POPULARITY
Categories
While our team is out on winter break, please enjoy this episode of Data Security Decoded from our partners at Rubrik. In this episode of Data Security Decoded, host Caleb Tolin sits down with Hayden Smith, CEO of Hunted Labs, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and what modern threat actors are doing to exploit trust at scale. Caleb and Hayden dive deep into real-world attacks, emerging TTPs, AI-powered threat hunting, and what organizations must do today to keep pace. Listeners walk away with a clear picture of the problem—and a practical blueprint for reducing supply chain risk. What You'll Learn How modern attackers infiltrate open source ecosystems through fake accounts and counterfeit package contributions. Why dependency chains dramatically amplify both exposure and attacker leverage. How to use threat intelligence and threat hunting to proactively evaluate upstream packages before adoption. Where AI-powered code analysis is changing the ability to discover hidden vulnerabilities and suspicious patterns. Why dependency pinning, SBOM discipline, and continuous monitoring now define a strong supply chain posture. Episode Highlights 00:00 — Welcome + Why Software Supply Chain Risk Matters 02:00 — Hayden's Non-Cyber Passion + Framing Today's Topic 03:00 — Why Open Source Powers Everything—and Why That Creates Exposure 06:00 — The Real Attack Vector: Contribution as Initial Access 08:00 — Inside the Indonesian “Fake Package” Campaign 10:30 — How to Evaluate Code + Contributor Identity Together 12:00 — Threat Hunting and AI-Enabled Code Interrogation 15:00 — The Challenge of Undisclosed Vulnerabilities in Widely Used Components 16:30 — How Recovery Works When Malware Is Already in Your Stack 19:00 — Continuous Monitoring as the Foundation of Modern Supply Chain Security 22:00 — Pinning, Maintainer Analysis, and Code Interrogation Best Practices 24:00 — Where to Learn More About Hunted Labs Episode Resources Hunted Labs — https://huntedlabs.com Hunted Labs Entercept Hunted Labs “Hunting Ground” research blog Open Source Malware (Paul McCarty) Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode, we provide an overview of the major announcements from Microsoft Ignite 2025 and offer an analysis grounded in our expertise. Key topics include Agent 365, SharePoint Knowledge Agent, and Agent Governance. We also address advancements in Security Copilot, Data Security, Work IQ, Fabric IQ, Foundry IQ, integration with other models through Copilot, as well as several additional themes presented at Ignite 2025. DOWNLOAD THIS PODCAST
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss the recent data breach at Conduent, including the company's anticipated cost of the incident, their next steps, and more. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
In 2026, AI will increasingly integrate into business processes, emphasizing strong data quality and security as prerequisites for success. AI agents, distinct from chatbots, will operate with machine identities to automate tasks while supporting, rather than replacing, human decision-making. This is just a glimpse of the insights Ben Wilcox of ProArch shared this week.
Send us a textIn this episode of The Wireless Way, host Chris Whitaker engages in an insightful conversation with Dennis Osha, founder and chairman of Mobile Mentor. The discussion delves into Dennis's journey from working with Nokia in the 1980s to establishing Mobile Mentor in 2004. Dennis shares how his company has become a global leader in modern endpoint management and security, earning multiple Microsoft Partner of the Year recognitions. The episode covers various stages of the company's evolution, including its pivot during the global financial crisis, partnership with Microsoft, and focus on Intune. Dennis also offers an in-depth analysis of current challenges and future trends in endpoint management, cloud security, and AI integration, underscoring the importance of unlocking the full potential of Microsoft 365 for optimal business outcomes.00:00 Introduction and Guest Introduction01:33 Dennis Osha's Background and Mobile Mentor's Origins03:05 Transition from Engineering to Business Focus05:21 Challenges and Pivotal Moments12:14 Evolution of Mobile Mentor and Partnership with Microsoft16:57 Current Trends and Future Directions20:54 Challenges in AI Implementation21:08 Data Security and Initial Findings21:33 Skillset and Training for AI Tools21:45 Board's Inquiry and ROI Model22:31 Types of Companies and AI Adoption23:35 Future of Device Management and Security Tools26:33 Proliferation of AI Tools27:31 Ideal Customer Profile33:20 Sales Cycle and Marketing Strategies36:36 Final Thoughts and ReflectionsMore on DenisMore on Mobile Mentor Support the showCheck out my website https://thewirelessway.net/ use the contact button to send request and feedback.
In this episode of Energy Newsbeat – Conversations in Energy, host Stu Turley sits down with Sarah E. Hunt, President of the Rainey Center, to break down groundbreaking new polling that reveals overwhelming bipartisan support for American energy dominance, secure domestic data centers, and rapid permitting reform. Sarah explains how voters overwhelmingly link energy independence to national security, the growing AI arms race with China, and the urgent need to build every possible electron—nuclear, natural gas, solar, wind—to safeguard America's technological future. From China's 10x energy build-out to AI-driven permitting solutions, this conversation delivers sharp insights, alarming realities, and a clear call to action for policymakers across the U.S.Highlights of the Podcast00:00 - Intro00:33 – Why Energy Dominance = National Security01:04 – The Shocking Truth About U.S. Data Stored in China02:27 – Voters See a Tech Arms Race With China03:23 – China's 10x Energy Build-Out Advantage03:58 – Nuclear Power, Permitting, & Speeding Up Builds05:42 – Using AI to Fix Permitting Bottlenecks06:08 – The “Three Horsemen” of Energy Dominance07:02 – Voters Overwhelmingly Support Cutting Red Tape08:03 – Grid Vulnerabilities & Chinese-Linked Equipment09:02 – Electricity as a Weapon of War10:12 – Bipartisan Consensus on Energy Independence10:40 – How the Rainey Center Started11:22 – Supporting Local, State & Federal Leaders14:00 – State-Level Energy Action & AI Competition With China16:41 – The Electricity War for Human Freedom17:15 – Wind, Solar, Nuclear & Reality of Energy Costs18:44 – Who Should Pay for Data Center Power?20:18 – Solar Already Built But Stuck in Red Tape21:48 – Critical Minerals, Supply Chains & Energy Security22:13 – How to Follow & Connect With Sarah23:59 – Closing RemarksWe recommend checking out the Rainey Center for Public Policy: https://www.raineycenter.org/Follow Sarah on her LinkedIn https://www.linkedin.com/in/sarahelisabethhunt/Check out https://theenergynewsbeat.substack.com/and https://energynewsbeat.co/
You open Excel daily, but are you using AI to make it work for you? While 58% of professionals have tried AI, only 17% use it regularly—a missed opportunity. Join CPA Kyle Ashcraft in this hands-on webinar to learn vibe coding—a no-programming approach using Cursor AI to automate repetitive Excel tasks. Watch Kyle transform messy spreadsheets, organize GL data, and reconcile transactions with simple AI prompts while keeping data secure. You'll get three ready-to-use scripts plus a framework to automate countless tasks and reclaim hours weekly.(Originally recorded on October 20, 2025, on Earmark Webinars+)Chapters(02:18) - Meet Kyle Ashcraft and His AI Journey (02:31) - The Importance of AI in Accounting (03:30) - Kyle's Background and CPA Review (04:38) - Live Webinar and Audience Interaction (05:12) - Kyle's AI Projects and Cursor Introduction (07:39) - Data Privacy Concerns with AI (17:18) - Practical AI in Excel: Examples and Demonstration (20:03) - Getting Started with Cursor (23:55) - First Cursor Project: Cleaning Up Excel Data (31:38) - Jumping into Financial Document Verification (32:50) - Exploring Cursor's Privacy Settings (33:48) - Understanding Data Retention Policies (36:23) - Comparing Excel Files with Cursor (36:48) - Analyzing Complex GL Details (42:22) - Using Cursor for Recurring Accounting Tasks (49:20) - Leveraging AI for Audit and Analysis (50:53) - Practical Tips for Implementing Cursor (53:56) - Q&A: Advanced Cursor Features (59:04) - Conclusion and Next Steps Earn CPE for this episode: https://www.earmark.app/c/2854Sign up to get free CPE for listening to this podcasthttps://earmarkcpe.comhttps://earmark.app/Download the Earmark CPE App Apple: https://apps.apple.com/us/app/earmark-cpe/id1562599728Android: https://play.google.com/store/apps/details?id=com.earmarkcpe.appResourcesIntro to Cursor PDF Guide - https://mcusercontent.com/02dbcae4a3e3f15021db25a0c/files/deff5647-e0a3-51d7-4225-cf8b3a48532d/Cursor_AI_Quick_Guide.pdfWebinar presentation - https://ai.maxwellstudy.com/Connect with Our Guest, Kyle Ashcraft, CPALinkedIn: https://www.linkedin.com/in/kyle-ashcraft-cpa-7638a42aLearn more about Maxwell CPA Reviewhttps://maxwellcpareview.com/Connect with Blake Oliver, CPALinkedIn: https://www.linkedin.com/in/blaketoliverTwitter: https://twitter.com/blaketoliver/
Sarah Ference, CPA, an author of the JofA's Professional Liability Spotlight column, returns to the JofA podcast to discuss recent column topics and the advice CPAs can gain from them. In particular, Ference details data security preparedness, the value of engagement letters for tax-compliance services, common audit claims and defenses, and more. Editor's note: This episode is the JofA podcast's last until Jan. 8. n October: Are You Prepared for the Cost of a Data Security Incident? n November: Blocking and Tackling: Engagement Letters for Tax Compliance Services n December: Common Audit Claims and Defenses What you'll learn from this episode: Advice for CPA firms to guard against data security incidents. The ways engagement letters can prevent costly client disputes. The factors that often make audit claims the most expensive type of claims for firms. How to protect your firm when a client faces bankruptcy.
In this episode of the Software People Stories, my guest Ben Wilcox is the Chief Technology Officer and Chief Information Security Officer at ProArch. Ben shares his fascinating journey from building a web hosting business as a teenager to his current role as CTO and CISO at ProArch. Ben discusses the evolution of his career, his involvement in various projects, and the ever-changing landscape of security, especially with the advent of AI. He also provides valuable insights into how enterprises should approach security, the complexities of data localization, and the importance of a continuous security model. The conversation also delves into career advice for aspiring IT and security professionals.00:00 Introduction and Guest Welcome00:42 Early Career and Web Hosting Business02:49 Transition to Software Development03:51 Joining Advisor Group and Pro05:06 Challenges of Running a Business as a Teenager07:55 Learning and Growth in a Larger Company09:14 Becoming a CISO and Security Focus12:21 Evolving Security Landscape and AI15:01 Data Security and Insider Risk Management20:51 Zero Trust Environments and Legacy Systems23:58 Sleepless Nights and Security Concerns25:50 Balancing Innovation and Security26:11 Finding Joy in Leadership26:54 Navigating the CTO and CISO Roles28:55 Keeping Up with Technology Trends31:27 Hyper-Personalization and Security Risks36:02 The Role of Open Source in Security41:03 Career Advice for Aspiring Security Professionals45:35 The Impact of AI on Security Jobs49:11 Conclusion and Contact InformationThe timestamps are approximate, and after the intro that is about 90 seconds.For more closer timestamps, add 90 seconds to the labels aboveBen Wilcox is the Chief Technology Officer and Chief Information Security Officer at ProArch, where he leads the company's cloud, security, and AI enablement strategy. With more than 20 years of experience spanning software engineering, cybersecurity, and enterprise architecture, Ben helps organizations modernize their technology foundations while navigating the evolving threat landscape.Ben's career began in hands-on development and infrastructure work, giving him a deep technical grounding that informs his leadership today. He has built and led high-performing engineering teams, guided complex cloud migrations, and designed modern security programs that balance innovation with risk management. At ProArch, he works closely with clients to architect AI-ready, scalable systems that drive business transformation.Connect with Ben: https://www.linkedin.com/in/ben-wilcox
join wall-e for today's tech briefing as we cover the latest developments in the tech world: ftc upholds ban: scott zuckerman is barred from the surveillance software industry after a severe data breach, maintaining the 2021 order for cybersecurity measures. nvidia h200 ai chips: commerce department allows export to china under specific conditions, despite congressional resistance over national security concerns. investment in skild ai: softbank and nvidia consider over $1 billion investment, valuing the ai robotics company at $14 billion, tripling its former valuation. ibm acquires confluent: ibm announces $11 billion acquisition to enhance its data infrastructure and automation capabilities, focusing on real-time data management. waymo's expanding robotaxi service: leaked data reveals waymo's significant increase in rides and plans for expansion to 12 more cities by 2026. stay tuned for more updates tomorrow!
On this episode of the Rebel Tech Podcast, TPPF's David Dunmoyer sits down with Zach Whiting, former co-host and now Director of Public Policy at Riot Platforms, along with Brian Morgenstern, Riot's Vice President of Public Policy. They break down the future of Bitcoin in Texas, the growth of the crypto industry, and how pro-innovation policies are shaping the state's digital asset landscape. Learn how Bitcoin mining, blockchain technology, and Texas' energy policies intersect—and what it means for the future of crypto in America.
In this episode, we dive into the silent killer of e-commerce team productivity: using personal chat apps for work. Guy Weiss, CEO and founder of ZenZap, shares how relying on apps like WhatsApp can quietly harm your business through security risks, employee burnout, and lost data. He reveals the "hidden cost" of the "always on" culture and explains how a business-focused messenger can keep your company's secrets safe, integrate with your tools, and make your team highly productive.Topics discussed in this episode: Why personal chat apps break work. The hidden cost of "always on" culture. Why personal apps ruin work/life separation. How your business IP is lost on employee phones. Why unstructured group chats cause missed orders. Why staff privacy matters as a business grows. How ZenZap solves complex communication. Links & Resources Website: https://www.zenzap.co/LinkedIn: https://www.linkedin.com/company/zenzap/Instagram: https://www.instagram.com/zenzapappYouTube: https://www.youtube.com/@zenzap_app Get access to more free resources by visiting the show notes at https://tinyurl.com/yeym4uyb______________________________________________________ LOVE THE SHOW? HERE ARE THE NEXT STEPS! Follow the podcast to get every bonus episode. Tap follow now and don't miss out! Rate & Review: Help others discover the show by rating the show on Apple Podcasts at https://tinyurl.com/ecb-apple-podcasts Join our Free Newsletter: https://newsletter.ecommercecoffeebreak.com/ Support The Show On Patreon: https://www.patreon.com/EcommerceCoffeeBreak Partner with us: https://ecommercecoffeebreak.com/partner-with-us/
What does it take to be ready to deploy M365 Copilot in your organization? Richard talks to Nikki Chapple about her latest incarnation of the M365 Copilot Readiness Checklist, working step-by-step to bring M365 Copilot into the organization without causing data leak issues. Nikki discusses utilizing existing tools to accurately identify sensitive data, archiving outdated information, and monitoring data usage by both users and agents - allowing you to detect issues before they escalate. The conversation also delves into the process of identifying issues, discussing policy changes, and how to communicate those changes so that people can take advantage of the power of these new tools without feeling threatened. It's a journey!LinksMicrosoft PurviewSharePoint Advanced ManagementDefender for Cloud AppsRestricted SharePoint SearchMicrosoft 365 ArchiveSharePoint Restricted Content DiscoveryData Security Posture Management for AINikki's Readiness ChecklistM365 Copilot Oversharing BlueprintMicrosoft Purview Secure by Default BlueprintPrevent Data Leaks to Shadow AI BlueprintRecorded November 7, 2025
Back in 2011, FedRAMP was put together because each federal agency had to conduct its own time-consuming security audit. The idea was to standardize security to reduce costs and accelerate cloud adoption. About ten years later, state leaders saw the same problem. Over the years, they worked out a security guidance package that was released this year. GovRAMP was launched to address many of the same challenges faced by the federal government: to establish a standard that enables transparency, standardization, and community. GovRamp's framework is based on NIST 800-53 rev5. Tony O'Neil from Massachusetts observed that before GovRAMP, each state had a patchwork of security guidelines. With so much variation across states, a simplified environment could reduce costs and enable leaders to adopt a mindset of investing in people. Today, we sat down with data security experts who detailed the implementation of compliance to improve data security and compliance. The conversation also covered the importance of continuous monitoring, the role of CSPs in maintaining security, and the necessity of proper resource allocation for cybersecurity professionals.
Send us a textIn this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how BonFi AI is innovating in data security. Tune in to learn about the importance of context in data protection and the future of cybersecurity in a rapidly changing digital world.00:00:19 Introduction to Vishnu's Journey00:00:30 Entering the US and Cisco00:02:18 Cloud Security and AI00:02:48 Data Governance and Challenges00:08:47 The Expansiveness of Cloud00:11:00 AI's Appetite for Data00:12:11 Data Security in the JNI Era00:14:29 The Importance of Context00:16:13 Data Used by Enterprises00:22:24 Conclusion and Future Trendshttps://www.bonfy.ai/Bonfy.aiBonfy ACS is a next-gen DLP platform built for the AI era. Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast Affiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss how, according to DataBreachToday, a Chinese state-linked hacking group relied on the Claude Code model to automate most of a cyberespionage campaign against dozens of organizations. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
Canisius and Bill dug into the whole on-prem vs cloud debate through the lens of AI, pointing out that massive compute needs and generative models pretty much force serious work into the cloud, with most operators moving to a hybrid setup rather than pure on-prem or multi-cloud. They spent a lot of time on trust, encryption, and data ownership, stressing that customer data stays isolated, is not used to train models unless you opt in, and that Microsoft's job is to be the secure, scalable platform while companies like Collide handle the oil and gas specific workflows and “last mile” value. They also hit on why “we already have Azure and Copilot” is not the same as having a purpose-built solution, why a single-cloud plus good governance usually beats juggling multiple hyperscalers, and closed with a look ahead to a world where agents manage other agents and AI is wired into everyday work across legal, operations, and the field.Click here to watch a video of this episode.Join the conversation shaping the future of energy.Collide is the community where oil & gas professionals connect, share insights, and solve real-world problems together. No noise. No fluff. Just the discussions that move our industry forward.Apply today at collide.ioClick here to view the episode transcript. https://twitter.com/collide_iohttps://www.tiktok.com/@collide.iohttps://www.facebook.com/collide.iohttps://www.instagram.com/collide.iohttps://www.youtube.com/@collide_iohttps://bsky.app/profile/digitalwildcatters.bsky.socialhttps://www.linkedin.com/company/collide-digital-wildcatters
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss how, according to DataBreachToday, a Chinese state-linked hacking group relied on the Claude Code model to automate most of a cyberespionage campaign against dozens of organizations. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
From politically motivated attacks to basic configuration errors, purpose-driven orgs are now on the front lines of cyber risk. In this episode, Steve Sharer and Garrett Miller walk through five areas where B Corps are more vulnerable than they realize — and the practical steps that strengthen each one. They explain why these gaps matter and how to close them with straightforward practices that don't overwhelm small teams.View the show notes: https://go.lifteconomy.com/blog/5-cyber-risks-for-b-corps-and-how-you-can-fix-them-w/-steve-sharer-garrett-millerUnlock your free B Corp Values Assessment—plus tips and insights to help your business grow. https://go.lifteconomy.com/b-corp-newsletter
Send us a textIf you don't know where the patient's data is at every moment, you really can't protect it yet. That's the reality many healthcare organizations are facing. Regulations can help but legacy siloed systems keep patients exposed.In this episode of the HealthBiz Podcast, David Williams is joined by Aimee Cardwell, CISO-in-residence at Transcend. Aimee breaks down why compliance doesn't equal security, how legacy architectures and vendor ecosystems create hidden vulnerabilities, and what modern, identity-centric, AI-enabled security should look like.
The U.S. Department of Justice's Data Security Program is reshaping how companies manage cross-border data activities. This episode of The Data Chronicles breaks down what the rule does, why it was created, and the types of transactions it restricts or prohibits—from data brokerage to vendor access to bulk genomic data. Host Scott Loughlin is joined by Hogan Lovells partner James Denvil and associate Lorea Mendiguren to walk through the rule's core elements and the open questions around implementation, risk, and compliance. They share practical insights from advising companies in e-commerce, health, and life sciences as they adjust to this new national-security-driven framework.
Send us a textWords can trigger audits, budget panic, or calm execution, and few words carry more weight than “leak” and “breach.” We unpack the real differences, the legal and regulatory implications of each, and how precise language shapes incident response. From there, we get hands-on with CISSP-ready concepts—data states, DLP, CASB, DRM, minimization, sovereignty, and sensitivity labels—and translate them into moves you can make this week.We start by mapping data states—at rest, in transit, in use—and explaining why data in use often deserves the strongest controls. You'll hear how teams over-index on storage encryption while under-protecting live workflows, and how to fix that with device posture checks, least privilege, just-in-time access, and application-layer monitoring. Then we dive into data minimization: setting clear retention rules, automating deletion, and killing the “we might need it someday” habit that inflates breach impact and eDiscovery pain. Along the way, sensitivity labels become the glue for governance, tying classification to access, encryption, and audit.Next, we stress-test common tools. DLP is great at stopping careless exfiltration but struggles with insiders who have legitimate access, so we show how to tune policies, coach users, and add approvals for mass exports. DRM protects intellectual property but introduces compatibility and friction; we outline how to pilot it with high-value content and measure productivity impact. For cloud journeys, CASB delivers visibility into sanctioned and shadow SaaS, enforces consistent policies, and even helps manage data egress costs—vital for budgets and compliance. Finally, we navigate data sovereignty, cross-border flows, and practical tactics like regional storage, masking, and pseudonymization to keep regulators satisfied and data safe.Whether you're studying for the CISSP or leading security strategy, you'll leave with clear definitions, sharper communication, and a toolkit for governing what you keep, protecting what you use, and deleting what you don't. If you found this helpful, subscribe, leave a review, and share it with a teammate who still calls every incident a breach.Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Defeating Porch Pirates and Holiday Scammers Welcome to The Secure Family Podcast with Andy Murphy! With the holiday shopping season upon us, Andy shares tips for safe online shopping and strategies to prevent porch piracy. He also discusses common holiday scams, offering advice on avoiding fraudulent ads and spotting the red flags of marketplace scams. Take control of your data with DeleteMe. Because they sponsor the podcast you can get 20% off a privacy plan from DeleteMe with promo code: DAD. Connect
Locate, assess, and prioritize high-risk data across Microsoft and non-Microsoft services using Microsoft Purview Data Security Posture Management (DSPM). Identify sensitive files, understand emerging data risks, and focus remediation efforts where they matter most without slowing down productivity. You can also remediate oversharing, enforce data loss prevention policies, and monitor AI agent activity with full visibility into their interactions with sensitive data. Talhah Mir, Microsoft Purview Partner GM, shares how to take control of your data security posture, act on top priorities, and build a sustainable discipline for protecting your organization's information at scale. ► QUICK LINKS: 00:00 - Unified solution with DSPM 01:48 - Day-to-day DSPM use 03:36 - Prevent oversharing 05:52 - AI observability 07:42 - Longer-term view of DSPM 08:25 - How to get DSPM working in your org 09:28 - Wrap up ► Link References Try it out at https://aka.ms/DSPM ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics
In this powerful episode of The Rebel Tech Podcast, TPPF's David Dunmoyer sits down with Maurine Molak, mother and co-founder of David's Legacy Foundation, for an emotional and eye-opening discussion about the darker side of technology, cyberbullying, and the real risks kids face online.Maurine shares her family's story and the tragic loss of her son, David, who struggled with cyberbullying and social media addiction. Together, David and Maurine explore the urgent need for online safety, stronger protections for kids, and meaningful tech policy reforms that help prevent digital harassment and harmful online behavior.If you're interested in internet safety, protecting children online, or technology policy, this episode offers essential insights and resources for families, educators, and policymakers.
In this episode host Max Havey dives deep into the world of unified security with guests Sinead O'Donovan, VP of Product Management, Identity and Network Access at Microsoft, and Eliot Sun, VP of Product Management at Netskope. Eliot and Sinead offer their perspectives on how an ideal unified strategy brings together data, network access, and identity. Additionally, they dig into the topline benefits, key metrics, and how organizations need to evolve to make a unified strategy a reality.
Welcome to episode 305 of Grow Your Law Firm, hosted by Ken Hardison. On today's episode, Ken welcomes Raquel Gomes, Founder and CEO of Stafi, a virtual staffing company revolutionizing how law firms operate. With a background in psychology, corporate America, and technology, Raquel brings a unique perspective to leadership and sustainable growth. Her company was born from her own journey—balancing the demands of a high-powered career with motherhood and the desire for a more fulfilling life. Today, Stafi supports hundreds of law firms across the U.S., providing highly skilled virtual assistants, customized training, and hands-on coaching to help firms scale efficiently without sacrificing quality or well-being. What you'll learn about in this episode: Offshore Staffing for Growth - How virtual teams can cut labor costs and free up marketing budgets - Why effective delegation is key to scaling law firms sustainably Training and Support that Drive Results - Inside Stafi University's 800+ certifications tailored for PI firms - How coaching, KPIs, and emotional support enhance performance and retention Data Security and Confidentiality - How Stafi ensures compliance through advanced vetting, cybersecurity, and monitoring - Building trust with virtual teams through transparency and accountability The Role of AI in Staffing and Operations - Why AI won't replace humans—but will replace humans who don't use AI - How Stafi's coaches ensure proper adoption of firm tools and automation systems 24/7 Intake and the Future of Legal Operations - How Stafi Live helps firms close more leads through empathy-driven communication - Why offshore staffing and AI integration are essential to remain competitive in 2026 Resources: Email: raquel@getstafi.com Website: getstafi.com LinkedIn: linkedin.com/in/raquel-gomesstafi/ Facebook: facebook.com/GetStafi Instagram: instagram.com/getstafi Additional Resources: https://www.pilmma.org/the-mastermind-effect https://www.pilmma.org/resources https://www.pilmma.org/mastermind AI for PI Expo: www.pilmma.org/ai-for-pi-expo
Artificial intelligence is transforming every corner of theinvestment world — but what does that really mean for data, strategy, and decision-making? In this episode of The Alternative Investing Advantage, host Alex Perny welcomes Daniel Nikic, founder of Coras Research, to discuss how AI and machine learning are reshaping financial markets, venture capital, and risk analysis.From cleaning data sets to building machine learning models,Daniel shares his experience evaluating thousands of AI companies and explains what separates real innovation from hype. Tune in to learn how AI impacts investing, cybersecurity, and emerging industries, and what investors should prepare for as automation continues to evolve.00:00 Introduction to AI in Investment Strategies01:55 Daniel Nikic's Journey into AI and Data06:30 The Evolution of AI and Data Utilization16:45 AI's Role in Financial Markets20:28 AI Applications in Various Industries24:01 Integrating AI in Venture Capital Decision Making28:38 The Role of AI in Decision Making30:16 Human Interaction and AI Limitations34:01 Adoption and Correction in AI Implementation36:28 Investment Trends in AI40:03 Data Security and AI45:53 Ancillary Industries in the AI Boom51:25 Concerns and Opportunities in AI's FutureSubscribe to our YouTube channel and join our growing community for new videos every week.If you are interested in being a podcast guest speaker or have questions, contact us at Podcast@AdvantaIRA.com.Learn more about our guest, Daniel Nikic: https://www.linkedin.com/in/daniel-nikic/?originalSubdomain=hrLearn more about Advanta IRA: https://www.AdvantaIRA.com/ https://podcasters.spotify.com/pod/show/advanta-irahttps://www.linkedin.com/company/Advanta-IRA/https://twitter.com/AdvantaIRA https://www.facebook.com/AdvantaIRA/ https://www.instagram.com/AdvantaIRA/The Alternative Investing Advantage is brought to you by Advanta IRA.Advanta IRA does not offer investment, tax, or legal advice nor do we endorse any products, investments, or companies that offer such advice and/or investments. This includes any investments promoted or discussed during the podcast as neither Advanta IRA nor its employees, have reviewed or vetted any investments, persons, or companies that may discuss their services during this podcast. All parties are strongly encouraged to perform their own due diligence and consult with the appropriate professional(s) before entering into any type of investment.#AIInvesting #MachineLearning #Fintech #AlternativeInvesting#DataDrivenDecisions #Cybersecurity #ArtificialIntelligence #AdvantaIRA#InvestmentStrategy #AIFuture
In this episode of the Future of ERP podcast, Brian Jensen, Managing Director at KPMG, breaks down the complex world of compliance in Cloud ERP environments and how businesses can navigate shared responsibility models effectively. Brian explains why compliance should be seen not as a mere checkbox but as a powerful enabler for risk management and business agility. The discussion covers critical topics like data security, user access control, and the dynamic role of hyperscalers in cloud compliance. Listeners will gain practical advice on balancing rapid innovation with strict regulatory demands and how emerging technologies like AI and automation will reshape compliance roles in ERP systems. Memorable analogies, such as comparing compliance to a car's safety features, make complex ideas accessible. Whether you're a business leader or an IT professional, this episode offers valuable lessons on leveraging Cloud ERP and compliance as a competitive edge. Tune in for actionable insights and a forward-thinking vision of ERP's future.
Washington AI Network founder Tammy Haddad hosts Cohesity CEO and President Sanjay Poonen for a conversation on the intersection of data security and artificial intelligence. Poonen explains why protecting government and enterprise data is the foundation for trustworthy AI — and why, in his words, “You can't do AI before you've secured your data.” He also introduces Gaia, Cohesity's new generative-AI platform built with NVIDIA, and shares how AI can help government become more efficient, secure, and productive. From ransomware readiness to the President's AI Action Plan, Poonen outlines how agencies can build cyber resilience, strengthen data hygiene, and embrace innovation safely in the age of AI.
Jim Caci, CFO at AvePoint (AVPT), looks at their latest quarterly earnings and how the company is using AI. He notes “strong performance” in revenue and new customers around the world. He discusses the exploding need for data security with the advent of AI and their fastest growing global market, AIPAC. “There's great opportunity in all parts of the world,” though, he stresses.======== Schwab Network ========Empowering every investor and trader, every market day. Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/ About Schwab Network - https://schwabnetwork.com/about
With me in this episode is John Ackerly, co-founder and CEO of Virtru. John started Virtru with his brother Will over a decade ago to make data security more pervasive across mediums such as emails and files. Virtru has raised over $150 million to this point from investors such as ICONIQ and Bessemer and built a very healthy business on one of the core pillars of cybersecurity. John has an atypical background in business well-complemented by his brother's technical experience at NSA. One of my favorite lines from the episode: he always thought he would start a business with his other brother. In the episode we discuss pricing strategy, which is certainly not all science, the founder outlook when starting a company, founding with family, and more. Website: https://www.virtru.com/
Imagine stepping into a role and discovering your predecessor had been severely underreporting vulnerabilities, leaving your systems 300 days behind on patches. Join G Mark Hardy and Ross Young in this riveting episode of CISO Tradecraft as they unveil a startling real-world scenario and a proven strategy to revolutionize your patching process. Learn how to tackle the ever-growing number of vulnerabilities, leverage AI and automation, and instill a culture of accountability and gamification among your team. With expert insights and practical steps, this episode is a must-watch for every cybersecurity leader looking to stay ahead of threats and secure their organization's future.Big thanks to our sponsor, Forcepoint. Check out how they can help you shut down ShadowAI. https://www.forcepoint.com/resources/ebooks/shadow-ai-security-guide?utm_source=linkedin&sf_src_cmpid=701a600000exxd7AAA&utm_medium=display&utm_content=AW_NC_LinkedInAds_October25_ban&utm_campaign=LinkedInAds_October25Slides can be found here: https://www.linkedin.com/posts/mrrossyoung_patch-or-perish-activity-7389964440546471936--I_F?utm_source=share&utm_medium=member_desktop&rcm=ACoAABnnk5MBYbK8I-lYgI25f6ro7t6rOeP-OdsChapters00:00 Introduction: The CISO Challenge 00:31 The Importance of Data Security 01:05 Welcome to CISO Tradecraft 02:01 Ross Young's Patching Journey 03:34 The Growing Threat of Vulnerabilities 05:16 AI and Cybersecurity 07:34 Developing a Comprehensive Security Approach 10:51 Accountability and Metrics 15:30 Improving Vulnerability Management Processes 19:28 Advanced Tooling and Automation 23:16 Future Trends in Cybersecurity 27:06 Conclusion: Adapting to the Future
Juan Loaiza is the EVP of Database Technologies at Oracle. In today's special episode of Cloud Wars Live, Loaiza joins Bob Evans to discuss how AI is transforming the way businesses interact with data. He spotlights Oracle's new AI-native database, the importance of trust and security in enterprise AI, and why business users now play a bigger role in data strategy. It's a revealing look at how Oracle is shaping the future of intelligent data systems.The AI Data RevolutionThe Big Themes:Trust, Governance, and Privacy Must Be Built Into the AI‑Data Stack: One of the strongest points made by Loaiza is about the risk of AI in enterprises: hallucinations, mis‑use of data, privacy violations, regulatory consequences. When mission‑critical systems (hospitals, banks, telecoms) are involved, errors are unacceptable and can be illegal. Oracle's approach is to embed privacy and access controls down into the database engine: the system knows who the end user is, what they can see, and ensures AI cannot leak unauthorized data.Multi‑Cloud, On‑Premises, Hybrid — Customers Want Flexibility: Loaiza describes how Oracle is enabling customers to run their database and AI workloads wherever they need: on‑premises, in public clouds (AWS, Azure, Google Cloud), or via “cloud at your data center” options like Exadata Cloud@Customer. This speaks to regulatory, latency, data sovereignty and operational constraints. For enterprises, the takeaway is that deployment flexibility is essential. A one‑size‑fits‑all cloud model may not meet strategic needs.Business Users and Developers Now Have Voices in Database Strategy: Historically, databases were the domain of DBAs, IT operations, and infrastructure teams. Now business users and developers also have meaningful voices because of AI democratizing access. This shift means organizational structures, roles and processes must change. Data governance, training, tool‑selection and deployment pipelines need to reflect that the “consumer” of the database is broader.The Big Quote: “[AI] can translate English to this language of computers, the language of data, which is SQL. So, what that means is you don't have to learn this crazy language anymore. So pretty much anyone, business people, lay people, can now talk using their normal natural language to the database, and the database will understand what they're saying and give them answers, build applications to all these and this is something I honestly never thought I'd see in my entire life, and it's here today."More from Juan Loaiza and Oracle:Follow Juan on LinkedIn or learn more about Oracle's approach to security. Visit Cloud Wars for more.
Oftentimes, organizations view training simply as another obligation; however, tailored and hands-on privacy and cybersecurity training are essential to safeguard data and ensure operations run smoothly in the event of a breach.
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss the news that SimonMed Imaging was targeted by the Medusa ransomware group, which claimed to have stolen 200 Gb of data, according to SecurityWeek. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
X: @MarshaBlackburn @ileaderssummit @americasrt1776 @NatashaSrdoc @JoelAnandUSA @supertalk Join America's Roundtable (https://americasrt.com/) radio co-hosts Natasha Srdoc and Joel Anand Samy with U.S. Senator Marsha Blackburn, senior senator for Tennessee and the first woman to represent the Volunteer State in the United States Senate. She serves on the Deputy Whip Team and is a member of the Finance Committee; the Commerce, Science & Transportation Committee; the Veterans' Affairs Committee; and the Judiciary Committee. Senator Marsha Blackburn serves as the Ranking Member on the Commerce Subcommittee on Consumer Protection, Product Safety, and Data Security and on the Judiciary Subcommittee on Human Rights and the Law. Before her election to the Senate, Marsha represented Tennessee's 7th Congressional District in the United States House of Representatives. americasrt.com (https://americasrt.com/) https://ileaderssummit.org/ | https://jerusalemleaderssummit.com/ America's Roundtable on Apple Podcasts: https://podcasts.apple.com/us/podcast/americas-roundtable/id1518878472 X: @MarshaBlackburn @ileaderssummit @americasrt1776 @NatashaSrdoc @JoelAnandUSA @supertalk America's Roundtable is co-hosted by Natasha Srdoc and Joel Anand Samy, co-founders of International Leaders Summit and the Jerusalem Leaders Summit. America's Roundtable (https://americasrt.com/) radio program focuses on America's economy, healthcare reform, rule of law, security and trade, and its strategic partnership with rule of law nations around the world. The radio program features high-ranking US administration officials, cabinet members, members of Congress, state government officials, distinguished diplomats, business and media leaders and influential thinkers from around the world. Tune into America's Roundtable Radio program from Washington, DC via live streaming on Saturday mornings via 68 radio stations at 7:30 A.M. (ET) on Lanser Broadcasting Corporation covering the Michigan and the Midwest market, and at 7:30 A.M. (CT) on SuperTalk Mississippi — SuperTalk.FM reaching listeners in every county within the State of Mississippi, and neighboring states in the South including Alabama, Arkansas, Louisiana and Tennessee. Tune into WTON in Central Virginia on Sunday mornings at 6:00 A.M. (ET). Listen to America's Roundtable on digital platforms including Apple Podcasts, Spotify, Amazon, Google and other key online platforms. Listen live, Saturdays at 7:30 A.M. (CT) on SuperTalk | https://www.supertalk.fm
In this episode of the Ardan Labs Podcast, Bill Kennedy talks with Zack Holland, CEO & Founder of Averi AI, about his journey from early life in Ecuador's Amazon rainforest to building an AI-powered marketing platform. Zack shares lessons from early business ventures, the challenges of running startups, and the evolution of his entrepreneurial mindset. They explore how Averi AI helps marketers become more creative and efficient, the importance of data security and trust in AI, and what it takes to innovate in a rapidly evolving digital landscape.00:00 Introduction02:54 Marketing and AI Evolution05:58 Changing Digital Landscape09:04 Early Life and Influences12:02 From Ecuador to Utah18:00 First Business in High School29:53 LLMs and Entrepreneurship39:44 Lessons from Failure43:46 Starting a Marketing Agency56:19 Founding Avery AI01:08:10 Trust and Data Security01:13:14 Marketing and AI Adoption01:17:58 AI Challenges and Opportunities01:26:00 Contact Info Connect with Zack: Linkedin: https://www.linkedin.com/in/zackhollandX: https://x.com/zack_hollandMentioned in this Episode:Averi AI: https://www.averi.ai/Want more from Ardan Labs? You can learn Go, Kubernetes, Docker & more through our video training, live events, or through our blog!Online Courses : https://ardanlabs.com/education/ Live Events : https://www.ardanlabs.com/live-training-events/ Blog : https://www.ardanlabs.com/blog Github : https://github.com/ardanlabs
The AWS Meltdown: $50 Billion Lost and Nobody's Talking About It | Karel Cast 25-134 When Amazon Web Services (AWS) went down, the internet itself nearly broke — apps crashed, transactions froze, and the global economy took a $50 BILLION hit in just hours. But the real story isn't just about one outage… it's about how dangerously dependent we've become on a single company's servers. Karel breaks down the truth behind the AWS crash, why it's scarier than you think, and what it says about the fragile state of our tech-driven world. Also on today's show:
Send us a textIn this episode, Joe sits down with Gidi Cohen, a cybersecurity expert with a rich background in the Israeli 8200 unit, to explore the evolving landscape of data security. They delve into the challenges of managing large data sets, the impact of AI on cybersecurity, and the innovative solutions offered by Bonfy AI. Whether you're a seasoned professional or new to the field, this conversation offers valuable insights into the complexities and opportunities within data security. Tune in to learn how to navigate the ocean of data and protect your organization's most valuable assets.00:00 Introduction to Gidi Cohen and His Background01:49 The Role of 8200 Unit in Cybersecurity04:25 Transitioning from Military to Industry11:32 Identifying Problems in Data Security16:00 The Challenges of Data Management in Organizations23:58 The Challenge of Data Classification26:59 Understanding Context in Data Security29:44 Adaptive Learning in AI Solutions32:22 Proactive Risk Mitigation Strategies34:57 Integrating Data Security Across Platforms37:33 The Future of Data Security SolutionsBonfy ACS is a next-gen DLP platform built for the AI era, combining contextual intelligence and adaptive remediation to secure sensitive data and enable AI innovation at scale. With high accuracy and out-of-the-box policies, it delivers fast time to value while reducing false alerts and investigation overhead. Trusted by regulated organizations, Bonfy ensures compliance and integrates seamlessly with Microsoft 365, Salesforce, Slack, and Google Workspace.Speaker: Gidi Cohen, CEO and Co-Founder of Bonfy.AIhttps://www.bonfy.ai/Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifyBonfy.aiBonfy ACS is a next-gen DLP platform built for the AI era. Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast Affiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.
SaaStr 825: How the AI Era Has Directly Impacted Marketing and Sales with Snowflake‘s CMO and Founding CRO Join us for an insightful episode discussing the impact of AI on marketing and sales at Snowflake. Hosts Chris Degnan, founding CRO of Snowflake, and Denise Persson, CMO at Snowflake, delve into how AI has revolutionized their operations. They share key learnings from Snowflake's data cloud market strategies and their record-breaking IPO. Discover the significance of company culture, security, and a centralized data foundation in leveraging AI. Hear about Snowflake's AI Council, customer use cases, task automation, and the consolidation of intelligence teams. Don't miss this comprehensive discussion on the transformative role of AI in the enterprise and valuable hiring insights for staying ahead in the AI era. 00:00 Introduction and Speaker Backgrounds 02:05 Impact of AI on Company Culture 05:09 Snowflake's AI Strategy and Data Security 08:03 AI Use Cases in Marketing 21:26 AI Use Cases in Sales 29:42 Governance and Security in AI Implementation 32:10 AI's Influence on Hiring and Company Growth 34:58 Closing Thoughts and Resources --------------------- This episode is Sponsored in part by Salesforce: Connect data, automate busywork and empower teams like nobody's business with the one platform that grows with you, every step of the way. Learn how Salesforce works for Startups at salesforce.com/smb. --------------------- This episode is Sponsored in part by Intercom:  Fin is the #1 AI Agent for resolving complex queries like refunds, transaction disputes, and technical troubleshooting—all with speed and reliability. See how Fin can deliver the highest resolution rates and highest-quality customer experience at fin.ai/saastr. --------------------- If you're serious about B2B and AI, you need to be in London this December. SaaStr AI London is bringing together more than 2,000 leaders and founders for two days of practical advice on scaling into the new year. We'll have speakers flying in from OpenAI, Wiz, Clay, Intercom, and all your favorite SaaS companies, including yours truly with Harry Stebbings for a live 20VC podcast. It'll be fun, and it's all in the heart of London. Don't miss out: get your tickets with my exclusive discount by going to podcast.saastrlondon.com --------------------- Hey everybody, the biggest B2B + AI event of the year will be back - SaaStr AI in the SF Bay Area, aka the SaaStr Annual, will be back in May 2026. With 68% VP-level and above, 36% CEOs and founders and a growing 25% AI-first professional, this is the very best of the best S-tier attendees and decision makers that come to SaaStr each year. But here's the reality, folks: the longer you wait, the higher ticket prices can get. Early bird tickets are available now, but once they're gone, you'll pay hundreds more so don't wait. Lock in your spot today by going to podcast.saastrannual.com to get my exclusive discount SaaStr AI SF 2026. We'll see you there.
Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss why he wrote it, how he got it done so quickly, and who needs to read it. Segment Resources: Get the book on Amazon: Data Security in the Age of AI (available in Kindle and print) Segment 2 - Topic: The reasons why CISOs buy (and the things that don't matter to them) Val Tsanev, founder of ExecWeb, part of the CyberRisk Alliance family, posted shared some VERY spicy insights about how CISOs buy products. This elicited some passionate responses. There are many interesting insights, but the biggest and most interesting is that 76% of CISOs choose products that presents the least risk to them, personally. Career safety trumps product performance, it would seem. Segment 3 - News In the enterprise security news, Shifting Zero Cyber insurance, unlike cyber crime, doesn't pay New AI security categories are popping up to serve Agentic and MCP servers how tech companies measure AI impact first malicious MCP server in the wild is your computer mouse listening to you? The Korean government did not follow the backup rule of three Think you've seen the absolute worst idea for a mobile app? Wait until you hear about Neon. We have no less than three squirrel stories involving bullets, lasers, and greasy snacks All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-428
Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss why he wrote it, how he got it done so quickly, and who needs to read it. Segment Resources: Get the book on Amazon: Data Security in the Age of AI (available in Kindle and print) Segment 2 - Topic: The reasons why CISOs buy (and the things that don't matter to them) Val Tsanev, founder of ExecWeb, part of the CyberRisk Alliance family, posted shared some VERY spicy insights about how CISOs buy products. This elicited some passionate responses. There are many interesting insights, but the biggest and most interesting is that 76% of CISOs choose products that presents the least risk to them, personally. Career safety trumps product performance, it would seem. Segment 3 - News In the enterprise security news, Shifting Zero Cyber insurance, unlike cyber crime, doesn't pay New AI security categories are popping up to serve Agentic and MCP servers how tech companies measure AI impact first malicious MCP server in the wild is your computer mouse listening to you? The Korean government did not follow the backup rule of three Think you've seen the absolute worst idea for a mobile app? Wait until you hear about Neon. We have no less than three squirrel stories involving bullets, lasers, and greasy snacks All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-428
Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss why he wrote it, how he got it done so quickly, and who needs to read it. Segment Resources: Get the book on Amazon: Data Security in the Age of AI (available in Kindle and print) Segment 2 - Topic: The reasons why CISOs buy (and the things that don't matter to them) Val Tsanev, founder of ExecWeb, part of the CyberRisk Alliance family, posted shared some VERY spicy insights about how CISOs buy products. This elicited some passionate responses. There are many interesting insights, but the biggest and most interesting is that 76% of CISOs choose products that presents the least risk to them, personally. Career safety trumps product performance, it would seem. Segment 3 - News In the enterprise security news, Shifting Zero Cyber insurance, unlike cyber crime, doesn't pay New AI security categories are popping up to serve Agentic and MCP servers how tech companies measure AI impact first malicious MCP server in the wild is your computer mouse listening to you? The Korean government did not follow the backup rule of three Think you've seen the absolute worst idea for a mobile app? Wait until you hear about Neon. We have no less than three squirrel stories involving bullets, lasers, and greasy snacks All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-428
Amanda Silberling joins Mikah Sargent on Tech News Weekly this week! Casio has a new smart toy companion powered by AI. The UK is still seeking to develop backdoor encryption for Apple users. ChatGPT is looking to act more like an operating system. And how the 'Buy Now, Pay Later' model has built a $120 billion industry. Amanda has her hands on a new AI-powered smart companion from Casio! She and Mikah talk about the device, how it works, and the possible data security and privacy concerns. Mikah talks about the UK's continued push to create backdoor encryption for Apple users in the country. Sabrina Ortiz of ZDNet joins the show to discuss OpenAI's Dev Day and the company's ambitions to make OpenAI function like an OS with the launch of the Apps SDK. Finally, Mikah shares an article from The New York Times Magazine about the 'Buy Now, Pay Later' market, which allows buyers to obtain their items easily and traps users in a swarm of debt. Hosts: Mikah Sargent and Amanda Silberling Guest: Sabrina Ortiz Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io threatlocker.com/twit cachefly.com/twit
Amanda Silberling joins Mikah Sargent on Tech News Weekly this week! Casio has a new smart toy companion powered by AI. The UK is still seeking to develop backdoor encryption for Apple users. ChatGPT is looking to act more like an operating system. And how the 'Buy Now, Pay Later' model has built a $120 billion industry. Amanda has her hands on a new AI-powered smart companion from Casio! She and Mikah talk about the device, how it works, and the possible data security and privacy concerns. Mikah talks about the UK's continued push to create backdoor encryption for Apple users in the country. Sabrina Ortiz of ZDNet joins the show to discuss OpenAI's Dev Day and the company's ambitions to make OpenAI function like an OS with the launch of the Apps SDK. Finally, Mikah shares an article from The New York Times Magazine about the 'Buy Now, Pay Later' market, which allows buyers to obtain their items easily and traps users in a swarm of debt. Hosts: Mikah Sargent and Amanda Silberling Guest: Sabrina Ortiz Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io threatlocker.com/twit cachefly.com/twit
Amanda Silberling joins Mikah Sargent on Tech News Weekly this week! Casio has a new smart toy companion powered by AI. The UK is still seeking to develop backdoor encryption for Apple users. ChatGPT is looking to act more like an operating system. And how the 'Buy Now, Pay Later' model has built a $120 billion industry. Amanda has her hands on a new AI-powered smart companion from Casio! She and Mikah talk about the device, how it works, and the possible data security and privacy concerns. Mikah talks about the UK's continued push to create backdoor encryption for Apple users in the country. Sabrina Ortiz of ZDNet joins the show to discuss OpenAI's Dev Day and the company's ambitions to make OpenAI function like an OS with the launch of the Apps SDK. Finally, Mikah shares an article from The New York Times Magazine about the 'Buy Now, Pay Later' market, which allows buyers to obtain their items easily and traps users in a swarm of debt. Hosts: Mikah Sargent and Amanda Silberling Guest: Sabrina Ortiz Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io threatlocker.com/twit cachefly.com/twit
Amanda Silberling joins Mikah Sargent on Tech News Weekly this week! Casio has a new smart toy companion powered by AI. The UK is still seeking to develop backdoor encryption for Apple users. ChatGPT is looking to act more like an operating system. And how the 'Buy Now, Pay Later' model has built a $120 billion industry. Amanda has her hands on a new AI-powered smart companion from Casio! She and Mikah talk about the device, how it works, and the possible data security and privacy concerns. Mikah talks about the UK's continued push to create backdoor encryption for Apple users in the country. Sabrina Ortiz of ZDNet joins the show to discuss OpenAI's Dev Day and the company's ambitions to make OpenAI function like an OS with the launch of the Apps SDK. Finally, Mikah shares an article from The New York Times Magazine about the 'Buy Now, Pay Later' market, which allows buyers to obtain their items easily and traps users in a swarm of debt. Hosts: Mikah Sargent and Amanda Silberling Guest: Sabrina Ortiz Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io threatlocker.com/twit cachefly.com/twit
When you're running a large industrial operation, tracking all of the elements of your process to know where they are and what they're doing in real-time, can be a huge challenge. Today, we're spotlighting a company whose revolutionary platform can help solve that problem. Ed Nabrotzky is the CEO and co-founder of Dot Ai, a company specializing in industrial asset intelligence solutions. Ed brings with him over 25 years of experience in technology development, and has held executive leadership roles at large public enterprises, including Molex and Panasonic. Ed joins us to discuss Dot Ai's competitive advantage, how AI is changing the game when it comes to asset intelligence, and how their tech helps make companies more efficient. Highlights:What Dot Ai does (1:53)The gap in the market (2:25)The customers (3:21)Inflection point (4:01)The current emphasis asset intelligence (5:51)ROI (7:09)The Dot Ai platform (8:36)Data Security (12:04)Meeting Unique Client Needs (13:25)R&D (14:40)Puerto Rico Manufacturing (16:15)SPAC (18:49)Forces reshaping supply chains (22:59)Misconceptions about automated asset tracking (25:04)Future outlook (26:10) Links:Ed's LinkedInDot Ai LinkedInDot Ai WebsiteICR LinkedInICR TwitterICR Website Feedback:If you have questions about the show, or have a topic in mind you'd like discussed in future episodes, email our producer, joe@lowerstreet.co.
The EU fines Google $3.5 billion over adtech abuses. Cloudflare blocks record-breaking Distributed Denial of Service (DDoS) attacks. The Salesforce-Salesloft breach began months earlier with GitHub access. Researchers say the new TAG-150 cybercriminal group has been active since March. Hackers use stolen secrets to leak more than 6,700 Nx private repositories. Subsea cable outages disrupt internet connectivity across India, Pakistan, and parts of the UAE. Monday Business Breakdown. On our Industry Voices segment Todd Moore, Global Vice President, Data Security at Thales, unpacks the perils of insider risk. Hackers claim Burger King's security flaws are a real whopper. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Industry Voices On our Industry Voices segment, we are joined by Todd Moore, Global Vice President, Data Security at Thales, discussing the biggest threat to your data has a badge, a password, and years of goodwill. Check out Todd's full conversation here. Selected Reading EU fines Google $3.5 billion for anti-competitive ad practices (Bleeping Computer) Cloudflare blocks massive 11.5 Tbps DDoS attack (SDxCentral) Salesloft GitHub Account Compromised Months Before Salesforce Attack (SecurityWeek) From CastleLoader to CastleRAT: TAG-150 Advances Operations with Multi-Tiered Infrastructure (Recorded Future) Over 6,700 Private Repositories Made Public in Nx Supply Chain Attack (SecurityWeek) Red Sea cable cuts disrupt internet across Asia and the Middle East (Reuters) N2K Pro Business Briefing update (N2K Networks) Burger King hacked, attackers 'impressed by the commitment to terrible security practices' — systems described as 'solid as a paper Whopper wrapper in the rain,' other RBI brands like Tim Hortons and Popeyes also vulnerable (Tom's Hardware) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices