POPULARITY
Categories
In this episode, we explore the intriguing balance between innovation and data privacy as we approach the AI Age. How will future technologies like AI, digital neural networks, and large language models reshape our world by 2045 or 2050? We'll dive into the implications of EU AI regulations and GDPR, discussing how they impact digital trust and ethics. Join host Punit Bhatia as he shares insights on how leaders are tackling these pressing issues in privacy laws and AI technology. Tune in for a thought-provoking discussion on the future of privacy that will keep you informed and engaged.KEY CONVERSION 00:02:29 How do you see the future in 2045 or 2050? Will it all be digital? 00:13:27 How does one balance privacy and innovation? 00:19:39 Hypothetical question: An option to embed a chip on yourself, would you take it? 00:21:39 Understanding Digital Neural Network 00:27:06 About Nicola's Book: Artificial Intelligence, Neural Networks & Privacy 00:34:53 Where can we people get Nicola's current and upcoming booksABOUT THE GUEST Nicola Fabiano is a distinguished Italian lawyer with a rich background in data protection, privacy, and artificial intelligence (AI) regulation. As an adjunct professor at Ostrava University in Rome and a former President of the San Marino Data Protection Authority, he brings a wealth of expertise to the table. Nicola has served as a national expert for the Republic of San Marino on key committees of the Council of Europe, including those focused on Convention No. 108 and the Ad hoc Committee on Artificial Intelligence. With his extensive experience as a government advisor for drafting legislation on personal data protection and his innovative contributions such as the Data Protection and Privacy Relationships Model (DAPPREMO), Nicola is at the forefront of shaping AI policy and ethics. He is a certified professional in various domains including security management, data protection, and privacy assessment. Nicola's memberships in prestigious organizations like the European AI Alliance and his role as a technical expert for the European Data Protection Board further highlight his influence in the field. With numerous publications to his name, Nicola Fabiano continues to be a leading voice in the intersection of law, technology, and ethics. ABOUT THE HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organization culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentor and coach privacy professionals. Punit is the author of books “Be Ready for GDPR'' which was rated as the best GDPR Book, “AI & Privacy – How to Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured amongst top GDPR and privacy podcasts. As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's value to have joy in life. He has developed the philosophy named ‘ABC for joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe.RESOURCES Websites www.fit4privacy.com,www.punitbhatia.com, https://www.linkedin.com/in/nicfab/, https://www.fabiano.law/en/ Podcast https://www.fit4privacy.com/podcast Blog https://www.fit4privacy.com/blog YouTube http://youtube.com/fit4privacy
Send us a textJoin us on this episode of Serious Privacy, as Paul Breitbarth and Ralph O'Brien present the breaking news and hot events in data protection and privacy while Dr. K Royal was out this week. Tune in for a great discussion and catch up! If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
AI is rewriting the rules of cybersecurity—and compliance is struggling to keep up. In this powerful CyberTalks by InfosecTrain episode, host Anas sits down with experts Rajas Pingle and Nazia Sharieff to explore how to secure AI without stifling innovation.
For episode 619 of the BlockHash Podcast, host Brandon Zemp is joined by Markus Levin, Co-Founder of XYO. After 7+ years on Ethereum, XYO, the first DePIN project established in 2018 and predating the term, is officially launching XYO Layer One, its own L1 blockchain. Designed for DePIN, RWA, AI and other data-heavy industries, this new dual-token blockchain solves the issues holding back blockchain development today. XYO reported a revenue of $8.8M in 2024, and has attracted 80% of its users from outside the crypto space. The decision to migrate from the Ethereum L2 ecosystem was driven by XYO’s own demand for a high-efficiency blockchain after over 7 years of building data-heavy blockchain products for millions of users around the world. The new XYO Layer One blockchain will process large volumes of real-time data with low latency and provide proprietary data validation capabilities for projects that demand performance. XYO will first migrate its own products to the new XYO Layer One blockchain, and be followed by key partners ⏳ Timestamps: (0:00) Introduction(0:54) Who is Markus Levin?(4:50) What is XYO?(6:52) Biggest issues with Data today?(8:05) XYO Solutions(11:25) First Dual-token Layer-1(13:10) Earning XYO Token(16:02) Future of DePIN(19:02) Education resources(20:43) XYO Partnerships(21:10) AI in Data Protection(23:38) XYO roadmap 2025(24:19) Events & Conferences(25:05) XYO website & socials
Send us a textOn this week of Serious Privacy, Dr. K Royal connects with Tash Whitaker to cover all things top of mind in data protection. Paul Breitbarth and Ralph O'Brien were out, so Tash and K hit the microphone unfettered! Join us as we discuss DSARs, AI, and more - in the run up to the Privacy Space in London in less than a month away. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
How secure is your trucking operation against cyberattacks? Are you confident your team could spot a phishing email or fake shipper domain before it costs you thousands? Today, listen to cybersecurity expert Melanie Padron speaking about the growing threat landscape in transportation! We discuss why small and mid-sized carriers are prime targets, often hit hardest because they lack dedicated security resources, how AI-powered tools are helping companies stay ahead of evolving cyber risks, and practical solutions: employee training, incident response plans, vendor vetting, and partnering with cybersecurity professionals who understand trucking operations. The key message? “Trust but verify.” As National Cybersecurity Awareness Month reminds us, education and consistency are your best defense. Whether you run one truck or a 500-unit fleet, acquire strategies from this episode to secure your business and protect the future of the industry. About Melanie Padron Melanie Padron is a risk management expert and cybersecurity speaker who has made it her mission to protect trucking companies from cyber threats. She's been right there in the trenches when ransomware attacks hit, helping pick up the pieces after systems are encrypted and ransom demands arrive. After spending over 20 years in the insurance industry helping businesses recover from disasters, Melanie has shifted her focus to something she's even more passionate about: stopping those disasters from happening in the first place through proactive cybersecurity. Her connection to trucking is personal. Growing up working in her family's convenience stores, she watched the steady stream of trucks that kept their gas tanks filled and shelves stocked. Her uncle and aunt were owner-operators who crossed the country delivering freight, giving her firsthand insight into the dedication and sacrifice required to build a trucking business. Working with veteran-owned IT Architeks, Melanie helps trucking leaders secure their fleets and leverage AI to become more efficient and profitable. Her approach is simple: when trucking companies truly understand their risk, real protection begins. One company at a time, she's working to build cyber resilience in the trucking industry. Connect with Melanie Website: https://www.itarchiteks.com/ LinkedIn: https://www.linkedin.com/in/melanie-padron/
The Small Business Owner's Cybersecurity Guide Hackers don't need masks — and they don't wait until midnight to strike. Data Protection for Small Business - Cybersecurity for biz - cybersecurity 4 biz https://www.cybersecurity4biz.com/ Navy veteran and cybersecurity consultant Todd Mitchell shows small business owners how to: Protect client data with simple, daily cybersecurity practices Stop phishing, ransomware, and social engineering attacks Build a cyber-safe culture and stay compliant with HIPAA, GLBA, PCI-DSS, and CMMC 2.0 If you think you're too small to be hacked, think again. This Halloween, the real fright isn't in the shadows… it's in your inbox. Whether you're a solopreneur, entrepreneur, coach, consultant, or run a healthcare or financial practice, your business holds valuable client data — and cybercriminals want it. If you've ever thought, “I'm too small to be hacked,” think again. Cybersecurity for small business is no longer optional — it's essential to protecting your reputation, income, and clients' trust. Data Protection for Small Business - Cybersecurity for biz - cybersecurity 4 biz https://www.cybersecurity4biz.com/ Kundalini yoga FISTS OF ANGER https://youtu.be/ckO8aCA5HQw?feature=shared WINE and food Books: “The Spirit of Tequila, Aliento a Tequila” by Joel Salcido, and “Tequila Wars” by Ted Genoways. RESOUCES Data Protection for Small Business - Cybersecurity for biz - cybersecurity 4 biz https://www.cybersecurity4biz.com/ Purchase the book through these online shops: Google.com books BARNES & NOBLE EBOOK $7.99 99cents amazon kindle https://books.google.com/books/about/The_Small_Business_Owner_s_Cybersecurity.html?id=bHiW0QEACAAJ&source=kp_book_description You can join me at any of these events! “How do I protect my customers information?” (4th Thursday 12pm MST) – Ask SMB Anything Group https://www.alignable.com/groups/ask-smb-owners... " How do I keep my children safe online?” (3rd Thursday 12pm MST) - Business Parenting Collaborative Group https://www.alignable.com/groups/business-paren.. CONTACT VALERIE HAIL VALERIE@ALLINOURMINDS.COM WWW.ALLINOURMINDS.COM INTERESTED IN BECOMING a COMMUNITY BUILDER TO SUPPORT THE MONTHLY CHANGE MAKERS SERIES UNIQUE AND PROFITABLE AVENUE FOR MORE SUCCESS
____________Podcast Redefining Society and Technology Podcast With Marco Ciappellihttps://redefiningsocietyandtechnologypodcast.com ____________Host Marco CiappelliCo-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybersecurity #Society
Send us a textOn this episode of Serious Privacy, hosts Paul Breitbarth, Ralph O'Brien, and Dr. K Royal bring you a full week in privacy and data protection featuring new laws, new decisions, and new enforcement. We span from Pay to Play, to children's privacy, to California's Frontie AI - tune in... it's a hot one! If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Alastair Paterson is the co-founder and CEO at Harmonic Security, which secured $17.5 Million in Series A funding to bring its unique “zero-touch data protection” capabilities to enterprises. In this episode, Paterson joins host Paul John Spaulding to discuss the funding, what it will be used for, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com/
Jonathan Armstrong remains on assignment. Today, Tom Fox visits with fellow Texan Jim LaRoe, CEO of Symphion, to discuss data privacy, data protection, and compliance related to printer security in one of the most interesting podcasts Tom has done in some time. Jim provides insight into how 20-30% of network endpoints are printers, and alarmingly, 99% of these are unprotected. Printers, despite being integral to business functions, are typically left vulnerable, making them prime targets for sophisticated phishing and cyber-attacks. Jim shares his journey from a trial lawyer to founding Symphion in 1999 and explains Symphion's groundbreaking work in developing comprehensive security software for printers. Jim highlights the importance of a culture of compliance in managing endpoint security and the multifaceted challenges that come with securing printers. He emphasizes the collaborative effort needed among GRC compliance teams, IT, and supply chain departments to manage printer security effectively, and offers actionable steps for businesses to mitigate these risks. Learn more about your ad choices. Visit megaphone.fm/adchoices
Send us a text
Send us a textOn this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien of Reinbo Consulting, talk about the UK's plans to introduce a mandatory digital identity card. This is not the first time a proposal for mandatory ID has come up in the UK, and Ralph has thoughts about it. Paul on the other hand is a little surprised about the uproar, since mandatory ID has been introduced in the Netherlands many moons ago.UK Government press release"‘A hacker's dream': Britons on Keir Starmer's plan for digital ID cards" - The Guardian - 27 September 2025 If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Wrapping up this season of Data Bytes, we examine the expanded powers given to the Information Commissioner’s Office (ICO) and what this means for data protection investigations now and in the future. Host Rhiannon Webster is joined by Ashurst colleagues Anthony Asindi and Tom Brookes to zoom in on an area of the Data (Use And Access) Act that some have overlooked – the changes to the investigatory powers of the UK’s data protection regulator. The ICO (soon to be rebadged as The Information Commission) deals with a huge volume of complaints and data breach reports annually. Rhiannon, Anthony and Tom pinpoint three notable new powers that the ICO will soon have: to compel the production of documents, to require controllers or processors to provide a report on a specified matter, and to compel individuals to attend interviews and answer questions. As well as outlining which powers are effective now and when the other powers are likely to come into force, the podcast covers restrictions on the powers including privilege and self-incrimination – with a notable exception being where individuals may be required to answer potentially self-incriminating questions if they relate to Data Protection Act breaches. Anthony notes that refusing to cooperate could become "an aggravating factor" leading to higher fines for the controller or processor. Tom identifies the mandatory report power as a potential "game changer," shifting the investigative burden and costs to organisations while potentially allowing the ICO to investigate more cases. Anthony offers some illuminating comparisons with the FCA’s powers under the Financial Services and Markets Act (while cautioning that we don’t know certain that the ICO will follow a similar approach). And Tom adds that the ICO should soon provide guidance on its new powers and the circumstances where those might be applied. To listen to this – and all our previous Data Bytes episodes – search for “Ashurst Legal Outlook” on Apple Podcasts, Spotify or your favourite podcast player. And to find out more about the full range of Ashurst podcasts, visit ashurst.com/podcasts. The information provided is not intended to be a comprehensive review of all developments in the law and practice, or to cover all aspects of those referred to. Listeners should take legal advice before applying it to specific issues or transactions.See omnystudio.com/listener for privacy information.
For episode #104 I invited Jatin Jindal to talk us through the recent Ransomware Recovery and Data Recovery announcements. Jatin discusses what the VMware Ransomware Recovery entails, what the differences are between a ransomware recovery process and a disaster recovery scenario, and he talks about various roadmap items like tag-based selection, seeding, QLC support, and vSAN Cyber ReadyNodes. Interested in participating in the upcoming Storage, Data Protection, and Data Beta Programs? Sign up now by filling out this form: https://docs.google.com/forms/d/e/1FAIpQLSeXBC6_oAnkS8vCFztuLQFHx0qZ5xxJSmxbMkyPBvDFM0lHLg/viewformWatch Jatin's Explore sessions now:10 Amazing New Things with VMware Live RecoveryThe Isolated Clean Room Blueprint for On-Premises Based Cyber Recoveries
A new episode of Darnley's Cyber Café is here, and it's one you won't want to miss. We dive into a shocking story about a familiar childhood pastime that takes an unexpected twist into the world of surveillance, privacy, and hidden risks.This isn't just about toys, it's about what's happening behind the curtain in our digital world, and why parents should pay close attention.Pour yourself a cup, tune in, and discover why this story matters more than you think.Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.
On this episode of the Tudor Dixon Podcast, Nebraska Attorney General Mike Hilgers exposes the growing threats posed by foreign surveillance technology—especially from Chinese companies—and what it means for American privacy and national security. From everyday devices like baby monitors to popular apps such as TikTok, Hilgers warns how consumer technology can be weaponized for espionage, data harvesting, and misinformation campaigns. He underscores the urgent need for federal action and stronger safeguards while urging individuals to stay vigilant about the products and platforms they trust. The Tudor Dixon Podcast is part of the Clay Travis & Buck Sexton Podcast Network. For more visit TudorDixonPodcast.comSee omnystudio.com/listener for privacy information.
Send us a textOn this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien of Reinbo Consulting, and Dr. K Royal speak with Paul Iagnocco, Head of Customer Enablement at our sponsor TrustArc. Apart from catching up, the team speaks with our guest about the development and maintenance of data protection compliance programs, especially in this time where AI is becoming more and more important. Links:Linkedin AI training settingsSRB v EDPS on pseudonymous data (C-413/23) If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
This session provides an overview of the Data Protection Impact Assessment (DPIA) process and its relevance to AI-related projects, including the identification and mitigation of data protection risks.
In this episode with Stas Levitan, AI Governance Expert & Co-founder @ DeepKeep we dive deep into the wild west of AI security, shadow AI, and the real risks lurking behind your favourite GenAI tools. Stas shares hard-hitting insights on why most companies are blind to their AI usage, and how governance isn't just about tick-box compliance — it's about survival.Here's what we covered:AI Risk Starts Way Before You Deploy It Most think risk begins at runtime. Nope. It starts the moment you grab that model from a repo — and trust me, most are not as “safe” as they look.Shadow AI Is Everywhere Employees are quietly using ChatGPT, Gemini, and open-source models — often with good intentions, but zero oversight. Big risk, bigger blind spot.Guardrails Aren't Optional Anymore Enterprise AI needs serious guardrails — not just generic APIs. Think AI-native tools that track, monitor, and enforce behaviour in real time.LLMs Don't Forget… Ever Feed your chatbot personal data, and you might just see it pop up later — possibly in someone else's output. AI Security ≠ Traditional SecurityFirewalls won't save you here. This is about controlling model behaviour, not just access and networks. Totally different mindset needed.Big AI Providers = Not Enterprise-Ready The default tools don't cut it. The second you fine-tune a model or use it with your data — you own the risk.EU AI Act Isn't Just Hype — It's Happening Risk assessments, monitoring, documentation — this isn't optional for high-risk sectors. And no, you probably aren't ready yet.Step One: Get Visibility You can't protect what you can't see. Start by discovering what AI is actually being used in your org — you might be shocked. It's a frank and eye-opening conversation that every CIO, CISO, and compliance lead should hear. Tune in — and if you're using GenAI without a plan, maybe… stop.Stas Levitan can be contacted here •DeepKeep official website: https://www.deepkeep.ai•Stas Levitan LinkedIn: https://uk.linkedin.com/in/stas-levitanThe latest in Data Protection and Privacy Podcast by David ClarkeFollow me on Twitter @1davidclarke 98.6k FollowersJoin Linkedin GDPR Group 30,475 Others Members for FREE CoAuthor of an ICO certified GDPR scheme
Send us a textOn this episode of Serious Privacy, Paul Breitbarth brings us news from the Global Privacy Assembly held in Korea and Dr. K Royal has fun with privacy trivia! Ralph O'Brien is out this week. Open offer to all fans... if you answered all the questions correctly, send oneof us your address and we will send you a sticker for playing Trivacy! If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
In this episode of the Unsecurity Podcast, hosts Brad Nigh and Megan Larkins are joined by special guest Jim Nelson from FRSecure to dive deep into the world of cloud security. Whether you're using AWS, Azure, or GCP, understanding the right security protocols is crucial. Jim, a subject matter expert in cloud assessments, CIS benchmarks, and cloud infrastructure, shares valuable insights on common security pitfalls and best practices to enhance your cloud security posture.Topics Covered:- Introduction to cloud security challenges and opportunities.- Key areas often overlooked in cloud infrastructure security.- The importance of proper configuration and ongoing monitoring.- Best practices in identity and access management.- Effective data protection and governance strategies.- The significance of continuous vulnerability management.- Real-world experiences and lessons from security assessments.- Tips for leveraging CIS benchmarks and security frameworks.- Insights into collaboration security and conditional access policies.Join us for a comprehensive discussion that offers actionable advice to elevate your security efforts in the cloud. Perfect for InfoSec professionals and organizations looking to bolster their cloud security strategies.Here are some resources to help get you started:FRSecure's Cloud Security Checklist: https://frsecure.com/cloud-infrastructure-security-checklist/The CIS Benchmarks: https://www.cisecurity.org/cis-benchmarksDon't forget to like, subscribe, and share with your network to stay informed about the latest in cybersecurity!-- Looking to get in touch? Reach out at unsecurity@frsecure.com and follow us for more!LinkedIn: https://www.linkedin.com/company/frsecure/Instagram: https://www.instagram.com/frsecureofficial/Facebook: https://www.facebook.com/frsecure/BlueSky: https://bsky.app/profile/frsecure.bsky.socialAbout FRSecure:https://frsecure.com/ FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start or looking for a team of experts to collaborate with you, we are ready to serve.
How prepared is your business to face today's evolving cybersecurity threats? Are you confident your team could spot an AI-generated scam or respond to a ransomware attack in real time? Listen to Joe Ohr sharing the impact of the NMFTA Cybersecurity Conference, which was born out of the LTL industry's push to go digital and address the gap in security education and awareness. We discuss who the prime targets for cybercriminals are, how AI has changed the game for bad actors, and how the NMFTA conference equips attendees with real-world tools. With its peer-to-peer format, intimate setting, and focus on actionable outcomes, strengthen your defenses against the rising tide of cyber threats! NMFTA Cybersecurity Conference Registration: https://cyber.nmfta.org/cybersecurity-conference/register About Joe Ohr Joe Ohr has more than two decades of experience in technical operations, customer success management, customer support, and product support. Currently serving as the Chief Operating Officer for the National Motor Freight Traffic Association, Inc. (NMFTA)™, he plays a pivotal role in helping to advance the industry through digitization, classification, and cybersecurity. Prior to Ohr's role at NMFTA, he served as in numerous engineering and operations positions at Qualcomm and Eaton, and most recently held the position of Senior Vice President of Operations/Customer Experience at Omnitracs. Throughout his career, Ohr has provided strategic guidance, vision, and a roadmap for addressing long-term customer challenges. He has played a key role in accelerating revenue growth and has collaborated closely with IT, product, and engineering teams to foster stronger partnerships with strategic customers and peers. Additionally, Ohr has overseen post sales customer support and service teams, as well as operations, managing a workforce of over 400 individuals. He holds multiple certifications such as CCNA from Cisco and MCSE from Microsoft and earned his Bachelor of Science in Education from the Ohio State University. Due to his contributions to the industry, he earned a spot in the Inner Circle in 2015 and 2018 from Qualcomm and Omnitracs.
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam celebrate their five-year anniversary with guest Amren Gill, a data security solutions engineer at Microsoft. They delve into the complexities of data protection, focusing on Microsoft Purview's capabilities, including data classification, data loss prevention (DLP), and advanced data protection features. The conversation highlights the importance of securing data by default, leveraging AI for enhanced security measures, and the role of data security posture management (DSPM) in identifying and addressing security gaps. Amren also discusses the new Data Security Investigations tool, which aids in responding to data breaches effectively.----------------------------------------------------YouTube Video Link: https://youtu.be/MZBEW265WwU----------------------------------------------------Documentation:https://learn.microsoft.com/en-us/purview/deploymentmodels/depmod-securebydefault-introhttps://learn.microsoft.com/en-us/purview/purview----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: andy@bluesecuritypod.com----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: adam@bluesecuritypod.com
In today's episode, we are talking today about a recent Third Circuit decision that addressed how an employer's computer use policy might interact with state and federal laws that protect electronically stored confidential information. Subscribe to our podcast today to stay up to date on employment issues from law experts worldwide.Read Denise's article here.Host: Tara Stingley (email) (Cline Williams Wright Johnson & Oldfather, LLP)Guest Speaker: Denise Elliott (email) (McNees Wallace & Nurick LLC / Eastern Pennsylvania)Support the showRegister on the ELA website here to receive email invitations to future programs.
For episode 602 of the BlockHash Podcast, host Brandon Zemp is joined by Arjun Bhatnagar the CEO and Founder of Cloaked, a privacy-first tech company revolutionizing the way people control and secure their personal data. As a Forbes Under 30 entrepreneur and a recognized advocate for human-centered privacy innovation, he's led Cloaked to the forefront of zero-knowledge architecture, end-to-end encryption, and identity anonymization. His focus is always on empowering users with true data ownership and bringing ethical, user-controlled privacy into everyday applications.⏳ Timestamps: (0:00) Introduction(1:03) Who is Arjun Bhatnagar?(4:20) What is Cloaked?(6:22) Importance of data protection & privacy(10:26) Impact of new technologies on data privacy(15:38) Features & Solutions(20:32) Future solutions for users(22:55) Cloaked Hotline 855-752-5625(25:35) How Cloaked encrypts your data(27:58) Cloaked website, socials & community(29:00) Cloaked roadmap
Learn how to elevate Data Protection in the Age of AI with Ronan Murphy In this episode of CISO Tradecraft, host G Mark Hardy and guest Ronan Murphy, Chief Strategy Officer at Forcepoint, discuss the critical importance of data protection for enterprises in the age of AI. Discover expert insights on common mistakes CISOs make, how AI revolutionizes data security, and the evolving role of CISOs from enforcers to strategists. Learn about effective data governance, AI's impact on data, and leveraging tools like DLP & CASB for robust cybersecurity. Plus, hear about Forcepoint Aware 2025 and actionable strategies for elevating your organization's data security posture. https://www.forcepoint.com/aware Chapters 00:00 Introduction: The Importance of Data Security 00:26 Meet the Expert: Ronan Murphy's Background 02:40 Challenges in Data Protection 04:01 The Role of AI in Data Security 06:26 Strategies for Effective Data Management 19:05 Understanding Data Loss Prevention (DLP) 20:36 Exploring Cloud Access Security Brokers (CASB) 24:37 Data Security Posture Management (DSPM) 38:36 The Future Role of CISOs 40:30 Conclusion and Upcoming Events
Learn how to elevate Data Protection in the Age of AI with Ronan Murphy In this episode of CISO Tradecraft, host G Mark Hardy and guest Ronan Murphy, Chief Strategy Officer at Forcepoint, discuss the critical importance of data protection for enterprises in the age of AI. Discover expert insights on common mistakes CISOs make, how AI revolutionizes data security, and the evolving role of CISOs from enforcers to strategists. Learn about effective data governance, AI's impact on data, and leveraging tools like DLP & CASB for robust cybersecurity.Plus, hear about Forcepoint Aware 2025 and actionable strategies for elevating your organization's data security posture. https://www.forcepoint.com/aware
Send us a textOn this week of Serious Privacy, Ralph O'Brien of Reinbo Consulting and Dr. K Royal (Paul Breitbarth is travelling) discuss current events in privacy, data protection, and cyber law. Fascinating episode with all the hot stories which seem to follow a theme - adequacy and child online safety, plus some enforcements. Coverage includes the decision on the European Court's decision on the Latombe suit challenging the adequacy of the EU-US thingie, Brazil, Tazania, Argentina, Austrailia, China, ChatGPT, and so much more! If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
In this episode of The ROCC Pod, we sit down with Shawn Thornton, founder of Smart Biz IT and former tech leader at Amazon and Ford, to unpack the growing importance of cybersecurity and compliance for small and mid-sized businesses. We open with a real-world horror story—Shawn walks us through how one of his Michigan-based clients was completely taken out by ransomware. Two facilities, thousands of hacked printers, a wiped customer database, destroyed emails, inaccessible websites—no backups, no recovery, over a million dollars in losses. It's a sobering introduction to the stakes of not being prepared.After the wake-up call, we shift to get to know Shawn a bit more personally—his passion for barbecuing, cold smoking cheeses, and his undying loyalty to the Detroit Lions. The conversation is easygoing, but the subject matter stays serious as we transition back to the business of IT and compliance.Shawn breaks compliance down in simple terms—it's about proving that you're protecting your customer and business data. Whether it's strong passwords, verified backups, multi-factor authentication, or employee training, these small habits can be the difference between continuity and catastrophe. He emphasizes that compliance isn't just about avoiding trouble; it can actually become a revenue driver. Companies looking to secure government contracts, enterprise partnerships, or venture funding all need to demonstrate cybersecurity maturity. Compliance is no longer optional—it's a credential.We talk about what Smart Biz IT offers: full-service IT support with a lens focused on compliance. From help desk and cloud backups to risk assessments and documentation, Shawn's firm is helping businesses not only stay safe but grow. He shares another example of a client with a seven-figure deal on the table—except they couldn't move forward without a SOC 2 attestation. Now, with Shawn's help, they're on track to be ready in time.The episode closes with Shawn reflecting on his move into entrepreneurship, the unique value Smart Biz iT brings to the market, and his great experience since joining the Royal Oak Chamber. We also get to learn that his favorite day of the year is NFL's opening Sunday, and fall—complete with smoked meats and fantasy football—is his favorite season.Contact Shawn: https://smartbizit.com/Or call: (248) 206-910000:00 – Ransomware Nightmare: A $1M Recovery00:53 – Introduction to the ROCC Pod01:12 – Meet Shawn Thornton: Tech Pro & BBQ King03:19 – What Is Compliance, Really?04:33 – Why Compliance Matters to Small Businesses06:04 – Common Cybersecurity Mistakes07:49 – Ransomware Case Study: Lessons Learned10:48 – Full-Service IT With a Compliance Focus12:53 – Turning Compliance Into Revenue13:46 – Shawn's Background: From Amazon to Smart Biz iT14:03 – Experience Joining the Chamber15:00 – Favorite Day of the Year: NFL Kickoff Sunday17:10 – Contact Info and Final Thoughts Learn more about the Royal Oak Chamber of Commerce: https://www.royaloakchamber.com/Connect with our hosts:Jon Gay from JAG in Detroit Podcasts - http://www.jagindetroit.com/Lisa Bibbee from Century 21 Northland - http://soldbylisab.com/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
This week on Commerce Code, we speak with Mark Lesiw, Co-Founder and Chief Commercial Officer at Olive. Olive builds digital commerce platforms for fintechs, and those platforms offer consumers fundraising, financial wellness, and membership and loyalty solutions. Today, we are talking about how he recently used AI tools to build a sophisticated customer loyalty app from start to finish in about 40 hours – the kind of thing that used to take months. It's a sort of experimental rocket, not something that replaces Olive's current technology. But this rocket flies, and it shows what's possible.
Data and identity security continues to grow in importance as enterprises face more sophisticated cyberattacks from expanding AI agents that are expanding their reach and tools. Bloomberg Intelligence's Global Head of Technology Research Mandeep Singh speaks with Cyera cofounder and CEO Yotam Segev about his company's position in the evolving cybersecurity space, especially with more consolidation on the horizon following Palo Alto Network's announced deal for CyberArk and Google's acquisition of Wiz.
Welcome to a fascinating exploration of the hidden legal battles shaping tomorrow's technology. Predictive algorithms have become the crystal balls of modern business, forecasting everything from home prices to healthcare costs, but they're also becoming the center of high-stakes courtroom dramas worth hundreds of millions of dollars.Across the globe, from Texas courtrooms to China's Supreme People's Court, judges and juries are answering a profound question: who owns the right to predict the future? The House Canary v. Amrock case resulted in a staggering $600 million verdict over real estate valuation algorithms, while Alibaba secured a 30 million RMB judgment against a company that allegedly scraped its predictive marketing tools. Even industrial applications aren't immune, with companies like Shen Group successfully protecting predictive design software for machinery components.What makes these cases particularly compelling is how they're redefining intellectual property law. Courts are now recognizing that AI model weights, the mathematical parameters tuned during training, qualify as protectable trade secrets. Data pipelines, prediction engines, and algorithmic structures have all received similar protection. The real drama often unfolds when employees change companies, raising thorny questions about what constitutes general expertise versus proprietary knowledge that belongs to the former employer.Healthcare prediction presents especially valuable territory, with ongoing battles between companies like Qruis and Epic Systems, or Milliman and Gradient AI, demonstrating how patient data forecasting creates immensely valuable intellectual property. Whether it's forecasting home values on Zillow or optimizing Medicare billing, these predictive tools aren't just convenient features, they're corporate crown jewels worth protecting at almost any cost.Ready to dive deeper into the invisible rules governing innovation? Subscribe now and join us as we continue to decode the legal frameworks shaping our technological future. The algorithms may predict tomorrow, but who gets to own those predictions? That's what we're exploring on Intangiblia.Get the book!Send us a textSupport the show
Send us a textOn this episode of Serious Privacy, while both Paul Breitbarth and Ralph O'Brien of Reinbo Consulting are out, Dr. K Royal connects with Jordan Hall, a DPO based in the UK. Discussion centers around scope of DPO, where the field has developed, and thoughts on current events. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Marialetizia is based out of Milan,We will talk about the career path she's on,Marialetizia did a study abroad in LA,Privacy manager at BIP is where she is today!
Too often, AI breaks in the wild. Why? CXOTalk 890 dissects the adversarial economy with Steven C. Daffron (fintech private equity leader) and Anthony Scriffignano (distinguished data scientist), hosted by Michael Krigsman. Discover the challenges of **ai implementation** and the strategies needed to navigate the **future of work** in an AI-driven world. Stay informed with expert insights on CXOTalk. What you'll learn:How AI enables and masks adversarial behaviorMisaligned incentives, data/model drift, and biasGovernance vs. regulation; resilient metrics and KPIsInvestor/CFO implications and talent/education needs
The Freedom of Information (FoI) Act – which was passed 25 years ago and came into force five years later – created a legal right for citizens to request information from public authorities. This was a radical shift in the government's approach to information and a significant step towards a more open culture of government. FoI was designed to generate more transparency and to tackle perceived secrecy in government, and it has been a vital tool for journalists, researchers and private citizens alike. However, some politicians have been critical of the burden that FoI requests create, and there are outstanding questions about how the FoI system can be more effective. With FoI requests more than tripling since it was introduced in 2005, this IfG event assessed the state of FoI on its double anniversary – and explored, through a series of proposals and an expert panel discussion, how the system can be improved. To pitch their proposals for the future of Freedom of Information, the IfG was joined by Jenna Corderoy, Investigative reporter at Democracy for Sale Dr Louise Crow, Chief Executive of mySociety Dr Ben Worthy, Lecturer at Birkbeck University And to discuss the proposals and the FoI system more broadly: John Edwards, Information Commissioner Lord Charlie Falconer, Secretary for Constitutional Affairs and Lord Chancellor (2003–07) Lynn Wyeth, Executive Board Member of the Campaign for Freedom of Information, and Executive Board Member of The National Association of Data Protection and Freedom of Information Officers (NADPO) The event was chaired by Gavin Freeguard, Associate of the Institute for Government. Learn more about your ad choices. Visit podcastchoices.com/adchoices
The Impacts of Retail Surveillance on Privacy In this episode of The Secure Family Podcast, Andy discusses the growing trend of retail surveillance and its implications for privacy. Highlighting recent advancements in smart retail technology, Andy examines how facial recognition, license plate readers, and AI systems are being used to track shoppers and collect their personal information. He explains the potential risks, including data breaches and misuse by law enforcement, and stresses the need for legislative action to protect consumer privacy. The episode also explores the paradox of retail surveillance not preventing shoplifting effectively and concludes with practical advice on how to stay informed and protect their privacy while shopping. More information from 404 Media: https://www.404media.co/home-depot-and-lowes-share-data-from-hundreds-of-ai-cameras-with-cops Take control of your data with DeleteMe. Because they sponsor the podcast you can get 20% off a privacy plan from DeleteMe with promo code: DAD. OmniWatch is a scam and identity protection service that monitors your data, alerts you to threats, and backs you with up with insurance. Try it for only $1 for 7 days. Learn how to freeze your child's credit to protect their good name. Connect
Send us a textOn this episode of seriousprivacy, Paul Breitbarth is away, so Ralph O' Brien and Dr. K Royal bring you a mish mash week in privacy. Topics include current news and a little bit about the differences in GDPR compliance vs what the US privacy laws require. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Priya is privacy lead at Deutsche Bank,We'll talk about how she rose through the ranks.She's an EDPB expert for her expertise in new tech,Priya is a pro at keeping data in check!
In the recent episode of the Advance in Vietnam podcast series, Rizwan Khan, Managing Partner of Acclime Vietnam shares his insights with Partner, Vlad Savin for compliance practices, data privacy requirements, penalties, and data privacy's roadmap for staying on top of Vietnam's evolving #data privacy regulations.Here are the key takeaways:➡ An overview of the current data privacy regulations in Vietnam and who is involved in enforcing these policies➡ The key compliance requirements for businesses under Vietnam's data privacy regulations➡ Types of breaches incur penalties, and what should businesses be aware of to avoid non-compliance under this regulation➡ The key legal requirements and considerations for transferring personal data outside of Vietnam➡ A step-by-step roadmap to achieve data privacy
Breaking Analysis with Dave Vellante, joined by theCube Research Principal Analyst - Cyber Resiliency, Data Protection, Data Management Christophe Bertrand
At Black Hat USA 2025, Sean Martin, co-founder of ITSPmagazine, sat down with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, to discuss the findings from the company's latest ransomware report. Over the past five years, the research has tracked how attack patterns, targets, and business models have shifted—most notably from file encryption to data theft and extortion.Brett explains that many ransomware groups now find it more profitable—and less risky—to steal sensitive data and threaten to leak it unless paid, rather than encrypt files and disrupt operations. This change also allows attackers to stay out of the headlines and avoid immediate law enforcement pressure, while still extracting massive payouts. One case saw a Fortune 50 company pay $75 million to prevent the leak of 100 terabytes of sensitive medical data—without a single file being encrypted.The report highlights variation in attacker methods. Some groups focus on single large targets; others, like the group “LOP,” exploit vulnerabilities in widely used file transfer applications, making supply chain compromise a preferred tactic. Once inside, attackers validate their claims by providing file trees and sample data—proving the theft is real.Certain industries remain disproportionately affected. Healthcare, manufacturing, and technology are perennial top targets, with oil and gas seeing a sharp increase this year. Many victims operate with legacy systems, slow to adopt modern security measures, making them vulnerable. Geographically, the U.S. continues to be hit hardest, accounting for roughly half of all observed ransomware incidents.The conversation also addresses why organizations fail to detect such massive data theft—sometimes hundreds of gigabytes per day over weeks. Poor monitoring, limited security staffing, and alert fatigue all contribute. Brett emphasizes that reducing exposure starts with eliminating unnecessary internet-facing services and embracing zero trust architectures to prevent lateral movement.The ransomware report serves not just as a data source but as a practical guide. By mapping observed attacker behaviors to defensive strategies, organizations can better identify and close their most dangerous gaps—before becoming another statistic in next year's findings.Learn more about Zscaler: https://itspm.ag/zscaler-327152Note: This story contains promotional content. Learn more.Guest:Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, | On LinkedIn: https://www.linkedin.com/in/brett-stone-gross/ResourcesLearn more and catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscalerLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: sean martin, brett stone-gross, ransomware, data extortion, cyber attacks, zero trust security, threat intelligence, data breach, cyber defense, network security, file transfer vulnerability, data protection, black hat, black hat usa 2025, zscaler
Send us a textWhile we generally don't shy away from politics when it comes to data protection and privacy rights, the conflict in Gaza is not a topic that we would quickly raise on the podcast. Unless data protection plays a role, which it now does.On this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien of Reinbo Consulting, and Dr. K Royal enter a dimension not seen before on the podcast - a plea for human rights related to Israel and Gaza. The immediate reason for our discussion are two news reports: the registration requirement for humanitarian aid organisations imposed by the Israeli government, and the mass surveillance of phone communications in the Palestinian territories.We recognise this topic is divise, and may not be to everyone's liking. If that is you, maybe skip this week's episode. Sources:https://www.theguardian.com/world/2025/aug/06/microsoft-israeli-military-palestinian-phone-calls-cloudhttps://autoriteitpersoonsgegevens.nl/en/current/ap-aid-organisations-cornered-due-to-israeli-requirement-to-provide-personal-data If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Your face unlocks your phone, animates your emoji, and verifies your identity but who actually owns the digital rights to your unique features? In this deep dive into biometric data law, we explore the high-stakes legal battles reshaping how technology interacts with our most personal physical characteristics.When Facebook paid $650 million to settle a class action lawsuit over facial recognition, it signaled a seismic shift in how companies must approach biometric data collection. We break down the landmark cases—from White Castle's potential $17 billion fingerprint scanning liability to Clearview AI's global legal troubles for scraping billions of public photos without consent. These aren't just American concerns; we journey from China, where a professor successfully sued a wildlife park over mandatory facial scans, to India's Supreme Court ruling on the world's largest biometric ID system.Beyond privacy concerns, fierce patent wars are erupting over who owns the methods for collecting and using biometric data. Companies battle over facial authentication patents worth billions while "liveness detection" technology becomes crucial in a world of deepfakes and digital impersonation. The stakes couldn't be higher as these technologies become embedded in everything from banking to border control.We untangle the global patchwork of regulations emerging to govern facial recognition, from Illinois' pioneering BIPA law to Europe's strict GDPR protections and China's surprising new limits on private biometric collection. Throughout it all, a clear trend emerges: your face isn't just data, it's your identity, and increasingly, the law recognizes that distinction.Whether you're concerned about your rights, curious about the future of facial recognition, or simply want to understand why your social media filters might be collecting more than just likes, this episode offers essential insights into the legal frameworks shaping our biometric future. Listen now to discover how to protect your digital identity in a world that increasingly wants to scan it.Send us a textSupport the show
Send us a textOn this week of Serious Privacy, Paul Breitbarth, Ralph O'Brien of Reinbo Consulting, and Dr. K Royal talk about a slew of breaches and what to do if your data is breached. If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
Giovanna is legal counsel for RCS,We will talk about how her career has been such a success.Giovanna is a co-chair of Milan's IAPP KnowledgeNet,She protects privacy and eliminates cyber threats.
Send us a textThis episode covers a week in privacy which feels light and refreshing. Listen to co-hosts Paul Breitbarth, Ralph O'Brien, and Dr. K Royal. Topics include an emergency ban in Italy about publishing images about an autopsy, Germany's actions involving Meta, Poland's enforcement on a McDonald's data breach, UK's collaboration with OpenAI, UK's enforcement against spam/spoof scam calls, age-verification in MS, and more! If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.
The Gene Simmons of Data Protection: Protegrity's KISS MethodToday, we are releasing another episode from our series, entitled The Gene Simmons of Data Protection - the KISS Method, brought to you by none other than Protegrity. Protegrity is AI-powered data security for data consumption, offering fine grain data protection solutions, so you can enable your data security, compliance, sharing and analytics.Episode Title: Navigating the Future of Data Management: Type Systems, Quantum Computing, and Protegrity's InnovationsIn our final episode, we are speaking with Michael Howard, CEO of Protegrity. We talk about how traditional type systems often fail short in modern data management, as well as potential threats posed by quantum computing to current encryption methods, as well as how Protegrity's product embeds context and security into the data itself, in order to repel any threat.QuestionsTell me and my audience a little bit about you. I know that you've referred to type systems as “lame.” Can you explain the concept of type systems in databases, why they're lame, and why they pose challenges for modern data management?How is quantum computing poised to impact the current landscape of data security and encryption?What are some of the limitations of traditional type systems in databases, and how can they be improved to handle modern data challenges?Can you share insights on how Protegrity's approach to data classification and protection differs from traditional methods?Looking ahead, how do you envision the role of type systems evolving with the advent of quantum computing and other emerging technologies?One of Protegrity's talking points has been how far behind legislation for data privacy and security is compared to today's rapidly accelerating data landscape. What do you think needs to happen – in quantum and AI – for conversations to turn into action?Linkshttps://www.protegrity.com/https://www.linkedin.com/in/michael-howard-2b7b273/Support this podcast at — https://redcircle.com/code-story/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
Are you confident your business can identify fraud before it hits your bottom line? How can you tell if an invoice, ID, or rate confirmation is real or AI-generated? You must listen to this conversation with Chad Capooth of Denim! Chad unpacks the alarming rise in sophisticated fraud across the transportation industry, from AI-generated fake documents and spoofed domains to virtual numbers and identity theft! With fraud tactics evolving every six months, Chad emphasizes that ongoing staff training, layered security, and tools like live ID matching and account verification are no longer optional; they're essential! About Chad Capooth Chad is the VP of Operations at Denim. He brings over 15 years of experience in strategic planning, business growth, and operations leadership. At Denim, he leads operational strategy, leveraging deep expertise in factoring, credit underwriting, and portfolio management to deliver efficient, tech-enabled solutions. Previously, as COO at eCommerce Financing LLC, Chad helped launch innovative products like Revenue Loans and Quick Pay Loans. At Transfac Capital, he advanced operational performance through technology-driven underwriting and automated invoice processing. Chad's earlier roles at Unlimited Working Capital and Enoble Business Capital (formerly National Bankers Trust) cemented his reputation as a leader in financial services innovation. Connect with Chad Website: https://www.denim.com/ Email: ccapooth@denim.com