POPULARITY
Categories
Bipul Sinha, CEO, chairman and cofounder of data security company Rubrik (RBRK), joins Market On Close to discuss the company's latest earnings and cybersecurity as a whole. “Every business is looking to transform to an AI strategy,” he explains, but before that, companies have to integrate into the cloud. To get there, they need to consider the security of that data as they transform, boosting Rubrik. Their focus is on “cyber resilience” within the world of data security.======== Schwab Network ========Empowering every investor and trader, every market day.Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about
During this episode, Santosh is joined by Pedro Neto, a supply chain data scientist at HP. Pedro discusses the real-world impact of generative AI on supply chain management. The conversation also explores practical opportunities for AI adoption, common challenges like model drift and data security, and the importance of starting with small, high-impact use cases. Pedro emphasizes the need for robust model evaluation, strong data governance, and empowering teams with accessible AI tools. Listeners will gain actionable insights on how to approach AI implementation, avoid common pitfalls, foster a culture of innovation within their organizations, and so much more.Highlights from their conversation include:Pedro's Introduction & Background (0:41)Opportunities and Challenges of Generative AI (3:00)AI Fatigue Among Practitioners (5:15)Prioritizing Gen AI in Supply Chain (7:39)Best Use Cases for Gen AI (10:28)Concrete Examples of Gen AI Impact (13:30)Handling Model Drift and Evaluation (16:45)Data Security and Governance in Gen AI (19:13)Keys to Successful AI Adoption (21:27)Rapid Fire: Overhyped AI, Irrelevant KPIs, and Dream Tools (23:26)Final Thoughts and Takeaways (25:37)Dynamo is a VC firm led by supply chain and mobility specialists that focus on seed-stage, enterprise startups.Find out more at: https://www.dynamo.vc/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
As the world becomes more digital, companies need to safeguard their data from cyberattacks and data loss. Many believe that storing data within their own facility is the safest option, but cloud-based solutions might provide even better safety to SMEs. You can learn more in this episode or read about it on our blog For more information about MRPeasy software, visit our website: mrpeasy.com
Join us on Discord with Semiconductor Insider, sign up on our website: www.chipstockinvestor.com/membershipSupercharge your analysis with AI! Get 15% of your membership with our special link here: https://fiscal.ai/csi/Welcome to CSI's first video about Rubrik, another competitor in the cybersecurity landscape. The episode covers Rubrik's role in protecting company data, their recent acquisition of Predibase, and their transition to a cloud-based subscription model. Financial updates and guidance are also discussed, including revenue growth, free cash flow, and market volatility. Tune in for a detailed analysis of Rubrik's strategies, partnerships, and future outlook. Don't forget to check out our live events and Q&A sessions on Semi Insider!Sign Up For Our Newsletter: https://mailchi.mp/b1228c12f284/sign-up-landing-page-short-form********************************************************Affiliate links that are sprinkled in throughout this video. If something catches your eye and you decide to buy it, we might earn a little coffee money. Thanks for helping us (Kasey) fuel our caffeine addiction!Content in this video is for general information or entertainment only and is not specific or individual investment advice. Forecasts and information presented may not develop as predicted and there is no guarantee any strategies presented will be successful. All investing involves risk, and you could lose some or all of your principal.Timestamps:(00:00) Rubrik and Cybersecurity(01:23) Rubrik's Services and Market Position(03:52) Rubrik's Competitors and Partnerships(05:31) Recent Developments and Acquisitions(07:18) Financial Performance and Guidance(10:18) Investment Considerations and Risks#rubrik #cybersecurity #rbrkstock #semiconductors #chips #investing #stocks #finance #financeeducation #silicon #artificialintelligence #ai #financeeducation #chipstocks #finance #stocks #investing #investor #financeeducation #stockmarket #chipstockinvestor #fablesschipdesign #chipmanufacturing #semiconductormanufacturing #semiconductorstocks
Join us this week for The Tech Leaders Podcast, where Gareth sits down with Chris Moore, European President at Veeva Systems. Chris talks about the impact AI will have on software development and data security, how technology has transformed the life sciences industry, and the long-term implications of Covid on drug development.On this episode, Chris and Gareth discuss how Chris helped make Veeva Europe more European, the importance of understanding the opportunities and threats associated with new technologies, and why the Y2K bug was a beautiful anti-climax.Timestamps:ICI, Kinesis and PWC (3:40)IBM, EY and living abroad (10:28)Making Veeva Europe more European (17:30)The impact of Covid on drug development (29:05)The evolution of the CIO (33:00)AI: Hopes, fears and the impact on software development and pharma (36:33)Advice for 21-year-old Chris (51:46)https://www.bedigitaluk.com/
In this episode of Bulletproof Your Marketplace, Jeremy is joined by Stephen Fusco, Data Privacy Officer & Sr. Counsel at Danone North America, as they meet to analyze a new chapter of the book Bulletproof Your Marketplace, focusing on Data Privacy and Data Security — Policies and Practices. Stephen shares lessons from real-world breaches and compliance challenges, offering practical guidance on data mapping, minimizing collection, building strong governance structures, and avoiding common mistakes that can lead to costly lawsuits. They also explore the fragmented U.S. regulatory landscape, consumer consent, privacy notices, cookie policies, and the risks of neglecting these essentials. This episode delivers actionable takeaways to help marketplace operators build a safer, more resilient platform while reducing exposure to regulatory penalties, class actions, and reputational damage.
How is AI Transforming Go To Market for B2B SaaS? Inbound go-to-market for SaaS is undergoing a major transformation. What once relied on blog posts, lead magnets, and cold outreach is now powered by artificial intelligence. AI is no longer just a content assistant. It now fuels end-to-end workflows, drives strategy, qualifies leads, and personalizes outreach at scale. SaaS teams are deploying AI agents to track LinkedIn signals, automate follow-ups, and even manage outbound efforts. This evolution is unlocking new levels of speed and scale, but it also brings real risks if automation isn't carefully managed. In this episode of the Grow Your B2B SaaS Podcast, Maja Voje breaks down how AI is reshaping inbound GTM. She shares what's working today, where teams should stay hands-on, and how to build AI-assisted systems without losing the human connection that still drives trust in B2B. If you're building or scaling a SaaS product, this is your playbook for doing it smarter with AI.Key Timecodes(0:00) - Boosting AI Content Performance & Automating Founder Workflows(0:53) - What Is AI's Role in SaaS GTM? [With Guest Maja Voje](1:48) - Is Everything Dead? Why AI Agents Are the Future of SaaS Workflows(2:55) - Multi-Agentic Workflows Explained: Tools, Agents & Human Oversight(4:28) - Why You Must Earn the Right to Automate with AI(5:27) - SaaS Automation Gone Wrong: Avoiding Enterprise Pitfalls(6:15) - AI Agents: Build or Buy? Key Considerations for GTM Leaders(6:38) - Mapping GTM Workflows: LinkedIn, DMs, Offers & Content Ops(8:00) - Real-Life AI Marketing Automations You Can Use Today(9:43) - How Many AI Agents Do You Really Need for LinkedIn & Lead Gen?(11:08) - Iterating AI Models Post-Training: Prompts, Builders & Feedback Loops(12:55) - AI Costs, Compliance & Rollouts: From POC to Scalable Deployment(15:07) - Data Security in AI: The Case for 'Least Privilege' Access(16:04) - Rule of Thumb: Don't Share Data You Wouldn't Give a Friend(16:13) - Sponsor Spotlight: SaaStock Dublin—Investor Matchmaking + Discounts(17:22) - Inbound Marketing with AI: LinkedIn Trends & Time-Wasters to Avoid(18:54) - External vs Internal Knowledge Bases: Training AI Without Garbage Input(20:31) - Why AI Design Often Fails: Creatives, Claude vs ChatGPT & Brand Gaps(21:53) - LinkedIn AI Strategy: Commenting, Publishing & Legal Risks in the EU(23:30) - AI-Powered Outbound Marketing: ICP Scoring, Lead Research & Social Selling(25:52) - Training Your Team on AI: Avoiding Content Quality Pitfalls(27:26) - Human-in-the-Loop Design: What to Automate vs Delegate(28:43) - The AI-First Founder Mindset: Culture, Talent & Psychological Safety(31:20) - AI Implementation Choices: From Prototypes to Governance Guardrails(33:29) - PR & Leadership: Why 'We Replaced 7 People with AI' Is a Bad Look(34:10) - 2-Year AI Roadmap: Think Strategically, Reflect Often, Stay Safe(36:20) - Going from 0 to 10K MRR: Learn to Sell, Test Pricing, and Stay Focused(38:53) - Bootstrapping with AI: Don't Waste Model Credits, Focus on ROI(39:32) - Scaling to $10M ARR with AI: Ecosystem Marketing & Creator-Led Trust(40:47) - Recap: AI Workflows, POCs, LinkedIn Automation & Strategic Thinking(42:35) - Connect with Guest Maja Voje on LinkedIn(42:58) - Subscribe to the GTM Strategies Newsletter on Substack(43:28) - Final CTA: Review the Show, Sponsor, Ask Questions, and Connect
The EU fines Google $3.5 billion over adtech abuses. Cloudflare blocks record-breaking Distributed Denial of Service (DDoS) attacks. The Salesforce-Salesloft breach began months earlier with GitHub access. Researchers say the new TAG-150 cybercriminal group has been active since March. Hackers use stolen secrets to leak more than 6,700 Nx private repositories. Subsea cable outages disrupt internet connectivity across India, Pakistan, and parts of the UAE. Monday Business Breakdown. On our Industry Voices segment Todd Moore, Global Vice President, Data Security at Thales, unpacks the perils of insider risk. Hackers claim Burger King's security flaws are a real whopper. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Industry Voices On our Industry Voices segment, we are joined by Todd Moore, Global Vice President, Data Security at Thales, discussing the biggest threat to your data has a badge, a password, and years of goodwill. Check out Todd's full conversation here. Selected Reading EU fines Google $3.5 billion for anti-competitive ad practices (Bleeping Computer) Cloudflare blocks massive 11.5 Tbps DDoS attack (SDxCentral) Salesloft GitHub Account Compromised Months Before Salesforce Attack (SecurityWeek) From CastleLoader to CastleRAT: TAG-150 Advances Operations with Multi-Tiered Infrastructure (Recorded Future) Over 6,700 Private Repositories Made Public in Nx Supply Chain Attack (SecurityWeek) Red Sea cable cuts disrupt internet across Asia and the Middle East (Reuters) N2K Pro Business Briefing update (N2K Networks) Burger King hacked, attackers 'impressed by the commitment to terrible security practices' — systems described as 'solid as a paper Whopper wrapper in the rain,' other RBI brands like Tim Hortons and Popeyes also vulnerable (Tom's Hardware) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Brad Frazer is a Boise-based attorney and partner at Hawley Troxell, Idaho's largest law firm, where he leads the Intellectual Property & Internet practice group with a specific focus in IP Strategy, AI, Data Security, and IT. A graduate of BYU, UC Hastings, and the University of Utah, Brad has decades of experience in cybersecurity, internet law, and IP, including roles as Deputy General Counsel at major tech firms. He's also a published novelist and a recognized expert in emerging technologies like blockchain, NFTs, and Web3. Richard Hundhausen helps software organizations and teams deliver better products by understanding and leveraging Azure DevOps and Scrum. He is a Professional Scrum Trainer and author of Professional Scrum with Azure DevOps (MS Press). As a software developer and consultant with over 30 years of experience, he understands that software is built and delivered by people and not by processes or tools. Topics of Discussion: [2:24] Richard and Brad share their enthusiasm for AI, and they discuss the legal implications of using AI-generated code. [4:00] Brad explains that ownership of AI-generated code is academic until legal issues arise, such as lawsuits or investment rounds. [5:29] Richard explains the process of using AI tools to create code, emphasizing the iterative nature of the process. [8:02] The nuances of copyright law, including the need for human authorship to establish ownership. [10:57] How one gets a registered copyright. [14:19] The different things that AI-driven development can mean. [19:44] Risk avoidance practices as a coder. [23:46] Brad advises software developers to be aware of the legal environment and the potential risks of using AI tools. [24:59] What is an AI output, and what is just the computer being helpful? [32:35] Brad shares a real-world example of a $20 million deal where the seller did not own the code, highlighting the potential risks. [38:38] Brad mentions the Anthropic case, where the company was sued for training its LLM on copyrighted material. [41:22] Richard and Brad discuss the importance of raising awareness and providing resources to help developers understand the legal implications of using AI tools. Mentioned in this Episode: Clear Measure Way Architect Forum Software Engineer Forum Brad Frazer LinkedIn Richard Hundhausen LinkedIn Thaler vs. Perlmutter Bartz v. Anthropic Who Owns the Code? Want to Learn More? Visit AzureDevOps.Show for show notes and additional episodes.
The panel examines the U.S. government's $8.9 billion investment in Intel, debating whether it strengthens national security or sets a risky precedent for government ownership in private companies. Chuck Joiner, David Ginsburg, Marty Jencius, Brian Flanigan-Arthurs, Ben Roethig, Jeff Gamet, Eric Bolden, Web Bixby, and Jim Rea discuss Intel's challenges, the role of the CHIPS Act, and political optics. The session also examined Bluesky's withdrawal from Mississippi over strict age-verification laws, and the implications for other states and services. Today's MacVoices is supported by Insta360 and their new GO Ultra, the tiny 4K camera that goes everywhere with you. Visit store.Insta360.com and use the code “MacVoices” for a free set of Sticky Tabs. Show Notes: Chapters: [0:10] Government investment in Intel [1:30] Concerns about state-owned enterprise [3:49] Intel's struggles and future outlook [5:43] Comparing Intel to past bailouts [7:19] Differences between subsidies and bailouts [7:57] Perspectives on government involvement [9:16] International vs U.S. approaches [11:29] Stratechery analysis on Intel [11:59] CHIPS Act and Intel's funding shift [15:17] Breakdown of grants and obligations [16:40] Political optics of Intel investment [20:30] Bluesky exits Mississippi [21:28] Age-verification law challenges [23:58] Privacy, Facebook, and data security [24:58] Broader implications of restrictive laws Links: Trump confirms US government's 10% stake in Intel, stock climbs https://9to5mac.com/2025/08/22/trump-confirms-us-governments-10-stake-in-intel-stock-climbs/ U.S. Intel https://stratechery.com/2025/u-s-intel/ Bluesky blocks service in Mississippi over age assurance law https://techcrunch.com/2025/08/24/bluesky-blocks-service-in-mississippi-over-age-assurance-law/ Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Ben Roethig has been in the Apple Ecosystem since the System 7 Days. He is the a former Associate Editor with Geek Beat, Co-Founder of The Tech Hangout and Deconstruct and currently shares his thoughts on RoethigTech. Contact him on Twitter and Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Send us a textCheck us out at: https://www.cisspcybertraining.com/Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkoutGet access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouvDive into the multifaceted world of data security controls with Sean Gerber as he unpacks CISSP Domain 2.6. The episode opens with a fascinating glimpse into the creative ingenuity of technology users—a student who managed to hack a TI-84 calculator to access ChatGPT during exams. This real-world example perfectly illustrates why robust data security controls are more crucial than ever in our interconnected world.Sean meticulously breaks down the three fundamental data states—data at rest, data in transit, and data in use—providing clear explanations of the unique protection mechanisms each requires. You'll discover why data is rarely truly "at rest" unless completely powered off and disconnected, and why this understanding is vital for comprehensive protection strategies. The discussion extends to emerging technologies like homomorphic encryption, which promises to keep data encrypted throughout all states, though it's still evolving.The heart of effective data protection lies in classification and labeling, and Sean offers practical advice on implementing these systems. Starting small with clearly defined data sets, standardizing nomenclature, and utilizing visual cues like color-coding are just a few of the actionable strategies shared. You'll gain insights into Digital Rights Management (DRM), Data Loss Prevention (DLP), and Cloud Access Security Brokers (CASBs)—three critical components of a comprehensive data security framework.Perhaps most valuable is Sean's emphasis on understanding organizational risk tolerance. As he eloquently puts it, "If you don't know the risk for your company, find out somebody who does." This perspective shift from pure protection to risk-aligned security can transform how security professionals approach their role and communicate with leadership.Whether you're studying for the CISSP exam or looking to enhance your organization's data protection strategy, this episode delivers practical wisdom drawn from real-world experience. Visit CISSP Cyber Training for additional resources, and remember—understanding data security isn't just about passing an exam; it's about becoming a more effective guardian of your organization's most valuable assets.Support the showGain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
This episode delves into the dynamic future of retail, spotlighting the pivotal role of AI in reshaping supply chains and customer interaction. Experts discuss how retailers are harnessing AI to deliver hyper-personalized shopping experiences, leveraging clean data to anticipate consumer needs and optimize inventory. The conversation explores the increasing importance of sustainability, with brands adopting eco-friendly practices and transparent supply chains to meet conscious consumer demands. The rise of social commerce platforms like TikTok is also examined, revealing how retailers are integrating social media into their sales strategies and supply chain management for unprecedented agility. This episode offers valuable insights into how technology, strategic data utilization, and a commitment to sustainability are converging to redefine the retail landscape and create new opportunities for brands and consumers alike.
We're asking the hard question: is technology the problem… to technology? If cybercrime only exists because the internet does, maybe the real solution is to unplug it all, toss the Wi-Fi router into the river, and go back to quills, scrolls, and smoke signals. In this episode, Darnley takes a tongue-in-cheek look at the rise of tech in cybersecurity, why every “solution” creates new problems, and whether we should just burn it all down.Grab a coffee, sit back, and laugh(or cry) while we wrestle with the paradox of fighting technology with technology, and what you actually need to do to stay safe online.Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.
In this episode, Matthew Craft, Detective Superintendent, NSW Police Force examines the evolving landscape of cybercrime in 2025—what's changed, what's emerging, and what organisations need to know to stay ahead. From rising threat trends to response readiness, the discussion also highlights the importance of national and international cooperation in combating cyber threats. Whether you're in government, law enforcement, or cyber defence, this episode offers timely insights into staying resilient in a high-risk digital world. Matthew Craft, Detective Superintendent, NSW Police Force For more great insights head to www.PublicSectorNetwork.co
Robert Johnson, III, is the President and CEO at Cimcor. In this episode, he joins host Heather Engel to discuss ow organizations are starting to move away from treating IT operations and cybersecurity as two separate areas and are instead bringing them together by aligning service processes with security practices. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
Cloud Stories | Cloud Accounting Apps | Accounting Ecosystem
In this solo episode Heather Smith explores how accountants can harness AI as a strategic enabler, boosting data-driven decision making, enhancing client value, and leading with ethics, integrity, and curiosity. Summary In this solo episode, I talk about . . . Key Points: Technology as a strategic enabler, not just an operational tool AI reduces repetitive work, empowering advisory services Algorithms + data = core to accountants' strengths Data as a strategic asset: dashboards, analytics, forecasting tools AI skills now a core competency—embrace continuous learning Importance of curiosity and experimentation Changing client expectations around speed, transparency, and insights Data security, ethics, and integrity as professional superpowers AI governance—opportunity to lead and educate clients Leadership moment for accountants in shaping AI adoption 00:00 – Welcome & Episode Overview Heather introduces the AI in accounting theme. 00:45 – 1 AI as a Strategic Enabler Why technology is more than an operational necessity. 02:10 – 2. Automation Frees Accountants to Be Human From data entry to strategic advisory work. 03:30 – AI in Simple Terms: Algorithms + Data Why this formula matters for accountants and bookkeepers. 04:50 – 3. Data as a Strategic Asset Leveraging dashboards, analytics, and forecasting tools. 06:15 – 4. AI Skills Are the New Core Competencies From spreadsheets to generative AI proficiency. 07:35 – 5. Curiosity & Experimentation Drive Innovation How to create space for trying new tools. 09:10 – 6. Meeting Evolving Client Expectations Speed, transparency, and tech-savvy service delivery. 10:40 – 7. Data Security & AI Disclosure Best practices for safeguarding sensitive financial data. 12:05 – 8. Ethics & Integrity as the Accountant's Superpower Embedding responsible AI use into daily decisions. 13:25 – 9. AI Governance: A New Service Opportunity Helping clients set rules and policies for AI adoption. 15:00 – 10. Leadership Moment for Accountants Shaping how AI delivers value and manages risk. 17:10 – Final Thoughts & Resources Encouraging continuous learning and professional community engagement. Contact details: Accounting Apps newsletter: http://accountingapps.io/ Accounting Apps Mastermind: https://www.facebook.com/groups/XeroMasterMind LinkedIn: https://www.linkedin.com/in/HeatherSmithAU/ YouTube Channel: https://www.youtube.com/ANISEConsulting X: https://twitter.com/HeatherSmithAU
In this episode of Bulletproof Your Marketplace, Jeremy Gottschalk sits down with seasoned legal counsel Krishan Thakker to unpack how user contracts and robust privacy practices can act as liability shields for digital platforms. Drawing on over 15 years advising global technology, e-commerce, and social media companies, Krish shares his expertise at the intersection of data privacy, regulatory compliance, AI governance, and trust & safety. Together, they explore why privacy can no longer be an afterthought, the dangers of conflating terms of use with privacy policies, and the financial and reputational fallout from neglecting compliance—illustrated through high-profile failure. Krish also outlines practical steps for platform operators, including conducting a data audit, adopting a “less is more” approach to PII collection, and drafting clear, standalone user agreements. Whether you're a founder, legal counsel, or trust & safety leader, this episode delivers actionable strategies to protect your platform, build user trust, and stay ahead of evolving regulations.
In this episode of CISO Tradecraft, host G Mark Hardy engages in an insightful conversation with Dave Lewis, Global Advisory CISO from 1Password, about AI governance and its importance in cybersecurity. They discuss AI policy and its implications, the evolving nature of AI and cybersecurity, and the critical need for governance frameworks to manage AI safely and securely. The discussion delves into the visibility challenges, shadow AI, the role of credentials, and the importance of maintaining fundamental security practices amidst rapid technological advancements. They also touch on the potential risks associated with AI, the misconceptions about its impact on jobs, and the need for a balanced approach to leveraging AI in a beneficial manner while safeguarding against its threats. This episode provides valuable guidance for cybersecurity professionals and organizations navigating the complexities of AI governance. Chapters 00:00 Introduction to AI Governance 00:30 Guest Introduction: Dave Lewis 00:49 The Importance of AI Governance 01:42 Challenges in AI Implementation 03:20 AI in the Modern Enterprise 03:49 Shadow AI and Security Concerns 04:49 AI's Impact on Jobs and Industry 05:27 The Gartner Hype Cycle and AI 05:43 AI's Influence on the Stock Market 06:14 Historical Context of AI 06:32 AI and Credential Security 08:29 The Role of Governance in AI 12:47 The Future of AI and Security 18:36 Governance and Policy Recommendations 19:26 AI Governance and Ethical Concerns 20:01 AI Self-Preservation and Human Safety 20:18 Uncontrollable AI Applications 21:17 Vectors of AI Trouble 21:58 AI Hallucinations and Data Security 22:53 AI Vulnerabilities and Exploits 26:29 Deepfakes and AI Misuse 27:33 Historical Cybersecurity Incidents 29:04 Future of AI and Job Security 33:47 Managing AI Identities and Credentials 34:21 Conclusion and Final Thoughts
In this episode of CISO Tradecraft, host G Mark Hardy engages in an insightful conversation with Dave Lewis, Global Advisory CISO from 1Password, about AI governance and its importance in cybersecurity. They discuss AI policy and its implications, the evolving nature of AI and cybersecurity, and the critical need for governance frameworks to manage AI safely and securely. The discussion delves into the visibility challenges, shadow AI, the role of credentials, and the importance of maintaining fundamental security practices amidst rapid technological advancements. They also touch on the potential risks associated with AI, the misconceptions about its impact on jobs, and the need for a balanced approach to leveraging AI in a beneficial manner while safeguarding against its threats. This episode provides valuable guidance for cybersecurity professionals and organizations navigating the complexities of AI governance. Chapters 00:00 Introduction to AI Governance 00:30 Guest Introduction: Dave Lewis 00:49 The Importance of AI Governance 01:42 Challenges in AI Implementation 03:20 AI in the Modern Enterprise 03:49 Shadow AI and Security Concerns 04:49 AI's Impact on Jobs and Industry 05:27 The Gartner Hype Cycle and AI 05:43 AI's Influence on the Stock Market 06:14 Historical Context of AI 06:32 AI and Credential Security 08:29 The Role of Governance in AI 12:47 The Future of AI and Security 18:36 Governance and Policy Recommendations 19:26 AI Governance and Ethical Concerns 20:01 AI Self-Preservation and Human Safety 20:18 Uncontrollable AI Applications 21:17 Vectors of AI Trouble 21:58 AI Hallucinations and Data Security 22:53 AI Vulnerabilities and Exploits 26:29 Deepfakes and AI Misuse 27:33 Historical Cybersecurity Incidents 29:04 Future of AI and Job Security 33:47 Managing AI Identities and Credentials 34:21 Conclusion and Final Thoughts
My guest today is Harish Chandramowli, Co-founder & CTO of Flair software.In this conversation, Harish talks about his journey from his early university days in India at Amrita University to leading roles in major companies like Bloomberg and MongoDB. He articulates his shift to a niche field combining software engineering with security, his experience at Johns Hopkins University, and his eventual move into cloud security engineering. Harish shares insightful narratives about his founding a small startup and the creation and development of Flair, a fashion tech platform, highlighting the challenges and triumphs he encountered. Topics include his approach to managing remote teams, dealing with the pressures of startup life, the challenges of prioritization, and maintaining a work-life balance. Harish also discusses the importance of understanding customer needs and integrating AI and security in product development.Some of the topics covered are:Introduction and Early CareerGraduate Studies and Early Professional ExperienceCareer at Bloomberg and MongoDBStartup Journey and MongoDB ExperienceTransition to Flair and Early ChallengesInsights on Security and AIBuilding Flair and Remote Team ManagementEmpowering Engineers Through Customer InteractionChallenges of Managing Remote TeamsRetention and Team DynamicsBalancing Startup Pressures and Personal GrowthNavigating the Fashion Industry's Legal LandscapeBuilding Global Products from IndiaStaying Grounded Amidst Startup ChallengesHarish Chandramowli is a second-time founder who started his career in deeply technical roles—building cloud infrastructure and security at MongoDB. Over time, he evolved from shipping code to selling ideas—learning the language of customers, diving into sales-led discovery, and translating that into product strategy. Today, Harish blends technical depth with commercial instinct to build tools that solve real operational pain with clarity and impact
Worried about securing data in the cloud? This session unpacks Domain 2 of the CCSP exam—Cloud Data Security. Learn how to protect, classify, and manage sensitive data across its entire lifecycle. Build both exam confidence and job-ready cloud security skills.
How do you secure your organization's data to let AI technologies work safely? Richard chats with Martina Grom about her experiences helping sysadmins responsibly bring the power of Microsoft M365 Copilot into their organizations. Martina discusses setting up security and monitoring with tools like Microsoft Purview, enabling visibility into where copilots are working and who is using them. Once the measuring tools are in place, you can begin to establish limitations for the AI without compromising regular employee workflows. Check the show links for a list of great tools you can use to get M365 Copilot working for your organization safely!LinksGovernance Toolkit 365EU AI ActData, Privacy, and Security for Microsoft 365 CopilotTranslating with CopilotConfiguring SharePoint with Entra IDMicrosoft PurviewData Loss PreventionMicrosoft Purview Compliance ManagerData Security Posture Management for AISharePoint Advanced ManagementCopilot in Microsoft 365 Admin CentersRecorded July 16, 2025
In this episode of Bulletproof Your Marketplace, Jeremy Gottschalk is joined by Stephen Fusco, Data Privacy Officer and Senior Counsel at Danone North America, as they meet to analyze a new chapter of the book Bulletproof Your Marketplace, focusing on Data Privacy and Data Security — Policies and Practices. Stephen shares lessons from real-world breaches and compliance challenges, offering practical guidance on data mapping, minimizing collection, building strong governance structures, and avoiding common mistakes that can lead to costly lawsuits. They also explore the fragmented U.S. regulatory landscape, consumer consent, privacy notices, cookie policies, and the risks of neglecting these essentials. This episode delivers actionable takeaways to help marketplace operators build a safer, more resilient platform while reducing exposure to regulatory penalties, class actions, and reputational damage.
After many months of making fun of the term "vibe coding," Emily and Alex tackle the LLMs-as-coders fad head-on, with help from security researcher Susanna Cox. From one person's screed that proclaims everyone not on the vibe-coding bandwagon to be crazy, to the grandiose claim that LLMs could be the "opposable thumb" of the entire world of computing. It's big yikes, all around.Susanna Cox is a consulting AI security researcher and a member of the core author team at OWASP AI Exchange.References:My AI Skeptic Friends Are All NutsLLMs: the opposable thumb of computingA disastrous day in the life of a vibe coderAlso referenced:Signal president Meredith Whittaker on the fundamental security problem with agentic AIThe "S" in MCP stands for securityOur Opinions Are Correct: The Turing Test is BullshitAI Hell:Sam Altman: The (gentle) singularity is already hereWhat do the boosters think reading is, anyway?Meta's climate model made up fake CO2 removal ideasOngoing lawsuit means all your ChatGPT conversations will be saved"Dance like you're part of the training set"Some Guy tries to mansplain Signal to…Signal's presidentWSJ headline claims ChatGPT "self-reflection", gets dunkedCheck out future streams at on Twitch, Meanwhile, send us any AI Hell you see.Our book, 'The AI Con,' is out now! Get your copy now.Subscribe to our newsletter via Buttondown. Follow us!Emily Bluesky: emilymbender.bsky.social Mastodon: dair-community.social/@EmilyMBender Alex Bluesky: alexhanna.bsky.social Mastodon: dair-community.social/@alex Twitter: @alexhanna Music by Toby Menon.Artwork by Naomi Pleasure-Park. Production by Christie Taylor.
In this episode, Craig Jeffery and Brian Weeks explore homomorphic encryption, an emerging encryption method that allows data to be processed while still encrypted. They discuss how it works, why it matters, and potential future applications in finance, benchmarking, and fraud detection. When will it become relevant to treasury? Listen in for a forward-looking perspective. For a deeper technical dive, check out these videos: https://youtu.be/SEBdYXxijSo https://youtu.be/lNw6d05RW6E
In this video, Cohesity CEO Sanjay Poonan tells The Forecast about advice he got from Nvidia CEO Jensen Huang that...
Rehan Jalil is the CEO of Securiti, a platform that enables the safe use of data and generative AI. They've raised $156M in funding from investors such as General Catalyst, Mayfield, and others. He was previously the CEO of Elastica, which was acquired for $280M by Bluecoat. Before that, he was the CEO of WiChorus, which was acquired by Tellabs for $180M.Rehan's favorite books: Good to Great (Author: Jim Collins)(00:00) Introduction (02:14) Founding Securiti and the Evolution of Data Privacy(06:08) Why Data Security Needs a Unified Platform(09:32) Scaling Challenges and Product Decisions(13:17) The Role of AI in Data Security(17:20) Navigating the Enterprise Sales Motion(21:56) Go-to-Market Lessons from Elastica to Securiti(25:43) Competing in a Crowded DSPM Market(29:00) Shifting Buyer Personas and GenAI Adoption(32:11) Rapid Fire Round--------Where to find Rehan Jalil: LinkedIn: https://www.linkedin.com/in/rehanjalil/--------Where to find Prateek Joshi: Newsletter: https://prateekjoshi.substack.com Website: https://prateekj.com LinkedIn: https://www.linkedin.com/in/prateek-joshi-infiniteX: https://x.com/prateekvjoshi
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to reflect on a 2006 data breach which served as a cybersecurity wake up call for the Department of Veterans Affairs and the rest of the federal government. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
In this episode Michael, Sarah and Mark talk to Mark Kendrick about Microsoft Sentinel Data Lake. We also cover news about The Open Group - Roles and Glossary standards, Security Adoption Module 5 - Data Security, Microsoft Azure Cloud HSM, WAF and Containers, PostgreSQL and PowerBI, Azure Managed Lustre, and more. Also, Sarah mentions some Developer Security YouTube videos coming out from MS Build!https://aka.ms/azsecpod
AI Chat: ChatGPT & AI News, Artificial Intelligence, OpenAI, Machine Learning
In this episode, Jaeden reviews the funding and promises from company "Confident Security". Claiming that their new "CONFSEC" encryption tool will keep data from being stored (but not seen) by AI.Try AI Box: https://aibox.aiAI Chat YouTube Channel: https://www.youtube.com/@JaedenSchaferJoin my AI Hustle Community: https://www.skool.com/aihustle/aboutYouTube Video: https://youtu.be/A2F7oPX7zZ8Chapters00:00 Introduction to Confident Security02:22 The Importance of Data Security in AI04:42 Confident Securities Innovative Solutions07:51 Future Implications for AI & Security
Are you confident your business can identify fraud before it hits your bottom line? How can you tell if an invoice, ID, or rate confirmation is real or AI-generated? You must listen to this conversation with Chad Capooth of Denim! Chad unpacks the alarming rise in sophisticated fraud across the transportation industry, from AI-generated fake documents and spoofed domains to virtual numbers and identity theft! With fraud tactics evolving every six months, Chad emphasizes that ongoing staff training, layered security, and tools like live ID matching and account verification are no longer optional; they're essential! About Chad Capooth Chad is the VP of Operations at Denim. He brings over 15 years of experience in strategic planning, business growth, and operations leadership. At Denim, he leads operational strategy, leveraging deep expertise in factoring, credit underwriting, and portfolio management to deliver efficient, tech-enabled solutions. Previously, as COO at eCommerce Financing LLC, Chad helped launch innovative products like Revenue Loans and Quick Pay Loans. At Transfac Capital, he advanced operational performance through technology-driven underwriting and automated invoice processing. Chad's earlier roles at Unlimited Working Capital and Enoble Business Capital (formerly National Bankers Trust) cemented his reputation as a leader in financial services innovation. Connect with Chad Website: https://www.denim.com/ Email: ccapooth@denim.com
TeamGroup has launched the P250Q-M80 SSD, a specialized drive that can physically destroy its flash memory by pressing a button. Designed for defense and critical-use scenarios, the drive features a one-click data destruction circuit, complete with LED indicators and functionality that remains intact even during power loss. Although not record-breaking in terms of speed or … Continue reading Self-Destructing SSD for Ultimate Data Security #1832 → The post Self-Destructing SSD for Ultimate Data Security #1832 appeared first on Geek News Central.
In this episode of Rebel Tech, recorded at the Texas Policy Summit 2025, hosts David Dunmoyer and Zach Whiting dive into the intersection of artificial intelligence and criminal justice with expert Christian Cochran from Right on Crime. A former deputy sheriff, Christian shares insights from his groundbreaking research on AI's role in law enforcement, discussing body cameras, license plate readers, firearm detection, and the balance between public safety and civil liberties. From transparency in tech deployment to privacy concerns and the future of AI in policing, this episode explores the promises and perils of emerging technologies in the justice system. Don't miss this engaging conversation on how AI is reshaping criminal justice and what it means for communities nationwide.
TeamGroup has launched the P250Q-M80 SSD, a specialized drive that can physically destroy its flash memory by pressing a button. Designed for defense and critical-use scenarios, the drive features a one-click data destruction circuit, complete with LED indicators and functionality that remains intact even during power loss. Although not record-breaking in terms of speed or … Continue reading Self-Destructing SSD for Ultimate Data Security #1832 → The post Self-Destructing SSD for Ultimate Data Security #1832 appeared first on Geek News Central.
פרק לייב! אבל בדיעבד. לפני שבוע התארחנו ב@מת״מ ושמחנו לקחת חלק בחגיגות השנתיים לקהילה. בנוכחות קהל (בפעם הראשונה) התכבדנו לארח את ד״ר @סתיו אלבר ולשוחח על פרטיות, סודיות והצפנה. סתיו היא חוקרת צפנים ב@טכניון ומהנדסת תוכנה ב@גוגל. מעבר לכך היא גם סופרת ילדים וכתבה את הספרים ״סודות ההצפנה לילדים״, ״בינה מלאכותית לילדים״ וגם ״אלגוריתמים לילדים״. אז על מה דיברנו? - למה צריך אבטחת מידע? - מה ההבדל בין סודיות ופרטיות? - למה הצפנה מקושרת לסייבר? - מה הסיפור עם האניגמה? - מתי התחילו להצפין מידע? - איך שוברים הצפנה? - איך ולמה חוקרת צפנים מתחילה לכתוב ספר ילדים? אחרי שהאזנתם לפרק מוזמנים להצטרף לקבוצת המאזינים שלנו - שם אנחנו מאמתים שאתם לא רובוטים >>> https://chat.whatsapp.com/KwUu8pQsxx220qS7AXv04T תודה ל@הגר על ההזמנה וההזדמנות להקליט פרק בלייב במתחם המקסים בפרק מת״מ! נשמח לשמוע את דעתכם על הפרק בתגובות. פרק 75 - Data Security Hard Reset - הפודקאסט של קהילת Hardware Engineering Israel. פרק זה הוקלט במהלך מלחמת ״חרבות ברזל״. מוזמנים ליצור איתנו קשר במייל podcasthardreset@gmail.com האזנה נעימה. Lior Schermann Yuval Kogan
Back in April, the Department of Justice issued a new rule governing foreign adversary access to U.S. sensitive data. But the complications of the rule and comments from companies motivated DOJ to provide a 90-day grace period for companies to come into compliance. That grace period ends today. Here with more on the rule, the requirements, and what happens next is partner in the Governmental Practice in Shepherd Mullin's Washington, D.C. office, Townsend Bourne.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
The genesis of the podcast show we are releasing today was an article written by Nick Bourke titled “America Can Fix Its Scam Problem. But We Keep Gifting Billions to Transnational Criminals Because It Feels Too Hard” published on April 12, 2025 in Open Banker. We learned from that article about the great work being done by Aspen Institute's National Task Force on Fraud and Scam Prevention. The purpose of the podcast is to describe the work of this Task Force The Aspen Institute states the following about the Task Force: Every day, criminals steal $430 million from American families, with total fraud proceeds reaching $158 billion annually. They are a critical funding source for transnational criminal organizations, fueling drug cartels, human trafficking, and terrorism. Fraud losses reported to the FBI increased 15-fold over roughly the last decade, and the rise of new technologies like AI has made scams more sophisticated and easier to perpetuate to harm American families. The Aspen Institute Financial Security Program launched the National Task Force on Fraud and Scam Prevention in 2024 to develop the first coordinated U.S. national strategy aimed at stopping financial fraud at its root. The guiding purpose of the Task Force is to bring together all parties with an interest in protecting consumers and restoring trust in our financial system. This is the first time such a broad collection of leaders from across government, law enforcement, private industry, and civil society are coming together to develop a nationwide strategy aimed at helping prevent fraud and scams. Our guests on this podcast are: Kate Griffin, Director of Programs, Aspen Institute Financial Security Program and Nick Bourke, Senior Policy Adviser, The Aspen Institute. Our guests covered the following topics: 1. What is the Aspen Institute's Financial Security Program and how did the Aspen Institute come to launch the National Task Force on Fraud and Scam Prevention? Who is participating in the Task Force? Why is such a cross-sector (industry, consumer advocates and government) very important? What is standing in the way of more robust, secure, cross-sector data-sharing today? 2. How big is the fraud and scams problem in the United States right now? How has it changed over time? 3. What are some of the implications of this problem? How should we be thinking about this beyond the consumer-level financial impacts? Where is all this money going, and what does that mean for our national security? How do fraud/scams compare to other forms of organized crime? Why is it so difficult for victims to recover their financial losses? Are there any efforts ongoing in Congress to alleviate this? Despite all the anti-fraud measures, educational resources, and even public media coverage, why do scammers still seem to be gaining ground? What are some of the biggest gaps or weaknesses in the U.S. system that scammers exploit? Are there promising models from other countries or sectors the U.S. can learn from? How is AI changing the landscape of scams — both in how they're perpetrated and how we might stop them? 4. What's the right balance between imposing duties on companies and offering legal safe harbors so they're not afraid to act? 5. Some people still feel a stigma around sharing when they have been the victim of a scam. How do we shift the environment away from victim-blaming and toward support? 6. The Task Force is driving toward developing a "national strategy" for fighting fraud and scams. What are some of the necessary components to make this truly effective? What do you mean by the need for a "national front door for reporting”? 7. Consumer education has to continue playing a role here. What kinds of public awareness campaigns or interventions have proven effective? What kinds of leadership or investment are needed from Congress, the White House, or federal agencies? 8. Are there any incentives that could better align corporate interests around fraud and scam prevention? Are there examples of companies that are leading the way on this issue? 9. What are the Task Force's next steps? When should we expect to hear more about the national strategy that's coming together? Alan Kaplinsky, founder of and former Chair for 25 years of the Consumer Financial Services Group, hosted the podcast show.
Are you struggling to keep up with the rapid pace of growth in cybersecurity sales? Wondering how to build a high-performing go-to-market team without sacrificing consistency or culture? Curious about what it takes to lead and enable teams through hypergrowth while navigating constant change? If so, you'll find answers and inspiration in this episode focused on Sierra, one of the fastest-growing cybersecurity firms on the market.In this conversation we discuss:
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss how the Gulf Cooperation Council (GCC) is strengthening cyber resilience in today's digital age. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
Mark Ericksen, creator of the Elixir LangChain framework, joins the Elixir Wizards to talk about LLM integration in Elixir apps. He explains how LangChain abstracts away the quirks of different AI providers (OpenAI, Anthropic's Claude, Google's Gemini) so you can work with any LLM in one more consistent API. We dig into core features like conversation chaining, tool execution, automatic retries, and production-grade fallback strategies. Mark shares his experiences maintaining LangChain in a fast-moving AI world: how it shields developers from API drift, manages token budgets, and handles rate limits and outages. He also reveals testing tactics for non-deterministic AI outputs, configuration tips for custom authentication, and the highlights of the new v0.4 release, including “content parts” support for thinking-style models. Key topics discussed in this episode: • Abstracting LLM APIs behind a unified Elixir interface • Building and managing conversation chains across multiple models • Exposing application functionality to LLMs through tool integrations • Automatic retries and fallback chains for production resilience • Supporting a variety of LLM providers • Tracking and optimizing token usage for cost control • Configuring API keys, authentication, and provider-specific settings • Handling rate limits and service outages with degradation • Processing multimodal inputs (text, images) in Langchain workflows • Extracting structured data from unstructured LLM responses • Leveraging “content parts” in v0.4 for advanced thinking-model support • Debugging LLM interactions using verbose logging and telemetry • Kickstarting experiments in LiveBook notebooks and demos • Comparing Elixir LangChain to the original Python implementation • Crafting human-in-the-loop workflows for interactive AI features • Integrating Langchain with the Ash framework for chat-driven interfaces • Contributing to open-source LLM adapters and staying ahead of API changes • Building fallback chains (e.g., OpenAI → Azure) for seamless continuity • Embedding business logic decisions directly into AI-powered tools • Summarization techniques for token efficiency in ongoing conversations • Batch processing tactics to leverage lower-cost API rate tiers • Real-world lessons on maintaining uptime amid LLM service disruptions Links mentioned: https://rubyonrails.org/ https://fly.io/ https://zionnationalpark.com/ https://podcast.thinkingelixir.com/ https://github.com/brainlid/langchain https://openai.com/ https://claude.ai/ https://gemini.google.com/ https://www.anthropic.com/ Vertex AI Studio https://cloud.google.com/generative-ai-studio https://www.perplexity.ai/ https://azure.microsoft.com/ https://hexdocs.pm/ecto/Ecto.html https://oban.pro/ Chris McCord's ElixirConf EU 2025 Talk https://www.youtube.com/watch?v=ojL_VHc4gLk Getting started: https://hexdocs.pm/langchain/gettingstarted.html https://ash-hq.org/ https://hex.pm/packages/langchain https://hexdocs.pm/igniter/readme.html https://www.youtube.com/watch?v=WM9iQlQSFg @brainlid on Twitter and BlueSky Special Guest: Mark Ericksen.
Next in Media spoke with Dr. Mark Grether SVP & General Manager, PayPal Ads, on why he thinks the company's 'transaction graph' may be even more powerful than some retailers' data for advertising, and why there's nothing to worry about with a company that has so many people's banking information to use that data for ad targeting.
In this episode of The Tech Leader's Playbook, Avetis Antaplyan interviews Philip Merrick, a seasoned technologist and CEO of pgEdge. They discuss Merrick's journey in the tech industry, the evolution of leadership styles, the importance of building great teams, and the vision behind pgEdge. The conversation also covers the evolution of cloud computing, data security, and fostering a culture of innovation within teams. In this conversation, Phillip Merrick shares his insights on the importance of mentorship in career growth, the key lessons for emerging leaders, and how to stay ahead of technology trends. He emphasizes the significance of building trust and accountability within teams and discusses the exciting potential of AI in leadership. Merrick distills his entrepreneurial philosophy into actionable advice, highlighting the need for adaptability and genuine care for team members.TakeawaysThe web protocols allowed for the automation of information exchange.Leadership styles evolve with experience and challenges faced.A great team is more important than a great idea.Transparency with the team builds trust and commitment.Curiosity drives innovation and problem-solving.Incremental innovation is often more impactful than radical changes.Cloud concentration risk is a growing concern for regulated industries.Data security and compliance are critical in software development.Fostering a culture of curiosity leads to better adaptability.Asking the right questions in interviews reveals a candidate's mindset.Mentorship is crucial for career growth and success.Emerging leaders should focus on articulating mission, vision, and values.Technology must be contextualized within business and societal trends.Building trust is essential for effective teamwork and accountability.AI has the potential to enhance leadership and management practices.Adaptability is key to overcoming challenges in entrepreneurship.Caring for team members fosters loyalty and engagement.Clear communication of company values prevents cultural drift.A strong team culture can be a competitive advantage. Chapters00:00 The Genesis of Innovation04:07 Leadership Evolution and Challenges08:52 Building a Great Team12:00 The Vision Behind pgEdge17:57 Navigating Cloud Evolution20:54 Data Security and Compliance23:55 Fostering Innovation and Adaptability27:38 The Importance of Mentorship in Career Growth31:19 Key Lessons for Emerging Leaders34:07 Staying Ahead of Technology Trends39:43 Building Trust and Accountability in Teams40:44 Exciting Trends in AI and Leadership43:16 Core Entrepreneurial PhilosophyPhillip Merrick's Social Media Links:https://www.linkedin.com/in/phillipmerrick/Phillip Merrick's Website:https://www.pgedge.com/Resources and Links:https://www.hireclout.comhttps://www.podcast.hireclout.comhttps://www.linkedin.com/in/hirefasthireright
Logan sits down with Bipul Sinha, CEO and co-founder of Rubrik and former VC at Lightspeed and Blumberg Capital. Bipul shares what he learned transitioning from investor to founder, why intuition beats expertise, and how he built Rubrik into a category-defining business by betting on uncool ideas. They talk product-market fit in the AI era, what most VCs get wrong today, and why the enterprise IT market is still just getting started. It's a conversation packed with hard-earned wisdom and bold takes on building lasting companies. (00:00) Intro (01:42) Transitioning from VC to Founder (02:27) The Genesis of Rubrik (03:30) Navigating Uncertainty in Business (06:57) Product Market Fit and Early Success (08:56) Evolving with the Market (13:14) AI and Data Security (18:53) Leadership and Intuition (28:34) Building a Transparent Culture (31:52) Handling Tough Questions in Board Meetings (33:28) Changing Perspectives Over Time (34:57) Traits of Successful Entrepreneurs (36:46) The Future of Venture Capital and Startups (40:38) Balancing Forward and Lateral Motion in Business (42:35) The Impact of AI on Various Industries (01:00:28) The Evolution of Work and Technology (01:02:52) Fostering a Collaborative Company Culture (01:04:56) Looking Ahead: The Future of Rubrik Executive Producer: Rashad Assir Producer: Leah Clapper Mixing and editing: Justin Hrabovsky Check out Unsupervised Learning, Redpoint's AI Podcast: https://www.youtube.com/@UCUl-s_Vp-Kkk_XVyDylNwLA