a former Navy SEAL, co-founder of ZeroEyes—a company dedicated to preventing gun violence through AI-powered security solutions—writer of the "What Then" Substack, and host of the Nobel Podcast. After his military service, Sam transitioned into entrepreneurship and writing, focusing on philosophy, leadership, and resilience. ZeroEyes: com Substack: org Podcast: Nobel Podcast Find Sam: Google "Sam Alaimo What Then" or visit his Substack for more. Learn more about the gift of Adversity and my mission to help my fellow humans create a better world by heading to www.marcusaureliusanderson.com. There you can take action by joining my ANV inner circle to get exclusive content and information.See omnystudio.com/listener for privacy information.
Brian Mendenhall, Worldwide Head, Security & Identity Partner Specialists of Amazon Web Services, reveals the insider framework for transforming enterprise AI security, including the three-pillar approach and partnership strategies that leading companies use to navigate AI governance challenges.Topics Include:At AWS everything starts with security as core principleConsulting partners follow three-phase model: assess, remediate, then fully manage securityTraditional security framework covers threat detection, incident response, and data protectionAI compliance spans multiple governance bodies with stacking requirements and regulationsEU AI Act affects any company globally if Europeans access their applicationsThree pillars: security OF AI, AI FOR security, security FROM AI attacksAWS launches AI security competency program with specialized partner categories and certificationsEnterprise AI spans five risk levels from consumer apps to self-trained modelsLegal liability dramatically increases as you move toward custom AI implementationsSafety means preventing harm; security means preventing breaches - both critical distinctionsCurrent AI hallucination rates hit 65-75% across major platforms like PalantirShared responsibility model determines who's liable when AI security tools failIndustry evolution progresses from machine learning to generative AI to autonomous agentsMajor prototype-to-production gap caused by governance, security, and scalability challengesSuccessful AWS partnerships require clear use cases, differentiation, and targeted go-to-market strategyParticipants:Brian Mendenhall - WW Head, Security & Identity Partner Specialists, Amazon Web ServicesSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon.com/isv/
The race to deploy AI is on, but are the cloud platforms we rely on secure by default? This episode features a practical, in-the-weeds discussion with Kyler Middleton, Principal Developer, Internal AI Solutions, Veradigm and Sai Gunaranjan, Lead Architect, Veradigm as they compare the security realities of building AI applications on the two largest cloud providers.The conversation uncovers critical security gaps you need to be aware of. Sai reveals that Azure AI defaults to sending customer data globally for processing to keep costs low, a major compliance risk that must be manually disabled . Kyler breaks down the challenges with AWS Bedrock, including the lack of resource-level security policies and a consolidated logging system that mixes all AI conversations into one place, making incident response incredibly difficult .This is an essential guide for any cloud security or platform engineer moving into the AI space. Learn about the real-world architectural patterns, the insecure defaults to watch out for, and the new skills required to transition from a Cloud Security Engineer to an AI Security Engineer.Guest Socials - Kyler's Linkedin + Sai's Linkedin Podcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter - Cloud Security BootCampIf you are interested in AI Cybersecurity, you can check out our sister podcast - AI Security PodcastQuestions asked:(00:00) Introduction(02:30) Who are Kyler Middleton & Sai Gunaranjan?(03:40) Common AI Use Cases: Chatbots & Product Integration(05:15) Beyond IAM: The Full Scope of AI Security in the Cloud(07:30) The Role of the Cloud in Deploying Secure AI(13:10) AWS AI Architecture: Bedrock, Knowledge Bases & Vector Databases(15:10) Azure AI Architecture: AI Services, ML Workspaces & Foundry(21:00) The "Delete the Frontend" Problem: The Risk of Agentic AI(23:25) A Security Deep Dive into Microsoft Azure AI Services(29:20) Azure's Insecure Default: Sending Your Data Globally(31:35) A Security Deep Dive into AWS Bedrock(32:30) The Critical Gap: No Resource Policies in AWS Bedrock(33:20) AWS Bedrock's Logging Problem: A Nightmare for Incident Response(36:15) AWS vs. Azure: Which is More Secure for AI Today?(39:20) A Maturity Model for Adopting AI Security in the Cloud(44:15) From Cloud Security to AI Security Engineer: What's the Skill Gap?(48:45) Final Questions: Toddlers, Kickball, Barbecue & Ice Cream
Discover how enterprises can successfully adopt and scale agentic AI to create real business impact in this conversation with Florian Douetteau, CEO and co-founder of Dataiku. Florian shares why democratizing AI across the enterprise is essential, how to prevent agent sprawl, and what it takes to build a governance framework that keeps your data secure while enabling innovation. Learn about Dataiku's enterprise AI blueprint, its partnership with NVIDIA, and how global companies are using agentic workflows to accelerate R&D, optimize operations, and stay competitive. If you're a business leader, CTO, or data professional looking to scale AI safely and effectively, this episode is your playbook for the future of enterprise AI. Stay Updated: Craig Smith on X: https://x.com/craigss Eye on A.I. on X: https://x.com/EyeOn_AI 00:00 Intro 00:31 Florian's Background & Dataiku's Founding 03:00 Enterprise Blueprint for AI with NVIDIA 05:13 Unique Needs of Financial Services 07:09 Building Agents on Dataiku 09:22 Permissioning & Governance 11:17 Agent Lifecycle Management 13:20 State of Agent-to-Agent Systems 15:02 Real-World Use Cases of Agents 16:28 The Most Complex Agents in Production 19:01 Future Vision: Headless Organizations 21:04 Human-Like Qualities of Agents 24:56 The LLM Mesh & Model Abstraction 28:55 Guardrails & Compliance 31:12 No-Code + Code-Friendly Collaboration 36:12 Breaking Silos & Centers of Excellence 41:36 Distribution & Seat Allocation 43:34 Most Common Agents by Industry 47:02 The State of Enterprise AI Adoption
