Podcasts about cybersecurity

The protection of computer systems from theft or damage

  • 11,570PODCASTS
  • 64,855EPISODES
  • 30mAVG DURATION
  • 10+DAILY NEW EPISODES
  • Feb 25, 2026LATEST
cybersecurity

POPULARITY

20192020202120222023202420252026

Categories




    Best podcasts about cybersecurity

    Show all podcasts related to cybersecurity

    Latest podcast episodes about cybersecurity

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Wednesday, February 25th, 2026: Open Redirects; setHTML in Firefox; telnetd issues

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Feb 25, 2026 7:29


    Open Redirects: A Forgotten Vulnerability? https://isc.sans.edu/diary/Open%20Redirects%3A%20A%20Forgotten%20Vulnerability%3F/32742 Goodbye innerHTML, Hello setHTML: Stronger XSS Protection in Firefox 148 https://hacks.mozilla.org/2026/02/goodbye-innerhtml-hello-sethtml-stronger-xss-protection-in-firefox-148/ More telnetd issues https://seclists.org/oss-sec/2026/q1/199

    DH Unplugged
    DHUnplugged #792: Disrupter < Disrupters

    DH Unplugged

    Play Episode Listen Later Feb 25, 2026 60:48


    DOD – Disrupter Disrupters China markets reopening after Lunar New Year Mexico Cartel Wars Refunds requested for the illegal tariffs PLUS we are now on Spotify and Amazon Music/Podcasts! Click HERE for Show Notes and Links DHUnplugged is now streaming live - with listener chat. Click on link on the right sidebar. Love the Show? Then how about a Donation? Follow John C. Dvorak on Twitter Follow Andrew Horowitz on Twitter Warm-Up - The CTP for Caterpillar announced - DOD - Disrupter Disrupters - China markets reopening after Lunar New Year - Mexico Cartel Wars (Jalisco) Markets - Mortgage Rates - looking good! - Tariffs found illegal - that is not stopping anything - Refunds requested for the illegal tariffs - Monday's big drop and AI taking a bite out of stock prices Tariffs - First, who actually knows what is going on. 100% chaos - Supreme court ruled illegal (6-3) - 10% flat across all countries immediately added - Wait a day and make that 15% - FedEx seeks refund for illegal IEEPA tariffs imposed by Trump after the Supreme Court ruled Trump's tariffs exceeded authority - Numerous lawsuits expected for IEEPA tariff refunds - Apple has spent more than $3 billion on tariffs since President Donald Trump enacted his trade policies. What about that? (HOW TO FIGURE OUT WHO GETS THE REFUND) --- Estimate that $175B tariffs have been collected alreay - A group of 22 U.S. Senate Democrats on Monday introduced legislation that would require President Donald Trump's administration to fully refund within 180 days all of the revenue, with interest, collected from tariffs struck down by the U.S. Supreme Court. - The legislation would require the Customs and Border Protection agency, which collects tariffs at U.S. ports of entry, to prioritize small businesses. - The U.S. Customs and Border Protection agency said it will halt collections of tariffs imposed under the International Emergency Economic Powers Act at 12:01 a.m. EST (0501 GMT) on Tuesday Stop The Presses - After years of JCD's rants....... - Apple will soon introduce MacBooks with touch screens - Apple Inc.'s initial touch Macs will have the Dynamic Island at the center top of the display and OLED screen technology. The new MacBook Pro models will have a refreshed, dynamic user interface that can shift between being optimized for touch or point-and-click input. Europe Reacts - "The current situation is not conducive to delivering 'fair, balanced, and mutually beneficial' transatlantic trade and investment, as agreed to by both sides" in the joint statement setting out the terms of last year's trade agreement, the Commission said. "A deal is a deal." - All active discussions are halted on any USA/Europe trade deal The Potential Winners - Brazil and China may be the winners here - Chinese President Xi Jinping has a boost in bargaining power after the US Supreme Court invalidated Donald Trump's broad emergency tariffs, a key point of leverage over China. - The removal of tariff threats will make it harder for Trump to press Xi for larger purchases of certain products and leaves him without a key weapon to strike back if Chinese negotiators make fresh demands. - Xi's team will likely push harder for access to advanced semiconductors, the removal of trade restrictions on Chinese companies, and reduced US support for self-ruled Taiwan, according to Wu Xinbo, director at Fudan University's Center for American Studies. NVDA Earnings - NVIDIA drops its fiscal Q4 2026 (ended Jan 2025) results tomorrow—another make-or-break moment for the AI trade. - The bar is sky-high after years of blowout beats, but whispers of "peak AI" and slowing growth momentum have investors on edge. --- Consensus Expectations : ----Revenue: ~$65.6–$66.1 billion (up ~67–68% YoY from last year's ~$39B; guided $65B ±2% in prior report) ------EPS (adjusted/non-GAAP): ~$1.50–$1.53 (up ~70–72% YoY from $0.89). --------Gross margins: Targeting ~75% non-GAAP (holding strong despite supply chain noise). -----------Key driver: Data Center segment expected to crush ~$58–$60B, fueled by Blackwell ramp and hyperscaler spend. Home Depot Earnings - The home-improvement retailer gained 2.7% after posting fourth-quarter adjusted earnings of $2.72 per share on revenues of $38.20 billion. - That exceeded the per-share earnings of $2.54 on revenues of $38.12 billion expected by analysts polled by LSEG. AMD News - The semiconductor maker rose about 11% after it inked a multiyear deal with Meta to lend up to 6 gigawatts of its graphics processing units to artificial intelligence data centers. - The cost of the deal is unclear, but the companies' agreement includes a a performance-based warrant that could amount to up to 160 million of AMD shares, according to a statement dated Tuesday. - Meta has committed to deploying up to 6 gigawatts (GW) of AMD's Instinct GPUs (high-end graphics processing units optimized for AI workloads) to power its massive AI data centers. - Analysts estimate the GPU portion alone could be worth $60–$100+ billion over 5+ years Mortgage Rates - The average rate on the popular 30-year fixed mortgage fell to 5.99% on Monday, according to Mortgage News Daily, matching its lowest levels since 2022. - Last year at this time the rate was 6.89%. - A buyer putting 20% down on the median priced home, about $400,000 according to the National Association of Realtors, would have a monthly payment of $1,916 for the principal and interest. One year ago, that payment would have been $2,105, a difference of $189. Life Insurance Record - Manulife Financial Corp. sold a $300 million life insurance policy in Singapore, topping what Guinness World Records certified as the most valuable policy ever issued. - The policy surpasses the previous record of $250 million, set by HSBC Life in Hong Kong in 2024. Manulife said in a statement Tuesday that the deal reflects growing demand from ultra-wealthy clients to preserve their assets. - In Singapore over the past 12 months, Manulife has issued 25 individual policies each worth more than $50 million. Bitcoin Rout - Gemini said it was axing as much as a quarter of its staff and exiting the UK, European Union and Australia entirely. - This week, it parted with its chief operating officer, chief financial officer and chief legal officer, all in a single day. - Its stock has fallen more than 80% from a post-listing high last year, collapsing its market value from a peak of almost $4 billion to under $700 million. Over the Greenland - USA sending a "hospital ship" over - Trump's post on the ship came hours after Denmark's Joint Arctic Command said it had evacuated a crew member who required urgent medical treatment from a U.S. submarine in Greenlandic waters, seven nautical miles outside of Greenland's capital, Nuuk. - Greenland said thanks but no thanks So Long! - U.S. investors are pulling money out of their own stock market at the fastest pace in at least 16 years as Big Tech returns fade and better-performing overseas markets look more attractive. - In the last six months, U.S.-domiciled investors have pulled some $75 billion from U.S. equity products, with $52 billion flowing out since the start of 2026 alone, the most in the first eight weeks of the year since at least 2010 AI Disruption - DOD (Disruption of Disrupters) - CrowdStrike -9.8% and other cybersecurity names under heavy pressure again as AI disruption fears build following Anthropic's Claude Code release - - Cybersecurity stocks are under broad pressure today, extending recent weakness following Friday's launch of Claude Code Security by Anthropic. Claude Code Security scans codebases for vulnerabilities and suggests software patches for human review, fueling a narrative that AI platforms may be moving more quickly into parts of the security workflow than investors had previously expected. For cybersecurity, that raises concern around the forward demand outlook and competitive positioning, particularly in areas tied to application security, cloud security, identity workflows, and security operations automation, where AI-native tools could start to narrow perceived differentiation. - The move suggests investors are still sorting through the implications for product overlap, pricing power, and competitive positioning as AI capabilities evolve quickly. - IBM shares dropping toward lows of the session; attributed to news that Claude can automate cobol modernization COBOL (Common Business-Oriented Language) is a high-level, English-like programming language created in 1959 for business, finance, and administrative data processing. It is renowned for its verbosity, readability, and reliability, processing massive amounts of transactions on mainframe systems,, notes NetCom Learning and IBM. Despite being decades old, it remains critical in banking, insurance, and government sectors. - It is estimated that 70-80% of the world's business transactions are processed by COBOL Grok's Prediction about Future of OpenAi/ChatGPT Scenario Likelihood (My Estimate) Key Factors Outcome for OpenAI/ChatGPT Thriving Leader Medium (40%) Sustained breakthroughs, partnerships (e.g., Microsoft), regulatory wins OpenAI as AI giant; ChatGPT as ecosystem hub for agents/robots Evolved Survivor High (50%) Adaptation to agents/hardware; mergers Exists but rebranded; ChatGPT integrated into daily life tools Decline/Acquisition Low (10%) Overcompetition, funding collapse Absorbed or legacy; ChatGPT commoditized or obsolete Quick check on Europe Shares - European company earnings growth is picking up this reporting season against a tentatively improving economic backdrop, but wary investors are demanding more than solid results to justify sky-high valuations. - Companies representing 57% of Europe's market capitalization have reported so far, achieving average earnings growth of 3.9% in the fourth quarter, ahead of estimates for a final result of a contraction of 1.1% --- That is a big differential.... +3.9 vs -1.1 Iran Talks - News over the weekend that Iran will look to discuss a variety of items and potentially get a deal.... energy, mining and aircraft - Best guess: Iran will string us along like Russia is doing and we will say we have some kind of bogus deal. --- There is some talk of US "going in" as we are building military presence. Supposedly there are some saying it could be a multi-week incursion. - What is the plan - Regime change? What is this? - A divided Supreme Court on Tuesday ruled that Americans can't sue the U.S. Postal Service, even when employees deliberately refuse to deliver mail. - By a 5-4 vote, the justices ruled against a Texas landlord, Lebene Konan, who alleges her mail was intentionally withheld for two years. Konan, who is Black, claims racial prejudice played a role in postal employees' actions. - Justice Clarence Thomas, writing for a majority of five conservative justices, said the federal law that generally shields the Postal Service from lawsuits over missing, lost and undelivered mail includes “the intentional nondelivery of mail.” - So can ballots just be thrown in garbage for mail-ins for one party that will throw out another party's?     Love the Show? Then how about a Donation? HE CLOSEST TO THE PIN for CATERPILLAR Winners will be getting great stuff like the new "OFFICIAL" DHUnplugged Shirt!     FED AND CRYPTO LIMERICKS   See this week's stock picks HERE Follow John C. Dvorak on Twitter Follow Andrew Horowitz on Twitter

    The Roundtable
    2/25/26 Panel

    The Roundtable

    Play Episode Listen Later Feb 25, 2026 95:33


    The Roundtable Panel: a daily open discussion of issues in the news and beyond. Today's panelists are Executive Vice President for Academic Affairs at Bard College, Director for the Center for Civic Engagement and Professor of Political Studies Jonathan Becker; public policy and communications expert Theresa Bourgeois; Dean of the College of Emergency Preparedness, Homeland Security and Cybersecurity at the University at Albany Robert Griffin, and Professor of Theatre at Siena University Mahmood Karimi Hakak.

    For Better Self & Net Worth
    Navigating Business Risks with Ryan Quirk, CEO Sparrow Risk Group

    For Better Self & Net Worth

    Play Episode Listen Later Feb 25, 2026 27:14


    In this episode, Ryan Quirk from Sparrow Risk Group discusses the various risks and threats businesses face today, particularly in the realm of cybersecurity. He shares insights from his extensive background in risk management and law enforcement, emphasizing the importance of understanding both threats and vulnerabilities. Ryan highlights the growing issue of business email compromise and social engineering attacks, providing practical advice for business owners to protect themselves. He also discusses the innovative programs Sparrow Risk Group is developing to enhance security for clients.takeawaysRyan Quirk has a diverse background in risk management and law enforcement.Sparrow Risk Group focuses on holistic risk mitigation rather than just security.Emotional reactions can cloud judgment in crisis situations.Predictions for 2023 included geopolitical conflicts and shifts in technology.Business email compromise is a significant threat to businesses.Social engineering exploits trust and urgency to manipulate individuals.Cybersecurity measures can be affordable and effective for businesses.Understanding vulnerabilities is key to mitigating risks.The importance of taking a moment to assess threats before reacting.Sparrow Risk Group is developing new programs to enhance client security.keywords: risk management, cybersecurity, business threats, social engineering, email compromise, security solutions, risk mitigation, Ryan Quirk, Sparrow Risk Group, business protection

    Cybersecurity Where You Are
    Episode 176: A Cybersecurity Journey of Incremental Wins

    Cybersecurity Where You Are

    Play Episode Listen Later Feb 25, 2026 36:03


    In episode 176 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager sit down with Brock Boggs, Director of Technology at Cityscape Schools and Multi-State Information Sharing and Analysis Center® (MS-ISAC®) member, and Maureen Kunac, Senior Product Manager at the Center for Internet Security® (CIS®). Together, they discuss Brock's story of using incremental wins to advance his organization on its cybersecurity journey.Here are some highlights from our episode:02:10. Getting started making the largest measurable impact with CIS-CAT® Pro Assessor03:52. Implementation Group 1: A filter for prioritizing secure configuration management efforts09:16. The use of essential cyber hygiene to build an on-ramp to a security controls program11:18. Navigating breakage, dependency, and other principles of change management13:37. Lessons learned from beta testing and enterprise rollout of security changes22:24. Advice: How to start on a journey of system hardening with measurable impactResourcesEpisode 163: K-12 Cybersecurity Made PracticalFormalizing K-12 Cybersecurity Policies in Less TimeCIS-CAT® Pro AssessorCIS-CAT Pro Results Focus on CIS Controls IG1CIS Critical Security Controls®Guide to Implementation Groups (IG): CIS Critical Security Controls v8.1What SLTTs Should Know About the FREE CIS SecureSuite MembershipIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

    AwesomeCast: Tech and Gadget Talk
    DJI Robot Vacuum Hack, Playable Tetris Magazine & Viral Olympic Moments | AwesomeCast 769

    AwesomeCast: Tech and Gadget Talk

    Play Episode Listen Later Feb 25, 2026 51:51


    Sorg and Podnar cover big and bizarre tech headlines: an alleged DJI robot vacuum security mess, AI-assisted “vibe coding,” and why camera-equipped home gadgets deserve extra caution. They also dig into the SAE Civic Progress Challenge (accessible mobility innovation), geek out over a playable Tetris magazine cover, and hit viral Winter Olympics moments—plus a Dunkin iced coffee mitten that's as ridiculous as it sounds. Includes Chachi's Video Game Minute and a Black History Month spotlight on Frederick McKinley Jones.

    Digital Government podcast
    What leadership through digital change actually looks like with Taimar Peterkop

    Digital Government podcast

    Play Episode Listen Later Feb 25, 2026 37:58


    Leadership in the public sector has always demanded resilience. This is best exemplified by three elements: 1) the ability to hold long-term vision steady while reacting to short-term pressures, 2) to build consensus across institutions that do not naturally cooperate, and 3) to keep an organisation moving when the ground shifts beneath it. Digital transformation has sharpened all of these demands. The leaders steering this process need more than technical knowledge. They need self-awareness, the capacity to build the team and trust it, and the judgment to know when a crisis is also an opportunity.In this episode of the Digital Government Podcast, hosted by Merle Maigre, Head of Cybersecurity at e-Governance Academy, we hear from Taimar Peterkop – former State Secretary of Estonia, former Director General of the Information System Authority, and now Senior Expert at the e-Governance Academy. Drawing on over two decades at some of Estonia's most consequential institutions, Peterkop shares practical wisdom on what it takes to lead through change and crisis – with honesty and without pretending to have all the answers.Tune in!

    Sorgatron Media Master Feed
    AwesomeCast 769: DJI Robot Vacuum Hack, Playable Tetris Magazine & Viral Olympic Moments

    Sorgatron Media Master Feed

    Play Episode Listen Later Feb 25, 2026 51:51


    Sorg and Podnar cover big and bizarre tech headlines: an alleged DJI robot vacuum security mess, AI-assisted “vibe coding,” and why camera-equipped home gadgets deserve extra caution. They also dig into the SAE Civic Progress Challenge (accessible mobility innovation), geek out over a playable Tetris magazine cover, and hit viral Winter Olympics moments—plus a Dunkin iced coffee mitten that's as ridiculous as it sounds. Includes Chachi's Video Game Minute and a Black History Month spotlight on Frederick McKinley Jones.

    Porozmawiajmy o IT
    Quo vadis cyber. O zagrożeniach i pracy w cybersecurity. Gość: Sebastian Burgemejster - POIT 307

    Porozmawiajmy o IT

    Play Episode Listen Later Feb 25, 2026 68:25 Transcription Available


    Witam w trzysta siódmym podcastu „Porozmawiajmy o IT”. Tematem dzisiejszej rozmowy są cyberzagrożenia i praca w branży cybersecurity.Dziś moimi gościem jest Sebastian Burgemejster – wdrażał, doradzał i audytował bezpieczeństwo informacji, IT, zarządzanie ryzykiem i zarządzanie jakością w różnych branżach i organizacjach, w tym o zasięgu międzynarodowym. Jest współwłaścicielem i dyrektorem zarządzającym spółek w Polsce i Wielkiej Brytanii, współzałożycielem The Antifragility Institute, byłym prezesem i członkiem zarządu Instytutu Audytorów Wewnętrznych IIA Polska. Posiadacz międzynarodowych certyfikatów zawodowych. Prywatnie miłośnik gór, biegania, sztuk walki i nowych technologii.W tym odcinku o cybersecurity rozmawiamy w następujących kontekstach:jak zmienił się krajobraz zagrożeń cyberbezpieczeństwa w ostatnich latach i co dziś budzi największy niepokójktóre typy ataków są obecnie najbardziej realne i kosztowne dla organizacjidlaczego w cyberbezpieczeństwie człowiek i procesy bywają większym zagrożeniem niż sama technologiajak wygląda codzienna praca specjalisty od bezpieczeństwa i jak bardzo odbiega od potocznych wyobrażeńco w pracy w cybersecurity generuje największy stres, a co daje poczucie sensu i satysfakcjijakie role i specjalizacje składają się dziś na szeroki ekosystem cyberbezpieczeństwaktóre stanowiska w cyber są obecnie najbardziej poszukiwane i gdzie widać przyszły wzrost zapotrzebowaniaod czego realnie zależą zarobki w cyberbezpieczeństwie i jak wygląda rynek finansowoczy możliwe jest wejście do branży bez klasycznego doświadczenia IT i jaka baza techniczna jest niezbędnajakie ścieżki wejścia do cybersecurity sprawdzają się najczęściej w praktycektóre kompetencje techniczne stanowią fundament pracy w obszarze bezpieczeństwajaką rolę odgrywają umiejętności miękkie, certyfikaty oraz długofalowe myślenie o rozwoju branżySubskrypcja podcastu:zasubskrybuj w Apple Podcasts, Spreaker, Sticher, Spotify, przez RSS, lub Twoją ulubioną aplikację do podcastów na smartphonie (wyszukaj frazę „Porozmawiajmy o IT”)poproszę Cię też o polubienie fanpage na FacebookuLinki:Profil Sebastiana na LinkedIn – https://www.linkedin.com/in/sebastian-burgemejster-cisa-crisc-cism-ccak-soc-2-expert-7b342a127/Jeśli masz jakieś pytania lub komentarze, pisz do mnie śmiało na krzysztof@porozmawiajmyoit.plhttps://porozmawiajmyoit.pl/307

    SUGTalks
    An Interview with Emel Morris, CIO at Central Bedfordshire Council

    SUGTalks

    Play Episode Listen Later Feb 25, 2026 35:35


    In our latest senior leader interview, Craig is joined by Emel Morris, CIO at Central Bedfordshire Council.Emel shares her journey from corporate communications into IT leadership and the skills that helped her transition into the role. She also outlines why today's CIO must focus on stakeholder engagement, change, and aligning technology to real service outcomes.Craig and Emel also discuss pressures on public sector services, cyber security, AI alongside the importance of inclusion and Women in SAP.To learn more about the UKISUG referral scheme, visit: https://www.sapusers.org/community-referral-scheme

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Tuesday, February 24th, 2026: Malicious JPEG Analysis; Calibre Vuln; jsPDF object injection; Roundcube Exploited

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Feb 24, 2026 7:04


    Another day, another malicious JPEG https://isc.sans.edu/diary/Another%20day%2C%20another%20malicious%20JPEG/32738 Calibre Path Traversal Leading to Arbitrary File Write and Potentially Code Execution CVE-2026-26064 CVE-2026-26065 https://github.com/kovidgoyal/calibre/security/advisories/GHSA-72ch-3hqc-pgmp https://github.com/kovidgoyal/calibre/security/advisories/GHSA-vmfh-7mr7-pp2w CVE-2026-25755: PDF Object Injection in jsPDF (addJS Method) https://github.com/ZeroXJacks/CVEs/blob/main/2026/CVE-2026-25755.md Roundcube Webmail Exploited CVE-2025-49113 https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10 https://www.openwall.com/lists/oss-security/2025/06/02/3

    Packet Pushers - Full Podcast Feed
    PP098: What Goes On Inside a Firewall?

    Packet Pushers - Full Podcast Feed

    Play Episode Listen Later Feb 24, 2026 57:47


    On today's show, we pop the lid off of a firewall (figuratively speaking) to understand what’s inside. We talk about how a packet moves through various packet-processing elements inside a firewall, how header analysis and de-encapsulation work, which hardware component has the biggest impact on performance, why stateful inspection still matters in an age of... Read more »

    Packet Pushers - Fat Pipe
    PP098: What Goes On Inside a Firewall?

    Packet Pushers - Fat Pipe

    Play Episode Listen Later Feb 24, 2026 57:47


    On today's show, we pop the lid off of a firewall (figuratively speaking) to understand what’s inside. We talk about how a packet moves through various packet-processing elements inside a firewall, how header analysis and de-encapsulation work, which hardware component has the biggest impact on performance, why stateful inspection still matters in an age of... Read more »

    TD Ameritrade Network
    Two Sides to "SaaS-pocalypse:" AI Threat v. Cybersecurity, Mag 7 Giants

    TD Ameritrade Network

    Play Episode Listen Later Feb 24, 2026 8:31


    The "SaaS-pocalypse" has arguments for and against it, says Ali Mogharabi. On the case justifying the sell-off, he notes new AI offerings causing growth outlook concerns that generate enough of a structural shift to rattle software's outlook. Ali makes another case for the sell-off being overdone in cybersecurity stocks like CrowdStrike (CRWD) and defense-centric companies. Ali also weighs on the risks posed to market giants Amazon (AMZN) and Microsoft (MSFT). ======== Schwab Network ========Empowering every investor and trader, every market day.Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – / schwabnetwork Follow us on Facebook – / schwabnetwork Follow us on LinkedIn - / schwab-network About Schwab Network - https://schwabnetwork.com/about

    Security Forum Podcasts
    S36 Ep20: Jaya Baloo

    Security Forum Podcasts

    Play Episode Listen Later Feb 24, 2026 18:14


    Today, Steve is in conversation with Jaya Baloo, COO at Aisle. One of the world's leading experts on quantum technology and cybersecurity, Jaya shares what the future of quantum computing looks like and what businesses can do to prepare for a quantum-prevalent world. She also offers her view of how cyber and quantum technology will co-evolve in the next 10 to 20 years. Key Takeaways: You should have started preparing for quantum yesterday. Cybersecurity stands out among areas of quantum as a space where quantum may first be used by governments to attack adversaries. More diversity is needed in quantum development.  Tune in to hear more about: How to begin your journey to quantum-ready today (8:17) How diversity can shape responsible development of quantum (13:48) Jaya Baloo's view on quantum in 10-20 years (15:58) Standout Quotes: “ Cybersecurity is something really special here because unfortunately we do not have only from quantum, the same ability to protect as we have to attack. And I worry that the first application of these technologies beyond the sensors, the first real application from governments will be that offensive use to attack our current cryptographic stack.” - Jaya Baloo “I think in general, especially now with the whole onslaught against everything DEI, I actually think it's such a shame to waste time on excluding anyone from anything. We really need the best skillset we can possibly get. And what you see is that, especially in areas like quantum, there's not enough diversity.” - Jaya Baloo “So what I really think that we need to think about is how do we democratize, as much as possible, access to our defense against a potential quantum threat, and how do we democratize the availability of quantum computing in order to benefit all of humanity?” - Jaya Baloo Read the transcript of this episodeSubscribe to the ISF Podcast wherever you listen to podcastsConnect with us on LinkedIn and TwitterFrom the Information Security Forum, the leading authority on cyber, information security, and risk management.

    Big Conversations by Ordinary People
    Banking 2.0: How KCB is Using AI to Transform Finance in East Africa

    Big Conversations by Ordinary People

    Play Episode Listen Later Feb 24, 2026 89:41


    In this episode of Big Conversations by Ordinary People, we dive deep into the technical and strategic world of banking with Carlton from KCB Bank. As AI continues to disrupt global markets, how is Uganda positioning itself?What we discuss in this 90-minute deep dive:The AI Regulatory Blueprint: How Uganda can lead the region in creating safe, effective AI frameworks for finance.Legacy vs. Innovation: The challenges and opportunities of moving traditional banking into a digital-first world.Financial Inclusion: Using technology to reach the unbanked and underbanked populations in East Africa.The Future of Work: How AI is augmenting (not just replacing) roles within the banking sector.Cybersecurity & Trust: Building robust systems to protect the digital identities of Ugandan citizens.Visionary Audio. Human Stories.Miratrax Studio.#KCBBank #AIBanking #UgandaFinance #DigitalTransformation #BigConvos #Miratrax #FinTechUganda #FutureOfMoney #BankingInnovationListen to more on: - Apple Podcasts: https://apple.co/3iDhPBe- Google Podcasts: https://bit.ly/3iDEu0p- Spotify: https://spoti.fi/3jEh9Np- Anchor: https://anchor.fm/bcop​

    Security Forum Podcasts
    S36 Ep20: Jaya Baloo

    Security Forum Podcasts

    Play Episode Listen Later Feb 24, 2026 18:14


    Today, Steve is in conversation with Jaya Baloo, COO at Aisle. One of the world's leading experts on quantum technology and cybersecurity, Jaya shares what the future of quantum computing looks like and what businesses can do to prepare for a quantum-prevalent world. She also offers her view of how cyber and quantum technology will co-evolve in the next 10 to 20 years. Key Takeaways: You should have started preparing for quantum yesterday. Cybersecurity stands out among areas of quantum as a space where quantum may first be used by governments to attack adversaries. More diversity is needed in quantum development.  Tune in to hear more about: How to begin your journey to quantum-ready today (8:17) How diversity can shape responsible development of quantum (13:48) Jaya Baloo's view on quantum in 10-20 years (15:58) Standout Quotes: “ Cybersecurity is something really special here because unfortunately we do not have only from quantum, the same ability to protect as we have to attack. And I worry that the first application of these technologies beyond the sensors, the first real application from governments will be that offensive use to attack our current cryptographic stack.” - Jaya Baloo “I think in general, especially now with the whole onslaught against everything DEI, I actually think it's such a shame to waste time on excluding anyone from anything. We really need the best skillset we can possibly get. And what you see is that, especially in areas like quantum, there's not enough diversity.” - Jaya Baloo “So what I really think that we need to think about is how do we democratize, as much as possible, access to our defense against a potential quantum threat, and how do we democratize the availability of quantum computing in order to benefit all of humanity?” - Jaya Baloo Read the transcript of this episodeSubscribe to the ISF Podcast wherever you listen to podcastsConnect with us on LinkedIn and TwitterFrom the Information Security Forum, the leading authority on cyber, information security, and risk management.

    Shawn Ryan Show
    #282 Nik Seetharaman - Former SpaceX's Head of Cybersecurity Critical Warning on AI Swarms

    Shawn Ryan Show

    Play Episode Listen Later Feb 23, 2026 369:10


    Nik Seetharaman is a special operations–trained cyber leader turned founder, known for bringing an operator's mindset to some of the most sensitive security programs in American industry. A former JSOC advance‑force operator attached to an East Coast Naval Special Warfare squadron, he ran advanced cyber warfare and close‑range reconnaissance missions before crossing over into the world of high‑stakes defense technology and enterprise security. In industry, Nik helped build and lead security at three of the most influential defense‑tech companies of the last decade. He served as head of cybersecurity operations at SpaceX and later led international cyber defense programs at Palantir, giving him a front‑row seat to how software, data, and security shape modern national power. He then became CIO and CISO at Anduril Industries, where he built the company's cybersecurity and weapons‑system security programs from the ground up while Anduril was racing to field autonomous systems for the Pentagon. Today, Nik is the founder and CEO of Wraithwatch, a cyber defense company born from his frustration that defenders are almost always forced to react second. At Wraithwatch, he is focused on “weaponizing” AI for defense at scale—using advanced models to help blue teams pre‑empt and out-iterate attackers instead of learning only from breaches and red‑team reports. Across each chapter of his career, he has carried forward the same core idea: apply special operations discipline, speed, and clarity of mission to how software, security teams, and AI‑driven defenses are built and run. Join the Waitlist - https://theglacierapp.com/waitlist Shawn Ryan Show Sponsors: Get started with Claude today at https://Claude.ai/srs Visit https://mauinuivenison.com/srs for a special deal for listeners of this show only. Go to https://helixsleep.com/SRS for 27% Off Sitewide. Go to https://shopbeam.com/SRS and use code SRS to get up to 50% off Beam Dream Nighttime Cocoa—grab it for just $32.50 and improve your sleep today. Try Rho Nutrition today and experience the difference of Liposomal Technology. Use code SRS for 20% OFF everything at https://www.rhonutrition.com/discount/SRS Nik Seetharaman Links: LI - https://www.linkedin.com/in/nikseetharaman Wraithwatch - https://www.wraithwatch.com X - https://x.com/nikseeth Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The CyberWire
    The basics broke telecom.

    The CyberWire

    Play Episode Listen Later Feb 23, 2026 31:28


    A senior FBI cyber official warns Salt Typhoon remains an ongoing threat. Data protection authorities issue a joint statement raising serious concerns about AI image creation. A Japanese semiconductor equipment maker confirms a ransomware attack. New number formats seek to reduce AI overhead. A low-skilled Russian-speaking threat actor compromised more than 600 Fortinet FortiGate firewalls. Spanish authorities have arrested four alleged members of Anonymous. CISA tags a pair of Roundcube Webmail flaws. Cybersecurity stocks fell sharply on news of a new security feature in Claude AI. Monday business breakdown. Brandon Karpf, friend of the show discussing sovereignty in space and cyber. Digital disruption drains drumsticks. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today Dave sits down with Brandon Karpf, friend of the show, and Maria Varmazis, host of T-Minus, as they are discussing sovereignty in space and cyber. Selected Reading FBI: Threats from Salt Typhoon are ‘still very much ongoing' (CyberScoop) Joint Statement on AI-Generated Imagery and the Protection of Privacy (International Enforcement Cooperation Working Group (IEWG)) Japanese chip-testing toolmaker Advantest suffers ransomware attack (Help Net Security) AI's Math Tricks Don't Work for Scientific Computing (IEEE) Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls (Infosecurity Magazine) Suspected Anonymous members cuffed in Spain over DDoS attack (The Register) CISA: Recently patched RoundCube flaws now exploited in attacks (Bleeping Computer) Anthropic Unveils 'Claude Code Security,' Sending Cyber Stocks Lower (Bloomberg) RSAC Innovation Sandbox finalists secure $5 million each. (N2K Pro Business Briefing) Cyber attack takes major chicken processor Hazeldenes offline leaving businesses without meat (ABC News) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Monday, February 23rd, 2026: Japanese Phishing; AI Agents Ignoring Instructions; Starkiller MFA Phishing

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Feb 23, 2026 6:33


    Japanese-Language Phishing Emails https://isc.sans.edu/diary/Japanese-Language%20Phishing%20Emails/32734 'God-Like' Attack Machines: AI Agents Ignore Security Policies https://www.darkreading.com/application-security/ai-agents-ignore-security-policies Starkiller: New Phishing Framework Proxies Real Login Pages to Bypass MFA https://abnormal.ai/blog/starkiller-phishing-kit

    Becker’s Healthcare Podcast
    Informatics, AI Governance, and Cybersecurity with Joseph Izzo, MD

    Becker’s Healthcare Podcast

    Play Episode Listen Later Feb 23, 2026 13:25


    In this episode, Joseph Izzo, MD, Chief Medical Information Officer at San Joaquin General Hospital, joins the podcast to discuss leading informatics and AI strategy in a public teaching hospital while balancing innovation, governance, and cybersecurity. He shares insights on emerging digital health tools, data driven care, and advice for clinicians navigating rapid technological change.

    PEBCAK Podcast: Information Security News by Some All Around Good People
    Episode 243 - Dutch Police Arrest For Their Own Mistake, Nancy Guthrie Location From Pacemaker, Spain Orders VPN Providers to Block Pirated Streams, Cybersecurity Interview Questions

    PEBCAK Podcast: Information Security News by Some All Around Good People

    Play Episode Listen Later Feb 23, 2026 50:21


    Welcome to this week's episode of the PEBCAK Podcast!  We've got four amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast   Please share this podcast with someone you know!  It helps us grow the podcast and we really appreciate it!   Simple 6 signup link https://simple6.co/r/CFUR98   Dutch Police arrest man for downloading confidential files https://therecord.media/netherlands-arrest-confidential-files-police Nancy Guthrie could be found using her pacemaker https://nypost.com/2026/02/15/us-news/nancy-guthrie-investigators-deploy-advanced-bluetooth-signal-detector-in-effort-to-find-pacemaker/  https://nypost.com/2026/02/17/us-news/former-marine-created-high-tech-bluetooth-signal-sniffer-to-find-nancy-guthrie/     Spain orders VPN providers to block pirate streams https://www.bleepingcomputer.com/news/legal/spain-orders-nordvpn-protonvpn-to-block-laliga-piracy-sites/  https://www.laliga.com/en-GB/news/official-statement-in-relation-to-the-blocking-of-ips-during-the-recent-ea-sports-laliga-matchdays-linked-to-illegal-cloudflare-practices  https://www.mcsweeneys.net/articles/the-millennial-captcha    Cybersecurity Interview Questions https://www.geeksforgeeks.org/ethical-hacking/cyber-security-interview-questions/      Dad Joke of the Week (DJOW)   Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Glenn - https://www.linkedin.com/in/glennmedina/ Scott - https://www.linkedin.com/in/scottmsavage/

    The Daily Scoop Podcast
    GSA reveals first round of awards for Alliant 3 contract

    The Daily Scoop Podcast

    Play Episode Listen Later Feb 23, 2026 5:16


    After a series of protests that led to a protracted evaluation period, the General Services Administration is moving forward with the Alliant 3 procurement, announcing Friday the first round of awards for the governmentwide IT services contract. GSA said in an online award notice that it received 133 proposals for the Alliant 3 Governmentwide Acquisition Contract (GWAC) solicitation and selected 43 winners for the first phase. Those not chosen are still eligible for future award phases until the agency has selected all 76 recipients, per the notice. The announcement comes more than a year after the GSA issued the request for proposals for the next iteration of the GWAC award, which has no maximum dollar ceiling, due to unsuccessful bid protests from multiple vendors. The latest iteration of the vehicle is a multiple-award, indefinite-delivery, indefinite-quantity contract for a variety of IT-based services that builds upon the GSA's Alliant and Alliant 2 GWACs. With these awards, agencies can issue task orders for services including cybersecurity, data solutions, systems engineering and cloud services, the GSA said. Longtime government contractors like Maximus, Booz Allen Hamilton, General Dynamics Information Technology, and Leidos were among the 43 phase one winners. Democratic lawmakers are once again pushing back on the Department of Homeland Security's expansive use of surveillance technology, with more than a dozen members of a House Oversight subcommittee expressing concern in a letter to Secretary Kristi Noem over the agency's processes for collection and analysis of cellphone data.The representatives pointed to recent reports of the agency procuring tools from Penlink, which is said to collect cellphone location data and allow customers to search for devices, and Paragon, a vendor known to enable access to a mobile device without the owner's knowledge or consent. Without guardrails, these tools introduce risks to data privacy and civil liberties, according to the signatories of the letter, which was led by Rep. Shontel Brown of Ohio, ranking member of the House Oversight Subcommittee on Cybersecurity, Information Technology, and Government Innovation. “Location data can reveal intimate details of a person's life, including where they live, work, worship, go to school, or seek medical care,” the lawmakers said. “DHS could use these tools to identify individuals for targeting based solely on their presence in certain locations, without a warrant or probable cause and regardless of their citizenship or residency status.” The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast  on Apple Podcasts, Soundcloud, Spotify and YouTube.

    Daily Stock Picks

    Absolutely the BEST podcast I have done if you're looking for a pre earnings analysis of $NVDA or a post earnings analysis of $MSFT or $AMZN. Absolute buy zones identified through Sidekick and spot on stock analysis of the memory names and Cybersecurity names. The longer live Youtube version has my entire process of getting ready for the podcast too. Click Here for the longer LIVE YouTube versionGet my FREE newsletter or sign up for the paid version with benefits like the Office Hours and tracking the portfolios in Savvy Trader ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://dailystockpick.substack.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠THESE SALES END SOON: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠TRENDSPIDER $9 2 week trial WEEKEND SALE - get any annual plan and I'll send you my 4 hour algorithm. ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Seeking Alpha's Tool kit ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠*BEST DEAL - SEEKING ALPHA BUNDLE - Save over $150 and get Premium and Alpha Picks together ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ALPHA PICKS - Want to Beat the S&P? Save $75 ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Seeking Alpha Premium - FREE 7 DAY TRIAL and 15% OFF⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEEKING ALPHA PRO - TRY IT FOR A MONTH FOR ONLY $89 ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠EPISODE SUMMARY

    Risk Management Show
    Why MORE Data Doesn't Mean BETTER Risk Models

    Risk Management Show

    Play Episode Listen Later Feb 23, 2026 24:39


    Discover exactly Why MORE Data Doesn't Mean BETTER Risk Models in this deep dive into credit risk. In this episode of the Risk Management Show, host Boris Agranovich is joined by Artem Lalaiants, CEO at RiskSeal, to explore the limitations of traditional credit bureaus. We discussed the critical difference between data volume and data relevance. Artem shares why adding more of the same information fails to improve underwriting and how "orthogonal" data—such as digital footprints and subscription behaviors—can unlock financial services for the underbanked. You will learn strategies for expanding into emerging markets using real-time insights that do not rely on regional bureau coverage. This conversation provides essential knowledge for any Chief Risk Officer or professional in Risk Management looking to modernize their credit scoring approach. As the Global Risk Community brings you expert discussions on topics ranging from Cyber Security to Sustainability, we aim to keep you ahead of the curve. If you want to be our guest or suggest a speaker, send your email to info@globalriskconsult.com with the subject line "Podcast Guest".

    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Stop ransomware without the hassle. Allow what you need and block the rest with ThreatLocker Zero Trust Platform — simple to deploy, simple to manage: https://www.threatlocker.com/dailycyber Check out Flare.io Academy at https://simplycyber.io/flare Secure Your Google Workspace Without the Guesswork: https://simplycyber.io/materialCheck out Pay-What-You-Can Antisyphon Training: https://simplycyber.io/antisyphon SC Academy - The Place for Cyber Careers: https://zpr.io/mYV5232V66Qn Join SC Discord: https://SimplyCyber.io/Discord News: https://cisoseries.com Follow SC: https://simplycyber.io/socials

    Irish Tech News Audio Articles
    How Artificial Intelligence is Reshaping Cybersecurity

    Irish Tech News Audio Articles

    Play Episode Listen Later Feb 23, 2026 6:43


    Last week, Irish consumers were warned that a range of household devices, including TV "dodgy boxes", could be secretly controlled by cybercriminals. Millions of these devices worldwide — including smart light bulbs, TVs, and other internet-connected gadgets — are susceptible to such attacks. Once inside your home network, attackers can monitor online activity and send fake messages that appear convincingly real. This is just one example of how quickly cyber threats are evolving. Critical infrastructures — such as hospitals, energy grids, and government services — are under constant attack. In response, researchers and policymakers are turning to artificial intelligence (AI) to strengthen digital defences. One of the most ambitious initiatives in this area is the EU-funded SYNAPSE project, a collaboration of 14 partners across eight countries. SYNAPSE aims to deliver an integrated risk and resilience management platform that provides holistic Situational Awareness (SA), cyber-incident response, and training and preparedness capabilities to safeguard critical environments. The platform is designed to detect cyber threats early, predict potential attacks, and guide security teams on how to respond effectively. To achieve this, SYNAPSE uses three powerful AI tools — explained here in simple terms. First, the platform learns what "normal" looks like within an organisation: how users log in, which files they access, and how devices communicate. When something deviates from this baseline, it raises an alert. Second, another component continuously scans global cybersecurity reports, databases, and open sources. It is like having an AI system that reads every cybersecurity article and threat bulletin worldwide and instantly identifies emerging risks relevant to your organisation. Third, the system connects different warning signals to forecast potential attacks before they fully unfold. It not only detects threats — it also recommends response strategies, helping security teams react faster and more effectively. These systems are currently being validated in real-world environments, including a hydrogen energy station in Germany, Cyprus's National Healthcare System, and a cyber-insurance company in Greece. But building powerful AI is only half the story. Whenever AI is deployed, strong ethical governance is essential. Eunomia Ltd, an Irish company, acts as the ethics and legal partner, ensuring that regulatory compliance, fundamental rights considerations, and trustworthy AI principles are embedded throughout the project lifecycle. Europe's new EU Artificial Intelligence Act (AI Act), which entered into force last year, classifies AI systems depending on the risk they pose for safety and fundamental rights and tailors the level of the intervention to the level of risk. The most regulated systems are the high-risk AI systems, which are those that may significantly affect individuals' safety or fundamental rights. Typical examples include AI used in employment and HR decisions (e.g., CV screening), access to education (e.g., exam scoring), creditworthiness and access to essential services (e.g., loan approvals), migration and border management (e.g., risk profiling), and certain law-enforcement or critical infrastructure uses. This classification triggers strict requirements, including robust risk management systems, human oversight mechanisms, transparency and documentation, technical robustness and accuracy, continuous monitoring and post-deployment evaluation. In parallel, the General Data Protection Regulation (GDPR) continues to regulate how personal data may be processed, including in the context of automated monitoring. While the AI Act does not apply directly to research-stage systems, responsible projects must anticipate these requirements. For this reason, SYNAPSE is being evaluated based on the EU's Assessment List for Trustworthy Artificial Intelligence (ALTAI) — a voluntary but influential framework developed by the Euro...

    Black Hills Information Security
    Palo Alto Fears China Retaliation – 2026-02-16

    Black Hills Information Security

    Play Episode Listen Later Feb 22, 2026 67:19 Transcription Available


    In this episode, the crew dives into reports that Palo Alto Networks allegedly avoided directly attributing a threat campaign to China over fears of retaliation—sparking a broader debate about corporate and government threat attribution, geopolitics, and whether attribution still matters in today's cyber landscape.They also explore the escalating AI arms race, including Meta's aggressive (and expensive) talent poaching, the growing rivalry between OpenAI and Anthropic, and what it all means for the future of the industry.Rounding out the episode, the team discusses the unintended consequences of the AI boom—like global hardware shortages stretching beyond GPUs to hard drives—and examines emerging prompt injection attack techniques, highlighting real-world examples and the growing security risks surrounding AI-powered tools.Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis

    The Signal
    What are AI agents and can they be trusted?

    The Signal

    Play Episode Listen Later Feb 22, 2026 14:21


    They used to be known as personal assistants, now you can just get an AI agent to plan your day, answer your emails and organise your life. But what are the risks around handing over control of your data, messages and payment methods to the latest wave of artificial intelligence tools?Today, computer security expert at Melbourne University Shaanan Cohney on how AI agents work and how close we are to AI taking our jobs. Featured: Dr Shaanan Cohney, Senior Lecturer in Cyber Security and Deputy Head for the School of Computing and Information Systems at the University of Melbourne

    Today in San Diego
    I-5 Closure, SDSU Cyber-Security Scam, San Diego Speed Limits

    Today in San Diego

    Play Episode Listen Later Feb 21, 2026 3:22


    Caltrans crews are closing three of the four northbound lanes on I-5 for multiple hours this weekend. San Diego State University says it was a victim of some kind of cyber-security scam. There is an effort underway to get drivers across the city of San Diego to slow down.     What You Need To Know To Start Your Saturday. 

    Chip Stock Investor Podcast
    Is AI Disrupting Cybersecurity? IS Palo Alto Networks In Trouble?

    Chip Stock Investor Podcast

    Play Episode Listen Later Feb 21, 2026 16:33


    Palo Alto Networks (PANW) is facing a volatile market, leading many to ask: is the "SaaS Apocalypse" finally hitting cybersecurity? We break down why the market is hammering the stock despite a clear secular growth trend in the industry.Since Nikesh Aurora took over in 2018, Palo Alto has spent $31 billion on multiple acquisitions to pivot from a simple firewall provider to a cloud and AI security powerhouse. We analyze the recent CyberArk deal, the shift in free cash flow margins, and why the company's platformization strategy is creating a longer payoff cycle for investors.If you are a PANW shareholder or looking for a value entry in cybersecurity, this video covers the essential valuation metrics.Join us on Discord with Semiconductor Insider, sign up on our website: www.chipstockinvestor.com/membershipSupercharge your analysis with AI! Get 15% of your membership with our special link here: https://fiscal.ai/csi/Sign Up For Our Newsletter: https://mailchi.mp/b1228c12f284/sign-up-landing-page-short-formIf you found this video useful, please make sure to like and subscribe!*********************************************************Affiliate links that are sprinkled in throughout this video. If something catches your eye and you decide to buy it, we might earn a little coffee money. Thanks for helping us (Kasey) fuel our caffeine addiction!Content in this video is for general information or entertainment only and is not specific or individual investment advice. Forecasts and information presented may not develop as predicted and there is no guarantee any strategies presented will be successful. All investing involves risk, and you could lose some or all of your principal.#PaloAltoNetworks #PANW #Cybersecurity #Investing #StockMarket #TechStocks #AI #SaaS #CloudSecurityNick and Kasey own shares of PANW

    The David Knight Show
    Interview: AI & The IoT: A Digital House of Cards Ready to Collapse

    The David Knight Show

    Play Episode Listen Later Feb 20, 2026 64:24 Transcription Available


    Cybersecurity veteran GoatTree warns that the Palantir hack, the Nancy Guthrie case, and even FBI search theatrics reveal a deeper truth: our hyper-connected AI infrastructure is riddled with backdoors, cloud vulnerabilities, and incompetence at the highest levels. From pacemakers and insulin pumps that can be hacked, to autonomous cars deciding who lives or dies, to drone swarms and IoT devices opening silent entry points, he argues we're building a fragile house of cards and calling it progress. The solution isn't more AI—it's less blind trust in centralized systems that can be weaponized, manipulated, or simply fail at scale.Money should have intrinsic value AND transactional privacy: Go to https://davidknight.gold/ for great deals on physical gold/silver For 10% off Gerald Celente's prescient Trends Journal, go to https://trendsjournal.com/ and enter the code KNIGHT Find out more about the show and where you can watch it at TheDavidKnightShow.com If you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughMail: David Knight POB 994 Kodak, TN 37764Zelle: @DavidKnightShow@protonmail.comCash App at: $davidknightshowBTC to: bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Become a supporter of this podcast: https://www.spreaker.com/podcast/the-david-knight-show--2653468/support.

    The David Knight Show
    Fri Episode #2206: Palantir: Building the Architecture of Total Control

    The David Knight Show

    Play Episode Listen Later Feb 20, 2026 123:34 Transcription Available


    ──────────────────────────────────────── 00:00:42:27 — Cybersecurity as Power, Not ProtectionCybersecurity is framed as a tool for centralized control and regime continuity rather than public safety, with Palantir cited as emblematic of surveillance-state architecture. ──────────────────────────────────────── 00:02:06:22 — Pam Bondi's Epstein Record ReexaminedQuestions resurface about Bondi's inaction on Epstein cases despite a public reputation for aggressively prosecuting trafficking crimes. ──────────────────────────────────────── 00:08:38:07 — Trump–Epstein Social Ties RevisitedPrior associations and evasive statements are revisited amid renewed scrutiny of elite political networks. ──────────────────────────────────────── 00:16:02:29 — From Ministry to Cold-Turkey Heroin RecoveryA missionary outreach in 1980s Madrid evolves into an international addiction recovery model emphasizing discipline, structure, and community over substitution therapy. ──────────────────────────────────────── 00:29:23:23 — Heroin, Shared Needles, and Spain's AIDS ExplosionIntravenous drug culture and prison conditions accelerate HIV transmission during one of Europe's worst heroin crises. ──────────────────────────────────────── 00:31:56:02 — Addiction as Spiritual and Social BreakdownRecovery is framed as rooted in restored relationships, accountability, and moral transformation rather than purely medical intervention. ──────────────────────────────────────── 00:58:25:07 — Palantir Hack and the “Backdoor State”Alleged breaches raise fears of embedded surveillance backdoors across government and corporate systems. ──────────────────────────────────────── 01:07:07:00 — Internet of Things as National Security LiabilityExpanding military and infrastructure interconnectivity is portrayed as multiplying systemic vulnerabilities rather than strengthening defense. ──────────────────────────────────────── 01:12:03:04 — Pentagon AI Expansion Despite Repeated BreachesVault 7, NSA hacks, and other incidents are cited as evidence that automation and AI integration are outpacing competence and safeguards. ──────────────────────────────────────── 01:17:22:01 — Offline Nuclear Systems vs. Cloud DefenseCold War air-gapped missile systems are contrasted with today's cloud-dependent defense architecture. ──────────────────────────────────────── 01:36:10:00 — Low-Tech Tools Defeat High-Tech DronesSimple heat shielding and optical tricks demonstrate asymmetric weaknesses in advanced surveillance and warfare technology. ──────────────────────────────────────── 01:44:29:12 — Autonomous Vehicle Ethics and Control HierarchiesAI-driven transportation raises unresolved questions about programmed value judgments, liability, and loss of human override authority. ──────────────────────────────────────── Money should have intrinsic value AND transactional privacy: Go to https://davidknight.gold/ for great deals on physical gold/silver For 10% off Gerald Celente's prescient Trends Journal, go to https://trendsjournal.com/ and enter the code KNIGHT Find out more about the show and where you can watch it at TheDavidKnightShow.com If you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughMail: David Knight POB 994 Kodak, TN 37764Zelle: @DavidKnightShow@protonmail.comCash App at: $davidknightshowBTC to: bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Become a supporter of this podcast: https://www.spreaker.com/podcast/the-david-knight-show--2653468/support.

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Friday, February 20th, 2026: DynoWiper Analysis; Vibe Passwords; IDE Extension Vulns; Gransstream GXP 1600 Vuln and PoC

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Feb 20, 2026 6:19


    Under the Hood of DynoWiper https://isc.sans.edu/diary/Under%20the%20Hood%20of%20DynoWiper/32730 Vibe Password Generation: Predictable by Design https://www.irregular.com/publications/vibe-password-generation Vulnerabilities (CVE-2025-65715, CVE-2025-65716, CVE-2025-65717) in four popular IDE Extensions https://www.ox.security/blog/four-vulnerabilities-expose-a-massive-security-blind-spot-in-ide-extensions/ Grandstream GXP1600 VoIP Phones https://www.rapid7.com/blog/post/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed/

    The REAL David Knight Show
    Interview: AI & The IoT: A Digital House of Cards Ready to Collapse

    The REAL David Knight Show

    Play Episode Listen Later Feb 20, 2026 64:24 Transcription Available


    Cybersecurity veteran GoatTree warns that the Palantir hack, the Nancy Guthrie case, and even FBI search theatrics reveal a deeper truth: our hyper-connected AI infrastructure is riddled with backdoors, cloud vulnerabilities, and incompetence at the highest levels. From pacemakers and insulin pumps that can be hacked, to autonomous cars deciding who lives or dies, to drone swarms and IoT devices opening silent entry points, he argues we're building a fragile house of cards and calling it progress. The solution isn't more AI—it's less blind trust in centralized systems that can be weaponized, manipulated, or simply fail at scale. Money should have intrinsic value AND transactional privacy: Go to https://davidknight.gold/ for great deals on physical gold/silver For 10% off Gerald Celente's prescient Trends Journal, go to https://trendsjournal.com/ and enter the code KNIGHT Find out more about the show and where you can watch it at TheDavidKnightShow.com If you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughMail: David Knight POB 994 Kodak, TN 37764Zelle: @DavidKnightShow@protonmail.comCash App at: $davidknightshowBTC to: bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Become a supporter of this podcast: https://www.spreaker.com/podcast/the-real-david-knight-show--5282736/support.

    The REAL David Knight Show
    Fri Episode #2206: Palantir: Building the Architecture of Total Control

    The REAL David Knight Show

    Play Episode Listen Later Feb 20, 2026 123:34 Transcription Available


    ──────────────────────────────────────── 00:00:42:27 — Cybersecurity as Power, Not ProtectionCybersecurity is framed as a tool for centralized control and regime continuity rather than public safety, with Palantir cited as emblematic of surveillance-state architecture. ──────────────────────────────────────── 00:02:06:22 — Pam Bondi's Epstein Record ReexaminedQuestions resurface about Bondi's inaction on Epstein cases despite a public reputation for aggressively prosecuting trafficking crimes. ──────────────────────────────────────── 00:08:38:07 — Trump–Epstein Social Ties RevisitedPrior associations and evasive statements are revisited amid renewed scrutiny of elite political networks. ──────────────────────────────────────── 00:16:02:29 — From Ministry to Cold-Turkey Heroin RecoveryA missionary outreach in 1980s Madrid evolves into an international addiction recovery model emphasizing discipline, structure, and community over substitution therapy. ──────────────────────────────────────── 00:29:23:23 — Heroin, Shared Needles, and Spain's AIDS ExplosionIntravenous drug culture and prison conditions accelerate HIV transmission during one of Europe's worst heroin crises. ──────────────────────────────────────── 00:31:56:02 — Addiction as Spiritual and Social BreakdownRecovery is framed as rooted in restored relationships, accountability, and moral transformation rather than purely medical intervention. ──────────────────────────────────────── 00:58:25:07 — Palantir Hack and the “Backdoor State”Alleged breaches raise fears of embedded surveillance backdoors across government and corporate systems. ──────────────────────────────────────── 01:07:07:00 — Internet of Things as National Security LiabilityExpanding military and infrastructure interconnectivity is portrayed as multiplying systemic vulnerabilities rather than strengthening defense. ──────────────────────────────────────── 01:12:03:04 — Pentagon AI Expansion Despite Repeated BreachesVault 7, NSA hacks, and other incidents are cited as evidence that automation and AI integration are outpacing competence and safeguards. ──────────────────────────────────────── 01:17:22:01 — Offline Nuclear Systems vs. Cloud DefenseCold War air-gapped missile systems are contrasted with today's cloud-dependent defense architecture. ──────────────────────────────────────── 01:36:10:00 — Low-Tech Tools Defeat High-Tech DronesSimple heat shielding and optical tricks demonstrate asymmetric weaknesses in advanced surveillance and warfare technology. ──────────────────────────────────────── 01:44:29:12 — Autonomous Vehicle Ethics and Control HierarchiesAI-driven transportation raises unresolved questions about programmed value judgments, liability, and loss of human override authority. ──────────────────────────────────────── Money should have intrinsic value AND transactional privacy: Go to https://davidknight.gold/ for great deals on physical gold/silver For 10% off Gerald Celente's prescient Trends Journal, go to https://trendsjournal.com/ and enter the code KNIGHT Find out more about the show and where you can watch it at TheDavidKnightShow.com If you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughMail: David Knight POB 994 Kodak, TN 37764Zelle: @DavidKnightShow@protonmail.comCash App at: $davidknightshowBTC to: bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Become a supporter of this podcast: https://www.spreaker.com/podcast/the-real-david-knight-show--5282736/support.

    Help Me With HIPAA
    CISA CPGs V2 Might Be the Best SMB Cybersecurity Approach Yet - Ep 548

    Help Me With HIPAA

    Play Episode Listen Later Feb 20, 2026 48:59


    Cybersecurity advice is everywhere — frameworks, standards, best practices, expert opinions — enough PDFs to last you the rest of the year. But for small and mid-sized businesses, the real question isn't "What guidance exists?" It's "What should we actually do that lowers our chances of having a really bad cyber day?" If you've ever looked at a massive cybersecurity framework and thought, "This feels like studying for a final exam I didn't sign up for," you're not alone. That's where CISA's updated Cybersecurity Performance Goals (Version 2.0) come in. Designed to be practical, prioritized, and actually usable, this streamlined approach may be the clearest cybersecurity foundation SMBs have seen yet. In this episode, we break down what changed, why it matters, and how to use it. More info at HelpMeWithHIPAA.com/548

    Breaking Into Cybersecurity
    Adiel Sheik Mohammed's Journey: From Networking to Cybersecurity Expertise

    Breaking Into Cybersecurity

    Play Episode Listen Later Feb 20, 2026 22:00


    Adiel Sheik Mohammed's Journey: From Networking to Cybersecurity ExpertiseIn this episode of Breaking into Cybersecurity, Adiel Sheik Mohammed shares his journey from his early exposure to computers through his father's training institute to becoming a cybersecurity expert. Adiel describes his academic background in telecommunication and networking, the pivotal decision to specialize in cybersecurity, and the certifications and hands-on experience that facilitated his transition. He discusses his roles, including his first cybersecurity job as a solution architect with WatchGuard, and elaborates on his continued learning through certifications. Adiel also talks about his contributions to the field, including authoring books on AI's impact on SOC and cybersecurity and his ongoing doctorate focused on AI and cybersecurity. The episode concludes with advice for aspiring cybersecurity professionals on networking, certifications, and staying current with industry developments.https://www.linkedin.com/in/shadeel/https://speakerhub.com/speaker/adeel-shaikh-muhammadhttps://adeel.solutionshttps://www.amazon.com/dp/B0DG66357Nhttps://www.amazon.com/dp/B0F3DCKYQ9https://www.amazon.com/dp/B0DVC5Z3XZ00:00 Introduction and Guest Introduction00:53 Early Life and Initial Interest in Cybersecurity02:09 Transition to Cybersecurity04:35 First Cybersecurity Role05:43 Certifications and Continuous Learning07:31 Writing Books and Doctorate Journey10:19 Current Work and Future Plans18:44 Advice for Aspiring Cybersecurity Professionals21:35 Conclusion and Final ThoughtsSponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It's a conversation about what they did before, why they pivoted into cyber, what the process was they went through, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership, as well as tips/tricks/advice from cybersecurity leaders.Check out our books:The Cybersecurity Advantage - https://leanpub.com/the-cybersecurity-advantageDevelop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level https://amzn.to/3443AUIHack the Cybersecurity Interview: Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roleshttps://www.amazon.com/Hack-Cybersecurity-Interview-Interviews-Entry-level/dp/1835461298/Hacker Inc.: Mindset For Your Careerhttps://www.amazon.com/Hacker-Inc-Mindset-Your-Career/dp/B0DKTK1R93/---About the host:Christophe Foulon focuses on helping secure people and processes, drawing on a solid understanding of the technologies involved. He has over ten years of experience as an Information Security Manager and Cybersecurity Strategist. He is passionate about customer service, process improvement, and information security. He has significant expertise in optimizing technology use while balancing its implications for people, processes, and information security, through a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.com- Website: https://www.cyberhubpodcast.com/breakingintocybersecurity- Podcast: https://podcasters.spotify.com/pod/show/breaking-into-cybersecuri- YouTube: https://www.youtube.com/c/BreakingIntoCybersecurity- Linkedin: https://www.linkedin.com/company/breaking-into-cybersecurity/

    Cybercrime Magazine Podcast
    Cybercrime Wire For Feb. 20, 2026. Cyberattack Strikes UMMC, IT Systems Down. WCYB Digital Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Feb 20, 2026 1:29


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    Cybercrime Magazine Podcast
    Cybercrime Wire For Feb. 21-22, 2026. Weekend Update. WCYB Digital Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Feb 20, 2026 0:58


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    Logistics Matters with DC VELOCITY
    Guest: Fab Brasca of Kinaxis on who is leading in AI adoption; The top five freight bottlenecks; A new data threat is lurking

    Logistics Matters with DC VELOCITY

    Play Episode Listen Later Feb 20, 2026 20:05


    Our guest on this week's episode is Fab Brasca, senior vice president of market strategy at Kinaxis. The use of artificial intelligence is growing and its potential impacts on supply chains might be practically limitless. But how fast should companies move on adopting these technologies – and who is way ahead of the pack in implementing AI? Ben Ames answers these questions with today's guest.Our supply chains are supposed to be in motion to be efficient, yet a lot of the time our freight is stuck in neutral due to road congestion. The American Transportation Research Institute published its annual ranking of the country's worst freight bottlenecks this week. Find out where the worst bottleneck in America is snarling traffic.This week we learned about a new cybersecurity threat to worry about, and this comes from a brand new technology called quantum computing. In fact, this technology is no new that it's really still in development, not in the markets yet. But that isn't stopping hackers from using it already, as cyber-adversaries are harvesting companies' encrypted data now even though they can't open those files, because they plan to decrypt it on a future date, once quantum computing becomes powerful enoughSupply Chain Xchange  also offers a podcast series called Supply Chain in the Fast Lane.  It is co-produced with the Council of Supply Chain Management Professionals. The latest series is now available on Top Threats to our Supply Chains. It covers topics including Geopolitical Risks, Economic Instability, Cybersecurity Risks, Threats to energy and electric grids; Supplier Risks, and Transportation Disruptions  Go to your favorite podcast platform to subscribe and to listen to past and future episodes. The podcast is also available at www.thescxchange.com.Articles and resources mentioned in this episode:KinaxisChicago is home to the nation's top freight bottleneckReport: Hackers collect data today and will crack it tomorrow with quantum techVisit DC VelocityVisit Supply Chain XchangeListen to CSCMP and Supply Chain Xchange's Supply Chain in the Fast Lane podcastSend feedback about this podcast to podcast@agilebme.comThis podcast episode is sponsored by: WernerOther linksAbout DC VELOCITYSubscribe to DC VELOCITYSign up for our FREE newslettersAdvertise with DC VELOCITY

    Audio-Podcast – OrionX.net: Deep Insight, Market Execution, Customer Engagement
    Analyst Roundtable: BTC Bubbles, AI Agents, Super Bowl – OXD35

    Audio-Podcast – OrionX.net: Deep Insight, Market Execution, Customer Engagement

    Play Episode Listen Later Feb 20, 2026


    Analyst roundtable covering the big ideas in technology that are changing the world, with Adrian Cockcroft, Stephen Perrenod, Chris Kruell, and Shahin Khan. In this episode: - Scientific Bitcoin Institute (BSI) - Bitcoin update - AI Agents, OpenClaw - Emergent abilities in AI - Memory shortage - Super Bowl ads, Sports tech - Social Media Bans [audio mp3="https://orionx.net/wp-content/uploads/2026/02/OXD035_ART-11_20260219.mp3"][/audio] The post Analyst Roundtable: BTC Bubbles, AI Agents, Super Bowl – OXD35 appeared first on OrionX.net.

    AI Briefing Room
    EP-480 Ai Breakthroughs at Google

    AI Briefing Room

    Play Episode Listen Later Feb 20, 2026 2:53


    join wall-e's tech briefing for friday, february 20th, covering the latest developments in technology: google's gemini pro model 3.1: highlighting its enhanced language processing capabilities and success in independent benchmarks, this next-gen ai model is set to redefine real knowledge work. atm jackpotting surge: the fbi reports a significant rise in atm attacks using malware like ploutus, leading to $20 million in losses this year alone. nvidia's expansion in india: partnering with venture firms to support ai startups, nvidia is strengthening its footprint in the indian tech ecosystem. openai's funding milestone: nearing a $100 billion funding round with major investors, this push seeks to enhance openai's growth and edge toward profitability. redwood materials scale-up: expanding its energy storage business with new labs, redwood responds to growing demand from ai data centers and renewable energy sectors. tune in tomorrow for more tech news updates!

    Simply Cyber

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Stop ransomware without the hassle. Allow what you need and block the rest with ThreatLocker Zero Trust Platform — simple to deploy, simple to manage: https://www.threatlocker.com/dailycyber Check out Flare.io Academy at https://simplycyber.io/flare Secure Your Google Workspace Without the Guesswork: https://simplycyber.io/materialCheck out Pay-What-You-Can Antisyphon Training: https://simplycyber.io/antisyphon SC Academy - The Place for Cyber Careers: https://zpr.io/mYV5232V66Qn Join SC Discord: https://SimplyCyber.io/Discord News: https://cisoseries.com Follow SC: https://simplycyber.io/socials

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Thursday, February 19th, 2026: Malware Image Resuse; Dell RecoveryPoint; Admin Center Vuln; DNS-PERSIST-01

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Feb 19, 2026 7:04


    Tracking Malware Campaigns With Reused Material https://isc.sans.edu/diary/Tracking%20Malware%20Campaigns%20With%20Reused%20Material/32726 From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day Windows Admin Center Elevation of Privilege Vulnerability CVE-2026-26119 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26119 DNS-PERSIST-01: A New Model for DNS-based Challenge Validation https://letsencrypt.org/2026/02/18/dns-persist-01.html Defending Web Apps https://www.sans.org/cyber-security-courses/application-security-securing-web-apps-api-microservices

    The Lifestyle Investor - investing, passive income, wealth
    278: From a Billion-Dollar Exit To Reimaging IT & Cybersecurity with Bill Tyndall

    The Lifestyle Investor - investing, passive income, wealth

    Play Episode Listen Later Feb 19, 2026 51:21


    Businesses are implementing AI faster than most entrepreneurs realize. But the best opportunities aren't always in cutting-edge startups. In many cases, the best returns are in legacy businesses that haven't kept pace with the innovation curve. Understanding that gap—and how to close it—has defined the career of today's guest.Bill Tyndall is the founder of Tynrose, a holding company focused on modernizing legacy businesses through digital transformation, data, cybersecurity, and AI. After launching Electric in 2016, which revolutionized IT support for SMBs, he had a billion-dollar exit just four years later. You'll hear how Bill's newest venture, Tynrose, builds platforms that don't just implement technology; they reimagine it and help companies move beyond patchwork solutions and into scalable solutions that are built to last in the digital world. His approach challenges outdated models and reframes what's possible when businesses stabilize their technology, leverage clean data, and deploy AI with intention.In this episode, you'll learn: ✅ How SMBs and legacy businesses may offer better AI-driven returns than tech startups.✅ Why Bill decided to start a new business after his billion-dollar exit, and what creating a legacy with his businesses means to him. ✅ Why AI is really just a capacity expander for humans and what the future holds for IT and cybersecurity in an AI-driven world.Show Notes: LifestyleInvestor.com/278Tax Strategy MasterclassIf you're interested in learning more about Tax Strategy and how YOU can apply 28 of the best, most effective strategies right away, check out our BRAND NEW Tax Strategy Masterclass: www.lifestyleinvestor.com/taxStrategy Session For a limited time, my team is hosting free, personalized consultation calls to learn more about your goals and determine which of our courses or masterminds will get you to the next level. To book your free session, visit LifestyleInvestor.com/consultationThe Lifestyle Investor InsiderJoin The Lifestyle Investor Insider, our brand new AI - curated newsletter - FREE for all podcast listeners for a limited time: www.lifestyleinvestor.com/insiderRate & ReviewIf you enjoyed today's episode of The Lifestyle Investor, hit the subscribe button on Apple Podcasts, Spotify, or wherever you listen, so future episodes are automatically downloaded directly to your device. You can also help by providing an honest rating & review.Connect with Justin DonaldFacebookYouTubeInstagramLinkedInTwitterSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    The Cybertraps Podcast
    INCH360 2025: Pete Tucker

    The Cybertraps Podcast

    Play Episode Listen Later Feb 19, 2026 8:38


    This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. Host Jethro D. Jones talks with Pete Tucker, developer at Drip7 and computer science instructor at Whitworth University, about the evolving role of AI in coding and education. Pete shares insights on teaching foundational skills, balancing AI assistance with deep learning, and how both students and professionals can use AI effectively while understanding its limitations. We're thrilled to be sponsored by IXL. IXL's comprehensive teaching and learning platform for math, language arts, science, and social studies is accelerating achievement in 95 of the top 100 U.S. school districts. Loved by teachers and backed by independent research from Johns Hopkins University, IXL can help you do the following and more:Simplify and streamline technologySave teachers' timeReliably meet Tier 1 standardsImprove student performance on state assessments

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Wednesday, February 18th, 2026: IR Phishing; Neenadu Android Backdoor; NiFi Bugs; LLMs Phishing; Encrypted RCS

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Feb 18, 2026 7:30


    Fake Incident Report Used in Phishing Campaign https://isc.sans.edu/diary/Fake%20Incident%20Report%20Used%20in%20Phishing%20Campaign/32722 Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets https://securelist.com/keenadu-android-backdoor/118913/ CVE-2026-25903: Apache NiFi: Missing Authorization of Restricted Permissions for Component Updates https://seclists.org/oss-sec/2026/q1/166 The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time https://unit42.paloaltonetworks.com/real-time-malicious-javascript-through-llms/ Encrypted RCS in iOS/iPadOS https://developer.apple.com/documentation/ios-ipados-release-notes/ios-ipados-26_4-release-notes

    Joey Pinz Discipline Conversations
    #818 Jason Magee:

    Joey Pinz Discipline Conversations

    Play Episode Listen Later Feb 18, 2026 103:12


    Send a textIn this wide-ranging and deeply thoughtful conversation, Joey Pinz sits down with Jason Magee, former CEO of ConnectWise and current CEO of Cynet, to unpack what leadership really looks like when the stakes are high and the noise is constant.Jason shares his personal journey through a major health challenge, a high-profile CEO transition, and the mindset shift required when moving from leading a global platform company to scaling a fast-growing cybersecurity organization. Together, they explore the difference between leaders and managers, how to spot real growth versus empty visibility, and why disciplined decision-making matters more than ever.The conversation dives deep into AI, automation, cybersecurity, and the realities MSPs face today—from talent shortages to increasing threat pressure and consolidation. Jason also opens up about motivation, legacy, burnout avoidance, and how leaders can stay grounded while navigating complexity.This episode is a masterclass in modern leadership, focus, and long-term thinking—for CEOs, founders, MSPs, and anyone responsible for building teams, platforms, and trust in a rapidly evolving industry.