POPULARITY
Categories
Send a textWelcome to the newest episode of the Serious Privacy podcast, where hosts Paul Breitbarth, Ralph O'Brien, and Dr. K Royal address the hot topic of agentic AI and the risks to #privacy, #dataprotection, #security, and #humanrights. We cover the basics as well as human attributes (or not) along with how to take the risks into consideration as a professional. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
This is a recap of the top 10 posts on Hacker News on February 23, 2026. This podcast was generated by wondercraft.ai (00:30): The Age Verification Trap: Verifying age undermines everyone's data protectionOriginal post: https://news.ycombinator.com/item?id=47122715&utm_source=wondercraft_ai(01:55): Ladybird adopts Rust, with help from AIOriginal post: https://news.ycombinator.com/item?id=47120899&utm_source=wondercraft_ai(03:21): Americans are destroying Flock surveillance camerasOriginal post: https://news.ycombinator.com/item?id=47127081&utm_source=wondercraft_ai(04:47): Elsevier shuts down its finance journal citation cartelOriginal post: https://news.ycombinator.com/item?id=47119530&utm_source=wondercraft_ai(06:12): Pope tells priests to use their brains, not AI, to write homiliesOriginal post: https://news.ycombinator.com/item?id=47119210&utm_source=wondercraft_ai(07:38): Binance fired employees who found $1.7B in crypto was sent to IranOriginal post: https://news.ycombinator.com/item?id=47127396&utm_source=wondercraft_ai(09:04): Hetzner (European hosting provider) to increase prices by up to 38%Original post: https://news.ycombinator.com/item?id=47121029&utm_source=wondercraft_ai(10:29): Magical Mushroom – Europe's first industrial-scale mycelium packaging producerOriginal post: https://news.ycombinator.com/item?id=47119274&utm_source=wondercraft_ai(11:55): FreeBSD doesn't have Wi-Fi driver for my old MacBook, so AI built one for meOriginal post: https://news.ycombinator.com/item?id=47129361&utm_source=wondercraft_ai(13:21): ASML unveils EUV light source advance that could yield 50% more chips by 2030Original post: https://news.ycombinator.com/item?id=47125349&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
New Book: Lost in Time — Our Forgotten and Vanishing Knowledge | An Interview with Jack R. Bialik | An Analog Brain In A Digital Age With Marco Ciappelli There's a particular arrogance embedded in how we talk about progress. We speak about innovation as if it moves in one direction only — forward, upward, smarter, faster. But what if the line isn't straight? What if it loops, doubles back, and occasionally vanishes entirely? That's the uncomfortable question at the center of my conversation with Jack R. Bialik. His book Lost in Time: Our Forgotten and Vanishing Knowledge doesn't read like a history lesson. It reads like a case file — evidence, example by example, that the civilization we assume is the most advanced in human history is also, in some critical ways, deeply amnesiac. Take cataract surgery. We learned it in the 1700s, right? Except we didn't. Indians were performing it in 800 BC. The ancient Egyptians and Babylonians had diagrams of the procedure dating back to 2,400 BCE. The knowledge existed, worked, and then — somewhere in the chaos of collapsing empires and burning libraries — it vanished. We didn't progress past it. We forgot it, and then reinvented it from scratch, centuries later, convinced we were doing something new. Or the Baghdad Battery: clay pots, 2,000 years old, that when filled with acid can generate 1.1 volts of electricity. We don't know what they used them for. We don't know who figured it out. We just know it worked, it existed, and then it didn't anymore. This is what Bialik calls the pattern of loss — and it's not random. It follows catastrophe: the Library of Alexandria, the systematic destruction of Mayan records, the slow erosion of oral traditions as writing systems took over. Knowledge disappears when the systems that carry it collapse. And here's where the conversation gets uncomfortably relevant: we are building those systems right now, and we are not thinking about how long they'll last. The curator at the Computer History Museum told Bialik that to preserve the data from early IBM PCs and Macintosh computers, they had to print it on paper. The floppy drives had become brittle. The formats were unreadable. The digital archive was failing — and the only solution was to go analog. A vinyl record from the 1920s still plays. A CD from the 1980s may not survive another decade. I've been thinking about this since we recorded. My brain is analog — that's not just a podcast title, it's a philosophy. I grew up in Florence, surrounded by things that had survived centuries because they were made to last: stone, fresco, manuscript. Then I jumped on the digital train like everyone else, seduced by infinite libraries on my phone, music on demand, knowledge at my fingertips. But what Bialik is pointing out is that fingertips are fragile. And so are hard drives. The deeper issue isn't storage format. It's the distinction Bialik draws between knowledge and wisdom. Knowledge is the data — the cataract surgery technique, the battery design, the pyramid engineering. Wisdom is knowing why it matters, when to use it, and what the consequences might be. We've gotten extraordinarily good at accumulating knowledge. We are considerably worse at transmitting wisdom. And wisdom, Bialik argues, doesn't live in databases. It lives in the space between people — in stories, in teaching, in the slow transmission of judgment across generations. That's why oral tradition survived when everything else failed. Not because it was more sophisticated, but because it was more human. It didn't require a device to run on. I don't know how to solve the digital longevity problem. Neither does Bialik — not yet. But I think the first step is admitting we have one. That's actually one of the quietest, most powerful arguments in the book: be humble. We don't know everything. We never did. And some of the things we've lost might be exactly what we need right now. The question isn't just what we've forgotten. It's what we're forgetting today, while we're too busy scrolling to notice. Grab Lost in Time: Our Forgotten and Vanishing Knowledge — link below — and spend some time with a perspective that goes very, very far back. Which is maybe the only way to see very, very far forward. And if this kind of conversation is what you come here for, subscribe to the newsletter at marcociappelli.com. More of this. Less noise. — Marco Ciappelli Co-Founder ITSPmagazine & Studio C60 | Creative Director | Branding & Marketing Advisor | Personal Branding Coach | Journalist | Writer | Podcast: An Analog Brain In A Digital Age ⚠️ Beware: Pigs May Fly |
This episode of the InfoSec Beat podcast focuses on careers in information security. Accenture CISO Kris Burkhardt talks with Dan Cosceari, the delivery lead for the Accenture Client Data Protection program, which helps internal teams treat client data properly and manage information security risk. Dan sees client data protection through customers' eyes. This customer-first mindset started in his restaurant days in New York City, and it drives how Dan protects client data today. Hear how he puts this into practice, advocates across the organization, and stays ahead of technology and regulatory changes.
Send a textWelcome to the newest episode of the Serious Privacy podcast, where hosts Paul Breitbarth and Dr. K Royal discuss the privacy and data protection news of the past couple of weeks. This week, Paul rants about digital sovereignty, K discusses new American legislation, especially to protection children's data, and together they also talk about the latest WhatsApp decision from the Court of Justice of the European Union. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
In this episode of Command Control Power, Jerry and Joe discuss recent weather experiences and delve into network topics, including the Unify travel router, the Unify 5G Max Dream Router, and data SIM options. They also share practical tips for streamlining tech tools like Text Expander shortcuts and explore innovative solutions like SPEED for bonding multiple internet connections. Additionally, they touch on topics like simplifying Amazon returns and considerations for international travel, providing humorous anecdotes and prudent advice along the way. 00:00 Introduction and Weather Chat 01:14 Network Talk: Ubiquiti Announcements 01:36 Unify Travel Router: Features and Criticisms 04:54 Dream Router 5G Max: A Versatile Solution 06:28 5G Max and LTE Backup: Deployment Insights 13:26 Affordable Data SIMs for Low-Income Users 18:41 International Travel: EIM Solutions 23:05 Speed.com: Bonding Multiple Connections 28:05 Understanding Data Plans and Router Compatibility 28:56 Currency Exchange for International Travel 33:29 Network Security and Data Protection 37:57 Text Expander Tips and Tricks 43:43 Venmo and ACH Payment Insights 48:11 Amazon Returns and Stock Picks 52:13 Conclusion and Listener Appreciation
The Gene Simmons of Data Protection: Protegrity's KISS MethodToday, we are releasing our final FINAL episode from our series, entitled The Gene Simmons of Data Protection - the KISS Method, brought to you by none other than Protegrity. Protegrity is AI-powered data security for data consumption, offering fine grain data protection solutions, so you can enable your data security, compliance, sharing and analytics.Episode Title: Navigating the Future of Data Management: Type Systems, Quantum Computing, and Protegrity's InnovationsIn our final-FINAL episode, we are speaking with Ave Gatton, Director of Generative AI. We talk about how AI safety doesn't end with training, it begins with inference. We explore the overlooked frontier of AI security, from prompt-injection, data leakage, and model manipulation. Ave helps to understand how you can build guardrails that operate in real time, and adapt to evolving threats.QuestionsWhat are inference-time threats and why are they becoming a critical focus in AI security? How do inference-time risks differ from training-time risks? Why is inference-time protection critical for safe, scalable AI adoption? How do inference-time threats vary across industries? Is there any industry where these attacks are most prevalent? Why are traditional security models insufficient at inference? What is the impact of inference-time breaches on AI adoption? What role does compliance play in shaping inference-time guardrails?What practical steps can organizations take to secure inference today? How can businesses balance performance with security when adding guardrails? Linkshttps://www.protegrity.com/https://www.linkedin.com/in/averell-gatton/Support this podcast at — https://redcircle.com/code-story-insights-from-startup-tech-leaders/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
Navigating Tough Conversations In this episode of The Secure Family Podcast, host Andy discusses the vital role of parents in safeguarding their families and emphasizes the importance of having open, sometimes uncomfortable, conversations with children. Special guest Jeff Hittner, founder of Ambitious Dads, shares his insights from over 25 years of coaching leaders and fathers. Jeff discusses how modern fatherhood involves succeeding at both work and home, and the necessity of continuous dialogue with children. Key topics include overcoming discomfort in discussing difficult subjects, the impact of parental anxiety on kids, and strategies to build a culture of communication at home. Jeff also suggests practical tools and methods like using ChatGPT for preparing conversations and establishing consistent family rituals to create an environment where critical discussions are a natural part of family life. For more from Jeff Hittner: https://www.ambitiousdads.com/ Take control of your data with DeleteMe. Because they sponsor the podcast you can get 20% off a privacy plan from DeleteMe with promo code: DAD. Connect
Send a textWelcome to the newest episode of the Serious Privacy podcast, where hosts Paul Breitbarth, Ralph O'Brien, and Dr. K Royal connect with Josh Schwartz of Phaselaw to discuss the increasing use of data subject access rights (DSARs) as a weapon. The resources required to handle such requests can be quite extensive. How do companies keep up? Maybe Josh has some insight. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
In today's Cloud Wars Minute, I explain why unified security strategies are essential in the GenAI Era.Highlights00:08 — One of the cornerstones of AI adoption is security. It's essential to get it right the first time and not backtrack, because compared to the security risks of the past, AI tools and the vast swathes of sensitive data they leverage are in a league of their own.00:25 — To mitigate these risks, organizations need to ensure that the pace of their security measures matches that of AI innovation. Now, the 2026 Microsoft Data Security Index report addresses these issues, how to leverage the incredible power of AI while keeping data secure.01:26 — Ultimately, the report suggests three priorities for organizations to protect their data while maximizing AI adoption. One is a conscious and deliberate move away from fragmented security tools towards a unified data security mechanism.01:45 — The report found that 47% of organizations surveyed had a GenAI-specific control in place, and this year's survey found that an astounding 82% of those questioned have already developed plans to incorporate GenAI into their data security ops.02:43 — When it comes to GenAI, the situation is tricky, because the technology serves both as a gateway for threat actors and as a mechanism for preventing them. When you get this balancing act right, the opportunities for growth are endless. Visit Cloud Wars for more.
None of Your Goddamn BusinessJohn Morgan Salomon said something during our conversation that I haven't stopped thinking about. We were discussing encryption, privacy laws, the usual terrain — and he cut through all of it with five words: "It's none of your goddamn business."Not elegant. Not diplomatic. But exactly right.John has spent 30 years in information security. He's Swiss, lives in Spain, advises governments and startups, and uses his real name on social media despite spending his career thinking about privacy. When someone like that tells you he's worried, you should probably pay attention.The immediate concern is something called "Chat Control" — a proposed EU law that would mandate access to encrypted communications on your phone. It's failed twice. It's now in its third iteration. The Danish Information Commissioner is pushing it. Germany and Poland are resisting. The European Parliament is next.The justification is familiar: child abuse materials, terrorism, drug trafficking. These are the straw man arguments that appear every time someone wants to break encryption. And John walked me through the pattern: tragedy strikes, laws pass in the emotional fervor, and those laws never go away. The Patriot Act. RIPA in the UK. The Clipper Chip the FBI tried to push in the 1990s. Same playbook, different decade.Here's the rhetorical trap: "Do you support terrorism? Do you support child abuse?" There's only one acceptable answer. And once you give it, you've already conceded the frame. You're now arguing about implementation rather than principle.But the principle matters. John calls it the panopticon — the Victorian-era prison design where all cells face inward toward a central guard tower. No walls. Total visibility. The transparent citizen. If you can see what everyone is doing, you can spot evil early. That's the theory.The reality is different. Once you build the infrastructure to monitor everyone, the question becomes: who decides what "evil" looks like? Child pornographers, sure. Terrorists, obviously. But what about LGBTQ individuals in countries where their existence is criminalized? John told me about visiting Chile in 2006, where his gay neighbor could only hold his partner's hand inside a hidden bar. That was a democracy. It was also a place where being yourself was punishable by prison.The targets expand. They always do. Catholics in 1960s America. Migrants today. Anyone who thinks differently from whoever holds power at any given moment. These laws don't just catch criminals — they set precedents. And precedents outlive the people who set them.John made another point that landed hard: the privacy we've already lost probably isn't coming back. Supermarket loyalty cards. Surveillance cameras. Social media profiles. Cookie consent dialogs we click through without reading. That version of privacy is dead. But there's another kind — the kind that prevents all that ambient data from being weaponized against you as an individual. The kind that stops your encrypted messages from becoming evidence of thought crimes. That privacy still exists. For now.Technology won't save us. John was clear about that. Neither will it destroy us. Technology is just an element in a much larger equation that includes human nature, greed, apathy, and the willingness of citizens to actually engage. He sent emails to 40 Spanish members of European Parliament about Chat Control. One responded.That's the real problem. Not the law. Not the technology. The apathy.Republic comes from "res publica" — the thing of the people. Benjamin Franklin supposedly said it best: "A republic, if you can keep it." Keeping it requires attention. Requires understanding what's at stake. Requires saying, when necessary: this is none of your goddamn business.Stay curious. Stay Human. Subscribe to the podcast. And if you have thoughts, drop them in the comments — I actually read them.Marco CiappelliSubscribe to the Redefining Society and Technology podcast. Stay curious. Stay human.> https://www.linkedin.com/newsletters/7079849705156870144/Marco Ciappelli: https://www.marcociappelli.com/John Salomon Experienced, international information security leader. vCISO, board & startup advisor, strategist.https://www.linkedin.com/in/johnsalomon/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Dr. Gabriela Zanfir-Fortuna is a globally recognized data protection law expert, with 15 years of experience in the field split between Europe and the U.S., spanning academia, public service, consulting and policy. She currently is Vice President for Global Privacy at the Future of Privacy Forum, a global non-profit headquartered in Washington DC, coordinating FPF's offices and partners in Brussels, Tel Aviv, Singapore, Nairobi, and New Delhi, and leading the work on global privacy and data protection developments related to new technologies, including AI. She is also a founding Advisory Board Member of Women in AI Governance, and an affiliated researcher to the LSTS Center of Vrije Universiteit Brussel.Dr. Zanfir-Fortuna worked for the European Data Protection Supervisor and is a member of the Reference Panel of the Global Privacy Assembly – the international organization reuniting data protection authorities around the world, as well as a member of the T20 engagement group of the G20 under Brazil's Presidency in 2024.She was elected to be part of the Executive Committee of ACM's Fairness, Accountability and Transparency (FaccT) Conference (2021-2022). Her scholarship on the GDPR is referenced by the Court of Justice of the EU, and in 2023 she won the Stefano Rodota Award of the Council of Europe for the paper “The Thin Red Line: Refocusing Data Protection Law on Automated-Decision-Making“, alongside her co-authors. Dr. Zanfir-Fortuna holds a PhD in Law with a thesis on the rights of the data subject under EU Data Protection Law, and an LLM in Human Rights (University of Craiova).With our guest, here for a third time, we have gone through the logic of the Digital Omnibus package aiming to reform a cluster of important EU regulations, the “birth defects” of the AI Act, the importance of South Korea in the global data protection panorama, and the potential consequences of the recent CJEU case, Russmedia.References:* Gabriela Zanfir-Fortuna at the Future of Privacy Forum* Gabriela Zanfir-Fortuna on LinkedIn* Gabriela Zanfir-Fortuna: A world tour of data protection laws (Masters of Privacy, April 2021)* Data Protection vs. Privacy and Data Privacy: a January 28th conundrum (with Gabriela Zanfir-Fortuna, Masters of Privacy - 2025)* X v Russmedia Digital SRL (CJEU, December 2, 2025). This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.mastersofprivacy.com/subscribe
Growing speculation about a possible exchange of personal and biometric data between Australia and the USA is causing alarm among data protection and security experts. While other countries with visa-free entry agreements are expanding their cooperation with Washington, it remains unclear whether the Australian government is also planning such a step. Critics warn of risks to privacy and data security. - Wachsende Spekulationen über einen möglichen Austausch persönlicher und biometrischer Daten zwischen Australien und den USA sorgen bei Datenschutz- und Sicherheitsexpert*innen für Alarm. Während andere Länder mit visafreien Einreiseabkommen ihre Kooperationen mit Washington ausweiten, bleibt unklar, ob auch die australische Regierung einen solchen Schritt plant. Kritiker warnen vor Risiken für Privatsphäre und Datensicherheit.
Send us a textWhen we talk about the challenges presented to those trying to secure the operational landscape of manufacturing, it's tough to avoid what I'd call the usual suspects - endpoints, connection points, credentials, vulnerabilities, silos and, of course, the impact of artificial intelligence.And just as there are benefits to discussing these individual aspects, it's equally important to look at things from a bigger picture in tying them all together. This not only helps us strengthen the chain, but appreciate the significance of reinforcing each of those links.Perhaps no one has helped tie all of these different players together better than our guest for this episode. Vinod D'Souza leads the manufacturing and industry vertical for Google Cloud's Office of the CISO. Watch/listen as we discuss:Emerging vulnerabilities and response plans.Segmentation challenges in the era of constant technological expansion.New-age approaches to patching.The connected fibers of artificial intelligence and the human factors of cybersecurity.Addressing IT and OT silos.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
Send us a textWelcome to the Serious Privacy podcast, where Paul Breitbarth, Dr. K Royal, and Ralph O'Brien meet with Tom Kemp of the California Privacy Protection Agency. We talk about the new DROP system, priorities, history, and coordination with other agencies and lawmakers. Tom was previously on Serious Privacy, before his CPPA days. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
In this episode, Bernie McMeel, OSH Executive, and Neil O'Brien, Senior Employer Relations and Communications Executive, discuss the data protection responsibilities that arise when dealing with occupational safety and health issues. Thank you for listening. To explore all of Ibec's podcast offering, visit here. Make sure to follow Ibec Podcasts to stay up to date with new episodes.
professorjrod@gmail.comData protection didn't fail because encryption was weak; it faltered when trust was broken. In this episode of Technology Tap: CompTIA Study Guide, we explore how scattered systems, third-party vendors, and cloud replication complicate the question, “Where is our data right now?” We discuss why the true solution starts with people, not just technology. Whether you're a professor leading a study group, an IT professional preparing for your CompTIA exam, or anyone invested in IT skills development, this episode offers a practical map to not just pass tech exams but to uphold your promises in data security. Tune in for expert insights on technology education and effective tech exam prep strategies.We break down the crucial difference between data types and classifications, showing why labels don't override laws and how sensitivity should drive controls. You'll hear how data inventories, retention policies, and deletion-by-default strategies reduce both breach blast radius and legal exposure. We get specific about data states—at rest, in motion, in use—and the matching controls that actually hold up under pressure. Then we confront data sovereignty: how cross‑region replicas can quietly violate GDPR and how region‑restricted storage, geofencing, and vendor due diligence keep you on the right side of the border and the law.Privacy takes center stage as we clarify the roles of data subject, controller, and processor, and why documentation beats intention when regulators come calling. We outline what changes when a privacy breach occurs: tight timelines, mandated notifications, and the high cost of silence. Finally, we center the human layer with policies that guide behavior—acceptable use, social media, BYOD, clean desk—and an awareness training lifecycle that adapts to roles and evolving threats. Phishing drills, password hygiene, insider threat cues, and speak‑up culture turn security from slides into habits that stick.If this helped you think differently about compliance, data governance, and human risk, follow the show, share it with a teammate, and leave a quick review telling us which control you'll strengthen first. Your feedback helps more listeners protect what matters most.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Today, host Frank La Vigne and guest Candice Gillhoolley dive deep into IonQ's headline-making billion-dollar acquisitions that are reshaping the quantum landscape. From hardware with Skywater, to quantum networking through Skyloom Global, and even AI-driven software via Seed Innovations, IonQ is assembling a complete quantum ecosystem—building the supply chain of the future, right here and now.The conversation unpacks the big money flowing into quantum tech, why in-house chip fabrication matters in a world grappling with supply chain vulnerabilities, and what these moves mean for the industry's evolution. With insights on stock market reactions, defense tech hires, and the urgent quest for quantum-safe security, Frank La Vigne and Candice Gillhoolley explain why the next decade will be defined by quantum preparedness.Plus, they tease the launch of an inspiring new podcast, Women in Quantum, highlighting diverse journeys into the field and the culture-shaping opportunities ahead. Whether you're quantum curious or watching markets closely, this episode frames why the quantum age is truly dawning—and why it's time to start thinking quantum safe!LinksIonQ to buy SkyWater for $1.8 billion to expand hardware capabilities - https://www.reuters.com/technology/ionq-buy-skywater-18-billion-expand-hardware-capabilities-2026-01-26/?utm_source=chatgpt.com IonQ Finalizes Acquisition of Skyloom Global - https://thequantuminsider.com/2026/01/28/ionq-completes-skyloom-acquisition/ From Visibility to Advantage – Building a Quantum-Safe Intelligence Enterprise https://intelligencecommunitynews.com/ic-insiders-from-visibility-to-advantage-building-a-quantum-safe-intelligence-enterprise/ Time Stamps00:00 "Reflections on Tech Advancements"03:35 "Securing Semiconductor Supply Chains"07:49 "Quantum Industry Supply Chain Ambitions"11:34 Quantum Tech and Security Trends15:43 "Funny Daycare Story at NIST"16:55 "Data Protection & Future Predictions"22:16 "Winter Boots and School Sneakers"24:03 "Culture Shapes Opportunities"
In questa puntata entriamo nel cuore delle sfide più complesse e strategiche dell'Intelligenza Artificiale: quelle che riguardano sicurezza, responsabilità e diritti fondamentali in un contesto ad alta criticità come quello della difesa e dell'aerospazio.Pasquale Viscanti e Giacinto Fiore ospitano Fabio Bartolomeo, Group Data Protection & Responsible AI Officer di Leonardo, per approfondire il passaggio dalla protezione dei dati alla governance dell'AI, il ruolo del Responsible AI Officer, l'integrazione tra compliance, etica e innovazione e le implicazioni concrete dell'AI Act in grandi gruppi industriali.Libro HUMAN RELOADED: https://amzn.to/4evkVWvIncontra tutti i protagonisti dell'AI alla AI WEEK 2026: Arsenalia, PwC, AlterMind, NTT Data, Reply e tanti altri. Scoprili tutti su https://www.aiweek.it Pasquale Viscanti e Giacinto Fiore ti guideranno alla scoperta di quello che sta accadendo grazie o a causa dell'Intelligenza Artificiale, spiegandola semplice.Puoi iscriverti anche alla newsletter su: https://www.iaspiegatasemplice.it
Send us a textWe are back! Welcome to season 7 of the Serious Privacy podcast, with dr. K Royal, Ralph O'Brien and Paul Breitbarth. Also this season, we will keep you up to date of developments in the data protection and privacy community, artificial intelligence and some cybersecurity. And of course we'll bring you interviews with great guests! If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Adv Pansy Tlakula: Information Regulator Chairperson spoke to Clarence Ford ahead of International Data Privacy day (28 Jan) Views and News with Clarence Ford is the mid-morning show on CapeTalk. This 3-hour long programme shares and reflects a broad array of perspectives. It is inspirational, passionate and positive. Host Clarence Ford’s gentle curiosity and dapper demeanour leave listeners feeling motivated and empowered. Known for his love of jazz and golf, Clarrie covers a range of themes including relationships, heritage and philosophy. Popular segments include Barbs’ Wire at 9:30am (Mon-Thurs) and The Naked Scientist at 9:30 on Fridays. Thank you for listening to a podcast from Views & News with Clarence Ford Listen live on Primedia+ weekdays between 09:00 and 12:00 (SA Time) to Views and News with Clarence Ford broadcast on CapeTalk https://buff.ly/NnFM3Nk For more from the show go to https://buff.ly/erjiQj2 or find all the catch-up podcasts here https://buff.ly/BdpaXRn Subscribe to the CapeTalk Daily and Weekly Newsletters https://buff.ly/sbvVZD5 Follow us on social media: CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/CapeTalk CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567See omnystudio.com/listener for privacy information.
Today on the podcast, data protection. There's always been a tension between the need for companies to share data, whether among coworkers, partners, or customers; and the need to protect data, whether it's for security, privacy, compliance, and so on. That tension existed before AI, but the rise of third-party and external AI tools has... Read more »
Growing your business means adding vendors, cloud tools, and systems, but it also means increasing your exposure to data risk. In this episode of Cultivating Business Growth, Jaime Staley sits down with Timothy O'Hara, VP of Data Risk at The Hack Ninja, to break down data protection for small business in a way non-technical owners can actually understand and act on. You'll learn why small and mid-sized businesses are often more vulnerable than large enterprises, how vendor and third-party risk quietly creates exposure, and what "minimum viable" cybersecurity really looks like for growing companies without internal IT leadership. This conversation reframes cybersecurity as a leadership and growth issue, not just an IT problem, showing how strong data controls can reduce risk, speed up deals, improve valuations, and protect your reputation as you scale. In this episode, we cover: Why growing businesses are prime targets for data breaches The biggest misconceptions about cybersecurity and vendor responsibility How third-party tools and vendors create hidden risk What questions to ask vendors to protect your data Zero Trust explained for small business owners Practical first steps to improve data protection this quarter How strong security controls can actually accelerate growth Resources mentioned: Learn more about Tim's work at The Hack Ninja: https://thehackninja.com Access a complimentary cybersecurity education session for small business owners through The Hack Ninja website If you're scaling your business and relying on software, vendors, or cloud tools, this episode will help you understand where your risk lives, and how to address it before it becomes a costly problem.
Today on the podcast, data protection. There's always been a tension between the need for companies to share data, whether among coworkers, partners, or customers; and the need to protect data, whether it's for security, privacy, compliance, and so on. That tension existed before AI, but the rise of third-party and external AI tools has... Read more »
Rob Hughes — CISO at RSA and Champion of a Passwordless FutureNo Password Required Season 7: Episode 1 - Rob HughesRob Hughes, the CISO at RSA, has more than 25 years of experience leading security and cloud infrastructure teams. In this episode, he reflects on his unconventional career path, from co-founding the original Geek.com and serving as its Chief Technologist during the early days of the internet, to leading security and systems design at Philips Home Monitoring.Jack Clabby of Carlton Fields, P.A. and Kayley Melton welcome Rob for a wide-ranging conversation on identity, leadership, and the realities of modern cybersecurity. Rob currently leads RSA's Security and Risk Office, overseeing cybersecurity, information security governance, and risk across both RSA's products and corporate environment.Rob explains his dream for a passwordless future. He unpacks why passwords remain one of the largest sources of cyber risk, how real-world incidents and password-spraying attacks have accelerated change, and why phishing-resistant technologies like passkeys may finally be reaching a tipping point. The episode wraps with the Lifestyle Polygraph, where Rob lightens the conversation with stories about gaming with his kids, underrated horror films, and classic cars.Follow Rob on LinkedIn: https://www.linkedin.com/in/robert-hughes-816067a4/Chapters: 00:00 Introduction to No Password Required01:43 Meet Rob Hughes, CISO at RSA02:05 The Role of a CISO in a Security Company05:09 Transitioning to the CISO Role08:00 The Early Days of Geek.com12:14 Launching a Startup During the Dot Com Boom14:30 The Push for a Passwordless Future18:21 Tipping Point for Passwordless Adoption20:20 Ongoing Learning in Cybersecurity26:09 Managing Stress in High-Pressure Environments33:46 The Lifestyle Polygraph Begins34:15 Career Insights in Cybersecurity36:08 Dream Cars and Personal Preferences39:58 Underrated Horror Films41:19 Creating a Cybersecurity Monster
This episode features Andy Drag, Staff Product Manager at Cohesity.With a background in systems administration and two managed service provider startups, Andy brings deep, hands-on insight into the challenges IT teams face. Over the last decade, he's led product management across backup vendors and SaaS continuity platforms, shaping products around integrations, cyber recovery, and resilience.In this episode, Andy shows how ransomware has changed the stakes for backup and identity, and why they must be treated as tier-zero systems. He explains how attackers now target backup platforms, what tighter roles, isolation, and immutability look like in practice, and why actually rehearsing recovery is more important than any architecture diagram.This is a realistic look at whether your recovery plan will work in a real-world attack or only looks good on paper.Guest Bio Andrew Drag is a Staff Product Manager at Cohesity, focused on identity resilience and Microsoft enterprise applications.. He began his career in systems administration before founding two local managed service provider startups, giving him deep, hands-on experience with the challenges IT teams face. Over the last decade, he has transitioned into product management, shaping products across legacy backup and recovery vendors as well as SaaS business continuity platforms with specific focuses on integrations, cyber recovery, and SaaS-ification. Drawing on this blend of practitioner insight and product leadership, he is passionate about building solutions that help organizations stay resilient in the face of change. Based in the New York metro area, he brings a practitioner's perspective to product leadership, ensuring technology solves real-world challenges.Guest Quote "One of the most important things is testing your recoveries. In a disaster, when you do a recovery, you don't want it to be the first time that you're performing that recovery.”Time stamps 01:16 Meet Andrew Drag: Identity Resilience and Data Protection Expert 01:57 Why Traditional Data Protection Breaks Down 04:19 Modern Data Protection: From Backups to Resilience 05:47 The Hard Truth About Recovering After an Attack 08:43 Core Best Practices for Data Protection 10:32 Elevating Backup and Identity to Tier 0 13:23 Using Backup Data for AI and Analytics 16:22 Conclusion and Final ThoughtsSponsor The HIP Podcast is brought to you by Semperis, the leader in identity-driven cyber resilience for the hybrid enterprise. Trusted by the world's leading businesses, Semperis protects critical Active Directory and Entra ID environments from cyberattacks, ensuring rapid recovery and business continuity when every second counts. Visit semperis.com to learn more.Links Connect with Andy on LinkedInLearn more about CohesityConnect with Sean on LinkedInDon't miss future episodesLearn more about Semperis
In this episode, we explore the rising threat of privacy lawsuits hitting e-commerce and CPG brands. Richart Ruddie, Founder of Captain Compliance, explains how new legal technologies are helping attorneys target smaller businesses for tracking pixel violations. He shares how brands can protect themselves by automating compliance, fixing broken consent banners, and staying ahead of rapidly changing state and federal laws to avoid massive legal fees.Topics discussed in this episode: Why privacy lawsuits target CPG brands. How AI tech speeds up legal claims. What tracking pixels cause the most risk. Why common consent banners often fail. How session replay tools invite litigation. What 20 state laws mean for merchants. Why blocking EU traffic isn't enough. How automated portals handle data requests. What litigation protection shields offer. Links & Resources Website: https://captaincompliance.comLinkedIn: https://www.linkedin.com/in/richartruddie/YouTube: https://www.youtube.com/@captain-complianceGet access to more free resources by visiting the show notes at https://tinyurl.com/mv6f5jj2______________________________________________________ LOVE THE SHOW? HERE ARE THE NEXT STEPS! Follow the podcast to get every bonus episode. Tap follow now and don't miss out! Rate & Review: Help others discover the show by rating the show on Apple Podcasts at https://tinyurl.com/ecb-apple-podcasts Join our Free Newsletter: https://newsletter.ecommercecoffeebreak.com/ Support The Show On Patreon: https://www.patreon.com/EcommerceCoffeeBreak Partner with us: https://ecommercecoffeebreak.com/partner-with-us/
What does sovereignty actually mean? This week, Technology Now dives into the world behind the words, exploring the reality versus the fantasy of data and technological sovereignty. We ask how definitions can change across location, and why this is important to understand when trying to work across boarders. Sana Kharegani, Chief Strategy Officer at Carbon3.AI tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Sam Jarrell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Sana:https://www.linkedin.com/in/sana-khareghani-4346771/?originalSubdomain=ukSources:https://gdpr-info.eu/issues/fines-penalties/https://www.dataversity.net/articles/brief-history-cloud-computing/https://www.kiteworks.com/risk-compliance-glossary/data-sovereignty-protecting-our-digital-footprint-in-the-age-of-information/https://gdpr.eu/what-is-gdpr/
Send us a textJoin your hosts on this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien, and Dr. K Royal as they close out 2025 with favorite moments and episodes, state law review, and predictions. And of course, a little bit about EU data protection. We'll be back January 28, global privacy / data protection day! If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Nokukhanya Mntambo speaks to Themba Ndubane, Managing Director at Horizon Seven, about whether documents stored in the cloud are genuinely secure. They look at encryption gaps, poor password protection and how third-party platforms may leave South Africans more exposed than they think. The Money Show is a podcast hosted by well-known journalist and radio presenter, Stephen Grootes. He explores the latest economic trends, business developments, investment opportunities, and personal finance strategies. Each episode features engaging conversations with top newsmakers, industry experts, financial advisors, entrepreneurs, and politicians, offering you thought-provoking insights to navigate the ever-changing financial landscape. Thank you for listening to a podcast from The Money Show Listen live Primedia+ weekdays from 18:00 and 20:00 (SA Time) to The Money Show with Stephen Grootes broadcast on 702 https://buff.ly/gk3y0Kj and CapeTalk https://buff.ly/NnFM3Nk For more from the show, go to https://buff.ly/7QpH0jY or find all the catch-up podcasts here https://buff.ly/PlhvUVe Subscribe to The Money Show Daily Newsletter and the Weekly Business Wrap here https://buff.ly/v5mfetc The Money Show is brought to you by Absa Follow us on social media 702 on Facebook: https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/CapeTalk 702 on YouTube: https://www.youtube.com/@radio702 CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/Radio702 CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567 See omnystudio.com/listener for privacy information.
Send us a textOn this week of Serious Privacy, Ralph O'Brien, and Dr. K Royal connect with Charlie Silver of permission.io to discuss data ownership and trackable permission for online data. Of course, while Paul Breitbarth is out, Raph and K cannot help but challenge some of the positions - revoking #consent, #democracy, and #optimism. Somehow, we also wound up discussing #cryptocurrency. Join us.Please subscribe in your favorite podcast app - sharing is caring! If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
As we close out 2025 and prepare for 2026, Dr. Eric Cole breaks down what it truly takes to be a world-class CISO in the year ahead. In this episode of Life of a CISO, Dr. Cole shares hard-earned lessons on leadership, health, resilience, and why taking care of yourself is foundational to protecting your organization. From personal reflection to executive-level strategy, this episode goes far beyond technical controls. Dr. Cole then dives deep into the three forces reshaping cybersecurity in 2026: artificial intelligence, cloud reliability, and ransomware, all centered around one core principle that too many organizations ignore: data protection. You will learn why AI is an augmentation tool, not a replacement for humans, how unrestricted AI use is creating massive new risks, why recent cloud outages are a warning sign for every executive, and how CISOs can regain trust, influence, and a permanent seat at the boardroom table. This episode is essential listening for CISOs, security leaders, executives, and anyone responsible for protecting critical data in an increasingly unstable digital world. Part two of this series continues next week.
Send us a textOn this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien, and Dr. K Royal connect with Val Ilchenko, Eric Sendelbach, and Ian Runyon of TrustArc to discuss the launch of the Arc. Join us as we discuss the factors that went into developing the Arc, challenges for privacy and data protection professionals, and how AI is baked in to give professionals the tools they need at their fingertips. Please subscribe in your favorite podcast app - sharing is caring! If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Send us a textJoin us for a rip-roaring week in privacy on this episode of Serious Privacy, where co-hosts Paul Breitbarth and Dr. K Royal (Ralph O'Brien is off this week) cover quality, not quantity - although there is no shortage of current events. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
To varying degrees, Caribbean countries are grappling with the issue of privacy and data protection. Countries that have more recent frameworks have been struggling to fully operationalise all of the provisions, whilst there are others that have not adopted current best practice in the space. With information privacy specialists, Allison James of Barbados, and Rishi Maharaj of Trinidad and Tobago, we explore privacy and data protection trends and developments across the Caribbean region. During our conversation, we discuss: * how privacy and data protection have evolved over the past few years; * the current status of regulatory enforcement; * areas of divergence or contradiction that multinational companies operating across the Caribbean must navigate; and * trends or emerging developments that the Caribbean region may need to consider. The episode, show notes and links to some of the things mentioned during the episode can be found on the ICT Pulse Podcast Page (www.ict-pulse.com/category/podcast/) Enjoyed the episode? Do rate the show and leave us a review! Also, connect with us on: Facebook – https://www.facebook.com/ICTPulse/ Instagram – https://www.instagram.com/ictpulse/ Twitter – https://twitter.com/ICTPulse LinkedIn – https://www.linkedin.com/company/3745954/admin/ Join our mailing list: http://eepurl.com/qnUtj Music credit: The Last Word (Oui Ma Chérie), by Andy Narrell Podcast editing support: Mayra Bonilla Lopez ---------------
Today I am interviewing Sam Gabriel,He tells his clients what data to conceal or reveal. Sam has developed his privacy skills,He is now a privacy contractor at HewardMills!
Security used to be a headache. Now it is a growth engine.In this episode of IT Visionaries, host Chris Brandt sits down with Taylor Hersom, Founder and CEO of Eden Data and former CISO, to break down how fast growing companies can turn cybersecurity and compliance into a true competitive advantage. Taylor explains why frameworks like SOC 2, ISO 27001, and emerging AI standards such as ISO 42001 are becoming essential for winning enterprise business. He also shares how to future proof controls, connect compliance work to real business goals, and avoid the costly pitfalls that stall companies during scale.Taylor also highlights the biggest blind spots in AI security, including model training risks, improper data handling, and the challenges created by relying on free AI tools. If you are building a SaaS product or selling into large companies, this conversation shows how trust, transparency, and strong security practices directly drive revenue. Key Moments: 00:00 — The Hidden Risks of Scattered Company Data04:11 — Why Early-Stage Teams Lose Control of Security08:22 — Compliance Becomes a Competitive Advantage12:33 — SOC 2 vs ISO 27001: What Founders Need to Know16:44 — Framework Overload and How to Navigate It20:55 — Mapping Security Controls to Business Objectives25:06 — The Gap Between Compliance Audits and Real Threats29:17 — Startup Security Blind Spots That Lead to Breaches33:28 — Rising AI Risks Leaders Aren't Preparing For37:39 — Building Customer Trust Through Transparency41:50 — Protecting AI Models and Sensitive Customer Data46:01 — Why Free AI Tools Create Hidden Data Exposure50:12 — Automating Security Controls for Scale54:23 — Continuous Compliance Beats Annual Audits58:34 — Final Takeaways on Security, Trust, and Growth -- This episode of IT Visionaries is brought to you by Meter - the company building better networks. Businesses today are frustrated with outdated providers, rigid pricing, and fragmented tools. Meter changes that with a single integrated solution that covers everything wired, wireless, and even cellular networking. They design the hardware, write the firmware, build the software, and manage it all so your team doesn't have to.That means you get fast, secure, and scalable connectivity without the complexity of juggling multiple providers. Thanks to meter for sponsoring. Go to meter.com/itv to book a demo.---IT Visionaries is made by the team at Mission.org. Learn more about our media studio and network of podcasts at mission.org. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Danny Jenkins — Founder of ThreatLocker and the Zero-Trust RevolutionDanny Jenkins is the CEO of ThreatLocker, the leading cybersecurity company that he built alongside his wife. Hosts Jack Clabby of Carlton Fields, P.A., and Kayley Melton of the Cognitive Security Institute follow Danny's journey from a scrappy IT consultant to leading one of the fastest-growing cybersecurity companies in the world.Danny shares the moment everything changed: watching a small business nearly collapse after a catastrophic ransomware attack. That experience reshaped his mission and ultimately sparked the creation of ThreatLocker. He also reflects on the gritty early days—cold-calling from his living room, coding through the night, and taking on debt before finally landing their first $5,000 customer.Danny explains the origins of Zero Trust World, his passion for educating IT teams, and why adopting a hacker mindset is essential for modern defenders.In the Lifestyle Polygraph, Danny relates his early “revenge tech” against school bullies, the place he escapes to when celebrating big wins, and the movie franchise he insists is absolutely a Christmas classic.Follow Danny on LinkedIn: https://www.linkedin.com/in/dannyjenkins/ 00:00 Introduction to Cybersecurity and ThreatLocker02:26 The Birth of ThreatLocker: A Personal Journey05:42 The Evolution of Zero Trust Security08:35 Real-World Impact of Cyber Attacks11:25 The Importance of a Hacker Mindset14:46 The Role of SOC Teams in Cybersecurity17:34 Building a Culture of Security20:23 Hiring for Passion and Skill in Cybersecurity23:44 Understanding Zero Trust: Trust No One26:32 Lifestyle Polygraph: Personal Insights and Fun29:41 Conclusion and Future of ThreatLocker
Send us a textIn this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how BonFi AI is innovating in data security. Tune in to learn about the importance of context in data protection and the future of cybersecurity in a rapidly changing digital world.00:00:19 Introduction to Vishnu's Journey00:00:30 Entering the US and Cisco00:02:18 Cloud Security and AI00:02:48 Data Governance and Challenges00:08:47 The Expansiveness of Cloud00:11:00 AI's Appetite for Data00:12:11 Data Security in the JNI Era00:14:29 The Importance of Context00:16:13 Data Used by Enterprises00:22:24 Conclusion and Future Trendshttps://www.bonfy.ai/Bonfy.aiBonfy ACS is a next-gen DLP platform built for the AI era. Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast Affiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.
Data Protection and Staying Safe as an Author, with special guest Liz McLaughlin.As writers, we are often targeted by scams - from fake publishing services to phishing attempts to fraudulent marketing opportunities.In this episode, we invite Liz McLaughlin to help us learn how to recognize and avoid the scams. Plus, in a world of technology meltdowns (viruses, getting water on your laptop anyone like Lainey!), we talk about how to keep copies of our work safe.Liz has spent years supporting people through moments of stress, vulnerability, and uncertainty working as an information technology professional. With a background in psychology and social work, she brings a grounded, compassionate understanding of how emotions influence decision-making—and how scammers expertly exploit those moments. Join our Substack for posts with quick tips, and a chance to pose questions to Lainey and Paulette! Episode Resources:Writer Beware by Victoria StraussWeekly Writer Support Group - cohosted by Lainey Cameron and Charlotte Dune:Support Liz McLaughlin's work:Amazon author pageThe Supernova Cycle Series of booksEpisode Sponsor:12 Weeks to Book Launch Success . In this group mastermind program, Lainey works one on one with a group of authors and helps you create a plan to successfully launch your book. Join the waitlist for next time, or full program info here.
Finding it difficult to navigate the changing landscape of data protection? In this episode of the DMI podcast, host Will Francis speaks with Steven Roberts, Group Head of Marketing at Griffith College, Chartered Director, certified Data Protection Officer, and long-time marketing leader. Steven demystifies GDPR, AI governance, and the rapidly evolving regulatory environment that marketers must now navigate. Steven explains how GDPR enforcement has matured, why AI has created a new layer of complexity, and how businesses can balance innovation with compliance. He breaks down the EU AI Act, its risk-based structure, and its implications for organizations inside and outside the EU. Steven also shares practical guidance for building internal AI policies, tackling “shadow AI,” reducing data breach risks, and supporting teams with training and clear governance. For an even deeper look into how businesses can ensure data protection compliance, check out Steven's book, Data Protection for Business: Compliance, Governance, Reputation and Trust. Steven's Top 3 Tips Build data protection into projects from the start, using tools like Data Protection Impact Assessments to uncover risks early. Invest in regular staff training to avoid common mistakes caused by human error. Balance compliance with business performance by setting clear policies, understanding your risk appetite, and iterating your AI governance over time. The Ahead of the Game podcast is brought to you by the Digital Marketing Institute and is available on YouTube, Apple Podcasts, Spotify, and all other podcast platforms. And if you enjoyed this episode please leave a review so others can find us. If you have other feedback for or would like to be a guest on the show, email the podcast team! Timestamps 01:29 – AI's impact on GDPR & the explosion of new global privacy laws 03:26 – Is GDPR the global gold standard? 05:04 – GDPR enforcement today: Who gets fined and why 07:09 – Cultural attitudes toward data: EU vs. US 08:51 – The EU AI Act explained: Risk tiers, guardrails & human oversight 10:48 – What businesses must do: DPIAs, fundamental rights assessments & more 13:38 – Shadow AI, risk appetite & internal governance challenges 17:10 – Should you upload company data to ChatGPT? 20:40 – How the AI Act affects countries outside the EU 24:47 – Will privacy improve over time? 28:45 – What teams can do now: Tools, processes & data audits 33:49 – Data enrichment tools: targeting vs. Legality 36:47 – Will anyone actually check your data practices? 40:06 – Steven's top tips for navigating GDPR & AI
Send us a textOn this episode of Serious Privacy, Paul Breitbarth and Dr. K Royal (while Ralph O'Brien is out) connect with a long-time friend and colleague Teresa Troester-Falk. The topics are broad, but mainly center around her new book "So you got the Privacy Officer Title - Now what?" (amazon link) which has gained quite the popularity among privacy professionals and those who want to enter / grow in the field. Join us as we discuss the big topics and nuances around the CPO title and responsibilities - and visibility. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Send us a textHaving the Privacy MindsetIn this episode of The Privacy & Freedom Podcast, Forrest Garvin dives into the foundation of digital privacy — the mindset. Before you install a VPN, delete social accounts, or buy a Faraday bag, you must first understand how to think privately in a world built to watch you.Forrest explains why true privacy starts with awareness, discipline, and intention — not gadgets. He exposes how corporations, governments, and data brokers profit from your every click, and why reclaiming control isn't paranoia — it's freedom. You'll learn how to shift from convenience-driven habits to privacy-driven decisions that protect your identity, assets, and peace of mind.This episode explores the psychology behind privacy — how our digital behavior reveals who we are, and how adopting a “privacy mindset” helps you take back power over your data, your finances, and your future. Forrest shows that privacy and security are not optional anymore; they are acts of freedom and the first step toward real independence.At Garvin Academy, Forrest teaches these principles in depth through his flagship course, Disappear on the Internet — a 25-hour masterclass that helps people just like you separate their real life from their digital footprint. Because when it comes to modern freedom, privacy isn't a luxury… it's survival.Listen now to learn how to build your privacy mindset — and why privacy and security are freedom, not fear.SEO Keywordsprivacy mindset, digital privacy, online security, Forrest Garvin, Garvin Academy, data protection, personal freedom, anonymous living, privacy and security, digital footprint, online surveillance, privacy awareness, privacy course, disappear on the internet Take back control of your online privacy with Proton Mail, the world's most trusted encrypted email service. Built in Switzerland and protected by some of the world's strongest privacy laws, Proton Mail ensures your data stays yours—always.Proton Mail – Secure Email That Protects Your Privacy (60% OFF) FREE Webinars:Seating is limited, so reserve your spot now! Dissappear On the InternetCrypto Digital Assets CourseGain Free Join PrepperNet.Net - https://www.preppernet.netPrepperNet is an organization of like-minded individuals who believe in personal responsibility, individual freedoms and preparing for disasters of all origins.PrepperNet Support the showPlease give us 5 Stars! www.preppingacademy.com Daily deals for preppers, survivalists, off-gridders, homesteaders https://prepperfinds.com Contact us: https://preppingacademy.com/contact/ www.preppernet.net Amazon Store: https://amzn.to/3lheTRTwww.forrestgarvin.com
Anu Talus was elected Chair of the European Data Protection Board in May of 2023. The EDPB, which was established in 2018, ensures that the EU General Data Protection Regulation and Data Protection Law Enforcement Directive are consistently applied in the EU. It also provides general GDPR guidance, adopts findings to ensure the GDPR is implemented consistently across member nations, advises the European Commission on data protection matters, and encourages DPAs to work together. In other words, leading the EDPB is no small task, especially in an increasingly complex digital marketplace during the dawn of the AI Era. While here in Brussels, IAPP Editorial Director Jedidiah Bracy sat down with Chair Talus during an especially significant week in EU data protection on the eve of the release of the EU's Digital Omnibus package, which proposes to amend parts of the GDPR and other EU digital regulations. In this wide-ranging conversation, Bracy and Talus discuss the EDPB's priorities and work in these transformative times.
Send us a textOn this episode of the award-winning Serious Privacy, Paul Breitbarth, Ralph O'Brien, and Dr. K Royal bring you an analysis of the leaked GDPR revisions recorded live at the award-winning Privacy Space in the UK. Tune in to hear what might be happening. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Amanda Fuso is from Brazil,Over the years, she's picked up many privacy skills.On the show, we will talk about how her career began,Amanda is now a Data Protection Specialist at Softplan!
Send us a textPodcast Summary – Prepping Academy Podcast: “VPNs Explained – The First Line of Defense for Online Privacy”In this powerful episode of The Prepping Academy Podcast, host Forrest Garvin exposes the truth about VPNs (Virtual Private Networks) — what they really do, how they work, and which ones you can actually trust. As online tracking, censorship, and surveillance continue to rise, using a VPN has become a critical step in protecting your privacy, security, and freedom online.Forrest breaks down how VPNs encrypt your data, hide your location, and shield your digital activity from hackers, corporations, and even your internet provider. You'll discover the top VPNs for privacy, the red flags to avoid, and why many “free” VPNs are more dangerous than helpful. Plus, he shares insider tips on using VPNs with your smartphones, routers, and streaming devices for complete protection.If you value anonymity, freedom, and security in a connected world, this episode is a must-listen. Learn how to stay invisible online — the right way.Keywords: VPN, online privacy, cybersecurity, data protection, internet security, best VPNs 2025, anonymity online, PrepperNet, Prepping Academy Podcast, Forrest Garvin.FREE Webinars:Seating is limited, so reserve your spot now! Dissappear On the InternetCrypto Digital Assets CourseGain Freedom with a Home-Based Business Join PrepperNet.Net - https://www.preppernet.netPrepperNet is an organization of like-minded individuals who believe in personal responsibility, individual freedoms and preparing for disasters of all origins.PrepperNet Support the showPlease give us 5 Stars! www.preppingacademy.com Daily deals for preppers, survivalists, off-gridders, homesteaders https://prepperfinds.com Contact us: https://preppingacademy.com/contact/ www.preppernet.net Amazon Store: https://amzn.to/3lheTRTwww.forrestgarvin.com
Send us a textIn this episode of Serious Privacy, Ralph O'Brien and Dr. K Royal discuss the weekly news, including the Google settlement in Texas, ClearviewAI and much more. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
In this episode, we explore the intriguing balance between innovation and data privacy as we approach the AI Age. How will future technologies like AI, digital neural networks, and large language models reshape our world by 2045 or 2050? We'll dive into the implications of EU AI regulations and GDPR, discussing how they impact digital trust and ethics. Join host Punit Bhatia as he shares insights on how leaders are tackling these pressing issues in privacy laws and AI technology. Tune in for a thought-provoking discussion on the future of privacy that will keep you informed and engaged.KEY CONVERSATIONS 00:02:29 How do you see the future in 2045 or 2050? Will it all be digital? 00:13:27 How does one balance privacy and innovation? 00:19:39 Hypothetical question: An option to embed a chip on yourself, would you take it? 00:21:39 Understanding Digital Neural Network 00:27:06 About Nicola's Book: Artificial Intelligence, Neural Networks & Privacy 00:34:53 Where can we people get Nicola's current and upcoming books ABOUT THE GUEST Nicola Fabiano is a distinguished Italian lawyer with a rich background in data protection, privacy, and artificial intelligence (AI) regulation. As an adjunct professor at Ostrava University in Rome and a former President of the San Marino Data Protection Authority, he brings a wealth of expertise to the table. Nicola has served as a national expert for the Republic of San Marino on key committees of the Council of Europe, including those focused on Convention No. 108 and the Ad hoc Committee on Artificial Intelligence. With his extensive experience as a government advisor for drafting legislation on personal data protection and his innovative contributions such as the Data Protection and Privacy Relationships Model (DAPPREMO), Nicola is at the forefront of shaping AI policy and ethics. He is a certified professional in various domains including security management, data protection, and privacy assessment. Nicola's memberships in prestigious organizations like the European AI Alliance and his role as a technical expert for the European Data Protection Board further highlight his influence in the field. With numerous publications to his name, Nicola Fabiano continues to be a leading voice in the intersection of law, technology, and ethics. ABOUT THE HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organization culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentor and coach privacy professionals. Punit is the author of books “Be Ready for GDPR'' which was rated as the best GDPR Book, “AI & Privacy – How to Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured amongst top GDPR and privacy podcasts. As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's value to have joy in life. He has developed the philosophy named ‘ABC for joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe. RESOURCES Websites www.fit4privacy.com,www.punitbhatia.com, https://www.linkedin.com/in/nicfab/, https://www.fabiano.law/en/ , https://growskills.store/ Podcast https://www.fit4privacy.com/podcast Blog https://www.fit4privacy.com/blog YouTube http://youtube.com/fit4privacy
Send us a text