Send us a text00:00 - Intro00:55 - Groq's $750M Funding, $6.9B Valuation02:23 - Figure's $1B+ Robotics Raise, $39B Valuation03:20 - Workday's $1.1B Sana Acquisition for AI Agents04:12 - Irregular's $80M AI Security Boost05:34 - xAI's 64M User Milestone06:27 - OpenAI's New ChatGPT Usage Report07:59 - OpenAI to Cut Microsoft Rev Share08:45 - Starlink Direct-To-Cell Testing Starts in 202610:06 - Google's Gemini Chrome Integration
CIO Classified is back! More CIO secrets. More battle-tested IT wisdom. Straight from leading CIOs across a wide range of industries. In this episode, host Ian Faison and co-host Yousuf Khan dive into the deep end of technology leadership in manufacturing. Ben Davis, Executive Vice President of IT at Cambria, joins the show to talk about his sweeping digital transformation at the quartz manufacturing leader, and shares how his startup past helped him turn IT from a reactive function to a trusted business advisor. Plus much more:How Cambria is leveraging AI in demand forecastingHow to optimize supply chains and improve customer experience How to do it all while managing a legacy infrastructure and cybersecurityThis episode is a must-listen for the modern CIO looking to bridge the gap between traditional industries and modern technologies without sacrificing security or business continuity. About the Guest: Ben Davis, EVP IT, Cambria, is a technical leader who is passionate about introducing new technology, improved processes and unexplored data sets to businesses in a manner that allows them to achieve scalable revenue growth. He does this by helping business-minded technologists use automation, prioritization and critical thinking to deliver technology, process improvement and data in a high-value, cost-effective way. Timestamps:02:30 – From startups to manufacturing: Applying entrepreneurial DNA07:00 – Communicating tech value across the organization09:30 – Why AI in manufacturing is a game-changer15:00 – Cybersecurity training, scorekeeping, and zero-trust realities17:30 – Modernizing legacy infrastructure in manufacturing23:00 – AI adoption vs. business architecture readiness26:00 – Staying close to the customer experience as CIO28:00 – Building, retaining, and empowering high-impact IT teams31:00 – Governance, shadow IT, and the rise of internal agents35:00 – AI tooling, data gaps, and minimizing technical debt38:00 – Manufacturing success, excitement, and the human side of techGuest Highlights:“ I think everybody under spends on cybersecurity. If I had an unlimited budget, I'd put the money towards that. I would also spend the money on data scientists, data modeling, data governance, mass data management to ensure that our data was ready to really take advantage of AI.”Get Connected:Ben Davis on LinkedInYousuf Kahn on LinkedInIan Faison on LinkedInHungry for more tech talk? Check out past episodes at ciopod.com: Ep 60 - Why the Smartest CIOs Are Becoming Business StrategistsEp 59 - CIO Leadership in AI Security and InnovationEp 58 - AI-Driven Workplace TransformationLearn more about Caspian Studios: caspianstudios.com Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Open Tech Talks : Technology worth Talking| Blogging |Lifestyle
In this episode of Open Tech Talks, we delve into the critical topics of AI security, explainability, and the risks associated with agentic AI. As organizations adopt Generative AI and Large Language Models (LLMs), ensuring safety, trust, and responsible usage becomes essential. This conversation covers how runtime protection works as a proxy between users and AI models, why explainability is key to user trust, and how cybersecurity teams are becoming central to AI innovation. Chapters 00:00 Introduction to AI Security and eIceberg 02:45 The Evolution of AI Explainability 05:58 Runtime Protection and AI Safety 07:46 Adoption Patterns in AI Security 10:51 Agentic AI: Risks and Management 13:47 Building Effective Agentic AI Workflows 16:42 Governance and Compliance in AI 19:37 The Role of Cybersecurity in AI Innovation 22:36 Lessons Learned and Future Directions Episode # 166 Today's Guest: Alexander Schlager, Founder and CEO of AIceberg.ai He's founded a next-generation AI cybersecurity company that's revolutionizing how we approach digital defense. With a strong background in enterprise tech and a visionary outlook on the future of AI, Alexander is doing more than just developing tools — he's restoring trust in an era of automation. Website: AIceberg.ai Linkedin: Alexander Schlager What Listeners Will Learn: Why real-time AI security and runtime protection are essential for safe deployments How explainable AI builds trust with users and regulators The unique risks of agentic AI and how to manage them responsibly Why AI safety and governance are becoming strategic priorities for companies How education, awareness, and upskilling help close the AI skills gap Why natural language processing (NLP) is becoming the default interface for enterprise technology Keywords: AI security, generative AI, agentic AI, explainability, runtime protection, cybersecurity, compliance, AI governance, machine learning Resources: AIceberg.ai
The European Union's upcoming Cyber Resilience Act (CRA) goes into effect in October 2026, with the remainder of the requirements going into effect in December 2027, and introduces significant cybersecurity compliance requirements for software vendors, including those who rely heavily on open source components. At the Open Source Summit Europe, Christopher "CRob" Robinson of the Open Source Security Foundation highlighted concerns about how these regulations could impact open source maintainers. Many open source projects begin as personal solutions to shared problems and grow in popularity, often ending up embedded in critical systems across industries like automotive and energy. Despite this widespread use—Robinson noted up to 97% of commercial software contains open source—these projects are frequently maintained by individuals or small teams with limited resources.Developers often have no visibility into how their code is used, yet they're increasingly burdened by legal and compliance demands from downstream users, such as requests for Software Bills of Materials (SBOMs) and conformity assessments. The CRA raises the stakes, with potential penalties in the billions for noncompliance, putting immense pressure on the open source ecosystem. Learn more from The New Stack about Open Source Security:Open Source Propels the Fall of Security by ObscurityThere Is Just One Way To Do Open Source Security: TogetherJoin our community of newsletter subscribers to stay on top of the news and at the top of your game.
We're thrilled to welcome Chris Pupillo (WWT VP of Engineering), Benita Mordi (WWT AI Strategist), and Joel Sprague (Cisco SE) to the Cisco SE Talks podcast. We cut through the noise to discuss customers' biggest questions about AI deployment, from strategy to security. Hear how our Cisco-WWT partnership is tackling the future and addressing our customers' biggest AI pain points head-on!
Ready to rethink everything you thought you knew about distribution?
Send us a textArtificial intelligence is developing at unprecedented speed, becoming a transformative force that may rival nuclear technology in its impact on human civilization. The rapid evolution of AI capabilities presents both extraordinary opportunities and profound challenges that we're only beginning to understand.• AI development is accelerating faster than any previous technology, with research papers becoming outdated within weeks or months• Current AI systems function primarily as prediction engines rather than truly conscious entities, despite sometimes exhibiting behaviors that appear sentient• Companies often implement AI solutions without clearly understanding the problems they're trying to solve or the technology's actual capabilities• AI regulation is developing globally, with the EU currently leading efforts to establish comprehensive frameworks and security standards• Most organizations will benefit more from using AI to augment human capabilities rather than attempting to replace workers entirely• The cybersecurity job market has become increasingly competitive, with automation making application processes more challenging for job seekers• When looking for jobs on LinkedIn, changing the URL parameter from 84,000 to 3,600 helps find postings from the last hour instead of the last 24 hoursConnect with Chris Cochran on LinkedIn to learn more about his work in AI and cybersecurity or to request assistance with making connections in the field.Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast
Adam Bell and Peter NikolaidisThe Blurring The Lines Podcast In this episode, Adam Bell and Peter Nikolaidis dive into everything from chamomile teas and CBD gummies for better sleep, to hydration hacks and non-alcoholic beers. They explore the promise and perils of AI tools like Gemini and ChatGPT—covering real-world use cases, security risks, and even […]
The managed services provider (MSP) market is experiencing a paradoxical trend where revenue is increasing while the number of providers is decreasing. According to Canalys data, global managed services revenue surpassed half a trillion dollars in 2024, reflecting a year-over-year growth of 9.7%. However, the number of channel partners has slightly declined by 0.6%, with large MSPs rapidly acquiring smaller ones. This consolidation trend has led to a significant shift in the market dynamics, where smaller MSPs struggle to compete against larger firms that possess superior resources and pricing power.To survive in this competitive landscape, smaller MSPs must adopt focused strategies, targeting specific customer segments or industries. By doing so, they can achieve higher profit margins, with specialized MSPs reporting EBITDA percentages between 15% to 30%, compared to just 7% for those lacking focus. The article emphasizes that smaller MSPs have several options: they can sell to larger firms, acquire smaller peers, focus on niche markets, or leverage partnerships to remain competitive. The reality is that the middle tier of MSPs is rapidly disappearing, and those who attempt to serve everyone may find themselves at a disadvantage.In addition to the MSP market dynamics, the podcast discusses recent legislative developments, including Michigan's new laws addressing deepfakes, which make it illegal to create AI-generated sexual imagery without consent. This reflects a growing trend across the U.S. to combat nonconsensual abuse imagery, with most states now having similar laws. Furthermore, the U.S. Treasury has imposed sanctions on individuals and entities linked to North Korea's illicit IT worker schemes, highlighting the security risks posed by fraudulent practices in the tech industry.The episode also covers the latest advancements in AI-powered security solutions from various vendors, including Thrive, Addigy, Arctic Wolf, and Acronis. These companies are rolling out new services and products designed to enhance security operations and protect data. The overarching theme is that as technology evolves, the risks associated with it are also increasing, and IT service providers must adapt to these changes by offering value-added services that help clients navigate the complexities of compliance and security in a rapidly changing environment. Four things to know today 00:00 MSP Market Expands to $500B as Provider Count Shrinks Amid Rapid Consolidation04:10 From Abuse Imagery to Supply Chain Threats, Regulation Struggles to Keep Up With Emerging Risks07:45 AI Everywhere: Thrive, Security Vendors, OpenAI, and Microsoft Redefine Service Provider Playbook12:39 D&H and Nutanix Growth Signals Services-Led Future as Distributors and Vendors Push Into MSP Territory This is the Business of Tech. Supported by: https://scalepad.com/dave/ https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
Cybersecurity Today: Navigating AI Advancements and Future Trends In this episode of 'Cybersecurity Today,' host Jim Love and panelists Tammy Harper, Laura Payne, and David Shipley discuss recent developments in cybersecurity, shifting focus to AI's impact on the industry. They explore emerging threats such as AI-generated ransomware and the efficiency of exploiting vulnerabilities using AI. The conversation emphasizes the need for improved policy and regulation, the role of MFA in safeguarding systems, and the implications of youth unemployment due to AI disruption. Predictions for the coming year include the necessity for better legislation, ethical considerations in AI deployment, and the continued importance of maintaining fundamental cybersecurity measures amidst rapid technological advances. 00:00 Introduction and Overview 00:36 Meet the Panelists 02:32 New Cybersecurity Awareness Platform 05:07 Biometric Guidance and Privacy 13:04 AI-Driven Exploits and Security Challenges 22:21 Hack Back Legislation Debate 30:21 MFA Implementation and Insurance Implications 36:30 Understanding the Role of Underwriting in Insurance 36:58 The Importance of Cybersecurity in Insurance 37:43 Scenarios and Broker Consultations 38:57 The Scattered Spiders and Cybersecurity Threats 43:07 Youth Unemployment and Cybersecurity 44:43 The Rise of Social Engineering 47:47 AI and Its Implications 49:28 The Future of AI and Cybersecurity 50:45 Challenges and Solutions in AI Security 51:09 Final Thoughts and Recommendations
Send us a textIn this action-packed episode, Joey Pinz sits down with cybersecurity veteran and ex-MSP operator Chris Loehr. From his early days as a two-footed soccer midfielder to leading Solis Security through complex ransomware response cases, Chris shares insights forged in both cleats and crisis. ⚽
Kelley Skar transformed his career, balanced family life, and embraced AI innovation. In this episode of The REI Agent, Mattias Clymer uncovers powerful lessons on resilience, leadership, and building legacy while showing how courage and balance fuel true success.See full article: https://www.unitedstatesrealestateinvestor.com/building-strength-family-and-future-through-real-estate-with-kelley-skar/(00:00) - Introduction to The REI Agent Podcast(00:06) - Meet Mattias: Agent and Investor(00:08) - Meet Erica: Licensed Therapist(00:14) - The Mission: Living Bold and Fulfilled Lives Through Real Estate(00:18) - Ready to Level Up? Let's Do It(00:24) - Mattias Shares a Rough Morning and Mindset Shift(01:40) - David Goggins, Willpower, and Strengthening the Brain(03:55) - Cold Plunge, Longevity, and Building Self-Control(05:40) - Introduction of Guest Kelley Skar(06:35) - Kelley Joins the Conversation(06:42) - Lion King References and Early Life(07:16) - From Welding to Real Estate: Kelley's Career Shift(09:47) - Juggling Twins, Family, and Career Beginnings(11:58) - Father's Real Estate Influence and the Gift of Gab(14:00) - Advice for New Agents: Burn the Boats or Play It Safe?(16:59) - Mattias Shares His Early Real Estate Hustle Phase(18:13) - Rookie of the Year: Kelley's First Deals and Open Houses(23:48) - Building a Team and First Coaching Lessons(25:52) - The Right Focus: Systems and People Over Money(27:20) - Exiting Brokerages, Coaching, and Building Community(28:34) - Balancing Family Life with Real Estate(32:10) - Communication as the Key to Family and Work Balance(34:07) - Modeling Healthy Habits for Children(37:44) - Teaching Kids Business and Life Lessons Through Real Estate(40:00) - Golden Nugget: AI as a Game Changer for Agents(43:55) - AI Replacing Roles and Opportunities for Growth(45:23) - AI Security, Risks, and the Unknown Future(46:50) - AI-Generated Art, Music, and Personal Experiences(47:52) - Why AI is Not Just Another Disruption(48:34) - Book Recommendations and 10x Thinking(50:33) - Where to Find Kelley Online(50:54) - Closing Thanks and Reflections(51:05) - Outro and DisclaimersContact Kelley Skarhttps://www.kelleyskar.ca/https://www.facebook.com/kelleyskarspeakertrainercoach/https://www.instagram.com/kelleyskar/https://www.linkedin.com/in/kelleyskar/For more revolutionary content to help you increase your holistic balance of life and success, visit https://reiagent.com
At Black Hat 2025, Sean Martin sits down with Ofir Stein, CTO and Co-Founder of Apono, to discuss the pressing challenges of identity and access management in today's hybrid, AI-driven environments. Stein's background in technology infrastructure and DevOps, paired with his co-founder's deep cybersecurity expertise, positions the company to address one of the most common yet critical problems in enterprise security: how to secure permissions without slowing the pace of business.Organizations often face a tug-of-war between security teams seeking to minimize risk and engineering or business units pushing for rapid access to systems. Stein explains that traditional approaches to access control — where permissions are either always on or granted through manual processes — create friction and risk. Over-provisioned accounts become prime targets for attackers, while delayed access slows innovation.Apono addresses this through a Zero Standing Privilege approach, where no user — human or non-human — retains permanent permissions. Instead, access is dynamically granted based on business context and automatically revoked when no longer needed. This ensures engineers and systems get the right access at the right time, without exposing unnecessary attack surfaces.The platform integrates seamlessly with existing identity providers, governance systems, and IT workflows, allowing organizations to centralize visibility and control without replacing existing tools. Dynamic, context-based policies replace static rules, enabling access that adapts to changing conditions, including the unpredictable needs of AI agents and automated workflows.Stein also highlights continuous discovery and anomaly detection capabilities, enabling organizations to see and act on changes in privilege usage in real time. By coupling visibility with automated policy enforcement, organizations can not only identify over-privileged accounts but also remediate them immediately — avoiding the cycle of one-off audits followed by privilege creep.The result is a solution that scales with modern enterprise needs, reduces risk, and empowers both security teams and end users. As Stein notes, giving engineers control over their own access — including the ability to revoke it — fosters a culture of shared responsibility for security, rather than one of gatekeeping.Learn more about Apono: https://itspm.ag/apono-1034Note: This story contains promotional content. Learn more.Guest:Ofir Stein, CTO and Co-Founder of Apono | On LinkedIn: https://www.linkedin.com/in/ofir-stein/ResourcesLearn more and catch more stories from Apono: https://www.itspmagazine.com/directory/aponoLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: sean martin, ofir stein, apono, zero standing privilege, access management, identity security, privilege creep, just in time access, ai security, governance, cloud security, black hat, black hat usa 2025, cybersecurity, permissions
Carlos Moreira da Silva brings a rare blend of insight: a deep B2B operator, a specialist investor at 33N, and a leading force behind Europe's cybersecurity coordination efforts through ECSO. Together, we explore why cybersecurity is Europe's opportunity to lead, not follow, in the new geopolitical tech stack.Here's what's covered:01:15 What is ECSO and Why It Matters for European Cyber03:30 Mapping the Cybersecurity Investment Gap: US vs Israel vs Europe05:20 The Tech Stack Power Shift: From Cloud to AI, and Why Security Must Catch Up07:30 Europe's Fragmentation Problem—Or Its Untapped Advantage?09:45 The Role of ECSO in Building a Unified European Cyber Strategy11:45 Why Europe Needs Specialist Cybersecurity VCs15:30 What Other Movements Can Learn from the ECSO Playbook20:00 Cybercrime vs Cyber Spending: The 10 Trillion Dollar Wake-Up Call21:30 Building Global Champions in Cyber (Not Just Regional Winners)25:00 What Startups Should Look for in a Cyber VC (Beyond the Check)26:30 Invest for Cyber @ SuperVenture: Why the LP Community Should Pay Attention28:00 Where Cyber Ends and Defense Begins—Drawing Ethical Boundaries at 33N
Bob Knakal is a legendary figure in New York commercial real estate, known for his data-driven territory model, massive deal volume, and unapologetically old-school work ethic. As the founder of Massey Knakal Realty Services (sold for $100M) and now Chairman at BKREA, Bob has shaped both the skyline of NYC and the next generation of real estate professionals.In this episode, Bob shares how 40 years of fieldwork, 22 boxes of newsletters, and a pandemic walking tour of Manhattan became the foundation of his modern marketing machine. He talks about launching The Bob Knakal Show, staying true to core values while adapting to AI, and how being “out there” isn't about ego—it's about client outcomes.You'll hear Bob's brutally honest take on what it takes to succeed in sales, why cold calling still matters, the power of content in real estate, and how office-to-residential conversions are reshaping the NYC market. This conversation is packed with timeless lessons on resilience, relevance, and why liking what you do still beats any business plan.Main Topics:How Bob turned mistakes and cold calls into a $100M business saleWhy content creation is the modern version of “pounding the pavement”The ROI of podcasting, newsletters, and putting yourself out thereA deep dive on NYC's office-to-residential conversion wave and 467M tax programWhat young professionals really need to learn (hint: not just Excel)Why Bob started his own show—and why your legacy mattersLessons in grit, luck, leadership, and working through adversityChapters With Timestamps:[00:00:00] Introduction and Early Career Insights[00:00:43] Bob Knakal's Life-Changing Advice[00:01:41] Writing the Book: Selling Buildings[00:05:17] Reading, Learning, and Staying Sharp[00:08:44] Is College Still Worth It?[00:15:22] Market Presence and Content Creation[00:19:46] Adapting to Change: Tech and Tactics[00:25:30] The Relentless Work Ethic[00:26:58] Finding Passion in Work[00:27:36] Resilience Through Adversity[00:30:43] Commercial Real Estate Market Changes[00:34:26] Office to Residential Conversions[00:39:35] Commitment to New York City[00:42:46] The Map Room Success[00:46:58] Launching The Bob Knakal Show[00:50:24] Inspiring the Next Gen[00:54:04] Wrap Up & Final WordsBob KnakalWebsiteYouTubeLinkedInRelated Episodes:David Selinger on AI Security, $15M Series B, and the Deep Sentinel Mission | EP192Tastytrade: How a Trading & Media Empire Was Built by Giving Everything Away | Scott Sheridan CEO — EP189How AI Is Changing College Counseling and Admissions with Senan Khawaja, CEO of Kollegio | EP190Entrepreneur Perspectives is produced by QuietLoud Studios — a modern media network and a KazSource brand.Get in touch with Eric Kasimov:XLinkedInCredits:Music by Jess & Ricky: SoundCloud
Shay Levi (@shaylevi2, CEO @UnframeAI) & Larissa Schneider (COO @UnframeAI) discuss the complexities of building an enterprise-grade AI platform. Topics include what an AI platform is, the advantages of adoption, and the efficiencies gained.SHOW: 948SHOW TRANSCRIPT: The Cloudcast #948 TranscriptSHOW VIDEO: https://youtube.com/@TheCloudcastNET CLOUD NEWS OF THE WEEK: http://bit.ly/cloudcast-cnotwNEW TO CLOUD? CHECK OUT OUR OTHER PODCAST: "CLOUDCAST BASICS"SPONSORS:[VASION] Vasion Print eliminates the need for print servers by enabling secure, cloud-based printing from any device, anywhere. Get a custom demo to see the difference for yourself.[DoIT] Visit doit.com (that's d-o-i-t.com) to unlock intent-aware FinOps at scale with DoiT Cloud Intelligence.SHOW NOTES:Unframe websiteTopic 1 - Shay & Larissa, welcome to the show! Give everyone a brief introduction and a little about your background. Topic 2 - Today, we're discussing AI Security and Enterprise Platforms. What are the problems or issues you see with AI development today?Topic 3 - Is this where an AI platform comes into play? I'm seeing more and more about this term and wondering what it truly means to be a platform. What is your definition of a platform, and what are the advantages?Topic 4 - Shay, considering your background in APIs and API security, how does that knowledge transfer into this space?Topic 5 - Larissa, with your background in operations, where do you see the inefficiencies in AI development and lifecycle management of the AI models and the datasets?Topic 6 - Let's talk about Unframe. Give everyone an overview. Is this a SaaS service? How and where does it fit into your typical AI development stack?FEEDBACK?Email: show at the cloudcast dot netBluesky: @cloudcastpod.bsky.socialTwitter/X: @cloudcastpodInstagram: @cloudcastpodTikTok: @cloudcastpod
On todays show AI models, quantum computing, mental health, smartphones, cryptocurrency, Tesla, regenerative braking, oil reserves, wind energy, military applications, open source, electric vehicles, hologram technology, parenting, cybersecurity., Energy transition, nuclear power, fusion, hydrocarbons, solar energy, wind energy, material science, AI, tariffs, manufacturing, redistricting, RNA vaccines, youth violence, Trump, China. Have Fun
David Selinger (aka “Selly”) is the founder and CEO of Deep Sentinel, a security company blending AI with live human monitoring to stop crime in real time. From Amazon to Redfin to AI security, Dave Selinger has built a real-time protection system now scaling fast with $15M in Series B funding from top investors.In this episode, Selly breaks down how Deep Sentinel works—from crime prediction models and real-time police calls to training AI to spot danger before it happens. He explains how the company went from idea to reality, how it stacks up against traditional alarms, and why his military mentors shaped his leadership style.This isn't just about cameras. It's about making AI useful, delivering outcomes that matter, and building a team with zero tolerance for compromise. You'll also hear Selly's thoughts on parenting, college, career detours, and how early obsessions with tech led him from Stanford to Jeff Bezos's office to the front lines of crime prevention.Main Topics• How Deep Sentinel stops crime before it happens using AI and live guards• Why traditional alarm systems fail — and what real security should look like• Lessons from military mentors on leadership, discipline, and zero compromise• The challenge of scaling real-time protection for homes and businesses• How Selly's early work at Amazon (with Jeff Bezos) and Redfin shaped his tech mindset• Raising kids with curiosity, independence, and meaningful support• Why the future of security depends on speed, customization, and trustChapters with Timestamps:[00:00:00] Introduction and Initial Scenario[00:00:42] Podcasting and Audience Engagement[00:02:06] AI and Podcasting Insights[00:03:17] Real-Life Security Challenges[00:03:58] Deep Sentinel's Unique Approach[00:04:49] Customer Experiences and Success Stories[00:11:34] Public-Private Partnerships in Security[00:15:52] Advanced Security Solutions and AI Integration[00:27:45] Exploring Security Challenges and Solutions[00:29:27] Military Influence and No Compromise Mentality[00:33:35] Childhood Passions and Career Pathways[00:36:02] Parental Support and Personal Growth[00:41:43] College Education and Career Advice[00:48:14] Amazon Experience and Innovations[00:54:23] Founding Redfin and Its Impact[00:56:29] Deep Sentinel's Growth and FutureDeep SentinelWebsiteLinkedInYouTubeSeries B FundingRelated Episodes:Ankit Somani | From Google to Conifer: Rare-Earth-Free Motors, $20M Seed, and Rethinking CollegeHow AI Is Changing College Counseling and Admissions with Senan Khawaja, CEO of KollegioAI Content Detection & Digital Ethics with Madeleine LambertEntrepreneur Perspectives is produced by QuietLoud Studios — a modern media network and a KazSource brand.Get in touch with Eric Kasimov:XLinkedInCredits:Music by Jess & Ricky: SoundCloud
Three Buddy Problem - Episode 57: Brandon Dixon (PassiveTotal/RiskIQ, Microsoft) leads a deep-dive into the collision of AI and cybersecurity. We tackle Google's “Big Sleep” project, XBOW's HackerOne automation hype, the long-running tension between big tech ownership of critical security tools and the community's need for open access. Plus, the future of SOC automation to AI-assisted pen testing, how agentic AI could transform the cyber talent bottlenecks and operational inefficiencies, geopolitical debates over backdoors in GPUs and the strategic implications of China's AI model development. Cast: Brandon Dixon (https://www.linkedin.com/in/brandonsdixon/), Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), and Ryan Naraine (https://twitter.com/ryanaraine).
Is your company's AI strategy opening you up to massive security risks? In this powerful conversation, Claudionor Coelho, Chief AI Officer at Zscaler, reveals the hidden dangers of agentic AI—and how Fortune 500 companies are unintentionally exposing sensitive data through generative AI tools.Claudionor shares real-world examples of AI vulnerabilities, how attackers can exploit agent systems to extract private data, and why AI security must be treated with the same urgency as data security. From salary leaks to corporate data breaches, this discussion is a wake-up call for executives, CISOs, and AI teams alike.
Artificial intelligence agents are significantly transforming the landscape of software-as-a-service (SaaS) pricing, moving away from traditional per-seat licenses towards usage and outcome-based models. Gartner predicts that by 2030, 40% of enterprise spending on software will shift to these new pricing structures, prompting businesses to reassess how they perceive value in digital operations. As AI features become more prevalent in enterprise software, organizations must navigate potential risks such as data silos and vendor lock-in, emphasizing the need for transparent pricing and governance strategies.The podcast discusses the growing concerns surrounding AI's impact on the workforce, with a survey revealing that 61% of white-collar workers fear job displacement within three years. Despite these fears, many workers report that AI has enhanced their creativity and productivity, suggesting that AI should be viewed as a tool for augmentation rather than replacement. This perspective can facilitate smoother adoption of AI technologies, positioning service providers as trusted change managers.In the realm of security, Microsoft faces scrutiny over a critical vulnerability in its new NLWeb protocol, which could allow unauthorized access to sensitive files. Meanwhile, Cloudflare has accused the AI startup Perplexity of violating no-crawl directives by stealthily scraping content from websites, raising concerns about unauthorized data access. Additionally, Anthropic's research highlights how AI personalities can be influenced by training data, underscoring the importance of data governance in AI development.The episode also touches on Delta Airlines' clarification regarding its AI-assisted dynamic pricing model, which aims to use aggregated data rather than individual customer information. In the fashion industry, the use of AI-generated models has sparked debate over authenticity and representation, as brands seek cost-effective solutions for content creation. Overall, the discussion emphasizes the need for service providers to balance AI's cost-saving potential with the importance of maintaining trust and authenticity in consumer-facing applications.Four things to know today 00:00 AI Agents Drive SaaS Pricing Shift, Raise Vendor Lock-In Concerns, and Reshape Worker Attitudes04:45 OpenAI Releases First Open-Weight Models in Six Years as AI Security and Ethics Face Fresh Challenges09:50 Delta Defends AI Pricing as Non-Personalized, While Fashion Faces Backlash Over AI-Generated Models12:47 Microsoft Ends Windows 11 SE, Debuts Edge AI Copilot, as SentinelOne Expands into Generative AI Security Supported by: https://scalepad.com/dave/https://getflexpoint.com/msp-radio/ Tell us about a newsletter! https://bit.ly/biztechnewsletter/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
Co-hosts Mark Thompson and Steve Little explore OpenAI's groundbreaking ChatGPT Agent, demonstrating how this autonomous tool can research, analyze, and perform complex tasks on your behalf.Next, they address important security concerns to consider in the new world of AI agents, introducing practical guidelines for protecting sensitive family data and avoiding prompt injection attacks.This week's Tip of the Week provides a back-to-basics guide on what AI is and its four core strengths: summarization, extraction, generation, and translation.In RapidFire, they discuss OpenAI's rumored office suite, Microsoft and Google's own efforts to integrate AI into their office suites, and recently announced AI infrastructure investments, including; Meta's Manhattan-sized data center and President Trump's new AI Action Plan.The hosts also announce their new Family History AI Show Academy, a five-week course beginning in October of 2025. See https://tixoom.app/fhaishow/ for more details.Timestamps:In the News:05:20 ChatGPT Agent: Autonomous Research Assistant for Genealogists22:49 Safe and Secure in the Age of AITip of the Week:36:20 What is AI and What is it Good For? Back to BasicsRapidFire:50:57 OpenAI's Office Suite Rumors53:56 Microsoft and Google Bring AI to Their Office Suites60:17 Big AI Infrastructure: Manhattan-Sized Data CentersResource Links:Introduction to Family History AIhttps://tixoom.app/fhaishow/Do agents work in the browser?https://www.bensbites.com/p/do-agents-work-in-the-browserIntroducing ChatGPT agent: bridging research and actionhttps://openai.com/index/introducing-chatgpt-agent/OpenAI's new ChatGPT Agent can control an entire computer and do tasks for youhttps://www.theverge.com/ai-artificial-intelligence/709158/openai-new-release-chatgpt-agent-operator-deep-researchOpenAI's New ChatGPT Agent Tries to Do It Allhttps://www.wired.com/story/openai-chatgpt-agent-launch/Agent demo posthttps://x.com/rowancheung/status/1945896543263080736OpenAI Quietly Designed a Rival to Google Workspace, Microsoft Officehttps://www.theinformation.com/articles/openai-quietly-designed-rival-google-workspace-microsoft-officeOpenAI Is Quietly Creating Tools to Take on Microsoft Office and Google Workspacehttps://www.theglobeandmail.com/investing/markets/stocks/MSFT/pressreleases/33074368/openai-is-quietly-creating-tools-to-take-on-microsoft-office-and-google-workspace-googl/What's new in Microsoft 365 Copilot?https://techcommunity.microsoft.com/blog/microsoft365copilotblog/what%E2%80%99s-new-in-microsoft-365-copilot--june-2025/4427592Google Workspace enables the future of AI-powered work for every businesshttps://workspace.google.com/blog/product-announcements/empowering-businesses-with-AIGoogle Workspace Review: Will it Serve My Needs?https://www.emailtooltester.com/en/blog/google-workspace-review/Tags:Artificial Intelligence, Genealogy, Family History, AI Agents, ChatGPT Agent, OpenAI, Computer Use, AI Security, Prompt Injection, Database Analysis, RootsMagic, Cemetery Records, AI Office Suite, Microsoft 365 Copilot, Google Workspace, Data Centers, AI Infrastructure, Natural Language Processing, Large Language Models, Context Windows, AI Education, Family History AI Show Academy, AI Reasoning Models, Autonomous Research, AI Ethics
Episode 245 : Intro: Welcome to the next episode of Pi Perspectives. Today Matt welcomes David DeJesus of Argus365. David and his team offer an interesting security solution built around Artificial Intelligence. The guys discuss the synergy between private investigations and security consulting. Stick around to the end and learn how you can participate as a qualified partner with this technology. Please welcome David DeJesus and your host, NY Private Investigator, Matt Spaier Links: Matt's email: MatthewS@Satellitepi.com Linkedin: Matthew Spaier www.investigators-toolbox.com David on Linkedin: David Dejesus Email: David@Argus365.com https://www.argus365.com/ PI-Perspectives Youtube link: https://www.youtube.com/channel/UCYB3MaUg8k5w3k7UuvT6s0g Sponsors: https://piinstitute.com/ https://www.skopenow.com https://researchfpr.com/ https://www.trackops.com FBI Tip Line https://tips.fbi.gov/home https://www.fbi.gov/contact-us/field-offices/newyork/about - (212) 384-1000 WAD info https://wad100conf.net/
Kent C. Dodds is back with bold ideas and a game-changing vision for the future of AI and web development. In this episode, we dive into the Model Context Protocol (MCP), the power behind Epic AI Pro, and how developers can start building Jarvis-like assistants today. From replacing websites with MCP servers to reimagining voice interfaces and AI security, Kent lays out the roadmap for what's next, and why it matters right now. Don't miss this fast-paced conversation about the tools and tech reshaping everything. Links Website: https://kentcdodds.com X: https://x.com/kentcdodds Github: https://github.com/kentcdodds YouTube: https://www.youtube.com/c/kentcdodds-vids Twitch: https://www.twitch.tv/kentcdodds LinkedIn: https://www.linkedin.com/in/kentcdodds Resources Please make Jarvis (so I don't have to): https://www.epicai.pro/please-make-jarvis AI Engineering Posts by Kent C. Dodds: https://www.epicai.pro/posts We want to hear from you! How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend? Let us know by sending an email to our producer, Em, at emily.kochanek@logrocket.com (mailto:emily.kochanek@logrocket.com), or tweet at us at PodRocketPod (https://twitter.com/PodRocketpod). Follow us. Get free stickers. Follow us on Apple Podcasts, fill out this form (https://podrocket.logrocket.com/get-podrocket-stickers), and we'll send you free PodRocket stickers! What does LogRocket do? LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. Try LogRocket for free today. (https://logrocket.com/signup/?pdr) Special Guest: Kent C. Dodds.
Vrajesh is co-founder and CEO at Operant AI. Operant AI is a holistic AI security platform, helping organizations discover, detect, and defend AI deployments. Operant raised a $10 million dollar Series A last fall from Felicis and SineWave, and the company continues to expand its offerings within AI security. Before Operant, Vrajesh worked at Apple, Qualcomm, Arm, and Scaled Inference, rounding out an exceptionally technical background with several quality technology companies. In the episode we discuss his career transition from extremely technical, kernel-level engineering to management, how he thinks about timing a market, and how the vision for Operant's product was cemented from day one rather than bolted together over time.Website
Ahead of Black Hat USA 2025, Sean Martin and Marco Ciappelli sit down once again with Rupesh Chokshi, Senior Vice President and General Manager of the Application Security Group at Akamai, for a forward-looking conversation on the state of AI security. From new threat trends to enterprise missteps, Rupesh lays out three focal points for this year's security conversation: protecting generative AI at runtime, addressing the surge in AI scraper bots, and defending the APIs that serve as the foundation for AI systems.Rupesh shares that Akamai is now detecting over 150 billion AI scraping attempts—a staggering signal of the scale and sophistication of machine-to-machine activity. These scraper bots are not only siphoning off data but also undermining digital business models by bypassing monetization channels, especially in publishing, media, and content-driven sectors.While AI introduces productivity gains and operational efficiency, it also introduces new and uncharted risks. Agentic AI, where autonomous systems operate on behalf of users or other systems, is pushing cybersecurity teams to rethink their strategies. Traditional firewalls aren't enough—because these threats don't behave like yesterday's attacks. Prompt injection, toxic output, and AI-generated hallucinations are some of the issues now surfacing in enterprise environments, with over 70% of organizations already experiencing AI-related incidents.This brings the focus to the runtime. Akamai's newly launched Firewall for AI is purpose-built to detect and mitigate risks in generative AI and LLM applications—without disrupting performance. Designed to flag issues like toxic output, remote code execution, or compliance violations, it operates with real-time visibility across inputs and outputs. It's not just about defense—it's about building trust as AI moves deeper into decision-making and workflow automation.CISOs, says Rupesh, need to shift from high-level discussions to deep, tactical understanding of where and how their organizations are deploying AI. This means not only securing AI but also working hand-in-hand with the business to establish governance, drive discovery, and embed security into the fabric of innovation.Learn more about Akamai: https://itspm.ag/akamailbwcNote: This story contains promotional content. Learn more.Guests:Rupesh Chokshi, SVP & General Manager, Application Security, Akamai | https://www.linkedin.com/in/rupeshchokshi/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Curl is a widely used open source tool and library for transferring data. On today’s Day Two DevOps we talk with curl creator Daniel Stenberg. Daniel gives us a brief history of curl and where it’s used (practically everywhere). We also discuss the impact of AI on curl. Open source projects are often starved for... Read more »
Send us a textIn this thoughtful and grounded episode of Joey Pinz Discipline Conversations, Joey sits down with Ken Tripp of Netwrix to discuss the evolving challenges MSPs face — and how true partner-led collaboration can help solve them. Recorded live at Pax8 Beyond 2025, this conversation weaves cybersecurity, personal transformation, and the need for industry-wide unity.Ken explains how Netwrix helps MSPs secure and profit from Microsoft, especially in relation to Copilot rollouts, compliance obligations, and scaling client environments without adding technical overhead. He discusses the shared responsibility model and how Netwrix streamlines identity, permissions, and data classification through AI — reducing labor costs and delivering predictable value to MSPs managing dozens or hundreds of tenants.The conversation also turns personal: Ken shares his 120-pound weight loss journey following a major health scare and how discipline and routine helped him reshape his life. That same clarity, he says, is needed in the MSP space — not just from vendors, but through shared change and joint accountability across the ecosystem.