POPULARITY
Categories
Key Takeaways Session overview: Newell will be leading a session as part of the M365 & Work IQ masterclass, "Executive's Guide to Rolling Out M365 Copilot." The session will focus on how organizations can move beyond AI experimentation to build a secure and productive AI strategy. "AI is incredibly powerful," he explains, "But you need to just make sure that you're set up to take advantage of it, and then you build some organizational capacity to do it." AI executive briefings: For customers and other leaders, Newell shares executive-level AI education and practical guidance, grounding other leaders in what AI, LLMs, and Microsoft's tools can do for productivity. He notes that some of these learnings will be a part of his session at the event. Final thoughts: In closing, Newell adds that he's looking forward to his session and hopes attendees bring questions focused on practical guidance. Visit Cloud Wars for more.
In this special joint episode of The Consumer Finance Podcast and Payments Pros, Taylor Gess and Kim Phan discuss key privacy and data security risks in point-of-sale finance. They dive into regulators' growing view that every player in the payments chain shares responsibility for protecting data, highlighting best practices for vendor management, PCI DSS oversight, and incident response planning. The episode also touches on the shifting patchwork of state privacy and breach notification laws, GLBA exemptions, and the risks of data monetization, including when packaging and selling transaction data can trigger Fair Credit Reporting Act obligations. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Rich Hoffman is an information technology professional with experience supporting Army communications, systems infrastructure, and secure digital operations. Hoffman's work focuses on maintaining reliable networks, safeguarding sensitive data, and implementing technical solutions that ensure operational readiness in demanding environments. His background highlights the critical role of IT in modern military logistics, cybersecurity, and real-time information management, where precision, security, and resilience are essential.Become a supporter of this podcast: https://www.spreaker.com/podcast/the-x-zone-radio-tv-show--1078348/support.Please note that all XZBN radio and/or television shows are Copyright © REL-MAR McConnell Meda Company, Niagara, Ontario, Canada – www.rel-mar.com. For more Episodes of this show and all shows produced, broadcasted and syndicated from REL-MAR McConell Media Company and The 'X' Zone Broadcast Network and the 'X' Zone TV Channell, visit www.xzbn.net. For programming, distribution, and syndication inquiries, email programming@xzbn.net.We are proud to announce the we have launched TWATNews.com, launched in August 2025.TWATNews.com is an independent online news platform dedicated to uncovering the truth about Donald Trump and his ongoing influence in politics, business, and society. Unlike mainstream outlets that often sanitize, soften, or ignore stories that challenge Trump and his allies, TWATNews digs deeper to deliver hard-hitting articles, investigative features, and sharp commentary that mainstream media won't touch.These are stories and articles that you will not read anywhere else.Our mission is simple: to expose corruption, lies, and authoritarian tendencies while giving voice to the perspectives and evidence that are often marginalized or buried by corporate-controlled media
Sue Serna - Social Media Security and Governance Leader and Lover of All BeaglesNo Password Required Season 7: Episode 2 - Sue SernaSue Serna is the CEO and Founder of Serna Social and the former head of global social media at Cargill. She brings more than two decades of experience at the intersection of storytelling, strategy, and security.In this episode, she shares her journey from business reporter to leading her own consultancy serving companies around the world on social media strategy.Jack Clabby of Carlton Fields, P.A, joined by guest co-host Rex Wilson of Cyber Florida, welcomes Sue for a candid discussion about the realities of enterprise social media. From managing more than 150 Facebook pages for a single company, to navigating internal politics, agency relationships, and regulatory pressure, Sue explains why social media is far from “free” and why most organizations still under-resource it.Sue dives deep into the gap between social media teams and cybersecurity departments. She outlines how personal account compromises can escalate into enterprise-level incidents, why governance frameworks matter, and how large organizations can regain control of sprawling digital footprints. Drawing from real-world examples, she argues that social media must be treated like finance or HR, a core business function requiring structure, ownership, and accountability.The episode wraps with the Lifestyle Polygraph, where Sue reveals her love of Apollo-era space history, debates iconic Philadelphia traditions, and imagines what magical talent her beagle would bring to Hogwarts.Follow Sue at SernaSocial.com or connect with her on LinkedIn: https://www.linkedin.com/in/sueserna/ Chapters: 00:00 Introduction and First Impressions 02:45 The Evolving Role of Social Media in Corporations 04:58 Transitioning from Journalism to Social Media 11:11 Building Social Media from Scratch 13:00 Becoming a CEO and Founder 16:28 The Importance of Networking 16:54 Bridging the Gap Between Social Media and Cybersecurity 20:51 Real-World Social Media Security Incidents 28:35 Navigating Internal Conflicts in Social Media 30:32 The Lifestyle Polygraph Begins 31:17 Nerd Things That Expose Sue: Space and Harry Potter! 35:16 Sue's Love For Beagles 37:50 Wreckless Intern or Overconfident Executive? 40:42 Hogwarts and Magical Beagles
Welcome to another insightful episode of "To The Point Cybersecurity," brought to you by Forcepoint! In today's episode, we're diving into the nuances of modern data security with our special guest, Yasir Ali, CEO of Polymer. As networks become increasingly borderless, the challenges for data security are escalating. We'll explore crucial technologies like Data Security Posture Management (DSPM) and Data Loss Prevention (DLP), and discuss the importance of reducing risk profiles and managing access control effectively. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e371
February 10th, 2026
In this episode of The Builders Club Podcast, Sohail Khan sits down with Arshad Ahmad, Director of Information Security at ZS, to decode one of the most critical challenges of our time: protecting data in the age of Artificial Intelligence.The rapid rise of GenAI has created a paradox for modern enterprises. While AI offers unprecedented productivity, it also opens new doors for sophisticated cyber threats. Arshad breaks down how security leaders are shifting from a "defensive" posture to an "adaptive" one, ensuring that innovation doesn't come at the cost of integrity.Key Insights from Arshad Ahmad:1. AI as a Double-Edged Sword: How AI-driven automation is revolutionizing threat detection while simultaneously enabling hackers to launch more complex, personalized attacks.2. The Privacy Paradox: Strategies for organizations to leverage Large Language Models (LLMs) and internal data without leaking proprietary secrets into the public domain.3. The "Human Firewall" in a Tech-First World: Why technical controls are only half the battle and why building a security-first culture is more important than ever.4. The Evolving CISO Role: How security leadership has shifted from being "the department of No" to a strategic business partner that enables safe growth.Whether you are a cybersecurity professional, a tech leader, or an entrepreneur navigating the digital landscape, this conversation offers a masterclass in staying resilient in an AI-powered world.#CyberSecurity #AI #DataSecurity #InformationSecurity #TheBuildersClub #CISO #TechLeadership #GenAI
Artificial intelligence is rapidly changing how we understand our health — not just how we feel today, but how fast we're actually aging.On this episode of Live Long, host Peter Bowes continues his personal experiment with Hundred, the AI-powered longevity platform that combines advanced blood testing, wearable data and personalized insights to track biological age and guide smarter health decisions.After introducing the app in an earlier conversation, Peter reconnects with Hundred's founder, Tyler Smith, to go deeper into the idea of a “health operating system” — essentially a personal doctor in your pocket. Together they explore how continuous testing and AI analysis could help prevent disease, spot risks earlier, and motivate lasting behavior change — while also addressing the realities of over-testing, false alarms, privacy concerns and health anxiety.Peter also shares the results of his own first round of testing, what surprised him most, and how he's using the data to shape his approach to longevity and healthy aging.-----JOIN HUNDREDOptimize your healthspan and potentially lower your biological age. Tyler and the team at HUNDRED are offering $75 in credit for add-on tests and supplements from the HUNDRED marketplace when you sign up at hundred.com/livelongpodcastThis podcast is supported by affiliate arrangements with a select number of companies. We have arranged discounts on certain products and receive a small commission on sales. The income helps to cover production costs and ensures that our interviews remain free for all to listen. Visit our SHOP for more details: https://healthspan-media.com/live-long-podcast/shop/Time-line Mitopure (a highly pure form of Urolithin A) boosts the health of our mitochondria – the battery packs of our cells – and improves muscle strength. Time-line is offering LLAMA listeners a 10% discount on its range of products – Mitopure powders, softgels & skin creams. Use the code LLAMA at checkout-Fit, Healthy & Happy Podcast Welcome to the Fit, Healthy and Happy Podcast hosted by Josh and Kyle from Colossus...Listen on: Apple Podcasts SpotifyEnergyBits algae snacksA microscopic form of life that could help us age better. Use code LLAMA for a 20 percent discountPartiQlar supplementsEnhance your wellness journey with pure single ingredients. 15% DISCOUNT - use code: MASTERAGING15Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showThe Live Long and Master Aging (LLAMA) podcast, a HealthSpan Media LLC production, shares ideas but does not offer medical advice. If you have health concerns of any kind, or you are considering adopting a new diet or exercise regime, you should consult your doctor.
What happens when AI stops talking to us... and starts talking to itself?In this episode of Darnley's Cyber Café, we explore the rise of AI-only social spaces and what they reveal about the direction technology is quietly moving.Inspired by the emergence of Moltbook (OpenClaw), this conversation looks beyond fear and headlines to examine how human absence, automation, and efficiency are reshaping decision-making and trust.Pull up a chair. The conversation's just beginning.Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.
Acknowledgement of Country// Headlines//Public housing residents seek court injunction to stop Homes Victoria evictionsGaza and West Bank updateProtests against Herzog visit Tenant's personal details exposed online by real estate rental platforms 'compost:compose' Live Performance and Program//Rasha Tayeh, Palestinian artist, curator, herbalist, and founder of Beit e'Shai Teahouse, joined Inez to discuss the creation of 'compost : compose', an arts project inviting artists to reflect on the purpose of art in times of ongoing genocide, social decay and climate crisis. Through a live performance weaving music, poetry, and movement, the work responds to and asks, how we might compost old structures, tend to grief, and decompose inherited ways of being, to make space for the new composing new imaginaries — rooted in care, repair, and collective liberation.Live performance on Wednesday the 18th of February, 7PM @ Next Wave, 270 Sydney Rd, Brunswick. Sliding scale tickets available from $10.Free public program on Saturday the 21st February, 3PM @ Next Wave. RSVP is essential.Follow the artists here // 'Through Our Eyes' Photography Exhibition//wani toaishara (co-curator) and Hussein Abdirahman Mohamud (artist) joined Inez to discuss the upcoming 'Through Our Eyes' photography exhibition, inviting audiences into a living archive of African-Australian experiences and curated by returning guest Dr Ibukun Oloruntoba. The exhibition responds to the pressing need for self-representation and visibility for the African diaspora living in Australia, examining how experiences of love, belonging, and resilience emerge in everyday life. Each artist's work investigates love as a connective force, whether through the quiet intimacies of brotherhood, the collective sanctuary of community or the resilience nurtured in and beyond public housing estates.Join them for a very special opening night next Friday the 13th of February, 6PM @ Blakdot Gallery, 33 Saxon Street Brunswick - running until Sunday 8th of March.Follow the artists here.// Rent Tech and Tenant Data Security Risks//Digital justice advocate, writer and researcher Samantha Floreani is a digital justice advocate and writer, joined us to discuss the rise and risks of rental technology and how the integration of these platforms into rental tenancies creates a demonstrable threat to privacy and security. Samantha is currently undertaking PhD research into the ways that digital technologies in so-called Australia's private rental sector impacts renters and housing justice. You can read the report ‘Implications of tenant data collection in housing: protecting Australian renters', which Samantha contributed to, here, and this week's Guardian exclusive on rent tech privacy breaches here.// Planned Demolition of Older Persons' Public Housing Towers//Fiona York, Executive Officer of Housing for the Aged Action Group, spoke with us about the Allan Labor Government's announcement last week of plans to demolish 7 older persons' public housing towers in the next stage of its high-rise redevelopment program. This move will erase over half of Melbourne's dedicated high-rise public housing for people over the age of 55 years, sparking concern and condemnation by grassroots groups and the community sector about the impact that relocation and estate redevelopment will have on elderly public tenants. While the 13 older persons' towers are included in the overall high-rise redevelopment program, tenants and advocates were led to believe that these buildings would not be up for demolition until significantly later in the program. Read Housing for the Aged Action Group's statement on last week's announcement here, and catch Fiona and the HAAG crew on 3CR's Raise the Roof program every Wednesday from 5:30-6PM.//
Recorded live at the NTL Summit in Miami, this episode features Jayson McQuown, Director of Sales at Fala, a cloud hosting provider built to compete with Amazon Web Services by offering governance and security “out of the box.” Jayson breaks down why knowing where your data physically lives matters—especially for law firms using AI—and how weak security can create serious risk around confidentiality and attorney-client privilege. He also introduces RedPill.ai, a “confidential AI” alternative designed to help professionals use automation without leaking sensitive data back to model providers. The conversation dives into real-world legal use cases (like reviewing massive discovery fast), why many AI vendors can't clearly explain their base models, and how trusted execution environments (TEEs) are changing what secure cloud and AI can look like for legal, healthcare, and other privacy-heavy industries.
In this episode of The CISO Brief, the Cyber Daily team outlines the importance of running regular tabletop cyber security exercises, the dangers of shadow AI, and employees stealing data – even accidentally – as a threat to your business. In this episode, hosts Liam Garman and Daniel Croft discuss tabletop cyber security exercises and how they can be a game changer for boosting the cyber resilience of any business. The two then summarise the pitfalls of shadow AI in the workplace and how sensitive company data should be kept away from unauthorised use of platforms like ChatGPT. Finally, the pair finish up with a look at employee data theft and how companies may be hemorrhaging data whenever they let an employee go. Enjoy the show, The Cyber Daily team
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam, along with expert Amren Gill, delve into the critical topic of data security. They discuss the importance of data classification and identification, the challenges of data loss prevention, and the significance of lifecycle management in maintaining data integrity. The conversation emphasizes the need for a strong security culture within organizations, highlighting the role of training, shared responsibility, and continuous improvement in achieving effective data governance. The episode serves as a comprehensive guide for organizations looking to enhance their data security practices and benchmark their maturity in this essential area.----------------------------------------------------Documentation:https://github.com/ajawzero/bspdatasecurity----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: andy@bluesecuritypod.com----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: adam@bluesecuritypod.com
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam, along with expert Amren Gill, delve into the critical topic of data security. They discuss the importance of data classification and identification, the challenges of data loss prevention, and the significance of lifecycle management in maintaining data integrity. The conversation emphasizes the need for a strong security culture within organizations, highlighting the role of training, shared responsibility, and continuous improvement in achieving effective data governance. The episode serves as a comprehensive guide for organizations looking to enhance their data security practices and benchmark their maturity in this essential area.----------------------------------------------------YouTube Video Link: https://youtu.be/xhxH_zrOYbE----------------------------------------------------Documentation:https://github.com/ajawzero/bspdatasecurity----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: andy@bluesecuritypod.com----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: adam@bluesecuritypod.com
Adv Pansy Tlakula: Information Regulator Chairperson spoke to Clarence Ford ahead of International Data Privacy day (28 Jan) Views and News with Clarence Ford is the mid-morning show on CapeTalk. This 3-hour long programme shares and reflects a broad array of perspectives. It is inspirational, passionate and positive. Host Clarence Ford’s gentle curiosity and dapper demeanour leave listeners feeling motivated and empowered. Known for his love of jazz and golf, Clarrie covers a range of themes including relationships, heritage and philosophy. Popular segments include Barbs’ Wire at 9:30am (Mon-Thurs) and The Naked Scientist at 9:30 on Fridays. Thank you for listening to a podcast from Views & News with Clarence Ford Listen live on Primedia+ weekdays between 09:00 and 12:00 (SA Time) to Views and News with Clarence Ford broadcast on CapeTalk https://buff.ly/NnFM3Nk For more from the show go to https://buff.ly/erjiQj2 or find all the catch-up podcasts here https://buff.ly/BdpaXRn Subscribe to the CapeTalk Daily and Weekly Newsletters https://buff.ly/sbvVZD5 Follow us on social media: CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/CapeTalk CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567See omnystudio.com/listener for privacy information.
Rick DeLisi is an author and Lead Research Analyst at Glia, an online leader in Digital Customer Service. Rick shares his expertise on integrating AI into work processes to achieve effortless interaction. Enjoy the listen. Along the way we discuss AI for All (5:00), AI and new product launch (10:00), AI Pre-Op (15:30), the Chainsaw Analogy (17:30), Communicating with Bots (19:00), flying the plane (21:00), dealing with the skeptics (21:45), Glia, Data Security, and Responsible AI (25:15), and the AI 24/7 Focus Group (31:15). Empower your teams and drive revenue @ Glia, AI Built for Community Impact This podcast is partnered with LukeLeaders1248, a nonprofit that provides scholarships for the children of military Veterans. Send a donation, large or small, through PayPal @LukeLeaders1248; Venmo @LukeLeaders1248; or our website @ www.lukeleaders1248.com. Music intro and outro from the creative brilliance of Kenny Kilgore. Lowriders and Beautiful Rainy Day.
What does sovereignty actually mean? This week, Technology Now dives into the world behind the words, exploring the reality versus the fantasy of data and technological sovereignty. We ask how definitions can change across location, and why this is important to understand when trying to work across boarders. Sana Kharegani, Chief Strategy Officer at Carbon3.AI tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Sam Jarrell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Sana:https://www.linkedin.com/in/sana-khareghani-4346771/?originalSubdomain=ukSources:https://gdpr-info.eu/issues/fines-penalties/https://www.dataversity.net/articles/brief-history-cloud-computing/https://www.kiteworks.com/risk-compliance-glossary/data-sovereignty-protecting-our-digital-footprint-in-the-age-of-information/https://gdpr.eu/what-is-gdpr/
In this conversation, Jason Gaunt and Dr. Dennis Sanchez explore the fascinating world of AI agents, discussing their evolution from simple chatbots to sophisticated doers that can automate tasks and enhance user experiences. They delve into the practical applications of AI agents, the ease of creating them without coding, and the importance of iterating and experimenting with these technologies. The discussion also highlights the safety and privacy considerations when using AI in business contexts, as well as the potential for AI to revolutionize various industries.Chapters00:00 Introduction to AI Agents04:12 Understanding AI Agents09:54 The Evolution of AI Interaction12:30 Creating AI Agents with Ease20:17 Practical Applications of AI Agents20:39 Starting with AI Agents23:22 Building AI Agents: The Basics27:53 Real-World Applications of AI Agents29:32 Data Security and AI31:21 Cost and Accessibility of AI Technology34:10 Key Takeaways on AI Agents37:00 Disclaimer
OpenAI is acquiring the team behind executive coaching AI tool Convogo in an all-stock deal, adding to the firm's M&A spree. Plus, Cyera raised another $400 million just six months after its last huge round. Learn more about your ad choices. Visit podcastchoices.com/adchoices
How are our networks designed to cope with the increasing demands of AI? This week, Technology Now dives into the topic of networking for AI, exploring how our networks have adapted and evolved to meet the ever growing demands of modern day AI infrastructure. Praful Lalchandani,VP of Networking Product Management, tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Sam Jarrell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Praful: https://www.linkedin.com/in/prafullalchandani/Sources:https://www.networkworld.com/article/972044/ethernet-at-50-bob-metcalfe-pulls-down-the-turing-award.htmlhttps://www.networkworld.com/article/970970/what-is-ethernet.htmlhttps://computer.howstuffworks.com/ethernet5.htm
Surprise. We don't have agents. I actually went in and did an audit of all the LLM applications that we've developed internally. And if you were to take Anthropic's definition of workflow versus agent, we don't have agents. I would not classify any of our applications as agents. xEric Ma, who leads Research Data Science in the Data Science and AI group at Moderna, joins Hugo on moving past the hype of autonomous agents to build reliable, high-value workflows.We discuss:* Reliable Workflows: Prioritize rigid workflows over dynamic AI agents to ensure reliability and minimize stochasticity in production environments;* Permission Mapping: The true challenge in regulated environments is security, specifically mapping permissions across source documents, vector stores, and model weights;* Trace Log Risk: LLM execution traces pose a regulatory risk, inadvertently leaking restricted data like trade secrets or personal information;* High-Value Data Work: LLMs excel at transforming archived documents and freeform forms into required formats, offloading significant “janitorial” work from scientists;* “Non-LLM” First: Solve problems with simpler tools like Python or ML models before LLMs to ensure robustness and eliminate generative AI stochasticity;* Contextual Evaluation: Tailor evaluation rigor to consequences; low-stakes tools can be “vibe-checked,” while patient safety outputs demand exhaustive error characterization;* Serverless Biotech Backbone: Serverless infrastructure like Modal and reactive notebooks such as Marimo empowers biotech data scientists for rapid deployment without heavy infrastructure overhead.You can also find the full episode on Spotify, Apple Podcasts, and YouTube.You can also interact directly with the transcript here in NotebookLM: If you do so, let us know anything you find in the comments!
In this episode of Hiring to Firing, hosts Tracey Diamond and Emily Schifter use the film Inception as a springboard to unpack the very real world of corporate espionage and trade secret theft. Joined by Troutman Pepper Locke partner and former Hiring to Firing co-host Evan Gibbs, co-chair of the firm's Corporate Espionage Response Team, they examine how insider threats arise in the workplace, the surge in trade secret litigation, and the high‑stakes emergency injunctions that can follow. The conversation offers practical guidance on onboarding and offboarding employees, tightening data security, and training managers to spot red flags before confidential information walks out the door. Tune in to learn how to protect your organization from data theft and avoid becoming the unwitting beneficiary — or victim — of corporate espionage.For a deeper dive into trade secret damages, attend the firm's webinar "Damages Decoded: How Receiving and Losing Trade Secrets Can Cost Your Company Millions" taking place on January 21. Click here to register.Troutman Pepper Locke's Labor + Employment Practice Group provides comprehensive thought leadership through various channels. We regularly issue advisories that offer timely insights into the evolving employment law landscape, and maintain the HiringToFiring.Law Blog, a resource spotlighting best practices for employers. Our Hiring to Firing Podcast, hosted by Tracey Diamond and Emily Schifter, delves into pressing labor and employment law topics, drawing unique parallels from pop culture, hit shows, and movies. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
In this episode of The Consumer Finance Podcast, Chris Willis is joined by Ted Augustinos and Kim Phan to introduce The Money Matrix, an upcoming webinar series helping financial institutions navigate privacy, data security, and AI in today's complex digital landscape. The teaser highlights strategies to secure financial data, overcome barriers to adopting AI, and stay ahead of regulatory trends. Each session offers practical guidance to help teams like Neo, Trinity, and Morpheus remain innovative, compliant, and trusted. The series explores how financial institutions can balance innovation with data privacy while leveraging AI responsibly. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
While our team is out on winter break, please enjoy this episode of Data Security Decoded from our partners at Rubrik. In this episode of Data Security Decoded, host Caleb Tolin sits down with Hayden Smith, CEO of Hunted Labs, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and what modern threat actors are doing to exploit trust at scale. Caleb and Hayden dive deep into real-world attacks, emerging TTPs, AI-powered threat hunting, and what organizations must do today to keep pace. Listeners walk away with a clear picture of the problem—and a practical blueprint for reducing supply chain risk. What You'll Learn How modern attackers infiltrate open source ecosystems through fake accounts and counterfeit package contributions. Why dependency chains dramatically amplify both exposure and attacker leverage. How to use threat intelligence and threat hunting to proactively evaluate upstream packages before adoption. Where AI-powered code analysis is changing the ability to discover hidden vulnerabilities and suspicious patterns. Why dependency pinning, SBOM discipline, and continuous monitoring now define a strong supply chain posture. Episode Highlights 00:00 — Welcome + Why Software Supply Chain Risk Matters 02:00 — Hayden's Non-Cyber Passion + Framing Today's Topic 03:00 — Why Open Source Powers Everything—and Why That Creates Exposure 06:00 — The Real Attack Vector: Contribution as Initial Access 08:00 — Inside the Indonesian “Fake Package” Campaign 10:30 — How to Evaluate Code + Contributor Identity Together 12:00 — Threat Hunting and AI-Enabled Code Interrogation 15:00 — The Challenge of Undisclosed Vulnerabilities in Widely Used Components 16:30 — How Recovery Works When Malware Is Already in Your Stack 19:00 — Continuous Monitoring as the Foundation of Modern Supply Chain Security 22:00 — Pinning, Maintainer Analysis, and Code Interrogation Best Practices 24:00 — Where to Learn More About Hunted Labs Episode Resources Hunted Labs — https://huntedlabs.com Hunted Labs Entercept Hunted Labs “Hunting Ground” research blog Open Source Malware (Paul McCarty) Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode, we provide an overview of the major announcements from Microsoft Ignite 2025 and offer an analysis grounded in our expertise. Key topics include Agent 365, SharePoint Knowledge Agent, and Agent Governance. We also address advancements in Security Copilot, Data Security, Work IQ, Fabric IQ, Foundry IQ, integration with other models through Copilot, as well as several additional themes presented at Ignite 2025. DOWNLOAD THIS PODCAST
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss the recent data breach at Conduent, including the company's anticipated cost of the incident, their next steps, and more. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
In 2026, AI will increasingly integrate into business processes, emphasizing strong data quality and security as prerequisites for success. AI agents, distinct from chatbots, will operate with machine identities to automate tasks while supporting, rather than replacing, human decision-making. This is just a glimpse of the insights Ben Wilcox of ProArch shared this week.
Send us a textIn this episode of The Wireless Way, host Chris Whitaker engages in an insightful conversation with Dennis Osha, founder and chairman of Mobile Mentor. The discussion delves into Dennis's journey from working with Nokia in the 1980s to establishing Mobile Mentor in 2004. Dennis shares how his company has become a global leader in modern endpoint management and security, earning multiple Microsoft Partner of the Year recognitions. The episode covers various stages of the company's evolution, including its pivot during the global financial crisis, partnership with Microsoft, and focus on Intune. Dennis also offers an in-depth analysis of current challenges and future trends in endpoint management, cloud security, and AI integration, underscoring the importance of unlocking the full potential of Microsoft 365 for optimal business outcomes.00:00 Introduction and Guest Introduction01:33 Dennis Osha's Background and Mobile Mentor's Origins03:05 Transition from Engineering to Business Focus05:21 Challenges and Pivotal Moments12:14 Evolution of Mobile Mentor and Partnership with Microsoft16:57 Current Trends and Future Directions20:54 Challenges in AI Implementation21:08 Data Security and Initial Findings21:33 Skillset and Training for AI Tools21:45 Board's Inquiry and ROI Model22:31 Types of Companies and AI Adoption23:35 Future of Device Management and Security Tools26:33 Proliferation of AI Tools27:31 Ideal Customer Profile33:20 Sales Cycle and Marketing Strategies36:36 Final Thoughts and ReflectionsMore on DenisMore on Mobile Mentor Support the showCheck out my website https://thewirelessway.net/ use the contact button to send request and feedback.
In this episode of Energy Newsbeat – Conversations in Energy, host Stu Turley sits down with Sarah E. Hunt, President of the Rainey Center, to break down groundbreaking new polling that reveals overwhelming bipartisan support for American energy dominance, secure domestic data centers, and rapid permitting reform. Sarah explains how voters overwhelmingly link energy independence to national security, the growing AI arms race with China, and the urgent need to build every possible electron—nuclear, natural gas, solar, wind—to safeguard America's technological future. From China's 10x energy build-out to AI-driven permitting solutions, this conversation delivers sharp insights, alarming realities, and a clear call to action for policymakers across the U.S.Highlights of the Podcast00:00 - Intro00:33 – Why Energy Dominance = National Security01:04 – The Shocking Truth About U.S. Data Stored in China02:27 – Voters See a Tech Arms Race With China03:23 – China's 10x Energy Build-Out Advantage03:58 – Nuclear Power, Permitting, & Speeding Up Builds05:42 – Using AI to Fix Permitting Bottlenecks06:08 – The “Three Horsemen” of Energy Dominance07:02 – Voters Overwhelmingly Support Cutting Red Tape08:03 – Grid Vulnerabilities & Chinese-Linked Equipment09:02 – Electricity as a Weapon of War10:12 – Bipartisan Consensus on Energy Independence10:40 – How the Rainey Center Started11:22 – Supporting Local, State & Federal Leaders14:00 – State-Level Energy Action & AI Competition With China16:41 – The Electricity War for Human Freedom17:15 – Wind, Solar, Nuclear & Reality of Energy Costs18:44 – Who Should Pay for Data Center Power?20:18 – Solar Already Built But Stuck in Red Tape21:48 – Critical Minerals, Supply Chains & Energy Security22:13 – How to Follow & Connect With Sarah23:59 – Closing RemarksWe recommend checking out the Rainey Center for Public Policy: https://www.raineycenter.org/Follow Sarah on her LinkedIn https://www.linkedin.com/in/sarahelisabethhunt/Check out https://theenergynewsbeat.substack.com/and https://energynewsbeat.co/
You open Excel daily, but are you using AI to make it work for you? While 58% of professionals have tried AI, only 17% use it regularly—a missed opportunity. Join CPA Kyle Ashcraft in this hands-on webinar to learn vibe coding—a no-programming approach using Cursor AI to automate repetitive Excel tasks. Watch Kyle transform messy spreadsheets, organize GL data, and reconcile transactions with simple AI prompts while keeping data secure. You'll get three ready-to-use scripts plus a framework to automate countless tasks and reclaim hours weekly.(Originally recorded on October 20, 2025, on Earmark Webinars+)Chapters(02:18) - Meet Kyle Ashcraft and His AI Journey (02:31) - The Importance of AI in Accounting (03:30) - Kyle's Background and CPA Review (04:38) - Live Webinar and Audience Interaction (05:12) - Kyle's AI Projects and Cursor Introduction (07:39) - Data Privacy Concerns with AI (17:18) - Practical AI in Excel: Examples and Demonstration (20:03) - Getting Started with Cursor (23:55) - First Cursor Project: Cleaning Up Excel Data (31:38) - Jumping into Financial Document Verification (32:50) - Exploring Cursor's Privacy Settings (33:48) - Understanding Data Retention Policies (36:23) - Comparing Excel Files with Cursor (36:48) - Analyzing Complex GL Details (42:22) - Using Cursor for Recurring Accounting Tasks (49:20) - Leveraging AI for Audit and Analysis (50:53) - Practical Tips for Implementing Cursor (53:56) - Q&A: Advanced Cursor Features (59:04) - Conclusion and Next Steps Earn CPE for this episode: https://www.earmark.app/c/2854Sign up to get free CPE for listening to this podcasthttps://earmarkcpe.comhttps://earmark.app/Download the Earmark CPE App Apple: https://apps.apple.com/us/app/earmark-cpe/id1562599728Android: https://play.google.com/store/apps/details?id=com.earmarkcpe.appResourcesIntro to Cursor PDF Guide - https://mcusercontent.com/02dbcae4a3e3f15021db25a0c/files/deff5647-e0a3-51d7-4225-cf8b3a48532d/Cursor_AI_Quick_Guide.pdfWebinar presentation - https://ai.maxwellstudy.com/Connect with Our Guest, Kyle Ashcraft, CPALinkedIn: https://www.linkedin.com/in/kyle-ashcraft-cpa-7638a42aLearn more about Maxwell CPA Reviewhttps://maxwellcpareview.com/Connect with Blake Oliver, CPALinkedIn: https://www.linkedin.com/in/blaketoliverTwitter: https://twitter.com/blaketoliver/
Sarah Ference, CPA, an author of the JofA's Professional Liability Spotlight column, returns to the JofA podcast to discuss recent column topics and the advice CPAs can gain from them. In particular, Ference details data security preparedness, the value of engagement letters for tax-compliance services, common audit claims and defenses, and more. Editor's note: This episode is the JofA podcast's last until Jan. 8. n October: Are You Prepared for the Cost of a Data Security Incident? n November: Blocking and Tackling: Engagement Letters for Tax Compliance Services n December: Common Audit Claims and Defenses What you'll learn from this episode: Advice for CPA firms to guard against data security incidents. The ways engagement letters can prevent costly client disputes. The factors that often make audit claims the most expensive type of claims for firms. How to protect your firm when a client faces bankruptcy.
In this episode of the Software People Stories, my guest Ben Wilcox is the Chief Technology Officer and Chief Information Security Officer at ProArch. Ben shares his fascinating journey from building a web hosting business as a teenager to his current role as CTO and CISO at ProArch. Ben discusses the evolution of his career, his involvement in various projects, and the ever-changing landscape of security, especially with the advent of AI. He also provides valuable insights into how enterprises should approach security, the complexities of data localization, and the importance of a continuous security model. The conversation also delves into career advice for aspiring IT and security professionals.00:00 Introduction and Guest Welcome00:42 Early Career and Web Hosting Business02:49 Transition to Software Development03:51 Joining Advisor Group and Pro05:06 Challenges of Running a Business as a Teenager07:55 Learning and Growth in a Larger Company09:14 Becoming a CISO and Security Focus12:21 Evolving Security Landscape and AI15:01 Data Security and Insider Risk Management20:51 Zero Trust Environments and Legacy Systems23:58 Sleepless Nights and Security Concerns25:50 Balancing Innovation and Security26:11 Finding Joy in Leadership26:54 Navigating the CTO and CISO Roles28:55 Keeping Up with Technology Trends31:27 Hyper-Personalization and Security Risks36:02 The Role of Open Source in Security41:03 Career Advice for Aspiring Security Professionals45:35 The Impact of AI on Security Jobs49:11 Conclusion and Contact InformationThe timestamps are approximate, and after the intro that is about 90 seconds.For more closer timestamps, add 90 seconds to the labels aboveBen Wilcox is the Chief Technology Officer and Chief Information Security Officer at ProArch, where he leads the company's cloud, security, and AI enablement strategy. With more than 20 years of experience spanning software engineering, cybersecurity, and enterprise architecture, Ben helps organizations modernize their technology foundations while navigating the evolving threat landscape.Ben's career began in hands-on development and infrastructure work, giving him a deep technical grounding that informs his leadership today. He has built and led high-performing engineering teams, guided complex cloud migrations, and designed modern security programs that balance innovation with risk management. At ProArch, he works closely with clients to architect AI-ready, scalable systems that drive business transformation.Connect with Ben: https://www.linkedin.com/in/ben-wilcox
join wall-e for today's tech briefing as we cover the latest developments in the tech world: ftc upholds ban: scott zuckerman is barred from the surveillance software industry after a severe data breach, maintaining the 2021 order for cybersecurity measures. nvidia h200 ai chips: commerce department allows export to china under specific conditions, despite congressional resistance over national security concerns. investment in skild ai: softbank and nvidia consider over $1 billion investment, valuing the ai robotics company at $14 billion, tripling its former valuation. ibm acquires confluent: ibm announces $11 billion acquisition to enhance its data infrastructure and automation capabilities, focusing on real-time data management. waymo's expanding robotaxi service: leaked data reveals waymo's significant increase in rides and plans for expansion to 12 more cities by 2026. stay tuned for more updates tomorrow!
In this episode, we dive into the silent killer of e-commerce team productivity: using personal chat apps for work. Guy Weiss, CEO and founder of ZenZap, shares how relying on apps like WhatsApp can quietly harm your business through security risks, employee burnout, and lost data. He reveals the "hidden cost" of the "always on" culture and explains how a business-focused messenger can keep your company's secrets safe, integrate with your tools, and make your team highly productive.Topics discussed in this episode: Why personal chat apps break work. The hidden cost of "always on" culture. Why personal apps ruin work/life separation. How your business IP is lost on employee phones. Why unstructured group chats cause missed orders. Why staff privacy matters as a business grows. How ZenZap solves complex communication. Links & Resources Website: https://www.zenzap.co/LinkedIn: https://www.linkedin.com/company/zenzap/Instagram: https://www.instagram.com/zenzapappYouTube: https://www.youtube.com/@zenzap_app Get access to more free resources by visiting the show notes at https://tinyurl.com/yeym4uyb______________________________________________________ LOVE THE SHOW? HERE ARE THE NEXT STEPS! Follow the podcast to get every bonus episode. Tap follow now and don't miss out! Rate & Review: Help others discover the show by rating the show on Apple Podcasts at https://tinyurl.com/ecb-apple-podcasts Join our Free Newsletter: https://newsletter.ecommercecoffeebreak.com/ Support The Show On Patreon: https://www.patreon.com/EcommerceCoffeeBreak Partner with us: https://ecommercecoffeebreak.com/partner-with-us/
What does it take to be ready to deploy M365 Copilot in your organization? Richard talks to Nikki Chapple about her latest incarnation of the M365 Copilot Readiness Checklist, working step-by-step to bring M365 Copilot into the organization without causing data leak issues. Nikki discusses utilizing existing tools to accurately identify sensitive data, archiving outdated information, and monitoring data usage by both users and agents - allowing you to detect issues before they escalate. The conversation also delves into the process of identifying issues, discussing policy changes, and how to communicate those changes so that people can take advantage of the power of these new tools without feeling threatened. It's a journey!LinksMicrosoft PurviewSharePoint Advanced ManagementDefender for Cloud AppsRestricted SharePoint SearchMicrosoft 365 ArchiveSharePoint Restricted Content DiscoveryData Security Posture Management for AINikki's Readiness ChecklistM365 Copilot Oversharing BlueprintMicrosoft Purview Secure by Default BlueprintPrevent Data Leaks to Shadow AI BlueprintRecorded November 7, 2025
Back in 2011, FedRAMP was put together because each federal agency had to conduct its own time-consuming security audit. The idea was to standardize security to reduce costs and accelerate cloud adoption. About ten years later, state leaders saw the same problem. Over the years, they worked out a security guidance package that was released this year. GovRAMP was launched to address many of the same challenges faced by the federal government: to establish a standard that enables transparency, standardization, and community. GovRamp's framework is based on NIST 800-53 rev5. Tony O'Neil from Massachusetts observed that before GovRAMP, each state had a patchwork of security guidelines. With so much variation across states, a simplified environment could reduce costs and enable leaders to adopt a mindset of investing in people. Today, we sat down with data security experts who detailed the implementation of compliance to improve data security and compliance. The conversation also covered the importance of continuous monitoring, the role of CSPs in maintaining security, and the necessity of proper resource allocation for cybersecurity professionals.
Send us a textIn this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how BonFi AI is innovating in data security. Tune in to learn about the importance of context in data protection and the future of cybersecurity in a rapidly changing digital world.00:00:19 Introduction to Vishnu's Journey00:00:30 Entering the US and Cisco00:02:18 Cloud Security and AI00:02:48 Data Governance and Challenges00:08:47 The Expansiveness of Cloud00:11:00 AI's Appetite for Data00:12:11 Data Security in the JNI Era00:14:29 The Importance of Context00:16:13 Data Used by Enterprises00:22:24 Conclusion and Future Trendshttps://www.bonfy.ai/Bonfy.aiBonfy ACS is a next-gen DLP platform built for the AI era. Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast Affiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss how, according to DataBreachToday, a Chinese state-linked hacking group relied on the Claude Code model to automate most of a cyberespionage campaign against dozens of organizations. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
Canisius and Bill dug into the whole on-prem vs cloud debate through the lens of AI, pointing out that massive compute needs and generative models pretty much force serious work into the cloud, with most operators moving to a hybrid setup rather than pure on-prem or multi-cloud. They spent a lot of time on trust, encryption, and data ownership, stressing that customer data stays isolated, is not used to train models unless you opt in, and that Microsoft's job is to be the secure, scalable platform while companies like Collide handle the oil and gas specific workflows and “last mile” value. They also hit on why “we already have Azure and Copilot” is not the same as having a purpose-built solution, why a single-cloud plus good governance usually beats juggling multiple hyperscalers, and closed with a look ahead to a world where agents manage other agents and AI is wired into everyday work across legal, operations, and the field.Click here to watch a video of this episode.Join the conversation shaping the future of energy.Collide is the community where oil & gas professionals connect, share insights, and solve real-world problems together. No noise. No fluff. Just the discussions that move our industry forward.Apply today at collide.ioClick here to view the episode transcript. https://twitter.com/collide_iohttps://www.tiktok.com/@collide.iohttps://www.facebook.com/collide.iohttps://www.instagram.com/collide.iohttps://www.youtube.com/@collide_iohttps://bsky.app/profile/digitalwildcatters.bsky.socialhttps://www.linkedin.com/company/collide-digital-wildcatters
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss how, according to DataBreachToday, a Chinese state-linked hacking group relied on the Claude Code model to automate most of a cyberespionage campaign against dozens of organizations. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
From politically motivated attacks to basic configuration errors, purpose-driven orgs are now on the front lines of cyber risk. In this episode, Steve Sharer and Garrett Miller walk through five areas where B Corps are more vulnerable than they realize — and the practical steps that strengthen each one. They explain why these gaps matter and how to close them with straightforward practices that don't overwhelm small teams.View the show notes: https://go.lifteconomy.com/blog/5-cyber-risks-for-b-corps-and-how-you-can-fix-them-w/-steve-sharer-garrett-millerUnlock your free B Corp Values Assessment—plus tips and insights to help your business grow. https://go.lifteconomy.com/b-corp-newsletter
Send us a textIf you don't know where the patient's data is at every moment, you really can't protect it yet. That's the reality many healthcare organizations are facing. Regulations can help but legacy siloed systems keep patients exposed.In this episode of the HealthBiz Podcast, David Williams is joined by Aimee Cardwell, CISO-in-residence at Transcend. Aimee breaks down why compliance doesn't equal security, how legacy architectures and vendor ecosystems create hidden vulnerabilities, and what modern, identity-centric, AI-enabled security should look like.
The U.S. Department of Justice's Data Security Program is reshaping how companies manage cross-border data activities. This episode of The Data Chronicles breaks down what the rule does, why it was created, and the types of transactions it restricts or prohibits—from data brokerage to vendor access to bulk genomic data. Host Scott Loughlin is joined by Hogan Lovells partner James Denvil and associate Lorea Mendiguren to walk through the rule's core elements and the open questions around implementation, risk, and compliance. They share practical insights from advising companies in e-commerce, health, and life sciences as they adjust to this new national-security-driven framework.
Defeating Porch Pirates and Holiday Scammers Welcome to The Secure Family Podcast with Andy Murphy! With the holiday shopping season upon us, Andy shares tips for safe online shopping and strategies to prevent porch piracy. He also discusses common holiday scams, offering advice on avoiding fraudulent ads and spotting the red flags of marketplace scams. Take control of your data with DeleteMe. Because they sponsor the podcast you can get 20% off a privacy plan from DeleteMe with promo code: DAD. Connect
In this episode host Max Havey dives deep into the world of unified security with guests Sinead O'Donovan, VP of Product Management, Identity and Network Access at Microsoft, and Eliot Sun, VP of Product Management at Netskope. Eliot and Sinead offer their perspectives on how an ideal unified strategy brings together data, network access, and identity. Additionally, they dig into the topline benefits, key metrics, and how organizations need to evolve to make a unified strategy a reality.
Welcome to episode 305 of Grow Your Law Firm, hosted by Ken Hardison. On today's episode, Ken welcomes Raquel Gomes, Founder and CEO of Stafi, a virtual staffing company revolutionizing how law firms operate. With a background in psychology, corporate America, and technology, Raquel brings a unique perspective to leadership and sustainable growth. Her company was born from her own journey—balancing the demands of a high-powered career with motherhood and the desire for a more fulfilling life. Today, Stafi supports hundreds of law firms across the U.S., providing highly skilled virtual assistants, customized training, and hands-on coaching to help firms scale efficiently without sacrificing quality or well-being. What you'll learn about in this episode: Offshore Staffing for Growth - How virtual teams can cut labor costs and free up marketing budgets - Why effective delegation is key to scaling law firms sustainably Training and Support that Drive Results - Inside Stafi University's 800+ certifications tailored for PI firms - How coaching, KPIs, and emotional support enhance performance and retention Data Security and Confidentiality - How Stafi ensures compliance through advanced vetting, cybersecurity, and monitoring - Building trust with virtual teams through transparency and accountability The Role of AI in Staffing and Operations - Why AI won't replace humans—but will replace humans who don't use AI - How Stafi's coaches ensure proper adoption of firm tools and automation systems 24/7 Intake and the Future of Legal Operations - How Stafi Live helps firms close more leads through empathy-driven communication - Why offshore staffing and AI integration are essential to remain competitive in 2026 Resources: Email: raquel@getstafi.com Website: getstafi.com LinkedIn: linkedin.com/in/raquel-gomesstafi/ Facebook: facebook.com/GetStafi Instagram: instagram.com/getstafi Additional Resources: https://www.pilmma.org/the-mastermind-effect https://www.pilmma.org/resources https://www.pilmma.org/mastermind AI for PI Expo: www.pilmma.org/ai-for-pi-expo
Washington AI Network founder Tammy Haddad hosts Cohesity CEO and President Sanjay Poonen for a conversation on the intersection of data security and artificial intelligence. Poonen explains why protecting government and enterprise data is the foundation for trustworthy AI — and why, in his words, “You can't do AI before you've secured your data.” He also introduces Gaia, Cohesity's new generative-AI platform built with NVIDIA, and shares how AI can help government become more efficient, secure, and productive. From ransomware readiness to the President's AI Action Plan, Poonen outlines how agencies can build cyber resilience, strengthen data hygiene, and embrace innovation safely in the age of AI.
With me in this episode is John Ackerly, co-founder and CEO of Virtru. John started Virtru with his brother Will over a decade ago to make data security more pervasive across mediums such as emails and files. Virtru has raised over $150 million to this point from investors such as ICONIQ and Bessemer and built a very healthy business on one of the core pillars of cybersecurity. John has an atypical background in business well-complemented by his brother's technical experience at NSA. One of my favorite lines from the episode: he always thought he would start a business with his other brother. In the episode we discuss pricing strategy, which is certainly not all science, the founder outlook when starting a company, founding with family, and more. Website: https://www.virtru.com/
Oftentimes, organizations view training simply as another obligation; however, tailored and hands-on privacy and cybersecurity training are essential to safeguard data and ensure operations run smoothly in the event of a breach.
Amanda Silberling joins Mikah Sargent on Tech News Weekly this week! Casio has a new smart toy companion powered by AI. The UK is still seeking to develop backdoor encryption for Apple users. ChatGPT is looking to act more like an operating system. And how the 'Buy Now, Pay Later' model has built a $120 billion industry. Amanda has her hands on a new AI-powered smart companion from Casio! She and Mikah talk about the device, how it works, and the possible data security and privacy concerns. Mikah talks about the UK's continued push to create backdoor encryption for Apple users in the country. Sabrina Ortiz of ZDNet joins the show to discuss OpenAI's Dev Day and the company's ambitions to make OpenAI function like an OS with the launch of the Apps SDK. Finally, Mikah shares an article from The New York Times Magazine about the 'Buy Now, Pay Later' market, which allows buyers to obtain their items easily and traps users in a swarm of debt. Hosts: Mikah Sargent and Amanda Silberling Guest: Sabrina Ortiz Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io threatlocker.com/twit cachefly.com/twit