Podcasts about Data security

  • 1,112PODCASTS
  • 2,365EPISODES
  • 35mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Aug 1, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Data security

Show all podcasts related to data security

Latest podcast episodes about Data security

Cybercrime Magazine Podcast
Data Security. Lessons From The 2006 VA Data Breach. Scott Schober, Author, "Hacked Again."

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 1, 2025 18:51


Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to reflect on a 2006 data breach which served as a cybersecurity wake up call for the Department of Veterans Affairs and the rest of the federal government. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com

The Azure Security Podcast
Episode 116: Microsoft Sentinel Data Lake

The Azure Security Podcast

Play Episode Listen Later Jul 31, 2025 40:03 Transcription Available


In this episode Michael, Sarah and Mark talk to Mark Kendrick about Microsoft Sentinel Data Lake. We also cover news about The Open Group - Roles and Glossary standards, Security Adoption Module 5 - Data Security, Microsoft Azure Cloud HSM, WAF and Containers, PostgreSQL and PowerBI, Azure Managed Lustre, and more. Also, Sarah mentions some Developer Security YouTube videos coming out from MS Build!https://aka.ms/azsecpod

AI Chat: ChatGPT & AI News, Artificial Intelligence, OpenAI, Machine Learning

In this episode, Jaeden reviews the funding and promises from company "Confident Security". Claiming that their new "CONFSEC" encryption tool will keep data from being stored (but not seen) by AI.Try AI Box: ⁠⁠https://aibox.aiAI Chat YouTube Channel: https://www.youtube.com/@JaedenSchaferJoin my AI Hustle Community: https://www.skool.com/aihustle/aboutYouTube Video: https://youtu.be/A2F7oPX7zZ8Chapters00:00 Introduction to Confident Security02:22 The Importance of Data Security in AI04:42 Confident Securities Innovative Solutions07:51 Future Implications for AI & Security

Coffee w/#The Freight Coach
1243. #TFCP - From Invoices to PODs: Where Fraud Hides in Plain Sight!

Coffee w/#The Freight Coach

Play Episode Listen Later Jul 18, 2025 33:27 Transcription Available


Are you confident your business can identify fraud before it hits your bottom line? How can you tell if an invoice, ID, or rate confirmation is real or AI-generated? You must listen to this conversation with Chad Capooth of Denim! Chad unpacks the alarming rise in sophisticated fraud across the transportation industry, from AI-generated fake documents and spoofed domains to virtual numbers and identity theft!  With fraud tactics evolving every six months, Chad emphasizes that ongoing staff training, layered security, and tools like live ID matching and account verification are no longer optional; they're essential!   About Chad Capooth Chad is the VP of Operations at Denim. He brings over 15 years of experience in strategic planning, business growth, and operations leadership. At Denim, he leads operational strategy, leveraging deep expertise in factoring, credit underwriting, and portfolio management to deliver efficient, tech-enabled solutions. Previously, as COO at eCommerce Financing LLC, Chad helped launch innovative products like Revenue Loans and Quick Pay Loans. At Transfac Capital, he advanced operational performance through technology-driven underwriting and automated invoice processing. Chad's earlier roles at Unlimited Working Capital and Enoble Business Capital (formerly National Bankers Trust) cemented his reputation as a leader in financial services innovation.   Connect with Chad Website: https://www.denim.com/  Email: ccapooth@denim.com  

Geek News Central
Self-Destructing SSD for Ultimate Data Security #1832

Geek News Central

Play Episode Listen Later Jul 15, 2025 35:15 Transcription Available


TeamGroup has launched the P250Q-M80 SSD, a specialized drive that can physically destroy its flash memory by pressing a button. Designed for defense and critical-use scenarios, the drive features a one-click data destruction circuit, complete with LED indicators and functionality that remains intact even during power loss. Although not record-breaking in terms of speed or … Continue reading Self-Destructing SSD for Ultimate Data Security #1832 → The post Self-Destructing SSD for Ultimate Data Security #1832 appeared first on Geek News Central.

Rebel Tech
Rebel Tech Podcast | Episode 23: AI in Criminal Justice with Christian Cochran at TPS 2025

Rebel Tech

Play Episode Listen Later Jul 15, 2025 22:32


In this episode of Rebel Tech, recorded at the Texas Policy Summit 2025, hosts David Dunmoyer and Zach Whiting dive into the intersection of artificial intelligence and criminal justice with expert Christian Cochran from Right on Crime. A former deputy sheriff, Christian shares insights from his groundbreaking research on AI's role in law enforcement, discussing body cameras, license plate readers, firearm detection, and the balance between public safety and civil liberties. From transparency in tech deployment to privacy concerns and the future of AI in policing, this episode explores the promises and perils of emerging technologies in the justice system. Don't miss this engaging conversation on how AI is reshaping criminal justice and what it means for communities nationwide.

Geek News Central (Video)
Self-Destructing SSD for Ultimate Data Security #1832

Geek News Central (Video)

Play Episode Listen Later Jul 15, 2025 35:15 Transcription Available


TeamGroup has launched the P250Q-M80 SSD, a specialized drive that can physically destroy its flash memory by pressing a button. Designed for defense and critical-use scenarios, the drive features a one-click data destruction circuit, complete with LED indicators and functionality that remains intact even during power loss. Although not record-breaking in terms of speed or … Continue reading Self-Destructing SSD for Ultimate Data Security #1832 → The post Self-Destructing SSD for Ultimate Data Security #1832 appeared first on Geek News Central.

Hard Reset
E75 - Data Security (Stav Elbar)

Hard Reset

Play Episode Listen Later Jul 14, 2025 37:29


פרק לייב! אבל בדיעבד. לפני שבוע התארחנו ב@מת״מ ושמחנו לקחת חלק בחגיגות השנתיים לקהילה. בנוכחות קהל (בפעם הראשונה) התכבדנו לארח את ד״ר @סתיו אלבר ולשוחח על פרטיות, סודיות והצפנה. סתיו היא חוקרת צפנים ב@טכניון ומהנדסת תוכנה ב@גוגל. מעבר לכך היא גם סופרת ילדים וכתבה את הספרים ״סודות ההצפנה לילדים״, ״בינה מלאכותית לילדים״ וגם ״אלגוריתמים לילדים״. אז על מה דיברנו? - למה צריך אבטחת מידע? - מה ההבדל בין סודיות ופרטיות? - למה הצפנה מקושרת לסייבר? - מה הסיפור עם האניגמה? - מתי התחילו להצפין מידע? - איך שוברים הצפנה? - איך ולמה חוקרת צפנים מתחילה לכתוב ספר ילדים? אחרי שהאזנתם לפרק מוזמנים להצטרף לקבוצת המאזינים שלנו - שם אנחנו מאמתים שאתם לא רובוטים >>> https://chat.whatsapp.com/KwUu8pQsxx220qS7AXv04T תודה ל@הגר על ההזמנה וההזדמנות להקליט פרק בלייב במתחם המקסים בפרק מת״מ! נשמח לשמוע את דעתכם על הפרק בתגובות. פרק 75 - Data Security Hard Reset - הפודקאסט של קהילת Hardware Engineering Israel. פרק זה הוקלט במהלך מלחמת ״חרבות ברזל״. מוזמנים ליצור איתנו קשר במייל podcasthardreset@gmail.com האזנה נעימה. Lior Schermann Yuval Kogan

Entrepreneur Lounge of India (ELI)
ELI - 483 | AI Agents for Lead Qualification, Customer Onboarding, Reactivation, and More - RevRagAI

Entrepreneur Lounge of India (ELI)

Play Episode Listen Later Jul 14, 2025 32:43


Ashutosh Prakash Singh, the co-founder and CEO of Revrag AI, joins the ELI podcast to discuss his entrepreneurial journey. He talks about his background, from his early days and interest in music to becoming a product manager and eventually starting his own company. Ashutosh explains the problem Revrag AI is solving in the BFSI sector by using AI agents to reduce drop-offs during customer onboarding. He delves into the challenges of working with banks, data security, and the evolving regulatory landscape for AI in India. The conversation also covers the underlying technologies at Revrag AI, the rise of voice AI, and the company's future vision.Chapters:00:00 - Introduction00:23 - Ashutosh's Background and Journey05:22 - The Problem Revrag AI is Solving09:21 - How Revrag AI Works11:07 - Navigating Challenges in the Banking Sector15:37 - Underlying Technologies at Revrag AI17:16 - Data Security and Sovereignty20:17 - Challenges in Building and Growing Revrag AI22:02 - The Future of AI and Finance Regulation in India26:12 - The Rise of Voice AI29:26 - Future Vision for Revrag AI31:38 - Conclusion

Federal Drive with Tom Temin
Today's the day to be in compliance with a data security rule from the Department of Justice

Federal Drive with Tom Temin

Play Episode Listen Later Jul 8, 2025 10:51


Back in April, the Department of Justice issued a new rule governing foreign adversary access to U.S. sensitive data. But the complications of the rule and comments from companies motivated DOJ to provide a 90-day grace period for companies to come into compliance. That grace period ends today. Here with more on the rule, the requirements, and what happens next is partner in the Governmental Practice in Shepherd Mullin's Washington, D.C. office, Townsend Bourne.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Heavy Metal Money: The Podcast
Is TikTok Really Spying on You? What No One Is Telling You About Data Security

Heavy Metal Money: The Podcast

Play Episode Listen Later Jul 4, 2025 16:45


In this solo episode of the Extreme Personal Finance Show, Chris discusses the controversy surrounding TikTok, particularly its impact on small businesses and the security measures in place to protect user data. He highlights Project Texas, a partnership with Oracle aimed at securing US user data, and delves into Apple's security protocols that safeguard user information. The conversation emphasizes the importance of user consent, developer accountability, and continuous improvement in security measures, urging listeners to understand the implications of these technologies on their businesses and personal data.TakeawaysChris expresses his patriotism and concern for national security.TikTok serves as a vital platform for small businesses.Project Texas aims to secure US user data through Oracle.Oracle's oversight includes rigorous monitoring and auditing.Apple employs a layered defense to protect user data.Privacy is a core belief for Apple.iOS uses sandboxing to isolate apps from each other.User consent is crucial for accessing sensitive data.Developer accountability is enforced through code signing.Regular security updates enhance user empowerment.Chapters00:00 Introduction to TikTok Controversy02:51 The Impact of TikTok on Small Businesses05:45 Understanding Project Texas and Data Security08:43 Apple's Security Measures Explained11:43 User Consent and Privacy Controls14:19 Developer Accountability and App Security17:17 Continuous Improvement in User Empowerment19:59 Conclusion and Call to ActionContact Chris:https://heavymetal.moneyhttps://www.facebook.com/MoneyHeavyMetalhttps://x.com/MoneyHeavyMetalhttps://www.instagram.com/chrislugerhttps://www.tiktok.com/@heavymetalmoneyemail: chris at heavymetal.moneyResources and Links:Apple Platform Security Project TexasHow Is TikTok Planning To Avoid a U.S. Ban? Enter “Project Texas.”The State of Texas Accelerates Public Safety Modernization with Oraclehttps://www.oracle.com/news/announcement/the-state-of-texas-accelerates-public-safety-modernization-with-oracle-2025-06-24/#TikTokBan #DataPrivacy #SmallBusiness #AppleSecurity #ExtremePersonalFinance

Consumer Finance Monitor
Aspen Institute Seems to be Making Great Strides in Fixing Our Online Scams Problem

Consumer Finance Monitor

Play Episode Listen Later Jul 3, 2025 80:33


The genesis of the podcast show we are releasing today was an article written by Nick Bourke titled “America Can Fix Its Scam Problem. But We Keep Gifting Billions to Transnational Criminals Because It Feels Too Hard” published on April 12, 2025 in Open Banker. We learned from that article about the great work being done by Aspen Institute's National Task Force on Fraud and Scam Prevention. The purpose of the podcast is to describe the work of this Task Force  The Aspen Institute states the following about the Task Force: Every day, criminals steal $430 million from American families, with total fraud proceeds reaching $158 billion annually. They are a critical funding source for transnational criminal organizations, fueling drug cartels, human trafficking, and terrorism. Fraud losses reported to the FBI increased 15-fold over roughly the last decade, and the rise of new technologies like AI has made scams more sophisticated and easier to perpetuate to harm American families. The Aspen Institute Financial Security Program launched the National Task Force on Fraud and Scam Prevention in 2024 to develop the first coordinated U.S. national strategy aimed at stopping financial fraud at its root. The guiding purpose of the Task Force is to bring together all parties with an interest in protecting consumers and restoring trust in our financial system. This is the first time such a broad collection of leaders from across government, law enforcement, private industry, and civil society are coming together to develop a nationwide strategy aimed at helping prevent fraud and scams. Our guests on this podcast are: Kate Griffin, Director of Programs, Aspen Institute Financial Security Program and Nick Bourke, Senior Policy Adviser, The Aspen Institute. Our guests covered the following topics: 1.  What is the Aspen Institute's Financial Security Program and how did the Aspen Institute come to launch the National Task Force on Fraud and Scam Prevention?  Who is participating in the Task Force?  Why is such a cross-sector (industry, consumer advocates and government) very important?  What is standing in the way of more robust, secure, cross-sector data-sharing today? 2.  How big is the fraud and scams problem in the United States right now? How has it changed over time?  3.  What are some of the implications of this problem? How should we be thinking about this beyond the consumer-level financial impacts? Where is all this money going, and what does that mean for our national security?  How do fraud/scams compare to other forms of organized crime? Why is it so difficult for victims to recover their financial losses? Are there any efforts ongoing in Congress to alleviate this?  Despite all the anti-fraud measures, educational resources, and even public media coverage, why do scammers still seem to be gaining ground?  What are some of the biggest gaps or weaknesses in the U.S. system that scammers exploit? Are there promising models from other countries or sectors the U.S. can learn from?  How is AI changing the landscape of scams — both in how they're perpetrated and how we might stop them? 4. What's the right balance between imposing duties on companies and offering legal safe harbors so they're not afraid to act?  5.  Some people still feel a stigma around sharing when they have been the victim of a scam. How do we shift the environment away from victim-blaming and toward support? 6.  The Task Force is driving toward developing a "national strategy" for fighting fraud and scams. What are some of the necessary components to make this truly effective?  What do you mean by the need for a "national front door for reporting”?   7.   Consumer education has to continue playing a role here. What kinds of public awareness campaigns or interventions have proven effective? What kinds of leadership or investment are needed from Congress, the White House, or federal agencies?  8.  Are there any incentives that could better align corporate interests around fraud and scam prevention? Are there examples of companies that are leading the way on this issue?  9.  What are the Task Force's next steps? When should we expect to hear more about the national strategy that's coming together? Alan Kaplinsky, founder of and former Chair for 25 years of the Consumer Financial Services Group, hosted the podcast show.

Bite Size Sales
Scaling the Fastest-Growing Data Security Startup

Bite Size Sales

Play Episode Listen Later Jul 1, 2025 38:33


Are you struggling to keep up with the rapid pace of growth in cybersecurity sales? Wondering how to build a high-performing go-to-market team without sacrificing consistency or culture? Curious about what it takes to lead and enable teams through hypergrowth while navigating constant change? If so, you'll find answers and inspiration in this episode focused on Sierra, one of the fastest-growing cybersecurity firms on the market.In this conversation we discuss: 

Cybercrime Magazine Podcast
Data Security. GCC Strengthening Cyber Resilience. Scott Schober, Author, "Hacked Again."

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 27, 2025 22:04


Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss how the Gulf Cooperation Council (GCC) is strengthening cyber resilience in today's digital age. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com

Microsoft Mechanics Podcast
Secure your AI apps with user-context-aware controls | Microsoft Purview SDK

Microsoft Mechanics Podcast

Play Episode Listen Later Jun 26, 2025 9:11 Transcription Available


Build secure, compliant AI apps with code-based controls that dynamically respond to user context using Microsoft Purview for AI app developers. With built-in protections, prevent data leaks, block unsafe prompts, and avoid oversharing without rewriting your app. As a developer, focus on innovation while meeting evolving security and compliance requirements. And as a security admin, gain full visibility into AI data interactions, user activity, and policy enforcement across environments. Shilpa Ranganathan, Microsoft Purview Principal GPM, shares how new SDKs and Azure AI Foundry integrations bring enterprise-grade security to custom AI apps. ► QUICK LINKS:  00:00 - Microsoft Purview controls for developers 00:16 - AI app protected by Purview 02:23 - User context aware 03:08 - Prevent data oversharing 04:15 - Behind the app 05:17 - API interactions 06:50 - Data security admin AI app protection 07:26 - Monitor and Govern AI Interactions 08:30 - Wrap up ► Link References Check out https://aka.ms/MicrosoftPurviewSDK Microsoft Purview API Explorer at https://github.com/microsoft/purview-api-samples/ For the Microsoft Purview Chat App go to https://github.com/johnea-chva/purview-chat ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics

Security Now (MP3)
SN 1031: How Salt Typhoon Gets In - What "AI" Really Means

Security Now (MP3)

Play Episode Listen Later Jun 25, 2025 180:38


China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

All TWiT.tv Shows (MP3)
Security Now 1031: How Salt Typhoon Gets In

All TWiT.tv Shows (MP3)

Play Episode Listen Later Jun 25, 2025 180:38 Transcription Available


China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

Security Now (Video HD)
SN 1031: How Salt Typhoon Gets In - What "AI" Really Means

Security Now (Video HD)

Play Episode Listen Later Jun 25, 2025


China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

Security Now (Video HI)
SN 1031: How Salt Typhoon Gets In - What "AI" Really Means

Security Now (Video HI)

Play Episode Listen Later Jun 25, 2025


China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

Radio Leo (Audio)
Security Now 1031: How Salt Typhoon Gets In

Radio Leo (Audio)

Play Episode Listen Later Jun 25, 2025 180:38 Transcription Available


China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

Security Now (Video LO)
SN 1031: How Salt Typhoon Gets In - What "AI" Really Means

Security Now (Video LO)

Play Episode Listen Later Jun 25, 2025


China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

All TWiT.tv Shows (Video LO)
Security Now 1031: How Salt Typhoon Gets In

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Jun 25, 2025 181:01 Transcription Available


China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

No Nonsense with Pamela Wallin
New Internet Laws and Data Security with Michael Geist

No Nonsense with Pamela Wallin

Play Episode Listen Later Jun 25, 2025 31:53


Ottawa is expanding state access to subscriber data and giving political parties a free ride when it comes to protecting voter data. Is this a red flag for what is to come in the new Ottawa? We'll ask internet law expert Michael Geist.

The Future of ERP
Episode 65: From Legacy to Leading Edge: How Cloud Solutions Empower Business Success

The Future of ERP

Play Episode Listen Later Jun 25, 2025 13:55


This episode explores how technology and business truly come together to drive meaningful change, focusing on the shift from on-premise to cloud ERP. You'll hear how companies are breaking free from outdated systems, overcoming technical debt, and embracing more agile, modular approaches to stay ahead in a fast-changing world. The conversation unpacks common myths about security and customization, explains why cloud ERP offers greater trust and flexibility, and highlights the priorities today's CIOs are setting to future-proof their organizations. With insights on continuous innovation, compliance, and keeping your business unique, this discussion will leave you rethinking what's possible for the future of work.

Radio Leo (Video HD)
Security Now 1031: How Salt Typhoon Gets In

Radio Leo (Video HD)

Play Episode Listen Later Jun 25, 2025 181:01 Transcription Available


China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

Biotech Bytes: Conversations with Biotechnology / Pharmaceutical IT Leaders
How IT is Transforming Biotech with AI | Anthony Murabito on Data, Security & Innovation

Biotech Bytes: Conversations with Biotechnology / Pharmaceutical IT Leaders

Play Episode Listen Later Jun 19, 2025 37:35 Transcription Available


How IT is Transforming Biotech with AI | Anthony Murabito on Data, Security & Innovation #biotech #informationtechnology #aiinbiotechCan IT really revolutionize a biotech company's success in the AI era?In this episode, I talk with Anthony Murabito, VP of IT and Head of Data Security at Wave Life Sciences, to uncover how modern biotech companies are using AI to accelerate research, enhance security, and optimize workflows. Please visit our website to get more information: https://swangroup.net/ We dive into the real-world role of IT in biotech from crafting AI policies to managing data protection and aligning IT with R&D and commercial goals. Whether it's pharmacology modeling or auto-reporting for sales teams, AI is reshaping everything. If you're in life sciences, tech, or leadership, this conversation will give you practical tips, a new mindset, and fresh strategies to maximize IT's impact. Subscribe to hear more on AI in biotech, data governance, and tech-driven leadership.Links from this episode:✅ Get to know more about Anthony Murabito: https://www.linkedin.com/in/tonymurabito ✅ Learn more about Wave Life Sciences: https://www.wavelifesciences.com

Smart Software with SmartLogic
LangChain: LLM Integration for Elixir Apps with Mark Ericksen

Smart Software with SmartLogic

Play Episode Listen Later Jun 12, 2025 38:18


Mark Ericksen, creator of the Elixir LangChain framework, joins the Elixir Wizards to talk about LLM integration in Elixir apps. He explains how LangChain abstracts away the quirks of different AI providers (OpenAI, Anthropic's Claude, Google's Gemini) so you can work with any LLM in one more consistent API. We dig into core features like conversation chaining, tool execution, automatic retries, and production-grade fallback strategies. Mark shares his experiences maintaining LangChain in a fast-moving AI world: how it shields developers from API drift, manages token budgets, and handles rate limits and outages. He also reveals testing tactics for non-deterministic AI outputs, configuration tips for custom authentication, and the highlights of the new v0.4 release, including “content parts” support for thinking-style models. Key topics discussed in this episode: • Abstracting LLM APIs behind a unified Elixir interface • Building and managing conversation chains across multiple models • Exposing application functionality to LLMs through tool integrations • Automatic retries and fallback chains for production resilience • Supporting a variety of LLM providers • Tracking and optimizing token usage for cost control • Configuring API keys, authentication, and provider-specific settings • Handling rate limits and service outages with degradation • Processing multimodal inputs (text, images) in Langchain workflows • Extracting structured data from unstructured LLM responses • Leveraging “content parts” in v0.4 for advanced thinking-model support • Debugging LLM interactions using verbose logging and telemetry • Kickstarting experiments in LiveBook notebooks and demos • Comparing Elixir LangChain to the original Python implementation • Crafting human-in-the-loop workflows for interactive AI features • Integrating Langchain with the Ash framework for chat-driven interfaces • Contributing to open-source LLM adapters and staying ahead of API changes • Building fallback chains (e.g., OpenAI → Azure) for seamless continuity • Embedding business logic decisions directly into AI-powered tools • Summarization techniques for token efficiency in ongoing conversations • Batch processing tactics to leverage lower-cost API rate tiers • Real-world lessons on maintaining uptime amid LLM service disruptions Links mentioned: https://rubyonrails.org/ https://fly.io/ https://zionnationalpark.com/ https://podcast.thinkingelixir.com/ https://github.com/brainlid/langchain https://openai.com/ https://claude.ai/ https://gemini.google.com/ https://www.anthropic.com/ Vertex AI Studio https://cloud.google.com/generative-ai-studio https://www.perplexity.ai/ https://azure.microsoft.com/ https://hexdocs.pm/ecto/Ecto.html https://oban.pro/ Chris McCord's ElixirConf EU 2025 Talk https://www.youtube.com/watch?v=ojL_VHc4gLk Getting started: https://hexdocs.pm/langchain/gettingstarted.html https://ash-hq.org/ https://hex.pm/packages/langchain https://hexdocs.pm/igniter/readme.html https://www.youtube.com/watch?v=WM9iQlQSFg @brainlid on Twitter and BlueSky Special Guest: Mark Ericksen.

TD Ameritrade Network
Shana Sissel on Fed's Path, Inflation Data & Security Stock Picks

TD Ameritrade Network

Play Episode Listen Later Jun 12, 2025 8:16


Shana Sissel says tariffs complicate the Fed's fight against inflation because of uncertainty. She believes the central bank is waiting for a way to justify a rate cut, but doesn't believe one is coming soon. Shana is positioning her portfolio for further volatility and provides several stock picks she likes, including CrowdStrike (CRWD) and Leidos (LDOS). ======== Schwab Network ========Empowering every investor and trader, every market day.Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about

Next in Marketing
Should Paypal be building an ad business?

Next in Marketing

Play Episode Listen Later Jun 11, 2025 22:10


Next in Media spoke with Dr. Mark Grether SVP & General Manager, PayPal Ads, on why he thinks the company's 'transaction graph' may be even more powerful than some retailers' data for advertising, and why there's nothing to worry about with a company that has so many people's banking information to use that data for ad targeting. 

The Tech Leader's Playbook
What Does It Take to Lead Through Chaos and Still Win?

The Tech Leader's Playbook

Play Episode Listen Later Jun 11, 2025 47:24


In this episode of The Tech Leader's Playbook, Avetis Antaplyan interviews Philip Merrick, a seasoned technologist and CEO of pgEdge. They discuss Merrick's journey in the tech industry, the evolution of leadership styles, the importance of building great teams, and the vision behind pgEdge. The conversation also covers the evolution of cloud computing, data security, and fostering a culture of innovation within teams. In this conversation, Phillip Merrick shares his insights on the importance of mentorship in career growth, the key lessons for emerging leaders, and how to stay ahead of technology trends. He emphasizes the significance of building trust and accountability within teams and discusses the exciting potential of AI in leadership. Merrick distills his entrepreneurial philosophy into actionable advice, highlighting the need for adaptability and genuine care for team members.TakeawaysThe web protocols allowed for the automation of information exchange.Leadership styles evolve with experience and challenges faced.A great team is more important than a great idea.Transparency with the team builds trust and commitment.Curiosity drives innovation and problem-solving.Incremental innovation is often more impactful than radical changes.Cloud concentration risk is a growing concern for regulated industries.Data security and compliance are critical in software development.Fostering a culture of curiosity leads to better adaptability.Asking the right questions in interviews reveals a candidate's mindset.Mentorship is crucial for career growth and success.Emerging leaders should focus on articulating mission, vision, and values.Technology must be contextualized within business and societal trends.Building trust is essential for effective teamwork and accountability.AI has the potential to enhance leadership and management practices.Adaptability is key to overcoming challenges in entrepreneurship.Caring for team members fosters loyalty and engagement.Clear communication of company values prevents cultural drift.A strong team culture can be a competitive advantage. Chapters00:00 The Genesis of Innovation04:07 Leadership Evolution and Challenges08:52 Building a Great Team12:00 The Vision Behind pgEdge17:57 Navigating Cloud Evolution20:54 Data Security and Compliance23:55 Fostering Innovation and Adaptability27:38 The Importance of Mentorship in Career Growth31:19 Key Lessons for Emerging Leaders34:07 Staying Ahead of Technology Trends39:43 Building Trust and Accountability in Teams40:44 Exciting Trends in AI and Leadership43:16 Core Entrepreneurial PhilosophyPhillip Merrick's Social Media Links:https://www.linkedin.com/in/phillipmerrick/Phillip Merrick's Website:https://www.pgedge.com/Resources and Links:https://www.hireclout.comhttps://www.podcast.hireclout.comhttps://www.linkedin.com/in/hirefasthireright

Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Ep. 246 Thales Powers Federal Data Security Against Quantum-Era Threats

Federal Tech Podcast: Listen and learn how successful companies get federal contracts

Play Episode Listen Later Jun 10, 2025 25:40


Connect to John Gilroy on LinkedIn   https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Years ago, the headline “Data Breach” was shocking; today, it is common. That may not be a problem for some, but the federal government maintains data stores that contain information about finances, health, and military matters. A recent report has shown that 50% of federal agencies have reported data breaches. It appears that it's time to find a solution. Today, we sat down with Blain Canavan from Thales Group to examine the usual suspects and the potential threats ahead. THE USUAL SUSPECTS:   MFA:  Protecting data can be accomplished with something as basic as phishing-resistant Multi-Factor Authentication. The first step in identity management can significantly reduce threats. Encryption: Deploying encryption can protect data at rest, in transit, and memory. Keys to the Kingdom: Little-known methods of managing the PKI system can help reduce risk in protecting data. THEAT DOWN THE ROAD: QUANTUM Now that you have checked the boxes for basic data protection, it is time to get a grasp on what lies ahead. We have read about quantum cryptography for twenty years. Today, we have pre-standardized quantum-resistant cryptographic algorithms available. One needs to take action a little sooner. During the interview, Blair Canavan highlights the proactive measures taken by the US federal government, including the implementation of PQC-safe digital signatures by 2025. The “down the road” also has a delimitation -- Blair emphasizes the urgency of replacing outdated cryptographic methods, such as RSA and ECC, by 2030 and 2035, respectively. Include the 2024 data threat report. = ==

Three Cartoon Avatars
EP 146: Bipul Sinha (CEO, Rubrik) on The New Rules of Silicon Valley

Three Cartoon Avatars

Play Episode Listen Later Jun 6, 2025


Logan sits down with Bipul Sinha, CEO and co-founder of Rubrik and former VC at Lightspeed and Blumberg Capital. Bipul shares what he learned transitioning from investor to founder, why intuition beats expertise, and how he built Rubrik into a category-defining business by betting on uncool ideas. They talk product-market fit in the AI era, what most VCs get wrong today, and why the enterprise IT market is still just getting started. It's a conversation packed with hard-earned wisdom and bold takes on building lasting companies. (00:00) Intro (01:42) Transitioning from VC to Founder (02:27) The Genesis of Rubrik (03:30) Navigating Uncertainty in Business (06:57) Product Market Fit and Early Success (08:56) Evolving with the Market (13:14) AI and Data Security (18:53) Leadership and Intuition (28:34) Building a Transparent Culture (31:52) Handling Tough Questions in Board Meetings (33:28) Changing Perspectives Over Time (34:57) Traits of Successful Entrepreneurs (36:46) The Future of Venture Capital and Startups (40:38) Balancing Forward and Lateral Motion in Business (42:35) The Impact of AI on Various Industries (01:00:28) The Evolution of Work and Technology (01:02:52) Fostering a Collaborative Company Culture (01:04:56) Looking Ahead: The Future of Rubrik Executive Producer: Rashad Assir Producer: Leah Clapper Mixing and editing: Justin Hrabovsky Check out Unsupervised Learning, Redpoint's AI Podcast: https://www.youtube.com/@UCUl-s_Vp-Kkk_XVyDylNwLA

Cybercrime Magazine Podcast
2025 State of Data Security. Latest Threats & More. Mike Thompson, Varonis.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 4, 2025 15:03


Mike Thompson is the Director, Cloud and Security Architecture at Varonis. In this episode, he joins host Paul John Spaulding to discuss Varonis' 2025 State of Data Security report, including the latest threats, how companies can stay protected, and more. This episode is brought to you by Varonis, whose AI-powered data security platform secures your data at scale – across IaaS, SaaS, and hybrid cloud environments. To learn more about our sponsor, visit https://www.Varonis.com.

The Future of Supply Chain
Episode 112: Smarter, Greener, Faster: AI-Driven Supply Chain Trends in Retail for 2025 with SAP's Amanda Spencer

The Future of Supply Chain

Play Episode Listen Later Jun 4, 2025 20:25 Transcription Available


This episode delves into the dynamic future of retail, spotlighting the pivotal role of AI in reshaping supply chains and customer interactions by 2025. Experts discuss how retailers are harnessing AI to deliver hyper-personalized shopping experiences, leveraging clean data to anticipate consumer needs and optimize inventory. The conversation explores the increasing importance of sustainability, with brands adopting eco-friendly practices and transparent supply chains to meet conscious consumer demands. The rise of social commerce platforms like TikTok is also examined, revealing how retailers are integrating social media into their sales strategies and supply chain management for unprecedented agility. This episode offers valuable insights into how technology, strategic data utilization, and a commitment to sustainability are converging to redefine the retail landscape and create new opportunities for brands and consumers alike.

Artificial Intelligence in Industry with Daniel Faggella
Driving Data Security in Unstructured and Structured Data for Customer Analytics - with Jiaxi Zhu of Google

Artificial Intelligence in Industry with Daniel Faggella

Play Episode Listen Later Jun 3, 2025 26:21


Today's guest is Jiaxi Zhu, Head of Analytics & Insights at Google. Jiaxi joins Emerj Editorial Director Matthew DeMello to explore how enterprises can strengthen data security and governance as customer analytics increasingly relies on both structured and unstructured data. As organizations expand their use of sources like call transcripts, social media posts, and third-party platforms, traditional data protection models are no longer sufficient. Jiaxi explains how modernizing data governance with comprehensive data dictionaries and metadata management is essential for understanding data lineage and ensuring compliance. Learn how brands work with Emerj and other Emerj Media options at emerj.com/ad1. Want to share your AI adoption story with executive peers? Click emerj.com/expert2 for more information and to be a potential future guest on the ‘AI in Business' podcast!

Cybercrime Magazine Podcast
Data Security. Marks & Spencer Hit By Ransomware Attack. Scott Schober, Author, "Hacked Again."

Cybercrime Magazine Podcast

Play Episode Listen Later May 30, 2025 18:23


Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss the ransomware attack that recently hit Marks & Spencer. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com

Microsoft Business Applications Podcast
Why Copilot Fails Without Data Security

Microsoft Business Applications Podcast

Play Episode Listen Later May 28, 2025 23:53 Transcription Available


Get featured on the show by leaving us a Voice Mail: https://bit.ly/MIPVM FULL SHOW NOTES https://www.microsoftinnovationpodcast.com/692 When organizations rush to adopt AI tools like Microsoft Copilot, they often overlook a critical prerequisite: a secure, well-structured data environment. In this episode, Åsne Holtklimpen—Cloud Solution Architect at Crayon and Microsoft MVP—shares how her journey from SharePoint veteran to Copilot expert revealed a hard truth: without strong information governance, AI can do more harm than good. Åsne walks us through real-world challenges, practical frameworks, and the mindset shift needed to make AI adoption safe, scalable, and truly transformative. KEY TAKEAWAYS Security Before AI: Successful Copilot implementation starts with robust information security—classification, labeling, and governance must come first. Start Small, Scale Smart: Åsne recommends a phased approach using Microsoft Purview, beginning with basic data classification before layering on policies and automation. Expose the Risks: Demonstrating real data exposure—like personal identity numbers or health info—helps organizations understand the urgency of securing their environments. AI Readiness ≠ Cloud Presence: Many companies assume they're ready for AI because they use Teams or SharePoint, but Åsne stresses the need for deeper structural alignment. Public Sector Pressure: Norway's public sector faces a mandate to adopt AI by 2030, but Åsne warns that without guidance and foundational readiness, this push could backfire.  RESOURCES MENTIONED

AWS for Software Companies Podcast
Ep101: Beyond Chat - How Asana and Amazon Q Are Embedding AI Into Enterprise Workflows

AWS for Software Companies Podcast

Play Episode Listen Later May 27, 2025 25:13


Victoria Chin of Asana and Michael Horn of AWS demonstrate how Amazon Q integrates with Asana to enable AI-powered workflows while dramatically reducing manual work and improving cross-functional collaboration.Topics Include:Victoria Chin introduces herself as Asana's CPO Chief of StaffMichael Horn from AWS discusses customer feedback on generative AIAI agents limited by quality of data pulled into themAmazon Q Business created to analyze information and take actionHundreds of customers using Q Business across various industries dailyAWS hosts most business applications, ideal for AI journeyAmazon Q has most built-in, managed, secure data connectors availableQ Index creates comprehensive, accessible index of all company dataSecurity permissions automatically pulled in, no manual configuration neededSupports both structured and unstructured data from multiple sourcesVictoria returns to discuss Asana's integration with Q IndexBillions invested in integrations, but usage still lags behindTeams switch between apps 1000 times daily, missing connectionsRoot problem: no reliable way to track who/what/when/whyContent platforms store work but don't manage or coordinateAsana bridges content and communication for effective teamwork scalingAI disrupting software, but questions remain about real valueSoftware must provide structured framework to guide LLMs effectivelyAI needs data AND structure to separate signal from noiseAsana Work Graph maps how work actually gets done organizationallyWork Graph visualized as interconnected data, not rows and columnsMost strategic work is cross-functional, requiring multiple teams collaboratingTraditional integrations require manual setup and knowing when to useQ Index gives Asana access to 40+ different data connectorsUsers can ask questions, get answers with cross-application contextAI Studio enables no-code building of workflows with AI agentsProduct launch example shows intake, planning, execution, and reporting stagesAI can surface relevant documents, research, and updates automaticallyChat is tip of iceberg; real power comes from embedded workflowsIntegration evolves from feature-level to AI-powered product-level connectionsParticipants:Victoria J. Chin – Chief of Staff / Product Strategy, AI, AsanaMichael Horn – Principal Head of Business Development – Artificial Intelligence & Machine Learning, AWSSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon/isv/

TD Ameritrade Network
AVPT Powers Ahead: Growth Driven by Data Security & A.I. Demand

TD Ameritrade Network

Play Episode Listen Later May 9, 2025 7:39


Avepoint (AVPT) had a strong quarter, with over 20% year-over-year growth in all three regions and customer segments. CFO Jim Caci credits the company's focus on profitable growth and controlling what it can in an uncertain environment. He also highlights the growing importance of data security, governance, and resilience, particularly in the Microsoft (MSFT), Alphabet (GOOGL), and Salesforce (CRM) environments where Avepoint operates.======== Schwab Network ========Empowering every investor and trader, every market day.Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about

Artificial Intelligence in Industry with Daniel Faggella
Navigating Challenges and Solutions in Data Security with AI - with Dimitri Sirota of BigID

Artificial Intelligence in Industry with Daniel Faggella

Play Episode Listen Later May 8, 2025 29:28


As enterprises double down on generative AI initiatives, the intersection of data security, privacy, and unstructured data is quickly becoming mission-critical. In this episode, Dimitri Sirota, Co-founder and CEO of BigID, joins the podcast to explore how AI transformation is reshaping enterprise data governance, security, and compliance—and why understanding your “crown jewel” data is essential to building trustworthy AI systems. Dimitri outlines the three major forces driving today's enterprise data challenges: accelerated cloud migration, a rising tide of global data privacy regulations, and the explosion of generative AI tools that rely on sensitive, unstructured data. He explains how enterprises can gain visibility into their AI programs and the data fueling them, mitigate shadow AI risks, and prepare for the next wave of agentic systems by adopting zero-trust models and real-time monitoring strategies. This episode is sponsored by BigID. Learn how BigID helps enterprises govern AI, mitigate data risk, and stay compliant here.

Afternoon Drive with John Maytham
Factory reset fallacy: Why your data's is still at risk

Afternoon Drive with John Maytham

Play Episode Listen Later May 7, 2025 7:55


John Maytham is joined by Tech Journalist and Editor and Publisher of Stuff, Toby Shapshak, to unpack the hidden risks of discarding or selling old electronic devices. Despite factory resets, studies show that personal data — including passports, medical records, and passwords — often remains recoverable on second-hand electronics. Follow us on:CapeTalk on Facebook: www.facebook.com/CapeTalkCapeTalk on TikTok: www.tiktok.com/@capetalkCapeTalk on Instagram: www.instagram.com/capetalkzaCapeTalk on YouTube: www.youtube.com/@CapeTalk567CapeTalk on X: www.x.com/CapeTalkSee omnystudio.com/listener for privacy information.

Cybercrime Magazine Podcast
Data Security. OCC Suffers Major Cyber Breach. Scott Schober, Author, "Hacked Again."

Cybercrime Magazine Podcast

Play Episode Listen Later May 2, 2025 18:12


Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss a cyberattack on The Office of the Comptroller of the Currency. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com

The MongoDB Podcast
EP. 264 Beyond the Database: Mastering Multi-Cloud Data, AI Automation & Integration (feat. Peter Ngai, SnapLogic)

The MongoDB Podcast

Play Episode Listen Later May 1, 2025 58:31


✨ Heads up! This episode features a demonstration of the SnapLogic UI and its AI Agent Creator towards the end. For the full visual experience, check out the video version on the Spotify app! ✨(Episode Summary)Tired of tangled data spread across multiple clouds, on-premise systems, and the edge? In this episode, MongoDB's Shane McAllister sits down with Peter Ngai, Principal Architect at SnapLogic, to explore the future of data integration and management in today's complex tech landscape.Dive into the challenges and solutions surrounding modern data architecture, including:Navigating the complexities of multi-cloud and hybrid cloud environments.The secrets to building flexible, resilient data ecosystems that avoid vendor lock-in.Strategies for seamless data integration and connecting disparate applications using low-code/no-code platforms like SnapLogic.Meeting critical data compliance, security, and sovereignty demands (think GDPR, HIPAA, etc.).How AI is revolutionizing data automation and providing faster access to insights (featuring SnapLogic's Agent Creator).The powerful synergy between SnapLogic and MongoDB, leveraging MongoDB both internally and for customer integrations.Real-world applications, from IoT data processing to simplifying enterprise workflows.Whether you're an IT leader, data engineer, business analyst, or simply curious about cloud strategy, iPaaS solutions, AI in business, or simplifying your data stack, Peter offers invaluable insights into making data connectivity a driver, not a barrier, for innovation.-Keywords: Data Integration, Multi-Cloud, Hybrid Cloud, Edge Computing, SnapLogic, MongoDB, AI, Artificial Intelligence, Data Automation, iPaaS, Low-Code, No-Code, Data Architecture, Data Management, Cloud Data, Enterprise Data, API Integration, Data Compliance, Data Sovereignty, Data Security, Business Automation, ETL, ELT, Tech Stack Simplification, Peter Ngai, Shane McAllister.

Corruption Crime & Compliance
DOJ Issues Data Security Program Requirements

Corruption Crime & Compliance

Play Episode Listen Later Apr 28, 2025 19:17


Could your routine data transfers now violate federal law? The DOJ's new Data Security Program (DSP) targets the flow of U.S. sensitive personal and government data to foreign adversaries — and the clock is ticking. In this episode of Corruption, Crime and Compliance, Michael Volkov breaks down the Justice Department's sweeping new Data Security Program, enacted under Executive Order 14117 and finalized in January 2025.You'll hear him discuss:The origins of the DSP, created through Executive Order 14117 under the Trump Administration, and the key national security concerns it addresses.What constitutes a “covered data transaction” and the thresholds for U.S. personal and government data that trigger compliance obligations.The list of “countries of concern” and what it means for companies doing business with entities tied to these regions.The types of U.S. data covered by the DSP, including biometric, genomic, financial, and geolocation data, and the specific quantity thresholds that trigger restrictions.Why data brokerage and bulk human genomic data transactions are prohibited outright, raising new compliance challenges for affected industries.How “restricted transactions” like cloud computing services and vendor agreements are subject to conditional exceptions under the DSP.The critical actions U.S. companies must take during the 90-day enforcement hiatus, including vendor assessments, renegotiations, and compliance system updates before the July 8th deadline.ResourcesMichael Volkov on LinkedIn | TwitterThe Volkov Law Group

HPE Tech Talk
What is sovereignty in AI?

HPE Tech Talk

Play Episode Listen Later Apr 24, 2025 23:40


 What does it mean for artificial intelligence to be sovereign? This week, Technology Now explores how more than just data can be sovereign, our AI models using the data can be too. We ask what it actually means for AI models to be sovereign and why companies, and indeed entire countries, would be interested in this concept. Andreas Geiss, Vice-President Automotive & Manufacturing at Aleph Alpha tells us more. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.Andreas Geiss: https://www.linkedin.com/in/andreas-geissSources cited in this week's episode:Data Privacy Framework:https://www.dataprivacyframework.gov/Program-Overviewhttps://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/eu-us-data-transfer-challenges.html Photonic chips: Ahmed, S.R., Baghdadi, R., Bernadskiy, M. et al. Universal photonic artificial intelligence acceleration. Nature 640, 368–374 (2025). https://doi.org/10.1038/s41586-025-08854-xhttps://www.reuters.com/science/lightmatter-shows-new-type-computer-chip-that-could-reduce-ai-energy-use-2025-04-09/History of the cordless home phone:https://www.britishtelephones.com/hawk.htmhttp://www.samhallas.co.uk/repository/sales/cp-ms_43.pdf 

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise

 What does it mean for artificial intelligence to be sovereign? This week, Technology Now explores how more than just data can be sovereign, our AI models using the data can be too. We ask what it actually means for AI models to be sovereign and why companies, and indeed entire countries, would be interested in this concept. Andreas Geiss, Vice-President Automotive & Manufacturing at Aleph Alpha tells us more. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.Andreas Geiss: https://www.linkedin.com/in/andreas-geissSources cited in this week's episode:Data Privacy Framework:https://www.dataprivacyframework.gov/Program-Overviewhttps://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/eu-us-data-transfer-challenges.html Photonic chips: Ahmed, S.R., Baghdadi, R., Bernadskiy, M. et al. Universal photonic artificial intelligence acceleration. Nature 640, 368–374 (2025). https://doi.org/10.1038/s41586-025-08854-xhttps://www.reuters.com/science/lightmatter-shows-new-type-computer-chip-that-could-reduce-ai-energy-use-2025-04-09/History of the cordless home phone:https://www.britishtelephones.com/hawk.htmhttp://www.samhallas.co.uk/repository/sales/cp-ms_43.pdf 

Command Control Power: Apple Tech Support & Business Talk
614: Navigating AI in IT Consulting: Insights from Michael Thomsen of Origin 84

Command Control Power: Apple Tech Support & Business Talk

Play Episode Listen Later Apr 22, 2025 58:46


Navigating AI in IT Consulting: Insights from Michael Thomsen   In this episode of Command Control Power, hosts welcome Michael Thomsen of Origin 84, dialing in from Australia. Michael shares critical insights into the use of AI in IT consulting. Topics range from the pros and cons of binge-listening to tech podcasts to the practical uses of AI tools like ChatGPT and Google's Gemini. Michael emphasizes the importance of balancing automation with human interaction, sharing examples of how AI can enhance efficiency, such as generating meeting summaries, handling complex client requests, and improving ticketing systems. The discussion also touches on the risks of data leakage, the necessity of well-defined policies, and the future implications of AI in both enhancing productivity and posing security challenges.   00:00 Introduction and Guest Welcome 00:36 Listener Feedback and Follow-Up 02:41 AI Tools in Daily Work 05:51 AI Integration in Business 09:08 Real-World AI Use Cases 13:52 Challenges and Best Practices with AI 23:50 AI in Education and Policy 27:22 Understanding AI Policies and Data Leakage 28:28 Balancing AI Empowerment and Security Risks 29:21 Credential Stuffing and Security Examples 30:49 Implementing Effective AI Policies 32:10 Microsoft Tools for Data Security 35:03 Challenges in Modern Security Practices 39:14 Leveraging AI for Productivity 42:09 AI in Client Communication and Ticketing 47:48 The Human Element in AI Integration 51:32 Concluding Thoughts on AI and Security

Coffee w/#The Freight Coach
1179. #TFCP - Ways To Spot Integration Illusions & Improve Data Security!

Coffee w/#The Freight Coach

Play Episode Listen Later Apr 18, 2025 31:47 Transcription Available


In today's episode, we discuss effective back-office integrations in transportation, data processing, and the risks of automation and data security with Sean Smith of Denim! Sean highlights how integrations can help with operational efficiency, reduce errors, and ensure confidence, as well as best practices to minimize risks, such as using different credentials for automation, data limitation, and multi-layer verification due to threats like deepfakes!   About Sean Smith Sean Smith, VP of Product at Denim, has spent 10 years building and scaling products in the financial services and logistics industries. While leading Product at Denim, he has pioneered new capabilities for the factoring space including risk automation and pricing.  Sean has also led work on our client dashboard, job management and collaboration that have revolutionized the process and workflow for broker clients looking to save time on back office operations. He excels at combining his passion for technology with the ability to drive impact on a balance sheet.   Connect with Sean Website: https://www.denim.com/  LinkedIn: https://www.linkedin.com/in/smithseanp/  Twitter (X): https://x.com/smithseanp  

Thrive LOUD with Lou Diamond
1081: Ed Crump - "Breaking Boundaries in Tech: Alexa and Beyond"

Thrive LOUD with Lou Diamond

Play Episode Listen Later Apr 3, 2025 37:15


What if the next big leap in technology isn't just another gadget, but a transformative bridge to a smarter, more efficient future? In this eye-opening episode of Thrive LouD with Lou Diamond, meet Edward Crump, the remarkable inventor of Amazon Alexa and a significant force behind innovation at companies like Netflix and Nike. Now serving as the CTO of Champion Venture Partners, Crump shares the secrets behind his incredible journey through technology and entrepreneurship. Key Highlights: Discover how a lifelong technologist like Ed Crump started his career by selling his first program at the age of 12 and eventually played a pivotal role in creating Amazon Alexa. Learn about the pioneering projects he led at major companies like Netflix and Nike, and how he transitioned to the venture capital world with Champion Venture Partners. Gain insights into Crump's vision for the future, where personal AIs and smart environments revolutionize our daily lives while respecting data privacy. Understand the importance of interdisciplinary collaboration, as demonstrated by Champion Venture Partners, in driving innovative solutions in sports science, health, and wellness. Join Lou Diamond and Ed Crump on this enlightening exploration into the future of technology and innovation, and discover how you can be a part of this thrilling journey. TIMESTAMPED OVERVIEW 00:00 Entrepreneurial Journey: From Startups to Amazon 06:36 Tech Giants' Race: Amazon Outpaces Apple 09:52 Leveraging Innovation in Digital Experiences 10:40 Future of Personal AI and Data 14:17 Data Privacy Concerns in AI 19:57 New Venture Collaboration Insights 21:20 "Unique Access to Sports Ecosystem" 25:48 "Passion for Management Collaboration" 28:40 "Digital Twins: A Matrix Parallel" 30:52 Sugar-Free Mental Clarity 35:44 "Ed Crump: Coolest Guest Spotlight" Connect with Ed Check out Champion Venture Partners company's website Follow Us:

Code Story
The Gene Simmons of Data Protection – KISS (Keep It Simple, Stupid): A Data Security Dilemma

Code Story

Play Episode Listen Later Apr 2, 2025 24:55


The Gene Simmons of Data P rotection: Protegrity's KISS MethodToday, we are kicking off a new series on the podcast, entitled The Gene Simmons of Data Protection - the KISS Method, brought to you by none other than Protegrity. Protegrity is AI-powered data security for data consumption, offering fine grain data protection solutions, so you can enable your data security, compliance, sharing and analytics.Episode Title: KISS (Keep It Simple, Stupid): A Data Security Dilemma with James RiceIn this episode, we are talking with James Rice, VP at Protegrity. He is going to help us strip away the nonsense, when it comes to securing data, and help us understand why we don't need a fortress... just a kill switch. While companies throw billions at firewalls, AI driven threat detection, and fortress like defenses - attackers still find their way in. James reminds us to keep it simple, with Protegrity's KISS Method which stands for Keep It Simple Stupid - and how when data is useless to attackers, breaches become mere inconveniences instead of existential threats.Questions:What exactly is the KISS method, and how does it apply to cybersecurity?Why are traditional cybersecurity approaches failing to stop breaches?What are some of the biggest myths about security that lead businesses to waste money on ineffective defenses?How do encryption, tokenization, and de-identification work together to make stolen data useless?Can you share an example where a company's focus on complex security backfired, and how a simpler approach could have helped?What's the biggest pushback you hear from companies hesitant to adopt a simpler, data-first security model? If a company wanted to implement the KISS method tomorrow, what are the first three steps they should take?Linkshttps://www.protegrity.com/https://www.linkedin.com/in/jamesrice1/Our Sponsors:* Check out Kinsta: https://kinsta.com* Check out Vanta: https://vanta.com/CODESTORYSupport this podcast at — https://redcircle.com/code-story/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy