American technology company
POPULARITY
What if the real AI race in 2026 isn't about building bigger models, but about where decisions are made, how fast they happen, and whether they deliver measurable value? In this episode, I'm joined by John Bradshaw, Director of Cloud Computing Technology and Strategy at Akamai, to unpack his predictions for the next phase of cloud, AI inference, and the economics that will shape enterprise technology over the next 12 months. As organizations move beyond experimentation, John explains why the boardroom conversation has shifted from capability to return on investment, and how spiraling compute demands are forcing leaders to rethink the balance between performance, cost, and innovation. We explore why this new financial scrutiny is not slowing AI adoption, but refining it. John shares how inefficient GPU workflows, centralized inference, and poorly aligned architectures are being challenged by a more disciplined approach that pushes intelligence closer to the edge. This shift is not only about latency and performance. It is about building scalable, value-driven platforms that can support real-time decision-making, agentic workloads, and global user experiences without breaking traditional IT budgets. Trust is another major theme throughout our conversation. From the rise of everyday AI agents that quietly handle routine tasks to the growing importance of secure, resilient inference pipelines, John outlines how low-latency edge infrastructure, local processing, and hybrid cloud models will redefine reliability for both enterprises and consumers. We also discuss the smart home backlash following recent outages, and why the next generation of connected products will be designed to work even when the network does not. The episode also looks at the future of streaming, where consolidation, intelligent content delivery, and AI-driven personalization are reshaping both the user experience and the economics behind the platforms. Behind the scenes, orchestration is emerging as a defining capability, with multiple models and services working together to validate outputs, reduce hallucinations, and create more dependable AI systems. This is a conversation about moving from possibility to production, from experimentation to accountability, and from centralized architectures to distributed intelligence. So as AI becomes embedded in every workflow and every customer interaction, will the winners be the companies with the biggest models, or the ones that know exactly where their AI should live, how it should be orchestrated, and how it proves its value every single day?
Please enjoy this encore of Career Notes. Larry Cashdollar, Principal Security Intelligence Response Engineer at Akamai Technologies, sits down with Dave Bittner to discuss his life leading up to working at Akamai. He shares his story from his beginnings to now, describing what college life was like as a young computer enthusiast. He says "If you look at my 1986 yearbook, I think it was my sixth grade class, it says computer scientist for my career path. So I had a love of computers when I was really young. I guess I knew what field I wanted to get into right off the bat." He describes different career paths that all led him to his current position. He also shares his love for computers and technology through the decades of his youth, and how he is learning, even now. We thank Larry for sharing his story. Learn more about your ad choices. Visit megaphone.fm/adchoices
This week, we discuss the latest Olympics viewership numbers on Peacock and debate whether Peacock's offer to give me a 72% discount on the service for six months to keep me as a subscriber is beneficial to the company's long-term viability. We cover the latest Apple TV news, including MLS, which kicked off the season this week, and Apple's launch of its new dedicated Formula 1 channel in the Apple TV app and the news that IMAX will show five major Formula 1 Grands Prix in their theatres. We also detail the new ultra-low-latency technology behind Comcast's 30 Mbps upscaled 4K Super Bowl Stream, called RealTime4K, the workflow, and which devices are supported. Finally, on the infrastructure side, we cover the latest numbers from Akamai's Q4 and full-year 2025 earnings, as well as the news that it will no longer break out delivery revenue going forward. In addition, we detail the numbers from CDN Netskrt, which has broken out its network capacity, capital-to-revenue ratio, and what makes its underlying costs unique.Podcast produced by Security Halt Media
Rick Ducat dials up the chart of Akamai (AKAM) as investors await the tech company's upcoming earnings print. Rick shows what technical patterns have led to the stock's meteoric rise over the last several weeks even amidst the recent selling pressures hitting the software stock group. Later, Rick composes an example options trade using a short put vertical strategy. He explains the bullish nature of the trade and ways to manage it following Akamai's earnings event. ======== Schwab Network ========Empowering every investor and trader, every market day.Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – / schwabnetwork Follow us on Facebook – / schwabnetwork Follow us on LinkedIn - / schwab-network About Schwab Network - https://schwabnetwork.com/about
In this episode of Partnerships Unraveled, we sit down with Dave Allen, Vice President of Geo Sales and Partner Sales at Akamai, to explore the strategy and innovation behind Akamai's newly revamped Partner Connect Program. With decades of channel experience, Dave shares the methodology behind designing a partner program from the ground up one that reflects today's evolving channel landscape and Akamai's partner-first mindset across security, compute, and edge infrastructure.Channel leaders tuning in will gain tactical insights on how Akamai is leveraging incentivized behaviors to drive new customer acquisition, expanding partner tiering to better reflect regional performance, and embracing distribution as a key scale lever. We also dive into how the company has embedded partner value into field compensation models and enablement structures—proving Akamai's shift from a direct-first legacy to a truly partner-centric approach.Whether you're rethinking your own partner tiers, struggling with program scalability, or seeking fresh ideas around high-growth services like microsegmentation, this episode delivers actionable frameworks and strategic clarity. Don't miss this look inside one of the most partner-focused evolutions in B2B tech._________________________Learn more about Channext
Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Cybersecurity is a rapidly evolving field, where every effective defense technique is quickly noticed and adapted to by malicious actors. The real question is how fast each side of this ongoing cat-and-mouse game can respond. Let us take an example of web applications. In the decade-long slog of the cloud, federal users migrated to web-based applications protected by Web Application Firewalls (WAFs). firewalls. As that method matured, malicious observers noted that the Application Programming Interface (API) allowed these software programs to communicate and exchange data. Voila, another attack vector was born. During today's interview, Joe Henry from Akamai Technologies notes that 80% of their customers report API attacks. Henry details a curious term called "Broken-Object Level Authorization." In this attack, an application fails to check if a user is authorized to access specific data objects. The ID is manipulated, and the malicious actor gets access. Akamai's API Security performs behavioral analysis beyond WAFs, flags PII exposure, and supports a zero-trust posture. Software developers talk about a "shift left"; we apply that to the Akamai approach. They have a worldwide network of Points of Presence (POPs) and data centers where they can observe attacks as they develop. It is so strong that it provides fail-open resilience with a 100% SLA. Akamai provides a State of the Internet Report (quarterly). If you would like to stay connected with the next manifestation of attack, consider subscribing or visiting their website to stay informed about the latest trend
Buzzwords don't make your content smarter—they make it forgettable. In this episode of Content Amplified, Abby Ross explains why vague, overused language quietly erodes trust, weakens differentiation, and confuses the very people you're trying to reach.Drawing from a career that spans journalism, PR, cybersecurity, and SaaS marketing, Abby shares a clear, practical approach to writing content that actually says something. No fluff. No hiding. Just words that mean what they say.What you'll learn in this episode:Why buzzwords signal uncertainty instead of expertiseHow vague language hurts credibility with buyers and journalistsA simple test to spot buzzwords before they shipHow to replace “fancy” words with specific, valuable languageWays to push back—politely—when executives insist on jargonHow AI can amplify bad writing if you don't guide it carefullyGuest Bio: Abby RossAbby Ross is a corporate communications leader with a deeply unconventional path. She began her career as a television news reporter, then moved into political communications as a communications director for a New York State Senator. From there, she transitioned into agency PR, representing clients across tech, legal, and nonprofit sectors.Abby later found her way into cybersecurity, leading media relations and corporate communications at companies including Trustwave, Bay Dynamics, IBM, and Akamai. Along the way, she also served as an acting CMO and led marketing for IBM's elite team of hackers and incident responders.Today, Abby leads corporate communications at Hydrolix, a SaaS data analytics platform that delivers real-time performance and security insights from massive volumes of log data.You can connect with Abby and explore her work here:LinkedIn: https://www.linkedin.com/in/abby-ross/Hydrolix: https://hydrolix.io/Text us what you think about this episode!
Atombeam CEO Charles Yeomans joins Chris Lustrino to break down a deceptively simple idea with massive implications: make data smaller while it's streaming so you can move and process more of it—without upgrading networks.Charles explains Atombeam's commercial product NeurPack, how it can often quadruple effective bandwidth, and why this matters across IoT, smart meters, satellites, defense, oil & gas wells, fintech, and eventually data centers and GPU utilization. They also dig into the realities of commercialization—choosing near-term deals that close fast while still pursuing multi-year “industry standard” opportunities—and why execution (not invention) is the real differentiator.00:00 What Atombeam does (pizza analogy)03:13 NeurPack explained05:35 Why 95% of IoT data doesn't move09:38 “Like launching 3 more satellites”13:57 Commercialization + customers16:31 Data centers + GPU utilization24:29 Defense traction + partnerships26:44 What success looks like (distribution)
A segurança digital é uma batalha global, silenciosa e cada vez mais complexa. No novo episódio do Podcast Canaltech, Fernanda Santos esteve em Seattle para conhecer de perto o trabalho da Microsoft no combate ao cibercrime e entender como a inteligência artificial está mudando a forma de proteger empresas e usuários. Durante a visita ao Microsoft Digital Crimes Unit, unidade que atua em cooperação com organizações como Interpol, FBI e autoridades internacionais, ficou claro como ataques digitais evoluíram, se tornaram mais profissionais e passaram a explorar tanto falhas técnicas quanto o fator humano. O episódio reúne entrevistas com Sherrod DeGrippo, diretora de Estratégia de Inteligência de Ameaças da Microsoft, e Rob Lefferts, vice-presidente corporativo de Proteção contra Ameaças da empresa. Eles explicam como funciona a defesa em escala global, como ataques são detectados e interrompidos em segundos e por que a IA se tornou peça-chave na segurança digital. Você também vai conferir: transferência digital de veículos é aprovada no Brasil, Visa e Akamai se unem para combater fraudes em compras com IA e Switch 2 pode ganhar cartuchos menores para reduzir custos. Este podcast foi roteirizado e apresentado por Fernada Santos e contou com reportagens de Danielle Cassita, Lilian Sibila e Diego Corumba, sob coordenação de Anaísa Catucci. A trilha sonora é de Guilherme Zomer, a edição de Jully Cruz e a arte da capa é de Erick Teixeira. See omnystudio.com/listener for privacy information.
Derek Champagne talks with Rohit Agarwal, CEO of The Weather Company. Rohit Agarwal is the CEO of The Weather Company, the world's most accurate forecaster. In this role, Rohit is responsible for setting the strategic vision that spans the company's digital consumer properties, including The Weather Channel app and weather.com, as well as its enterprise business across media,advertising, aviation, defense, and a variety of other industries. He stands behind the belief that high-performing teams are critical to innovation, growth, and impact, and diverse backgrounds and thinking benefit the end customer.Prior to joining The Weather Company, Rohit was the chief product and revenue officer at SoundCloud, the world's largest online community of artists, bands, DJs, and audio creators, where he led the vision, strategic execution, and revenue. This included overseeing business and product strategy, delivery and operations, design, product marketing, and growth. Through Rohit's leadership, SoundCloud refactored the product, doubled its subscriber base, and meaningfully improved its ads business, leading the company to its first profitable year in its 16-year history.Rohit previously served as chief product and growth officer at CNN. Throughout his career, he has driven 2-3x user and revenue growth across leading companies in industries including music (Last.fm, CBS), media(CNN/WarnerMedia, The Economist, Bild), banking (HSBC), B2B SaaS (Trustpilot, Akamai), and consumer internet (AOL). Rohit is a frequent speaker at leading conferences (Google I/O, SXSW, CES, RISE, WebSummit, Product Summit), an active advisor and investor in startups, and launched his own startup in the past. He is also a committed supporter of diverse and inclusive education initiatives – both as a board member of the Smithsonian's Center for Folklife and Cultural Heritage and as a board member of Leap Year, a unique program based in metro Atlanta dedicated to improving college access and early adolescent reading skills to under-represented youth.Rohit lives in Atlanta with his wife and two daughters. An avid sports fan, he also enjoys playing soccer and tennis, painting, and cooking, and he acknowledges that his creative endeavors make him a better leader.Business Leadership Series Intro and Outro music provided by Just Off Turner: https://music.apple.com/za/album/the-long-walk-back/268386576
Tim and Juan chat with Lena Hall, the Senior Director of Developer Relations at Akamai, and an AI practitioner where we dive into what it means to build AI agents. See omnystudio.com/listener for privacy information.
This is the takeaway episode with Lena Hall, the Senior Director of Developer Relations at Akamai, and an AI practitioner where we dive into what it means to build AI agents. If you like what you heard, you should check out the full episode!See omnystudio.com/listener for privacy information.
This is the takeaway episode with Lena Hall, the Senior Director of Developer Relations at Akamai, and an AI practitioner where we dive into what it means to build AI agents. If you like what you heard, you should check out the full episode!See omnystudio.com/listener for privacy information.
Tim and Juan chat with Lena Hall, the Senior Director of Developer Relations at Akamai, and an AI practitioner where we dive into what it means to build AI agents. See omnystudio.com/listener for privacy information.
Most enterprises burn millions on idle GPUs while developers wait weeks for access. Haseeb Budhani, CEO of Rafay Systems, built a global GPU orchestration platform after exits at Soha Systems (acquired by Akamai) and brings deep infrastructure expertise to solving the $100B GPU waste crisis. He reveals why 93% of Fortune 500 companies achieve sub-85% GPU utilization, how sovereign AI requirements are driving hundreds of "Neo clouds" globally, and the specific multi-tenancy frameworks that transform expensive compute from sunk cost into competitive advantage.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
After selling your company for half a billion dollars, what do you do next? Our guest, Shay Levi, decided to start all over again with an even more ambitious mission. Shay previously co-founded the API security giant Noname Security, which was acquired by Akamai for a staggering $500 million.Now, he's back with Unframe, a company taking on the entire software industry with a radical promise: they'll build your custom software for free, and you only pay if it delivers a real impact.Today, Shay walks us through his incredible journey, the contrarian thinking behind his new venture, and how Unframe is using AI to build working solutions in just a matter of days.⭐ Sponsored by Podcast10x - Podcasting agency for VCs - https://podcast10x.comVC10X website - https://VC10X.com/Unframe website - https://unframe.aiShay Levi on LinkedIn - https://www.linkedin.com/in/shaylevi2
This week, we detail Amazon's confirmation that it has started blocking sideloaded apps on Fire TVs that it deems are being used for piracy, in an effort to restrict users from accessing pirated content. We also discuss ITV's confirmation that it is in talks with Comcast-owned Sky about a potential acquisition of its broadcast business, valuing the company at £1.6 billion. We review the latest financial numbers and subscriber counts from Q3 earnings reported by WBD (HBO Max), Xperi, EchoStar (Sling TV), Altice, and AMC Networks, and highlight the strong earnings results from Akamai and Fastly.Note: I incorrectly stated 'Hulu+ Live TV' when I meant to say 'YouTube TV', and on a second occasion, I meant to say 'YouTube' instead of 'Amazon'. My apologies for the confusion.Podcast produced by Security Halt Media
Die Wall Street steht erneut leicht unter Druck. Die Folgen des Regierungs-Shutdowns werden zunehmend sichtbar, mit den Aktien der Fluggesellschaften unter Druck. Ab heute werden bei 40 Flughäfen rund 10% der Flüge gestrichen. Die Reaktion auf Ergebnisse sind seit gestern Abend überwiegend positiv, mit den Aktien von Affirm, Airbnb, Expedia, KKR und Akamai freundlich. Abwärts geht es nach den Zahlen vor allem bei Sweetgreen, Block und Take-Two-Interactive. Bei Take-Two belastet die erneute Verschiebung des Launches der nächsten Generation von Grand Theft Auto. Trade Desk tendiert kaum verändert. Die Zahlen und Aussichten waren solide. Dass das gewaltige Zahlungspaket für Elon Musk von den Tesla-Aktionären abgesegnet wurde, wirkt sich auf den Wert kaum aus. Abonniere den Podcast, um keine Folge zu verpassen! ____ Folge uns, um auf dem Laufenden zu bleiben: • X: http://fal.cn/SQtwitter • LinkedIn: http://fal.cn/SQlinkedin • Instagram: http://fal.cn/SQInstagram
Werbung | Handelsblatt mit 30 % Rabatt – exklusiv für unsere Hörer: Sichert euch jetzt das Handelsblatt – gedruckt oder digital – für 12 Monate mit 30 % Rabatt. Alle Infos zum Angebot findet ihr unter: www.handelsblatt.com/wallstreet30 Die Wall Street steht erneut leicht unter Druck. Die Folgen des Regierungs-Shutdowns werden zunehmend sichtbar, mit den Aktien der Fluggesellschaften unter Druck. Ab heute werden bei 40 Flughäfen rund 10% der Flüge gestrichen. Die Reaktion auf Ergebnisse sind seit gestern Abend überwiegend positiv, mit den Aktien von Affirm, Airbnb, Expedia, KKR und Akamai freundlich. Abwärts geht es nach den Zahlen vor allem bei Sweetgreen, Block und Take-Two-Interactive. Bei Take-Two belastet die erneute Verschiebung des Launches der nächsten Generation von Grand Theft Auto. Trade Desk tendiert kaum verändert. Die Zahlen und Aussichten waren solide. Dass das gewaltige Zahlungspaket für Elon Musk von den Tesla-Aktionären abgesegnet wurde, wirkt sich auf den Wert kaum aus. Ein Podcast - featured by Handelsblatt. +++ Alle Rabattcodes und Infos zu unseren Werbepartnern findet ihr hier: https://linktr.ee/wallstreet_podcast +++ +++ Hinweis zur Werbeplatzierung von Meta: https://backend.ad-alliance.de/fileadmin/Transparency_Notice/Meta_DMAJ_TTPA_Transparency_Notice_-_Ad_Alliance_approved.pdf +++ Der Podcast wird vermarktet durch die Ad Alliance. Die allgemeinen Datenschutzrichtlinien der Ad Alliance finden Sie unter https://datenschutz.ad-alliance.de/podcast.html Die Ad Alliance verarbeitet im Zusammenhang mit dem Angebot die Podcasts-Daten. Wenn Sie der automatischen Übermittlung der Daten widersprechen wollen, klicken Sie hier: https://datenschutz.ad-alliance.de/podcast.html Impressum: https://www.360wallstreet.de/impressum
Topics covered in this episode: * djrest2 -* A small and simple REST library for Django based on class-based views. Github CLI caniscrape - Know before you scrape. Analyze any website's anti-bot protections in seconds. *
Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Sometimes, the plow must go deeper. Current approaches to Zeer Trust implementation can leave gaps in security. Today, we sat down with Akamai's Mike Colson to discuss the concept of combining Identity Credential Access Management with Least Permissive Trust. Setting the stage, Mike Colson details some of the challenges in the varying kinds of Zero Trust that are being applied in the Federal Government. The standard way of implementing ICM can result in assigning more resources than necessary, leading to permission creep and inflexible permission. Over provisioning: The amount of data being created is almost impossible to manage. A person may be given access to a data set they are not permitted to see. A “just in time” permission structure would help avoid that situation. Stale: Just because a person has access to a data set on a Tuesday does not mean he has access on a Wednesday. People can leave the workforce, be reassigned, or change roles. Access must be constantly updated. Static: Ron Popiel made the phrase, “Set it and forget it,” memorable. Unfortunately, this approach can lead to a permission structure that may limit access to key data. This may be considered under-provisioning, potentially leading to time delays in obtaining key information. Colson took the listeners through several iterations of access control, including Role-Based Access Control and Attribute-Based Access Control. On top of these old favorites, Colson discussed what may be called Context-Based Access Control, or what he calls Least Permissive Trust. Least permissive trust is a concept Colson outlined, which uses user behavior, device health, and contextual factors to grant permission dynamically. The conclusion is simple: not all Zero Trust is created equal.
In this episode of Scratch, Ariel Kelman, President & CMO of Salesforce, shows how a category leader can still think like a challenger through the power of education, not persuasion. Education beats persuasion when you make community the flywheel: by pairing product truth with peer proof through events like Dreamforce, Trailhead, and forums, so customers learn how to win with your product (not just why it's great). That mindset turns advocacy into momentum.But teaching only lands if the tech actually works in the flow of “work”, so Ariel's rule is being able to put data before demos. He emphasizes the need to harmonize and govern customer data in Data Cloud so AI agents have context, then deploy them where they matter. For example, a product Q&A agent spun up in weeks drove 700k+ customer chats, and their website/service agents have resolved 1.6M cases because they understand real customer history, permissions, and next best actions.Finally, as a brand, you need to be Customer Zero and balance quick wins with long bets. Dogfood your offerings first to iterate fast and convert internal proofs into external playbooks, then scale what works. Watch the video version of this podcast on YouTube ▶️: https://youtu.be/92Rfv19ypQE
In this episode, host Dan Sixsmith interviews Marilee Bear the CRO at Gainsight. Marilee reflects on her first year at the helm, discussing the company's impressive growth trajectory, recent strategic acquisitions, and the challenges and opportunities presented by a major leadership transition. Marilee shares actionable strategies for improving net revenue retention, such as leveraging data-driven insights, fostering cross-functional collaboration, and investing in customer education. The conversation also explores the impact of AI on sales processes. Marilee offers candid leadership insights, discussing the importance of transparency, adaptability, and building a culture of continuous learning. She also recounts her career journey, from her early ambitions and formative experiences to the pivotal moments that led her to lead a major SaaS company, offering advice for aspiring leaders in the tech industry.Timestamps:Welcome and Introductions (00:00:01) Dan welcomes Marilee Bear who reflects on her first year at Gainsight, company growth, and recent leadership changes.Company Growth, Acquisitions, and Leadership Transition (00:00:30) Marilee discusses acquisitions, repositioning Gainsight for growth, and the CEO transition from Nick Mehta to Chuck Apathy.Team Structure and Business Unit Model (00:02:04) Explanation of new hires, business unit model, and leadership structure within product and customer success teams.Integrating Customer Success into Revenue Organization (00:03:21) Describes shifting customer success under the revenue team and the industry trend of CS as a revenue driver.Defining Roles and Realigning the Revenue Team (00:05:25) Outlines the jobs-to-be-done exercise, clarifying roles across sales, CS, and other go-to-market functions.Customer Success as a Pipeline Engine (00:06:24) Details how CS now contributes to pipeline generation and the metrics used to measure CSM impact.Net Revenue Retention (NRR) Challenges (00:07:29) Discussion of industry-wide NRR declines and the need for strategic retention and value delivery.Retention Strategies and Multi-threading (00:08:21) Emphasizes proactive retention, business value demonstration, and multi-threading within customer organizations.Competitive Landscape and Expansion Focus (00:12:29) Explains how competition now includes internal build vs. buy, and the importance of expansion within existing customers.Convergence of Sales and Customer Success Roles (00:13:53) Observes the merging responsibilities of CS and sales, with CS teams adopting more sales-like approaches.State of B2B Sales and Impact of AI (00:14:25) Explores ongoing challenges in B2B sales, the impact of generative AI, and the need for business acumen.Reaching C-level Executives and Sales Best Practices (00:17:00) Shares the difficulty of accessing executives, the importance of detective work, and value-driven outreach.Effective Sales Outreach to Executives (00:19:12) Marilee describes what makes sales outreach compelling: offering choices, concise meetings, and understanding executive preferences.Marilee's Career Journey (00:21:31) Covers her early ambitions, work history from restaurants to Oracle, Akamai, Zendesk, and her path to Gainsight.Retention and Customer Success Experience (00:25:54) Highlights her experience with retention at Akamai, building CS teams, and her initial exposure to Gainsight.Key Career Lessons and Leadership Growth (00:28:54) Shares lessons on authenticity, operational rigor, and the importance of direct feedback and self-improvement.Leadership Philosophy and Team Management (00:33:58) Discusses leading diverse teams, empathy, balancing encouragement with accountability, and fostering a feedback culture.Definition of Success (00:36:00) Marilee defines success as delivering the best outcomes for customers, company, and self, in that order.Closing Remarks (00:36:43) Dan thanks Marilee, wraps up the episode, and previews future collaborations.
Recent studies have shown how AI Agents have expanded the attack surface for federal agencies. Today, we sit down with three leaders who demonstrate why fundamentals, such as visibility, inventory, runtime, and least-permissive access control, will be more critical than ever. Rob Roser from Idaho National Labs looks at the proliferation of API in the past decade. Although they facilitate communication, they can also give a path to attackers. He notes that today's attackers are interested in much more than money, the seek intellectual property that can compromise American security. Phishing and security training are good starting points, but developers must learn what tools to use to be able to use AI an appropriate manner. Where to start? Steven Ringo from Akamai give four key points for handling the drastic increase in data generated by AI · One: Discovery - build an API inventory · Two: Posture – implement policies that can control the APIs · Three: Run Time protection - design how to alert and take action to block · Four: Active testing prevention that is continuous The webinar underscored the urgency of integrating API security into comprehensive cybersecurity strategies and recommends programs to test and validate APIs before production deployment.
What makes a truly effective security leader in today's complex threat landscape? In this enlightening conversation with Andy Ellis, former CISO of Akamai Technologies and author of "1% Leadership," we explore how the role of the security executive has transformed from a technical specialist to a strategic business enabler.Andy shares his remarkable journey from Air Force information warfare specialist to becoming Akamai's first security hire, where he spent 20 years building a multi-billion dollar security business within the infrastructure company. His unique perspective challenges conventional thinking about security leadership, organizational structure, and how security teams should communicate risk to the broader business."Your job as a security professional is really to enable the business to make wiser risk choices," Andy explains, reframing the security function away from being the department of "no" to becoming a trusted advisor that helps organizations understand and navigate risks effectively. Using colorful analogies about crocodiles in the boardroom, he illustrates why security leaders should focus on making relevant risks believable rather than raising alarms about threats that don't align with business priorities.We dive deep into the evolution of the CISO role, discussing why the traditional reporting structures may be outdated and how smaller companies are blending security leadership with IT functions as traditional infrastructure moves to SaaS. Andy challenges security professionals to understand why controls exist rather than just implementing them, asking three critical questions: "What is the real reason you do this? Could we stop? What should we do differently?"Whether you're an aspiring security leader or a seasoned CISO, this conversation offers valuable insights on leadership, communication, and how to deliver real security value in an increasingly complex digital landscape. Listen now to learn how small, incremental improvements in your leadership approach can transform your security program's effectiveness and business impact.
The Confluent Developer Podcast is here! For this first episode, Tim Berglund talks to his co-host, Adi Polak (Confluent), about her career in distributed data systems. Her first job: neighborhood dogwalker. Her challenge/theme: early Hadoop, working at Akamai on data optimization and real-time threat detection for huge global customers like Apple, Nike, Facebook and others, and the power of collaboration. SEASON 2 Hosted by Tim Berglund, Adi Polak and Viktor Gamov Produced and Edited by Noelle Gallagher, Peter Furia and Nurie Mohamed Music by Coastal Kites Artwork by Phil Vo
Changying (Z) Zheng brings calm thinking to DesignOps — showing how clarity, storytelling, and ruthless prioritisation help design teams thrive . ====== Episode Chapters: 00:00 – Why Design Needs to Prove Its Value 00:30 – Welcome and Introduction 02:30 – From Graphic Design to Design Ops Leadership 05:40 – Running a Dairy-Free Dessert Business and Learning Calm Leadership 10:00 – Leading Without Drama and Seeing Multiple Perspectives 13:00 – Design Ops as Service Design for Design Teams 16:00 – Storytelling, Outcomes, and Speaking the Language of Business 18:45 – Earning and Keeping a Seat at the Table 21:00 – Moving from Ticket Taking to Strategic Design Work 26:00 – Saying No Kindly and Introducing Office Hours 32:00 – People, Process, and Platform as Core Pillars 36:00 – Becoming the Connective Tissue Across Orgs 42:00 – Growing Into Product Ops at Cloudflare 55:00 – Communication as the Connective Tissue of Ops 1:10:00 – A Two-by-Two Framework for Career Development ====== Who is Changying (Z) Zheng? Changying (Z) Zheng is a Director of Product Operations at Cloudflare, where she's scaled the operational backbone of one of the internet's most recognisable infrastructure companies . She has: Started as a team of one and built thriving design and research operations Worked in agencies, higher education, and at companies like Akamai, VMware, and Nasdaq Founded and ran her own retail business Delivered talks at The DevOps Conference and DesignOps Summit, shaping how people understand DesignOps in technical environments ====== Find Changying (Z) Zheng here: LinkedIn → https://www.linkedin.com/in/changyingz/ Website → https://www.changyingart.com/ ====== Subscribe to Brave UX Like what you heard?
The OpenMOQ Software Consortium has launched as a new effort among vendors and content owners, focused on advancing MOQ-based technology through open-source software. The consortium is tasked with developing high-performance software that will enable the next generation of media contribution, distribution, and playback. OpenMOQ is a collaborative effort to accelerate development, enhance interoperability and share cost between vendors, distributors and in some cases, even competitors. In this interview, Will Law from Akamai and Tomas Kvasnicka from CDN77 discuss the formation of OpenMOQ and its goals. https://openmoq.orgPodcast produced by Security Halt Media
George Kurian's journey from a modest upbringing in Kerala, India, to becoming CEO of NetApp is an extraordinary story. George worked cafeteria shifts and construction jobs to pay his way through Princeton before climbing the ranks at Oracle, McKinsey, and Cisco. In this episode, George opens up about the weight of being a “rookie CEO” responsible for 12,000 people, the discipline of saying no to 97% of ideas, and the humility it takes to lead through uncertainty. He and Ilana explore resilience, focus, and the future of AI, while revealing how diverse experiences and family values shaped his leadership philosophy. George Kurian is CEO of NetApp, a Fortune 500 data infrastructure and cloud services company. Under his leadership, NetApp has strengthened its cloud-first and data services strategy, growing into a $20 billion company. In this episode, Ilana and George will discuss: (00:00) Introduction (02:20) Family Role Models and Upbringing (06:00) Landing a Princeton Scholarship and Learning to Survive (09:20) Lessons from Oracle and McKinsey (13:50) Why George Left Cisco to Join NetApp (16:45) How Cafeteria Work Inspired NetApp's Engineering Process (19:40) The ‘30-30-30' Rule for Driving Organizational Change (22:40) George's Journey to Becoming CEO Overnight (26:30) First-Time CEO Challenges and Leadership Struggles (30:40) Why a CEO Should Say “No” to 97% of Ideas (33:10) Betting on Cloud Partnerships Instead of Competing (37:15) The Power of Choosing Your Path and Tackling Hard Problems George Kurian is CEO of NetApp, a Fortune 500 data infrastructure and cloud services company. Before joining NetApp in 2011, he had built a diverse tech career that included leadership roles at Oracle, McKinsey, Cisco, and Akamai. Under his leadership, NetApp has strengthened its cloud-first and data services strategy, growing into a $20 billion company. Connect with George: George's LinkedIn: linkedin.com/in/georgekuriannetapp Leap Academy: Ready to make the LEAP in your career? There is a NEW WAY for professionals to fast-track their careers and leap to bigger opportunities. Watch the free training at https://bit.ly/leap--free-training
⬥GUEST⬥Andy Ellis, Legendary CISO [https://howtociso.com] | On LinkedIn: https://www.linkedin.com/in/csoandy/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥EPISODE NOTES⬥In this episode of Redefining CyberSecurity, host Sean Martin speaks with Andy Ellis, former CSO at Akamai and current independent advisor, about the shifting expectations of security leadership in today's SaaS-powered, AI-enabled business environment.Andy highlights that many organizations—especially mid-sized startups—struggle not because they lack resources, but because they don't know how to contextualize what security means to their business goals. Often, security professionals aren't equipped to communicate with executives or boards in a way that builds shared understanding. That's where advisors like Andy step in: not to provide a playbook, but to help translate and align.One of the core ideas discussed is the reframing of security as an enabler rather than a gatekeeper. With businesses built almost entirely on SaaS platforms and outsourced operations, IT and security should no longer be siloed. Andy encourages security teams to “own the stack”—not just protect it—by integrating IT management, vendor oversight, and security into a single discipline.The conversation also explores how AI and automation empower employees at every level to “vibe code” their own solutions, shifting innovation away from centralized control. This democratization of tech raises new opportunities—and risks—that security teams must support, not resist. Success comes from guiding, not gatekeeping.Andy shares practical ways CISOs can build influence, including a deceptively simple yet powerful technique: ask every stakeholder what security practice they hate the most and what critical practice is missing. These questions uncover quick wins that earn political capital—critical fuel for driving long-term transformation.From his “First 91 Days” guide for CISOs to his book 1% Leadership, Andy offers not just theory but actionable frameworks for influencing culture, improving retention, and measuring success in ways that matter.Whether you're a CISO, a founder, or an aspiring security leader, this episode will challenge how you think about the role security plays in business—and what it means to lead from the middle.⬥SPONSORS⬥LevelBlue: https://itspm.ag/attcybersecurity-3jdk3ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Inspiring Post: https://www.linkedin.com/posts/csoandy_how-to-ciso-the-first-91-days-ugcPost-7330619155353632768-BXQT/Book: “How to CISO: The First 91-Day Guide” by Andy Ellis — https://howtociso.com/library/first-91-days-guide/Book: “1% Leadership: Master the Small Daily Habits that Build Exceptional Teams” — https://www.amazon.com/1-Leadership-Daily-Habits-Exceptional/dp/B0BSV7T2KZ⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast:
Cybersecurity risks have become more complex and unpredictable than ever, yet many companies struggle to quantify these threats in terms that truly matter. How can CFOs and CISOs effectively communicate about risk, make smart security investments, and navigate the emerging challenges posed by AI? In this episode, CJ interviews Andy Ellis, a renowned cybersecurity leader, former CISO of Akamai, investor, director, advisor, leadership coach, and author of the book 1% Leadership. Andy unpacks why most companies measure risk the wrong way and breaks down his "Pyramid of Pain” framework for categorizing it. He discusses the dynamics between CFOs and CISOs in purchasing security tools, demystifies security budgeting and vendor negotiations, dives into the evolving role of AI in security operations, and explains why the CISO and CIO roles are on a collision course. Andy also reveals insider stories from the frontlines of major breaches, shares a compelling risk analogy inspired by vampires and zombies, and clears up once and for all why the demise of the Death Star was not a failure of risk management.—LINKS:Andy Ellis on LinkedIn: https://www.linkedin.com/in/csoandyAndy Ellis on X: (@CSOAndy) https://x.com/csoandyWebsite: https://www.csoandy.com1% Leadership: https://www.amazon.com/1-Leadership-Master-Improvements-Leaders/dp/0306830817How to CISO: https://www.howtociso.comDuha One: CJ on X (@cjgustafson222): https://x.com/cjgustafson222Mostly metrics: —TIMESTAMPS:(00:00) Preview and Intro(02:49) Sponsor – Rillet | Pulley | Brex(07:23) Defining Risk: Technical & Human-Friendly Perspectives(09:20) Actuarial Risk Versus Human-Driven Risk(15:33) Why the Demise of the Death Star Wasn't a Failure of Risk Management(16:58) Sponsor – Aleph | RightRev | Navan(21:22) How the Death Star Metaphor Relates to Real-World Security Breaches(23:20) Why Risk Should Not Be Quantified in Dollar Terms(25:15) The Pyramid of Pain: Risk Severity and Surprise Levels(30:21) How CFOs and CISOs Should Partner on Security Purchases(34:03) Are Security Budgets Over or Under-Spent?(36:22) Balancing Budget for Security Tools and People(39:48) Tips for FP&As on Brokering the Security Budget With Your CISO(44:10) Factoring AI Uncertainty in a Three-Year Security Roadmap(46:38) AI Washing in Security Products and Realistic Impact(48:55) The Limitations of Security Operations(50:53) The Future of CIO and CISO Roles and Organizational Reporting(54:55) Why IT Shouldn't Report to the CFO(57:18) Israeli Unit 8200 and Cybersecurity Innovation(59:50) Startups Versus Public Companies: Differing Risk Models(1:02:52) Wrap—SPONSORS:Rillet is the AI-native ERP modern finance teams are switching to because it's faster, simpler, and 100% built for how teams operate today. See how fast your team can move. Book a demo at https://www.rillet.com/metrics.Pulley is the cap table management platform built for CFOs and finance leaders who need reliable, audit-ready data and intuitive workflows, without the hidden fees or unreliable support. Switch in as little as 5 days and get 25% off your first year: https://pulley.com/mostlymetrics.Brex offers the world's smartest corporate card on a full-stack global platform that is everything CFOs need to manage their finances on an elite level. Plus, they offer modern banking and treasury as well as intuitive expenses and accounting automation, bill pay, and travel. Find out more at https://www.brex.com/metricsAleph automates 90% of manual, error-prone busywork, so you can focus on the strategic work you were hired to do. Minimize busywork and maximize impact with the power of a web app, the flexibility of spreadsheets, and the magic of AI. Get a personalised demo at https://www.getaleph.com/runRightRev automates the revenue recognition process from end to end, gives you real-time insights, and ensures ASC 606 / IFRS 15 compliance—all while closing books faster. For RevRec that auditors actually trust, visit https://www.rightrev.com and schedule a demo.Navan is the all-in-one travel and expense solution that can give you access to exclusive, proprietary Nasdaq-validated data that reveals what's happening with corporate travel investments. See the Navan Business Travel Index at https://navan.com/bti.#Cybersecurity #RiskManagement #CISO #SecurityOperations #SecurityFinance This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit www.mostlymetrics.com
Episode 135: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Ryan Barnett for a deep dive on WAFs. We also recap his Exploiting Unicode Normalization talk from DEFCON, and get his perspective on bug hunting from his time at Akamai. Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!====== Links ======Follow your hosts Rhynorater and Rez0 on Twitter: https://x.com/Rhynoraterhttps://x.com/rez0__====== Ways to Support CTBBPodcast ======Hop on the CTBB Discord at https://ctbb.show/discord!We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.You can also find some hacker swag at https://ctbb.show/merch!Today's Sponsor - ThreatLocker. Checkout ThreatLocker Detect! https://www.criticalthinkingpodcast.io/tl-detectToday's Guest: https://x.com/ryancbarnett====== Resources ======Accidental Stored XSS Flaw in Zemanta 'Related Posts' Plugin for TypePadhttps://webappdefender.blogspot.com/2013/04/accidental-stored-xss-flaw-in-zemanta.htmlXSS Street-Fighthttps://media.blackhat.com/bh-dc-11/Barnett/BlackHat_DC_2011_Barnett_XSS%20Streetfight-Slides.pdfBlackhat USA 2025 - Lost in Translation: Exploiting Unicode Normalizationhttps://www.blackhat.com/us-25/briefings/schedule/#lost-in-translation-exploiting-unicode-normalization-44923====== Timestamps ======(00:00:00) Introduction(00:02:49) Accidental Stored XSS in Typepad Plugin (00:06:34) Chatscatter & Abusing third party Analytics(00:11:42) Ryan Barnett Introduction(00:21:11) Virtual Patching & WAF Challenges(00:40:39) AWS API Gateways & Whitelisting Bug Hunter Traffic(00:49:59) Lost in Translation: Exploiting Unicode Normalization(01:11:29) CSPs at the WAF level & 'Bounties for Bypass'
In the movies, Tony Stark's JARVIS is the ultimate AI assistant, managing schedules, running simulations, controlling environments, and anticipating needs before they are voiced. In reality, today's AI agents are still far from that vision. Despite 2025 being heralded as the year of agentic AI, the first offerings from major players have been underwhelming. They can perform tasks, but they remain a long way from the seamless, hyper-intelligent assistants we imagined. In this episode, Dr. Robert “Bobby” Blumofe, CTO at Akamai Technologies, joins me to explore what is really holding AI assistants back and what it will take to build one as capable as a top human executive assistant. Bobby argues that the leap forward will not come from chasing ever-larger models but from optimization, efficiency, and integrating AI with the right tools, infrastructure, and processes. He believes that breakthroughs in model efficiency, like those seen in DeepSeek, could make capable agents affordable and viable for everyday use. We break down the spectrum of AI agents from simple, task-specific helpers to the fully autonomous, general-purpose vision of JARVIS. Bobby shares why many of the most valuable enterprise applications will come from the middle ground, where agents are semi-autonomous, task-focused, and integrated with other systems for reliability. He also explains why smaller, specialized models often outperform “ask me anything” LLMs for specific business use cases, reducing cost, latency, and security risks. The conversation covers Akamai's role in enabling low-latency, scalable AI at the edge, the importance of combining neural and symbolic AI to achieve reliable reasoning and planning, and a realistic five-to-seven-year timeline for assistants that can rival the best human EAs. We also look at the technical, social, and business challenges ahead, from over-reliance on LLMs to the ethics of deploying highly capable agents at scale. This is a grounded, forward-looking discussion on the future of AI assistants, where they are today, why they have fallen short, and the practical steps needed to turn fiction into reality.
This week, we detail all the news from Disney's earnings, its proposed deal between ESPN and the NFL and the launch of ESPN's new DTC service this month. We also discuss the impact of Disney's decision to no longer report paid subscribers or ARPU numbers for Disney+ and Hulu, and will cease reporting ESPN+ numbers as of next month. We also discuss all the essential numbers from Q2 earnings for WBD, Paramount Global, Fubo, Altice, Akamai, Fastly, Vimeo, and highlight the upcoming launch of FOX One on August 21st, as well as recent news from Roku and MLS.Podcast produced by Security Halt Media
At Black Hat USA 2025, Rupesh Chokshi, Senior Vice President and General Manager at Akamai Technologies, connected with ITSPmagazine's Sean Martin to discuss the dual realities shaping enterprise AI adoption—tremendous opportunity and significant risk.AI is driving a seismic transformation in business operations, with executive teams rapidly deploying proof-of-concept projects to capture competitive advantage. Yet, as Chokshi notes, many of these initiatives race ahead without fully integrating security teams into the process. While budgets for AI are expanding, funding for AI-specific security measures often lags behind, leaving organizations exposed.One of the most pressing concerns is the rise of AI bots—Akamai observes 150 billion such bots traversing networks daily. These bots scrape valuable digital content, train models on it, and, in some cases, replace direct customer interactions with summarized answers. The result? Lost marketing leads, disrupted sales funnels, and even manipulated product recommendations—all without traditional “breach” indicators.This is not just a security problem; it's a business continuity challenge. Organizations must develop strategies to block or manage scraping, including commercial agreements for content usage. Beyond this, the proliferation of conversational AI agents—whether for booking tickets, providing mortgage information, or recommending products—introduces new attack surfaces. Threat actors exploit prompt injections, jailbreaks, and code execution vulnerabilities to compromise these interfaces, risking both customer trust and brand reputation.Akamai's response includes capabilities such as Firewall for AI, providing in-line visibility and control over AI-driven sessions, and bot mitigation technologies that protect high-value content. By offering real-time threat intelligence tailored to customer environments, Akamai helps enterprises maintain agility without sacrificing protection.Chokshi's call to action is clear: every company is now an AI company, and security must be embedded from the outset. Boards should view security not as a budget line item, but as the foundation for innovation velocity, brand integrity, and long-term competitiveness.Learn more about Akamai: https://itspm.ag/akamailbwcNote: This story contains promotional content. Learn more.Guests:Rupesh Chokshi, SVP & General Manager, Application Security, Akamai | https://www.linkedin.com/in/rupeshchokshi/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Akamai CEO Tom Leighton speaks on the company's Q2 earnings and growth in cloud infrastructure services with Bloomberg's Caroline HydeSee omnystudio.com/listener for privacy information.
Ahead of Black Hat USA 2025, Sean Martin and Marco Ciappelli sit down once again with Rupesh Chokshi, Senior Vice President and General Manager of the Application Security Group at Akamai, for a forward-looking conversation on the state of AI security. From new threat trends to enterprise missteps, Rupesh lays out three focal points for this year's security conversation: protecting generative AI at runtime, addressing the surge in AI scraper bots, and defending the APIs that serve as the foundation for AI systems.Rupesh shares that Akamai is now detecting over 150 billion AI scraping attempts—a staggering signal of the scale and sophistication of machine-to-machine activity. These scraper bots are not only siphoning off data but also undermining digital business models by bypassing monetization channels, especially in publishing, media, and content-driven sectors.While AI introduces productivity gains and operational efficiency, it also introduces new and uncharted risks. Agentic AI, where autonomous systems operate on behalf of users or other systems, is pushing cybersecurity teams to rethink their strategies. Traditional firewalls aren't enough—because these threats don't behave like yesterday's attacks. Prompt injection, toxic output, and AI-generated hallucinations are some of the issues now surfacing in enterprise environments, with over 70% of organizations already experiencing AI-related incidents.This brings the focus to the runtime. Akamai's newly launched Firewall for AI is purpose-built to detect and mitigate risks in generative AI and LLM applications—without disrupting performance. Designed to flag issues like toxic output, remote code execution, or compliance violations, it operates with real-time visibility across inputs and outputs. It's not just about defense—it's about building trust as AI moves deeper into decision-making and workflow automation.CISOs, says Rupesh, need to shift from high-level discussions to deep, tactical understanding of where and how their organizations are deploying AI. This means not only securing AI but also working hand-in-hand with the business to establish governance, drive discovery, and embed security into the fabric of innovation.Learn more about Akamai: https://itspm.ag/akamailbwcNote: This story contains promotional content. Learn more.Guests:Rupesh Chokshi, SVP & General Manager, Application Security, Akamai | https://www.linkedin.com/in/rupeshchokshi/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
ITSPmagazine Weekly Update | From Black Hat to Black Sabbath / Ozzy: AI Agents and Guitars (again!) + Entry Level Cybersecurity Jobs, Robots Evolution, and the Weekly Recap You Didn't Expect - On Marco & Sean's Random & Unscripted Podcast __________________Marco Ciappelli and Sean Martin are back with another random and unscripted weekly recap—from pre-Black Hat buzz and AI agents to vintage wood guitars, talent gaps, and Glen Miller debates. This week's reflection hits tech, music, and philosophy in all the right ways. Tune in, ramble with us, and subscribe. __________________Full Blog Article This week's recap was a ride.Sean and I kicked things off with the big news: we're officially consistent. Weekly recap number… I lost count. But we're doing it. We covered what ITSPmagazine's been working on, what we've been publishing, and where our minds are wandering lately (spoiler: everywhere).Black Hat USA 2025 is just around the corner, and we're deep into prep mode. I even bought a paper map. Why? I don't know. But we've got some great pre-event conversations already out—like our annual chat with Black Hat GM Steve Wylie, plus briefings with Dropzone AI (get ready for “agentic automation” to be the next big buzzword) and Akamai (yes, bots and APIs again, but with a solid strategy twist).We also talked about a fantastic episode Sean did on resonance and reinvention—featuring Cindy, a luthier in NYC who builds custom guitars using century-old beams from historic buildings. The pickups even use the old nails. Music and wood with a past life. It's beautiful stuff.Speaking of stories, I officially closed down the Storytelling podcast. But don't worry—I'm still telling stories. I've just shifted focus to “Redefining Society and Technology,” my newsletter and podcast series where I explore how humans and tech evolve together. This week's edition tackled the merging of humans and machines as a new species. Isaac Asimov meets Andy Clark.We also got a bit philosophical about AI and jobs. If machines take over the “easy” roles, where do humans begin? Are we cutting off our own training paths?Sean's episode with John Solomon dug into the cybersecurity hiring crisis—challenging the idea that we have a “talent gap.” The real issue? We're not hiring or nurturing people properly.Oh, and I finally released my long-overdue interview with Michael Sheldrick from Global Citizen. Music. Social impact. Doing good. It's all there. I'm honored to support even a small piece of what he's building.And yes… Ozzy. RIP. Music never dies.So if you're into random reflections with meaning, tech with humanity, and stories that don't always follow the rules—subscribe, share, and join the ride.See you in Vegas. Or the future. Or somewhere in between.________________ KeywordsBlack Hat USA 2025, ITSPmagazine recap, Marco Ciappelli, Sean Martin, cybersecurity podcast, AI in cybersecurity, agentic automation, Dropzone AI, Akamai APIs, HITRUST security, Global Citizen, Michael Sheldrick, storytelling podcast, Redefining Society, Andy Clark, Isaac Asimov, human-machine evolution, cybersecurity talent gap, custom guitar NYC, Ozzy tributeHosts links:
Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Want to listen to other episodes? www.Federaltechpodcast.com In 2018, ransomware was a quaint little cyberattack. Suddenly, the first half of 2024 saw $459 million paid in ransomware. Everyone is being targeted: retailers in the UK, resellers in LA, and even the federal government can be included in the target for ransomware attackers. Today, we sit down with Douglas Holland to see what role Akamai plays in preventing these rapidly proliferating attacks. One of the strengths of Akamai is its ability to handle a wide range of internet activity, as Akamai processes 11 trillion DNS queries daily. This gives them a perfect perspective to identify troublesome sites and apply Domain Name Systems (DNS) to provide robust cybersecurity. Douglas Holland puts this situation into perspective by noting that during the COVID-19 pandemic, more and more people started using VPN technology, making systems vulnerable to phishing attacks. He notes the rise of ransomware-as-a-service and phishing-as-a-service, emphasizing the importance of employee training and education. Holland also addresses the challenges of VPNs and remote desktop security, advocating for zero-trust architectures and multi-factor authentication. The interview ends with discussing the role of AI and machine learning in Akamai's threat protection.
This week we are joined by Kyle Lefton, Security Researcher from Akamai, who is diving into their work on "Two Botnets, One Flaw - Mirai Spreads Through Wazuh Vulnerability." Akamai researchers have observed active exploitation of CVE-2025-24016, a critical RCE vulnerability in Wazuh, by two Mirai-based botnets. The campaigns highlight how quickly attackers are adapting proof-of-concept exploits to spread malware, underscoring the urgency of patching vulnerable systems. One botnet appears to target Italian-speaking users, suggesting regionally tailored operations. The research can be found here: Two Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability Learn more about your ad choices. Visit megaphone.fm/adchoices
Episode 385 of The VentureFizz Podcast features Julia Austin - Board Member, Executive Coach, HBS Senior Lecturer, Operator, Angel Investor, and now - Author. Another repeat original guest! Julia was a guest for Episode 30 of The VentureFizz Podcast back in 2018 where we do a deep dive into her background plus cover lots of interesting topics like what it takes to become a great Product Manager and others. In this interview, we catch up to discuss her new role as an author and the details about her new book called After The Idea - What It Really Takes to Create and Scale a Startup: https://www.hachettebookgroup.com/titles/julia-austin/after-the-idea/9781541705296 https://www.amazon.com/After-Idea-Really-Create-Startup/dp/1541705270 Julia is a seasoned operator who has served in leadership roles at several scaled technology companies like Akamai, VMware, and DigitalOcean. She has also advised hundreds of founders and startups. In this new book, which I believe will become a new staple in the entrepreneurial startup circles, she helps entrepreneurs navigate the complexities and challenges of building a startup like important matters around product, people, operations, and more. What I also appreciate the most about this book is the fact that it is very comprehensive, yet easy to understand and implement. In this episode of our podcast, we cover lots of great topics like: * A quick run through Julia's background - check out Episode 30 for the deeper dive. * How Julia became a member of the faculty at Harvard Business School and the impact of The Startup Operations course that she created. * The inside look at what it's like to write a book. * How proper discovery can help avoid false positives. * Why entrepreneurs don't always need a co-founder. * The importance of ABR - that being Always Be Recruiting - for founders. * The difference between Founders & Joiners * Comparing the Boston and NYC startup ecosystems. * And so much more.
Three Buddy Problem - Episode 47: We unpack a multi-agency report on Russia's APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA's sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia's discovery of thousands of hijacked edge devices repurposed as honeypots. The back half veers into Microsoft's resurrected Windows Recall, Signal's new screenshot-blocking countermeasure, Japan's fresh legal mandate for pre-emptive cyber strikes, and why appliance vendors like Ivanti keep landing in the headlines. Along the way you get hot takes on techno-feudalism, Johnny Ive's rumored AI gadget, and a lively debate over whether publishing exploit code ever helps defenders. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
File Hashes Analysis with Power BI Guy explains in this diary how to analyze Cowrie honeypot file hashes using Microsoft's BI tool and what you may be able to discover using this tool. https://isc.sans.edu/diary/File%20Hashes%20Analysis%20with%20Power%20BI%20from%20Data%20Stored%20in%20DShield%20SIEM/31764 Apache Camel Vulnerability Apache released two patches for Camel in close succession. Initially, the vulnerability was only addressed for headers, but as Akamai discovered, it can also be exploited via query parameters. This vulnerability is trivial to exploit and leads to arbitrary code execution. https://www.akamai.com/blog/security-research/march-apache-camel-vulnerability-detections-and-mitigations Juniper Patches Junos Vulnerability Juniper patches an already exploited vulnerability in JunOS. However, to exploit the vulnerability, and attacker already needs privileged access. By exploiting the vulnerability, an attacker may completely compromised the device. https://supportportal.juniper.net/s/article/2025-03-Out-of-Cycle-Security-Bulletin-Junos-OS-A-local-attacker-with-shell-access-can-execute-arbitrary-code-CVE-2025-21590?language=en_US AMI Security Advisory AMI patched three vulnerabilities. One of the, an authentication bypass in Redfish, allows for a complete system compromise without authentication and is rated with a CVSS score of 10.0. https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf