Podcasts about Data security

  • 1,088PODCASTS
  • 2,321EPISODES
  • 35mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • May 20, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Data security

Show all podcasts related to data security

Latest podcast episodes about Data security

Oracle University Podcast
Oracle GoldenGate 23ai Security Strategies

Oracle University Podcast

Play Episode Listen Later May 20, 2025 16:13


GoldenGate 23ai takes security seriously, and this episode unpacks everything you need to know. GoldenGate expert Nick Wagner breaks down how authentication, access roles, and encryption protect your data.   Learn how GoldenGate integrates with identity providers, secures communication, and keeps passwords out of storage. Understand how trail files work, why they only store committed data, and how recovery processes prevent data loss.   Whether you manage replication or just want to tighten security, this episode gives you the details to lock things down without slowing operations.   Oracle GoldenGate 23ai: Fundamentals: https://mylearn.oracle.com/ou/course/oracle-goldengate-23ai-fundamentals/145884/237273 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu   Special thanks to Arijit Ghosh, David Wright, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode.   --------------------------------------------------------------   Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:25 Lois: Hello and welcome to the Oracle University Podcast! I'm Lois Houston, Director of Innovation Programs with Oracle University, and with me is Nikita Abraham, Team Lead: Editorial Services.  Nikita: Welcome, everyone! This is our fourth episode on Oracle GoldenGate 23ai. Last week, we discussed the terminology, different processes and what they do, and the architecture of the product at a high level. Today, we have Nick Wagner back with us to talk about the security strategies of GoldenGate. 00:56 Lois: As you know by now, Nick is a Senior Director of Product Management for GoldenGate at Oracle. He's played a key role as one of the product designers behind the latest version of GoldenGate. Hi Nick! Thank you for joining us again. Can you tell us how GoldenGate takes care of data security? Nick: So GoldenGate authentication and authorization is done in a couple of different ways. First, we have user credentials for GoldenGate for not only the source and target databases, but also for GoldenGate itself. We have integration with third-party identity management products, and everything that GoldenGate does can be secured. 01:32 Nikita: And we must have some access roles, right? Nick: There's four roles built into the GoldenGate product. You have your security role, administrator, operator, and user. They're all hierarchical. The most important one is the security user. This user is going to be the one that provides the administrative tasks. This user is able to actually create additional users and assign roles within the product. So do not lose this password and this user is extremely important. You probably don't want to use this security user as your everyday user. That would be your administrator. The administrator role is able to perform all administrative tasks within GoldenGate. So not only can they go in and create new extracts, create new replicats, create new distribution services, but they can also start and stop them. And that's where the operator role is and the user role. So the operator role allows you to go in and start/stop processes, but you can't create any new ones, which is kind of important. So this user would be the one that could go in and suspend activity. They could restart activity. But they can't actually add objects to replication. The user role is really a read-only role. They can come in. They can see what's going on. They can look at the log files. They can look at the alerts. They can look at all the watches and see exactly what GoldenGate is doing. But they're unable to make any changes to the product itself. 02:54 Lois: You mentioned the roles are hierarchical in nature. What does that mean? Nick: So anything that the user role does can be done by the operator. Anything that the operator and user roles can do can be done by the administrator. And anything that the user, operator, and administrator roles do can be done by the security role. 03:11 Lois: Ok. So, is there a single sign-on available for GoldenGate? Nick: We also have a password plugin for GoldenGate Connections. A lot of customers have asked for integration with whatever their single sign-on utility is, and so GoldenGate now has that with GoldenGate 23ai. So these are customer-created entities. So, we have some examples that you can use in our documentation on how to set up an identity provider or a third-party identity provider with GoldenGate. And this allows you to ensure that your corporate standards are met. As we started looking into this, as we started designing it, every single customer wanted something different. And so instead of trying to meet the needs for every customer and every possible combination of security credentials, we want you to be able to design it the way you need it. The passwords are never stored. They're only retrieved from the identity provider by the plugin itself. 04:05 Nikita: That's a pretty important security aspect…that when it's time to authenticate a user, we go to the identity provider. Nick: We're going to connect in and see if that password is matching. And only then do we use it. And as soon as we detect that it's matched, that password is removed. And then for the extract and replicats themselves, you can also use it for the database, data source, and data target connections, as well as for the GoldenGate users. So, it is a full-featured plugin. So, our identity provider plugin works with IAM as well as OAM. These are your standard identity manager authentication methods. The standard one is OAuth 2, as well as OIDC. And any Identity Manager that uses that is able to integrate with GoldenGate. 04:52 Lois: And how does this work? Nick: The way that it works is pretty straightforward. Once the user logs into the database, we're going to hand off authentication to the identity provider. Once the identity provider has validated that user's identity and their credentials, then it comes back to GoldenGate and says that user is able to log in to either GoldenGate or the application or the database. Once the user is logged in, we get that confirmation that's been sent out and they can continue working through GoldenGate. So, it's very straightforward on how it works. There's also a nice little UI that will help set up each additional user within those systems. All the communication is also secured as well. So any communication done through any of the GoldenGate services is encrypted using HTTPS. All the REST calls themselves are all done using HTTPS as well. All the data protection calls and all the communication across the network when we send data across a distribution service is encrypted using a secure WebSocket. And there's also trail file encryption at the operating system level for data at REST. So, this really gives you the full level of encryption for customers that need that high-end security. GoldenGate does have an option for FIPS 140-2 compliance as well. So that's even a further step for most of those customers. 06:12 Nikita: That's impressive! Because we want to maintain the highest security standards, right? Especially when dealing with sensitive information. I now want to move on to trail files. In our last episode, we briefly spoke about how they serve as logs that record and track changes made to data. But what more can you tell us about them, Nick? Nick: There's two different processes that write to the trail files. The extract process will write to the trail file and the receiver service will write to the trail file. The extract process is going to write to the trail file as it's pulling data out of that source database. Now, the extract process is controlled by a parameter file, that says, hey, here's the exact changes that I'm going to be pulling out. Here's the tables. Here's the rows that I want. As it's pulling that data out and writing it to the trail files, it's ensuring that those trail files have enough information so that the replicat process can actually construct a SQL statement and apply that change to that target platform. And so there's a lot of ways to change what's actually stored in those trail files and how it's handled. The trail files can also be used for initial loads. So when we do the initial load through GoldenGate, we can grab and write out the data for those tables, and that excludes the change data. So initial loads is pulling the data directly from the tables themselves, whereas ongoing replication is pulling it from the transaction logs. 07:38 Lois: But do we need to worry about rollbacks? Nick: Our trail files contain committed data only and all data is sequential. So this is two important things. Because it contains committed data only, we don't need to worry about rollbacks. We also don't need to worry about position within that trail file because we know all data is sequential. And so as we're reading through the trail file, we know that anything that's written in a prior location in that trial file was committed prior to something else. And as we get into the recovery aspects of GoldenGate, this will all make a lot more sense. 08:13 Lois: Before we do that, can you tell us about the naming of trail files? Nick: The trail files as far as naming, because these do reside on the operating system, you start with a two-letter trail file abbreviation and then a nine-digit sequential value. So, you almost look at it as like an archive log from Oracle, where we have a prefix and then an affix, which is numeric. Same kind of thing. So, we have our two-letter, in this case, an ab, and then we have a nine-digit number. 08:47 Transform the way you work with Oracle Database 23ai! This cutting-edge technology brings the power of AI directly to your data, making it easier to build powerful applications and manage critical workloads. Want to learn more about Database 23ai? Visit mylearn.oracle.com to pick from our range of courses and enroll today! 09:12 Nikita: Welcome back! Ok, Nick. Let's get into the GoldenGate recovery process. Nick: When we start looking at the GoldenGate recovery process, it essentially makes GoldenGate kind of point-in-time like. So on that source database, you have your extract process that's going to be capturing data from the transaction logs. In the case of Oracle, the Oracle Database is actually going to be reading those transaction logs from us and passing the change records directly to GoldenGate. We call them an LCR, Logical Change Record. And so the integrated extract and GoldenGate, the extract portion tells the database, hey, I'm now going to be interested in the following list of tables. And it gives a list of tables to that internal component, the log mining engine within the database. And it says, OK, I'm now pulling data for those tables and I'm going to send you those table changes. And so as the extract process gets sent those changes, it's going to have checkpoint information. So not only does it know where it was pulling data from out of that source database, but what it's also writing to the trail file. The trail files themselves are all sequential and they have only committed data, as we talked about earlier. The distribution service has checkpoint information that says, hey, I know where I'm reading from in the previous trail file, and I know what I've sent across the network. The receiver service is the same thing. It knows what it's receiving, as well as what it's written to the trail file and the target system. The replicat also has a checkpoint. It knows where it's reading from in the trail file, and then it knows what it's been applying into that target database.  This is where things start to become a little complicated. Our replicat process in most cases are parallel, so it'll have multiple threads applying data into that target database. Each of those threads is applying different transactions. And because of the way that the parallelism works in the replicat process, you can actually get situations where one replicat thread might be applying a transaction higher than another thread. And so you can eliminate that sequential or serial aspect of it, and we can get very high throughput speeds to the replicat. But it means that the checkpoint needs to be kind of smart enough to know how to rebuild itself if something fails. 11:32 Lois: Ok, sorry Nick, but can you go through that again? Maybe we can work backwards this time?  Nick: If the replicat process fails, when it comes back up, it's going to look to its checkpoint tables inside that target database. These checkpoint tables keep track of where each thread was at when it crashed. And so when the replicat process restarts, it goes, oh, I was applying these threads at this location in these SCNs. It'll then go and read from the trail file and say, hey, let me rebuild that data and it only applies transactions that it hasn't applied yet to that target system. There is a synchronized replicat command as well that will tell a crashed replicat to say, hey, bring all your threads up to the same high watermark. It does that process automatically as it restarts and continues normal replication. But there is an option to do it just by itself too. So that's how the replicat kind of repairs and recovers itself. It'll simply look at the trail files. Now, let's say that the replicat crashed, and it goes to read from the trail files when it restarts and that trail profile is missing. It'll actually communicate to the distribution, or excuse me, to the receiver service and say, hey, receiver service, I don't have this trail file. Can you bring it back for me? And the receiver service will communicate downstream and say, hey, distribution service, I need you to resend me trail find number 6. And so the distribution service will resend that trail file so that the replicat can reprocess it. So it's often nice to have redundant environments with GoldenGate so we can have those trail files kind of around for availability. 13:13 Nikita: What if one of these files gets corrupted? Nick: If one of those trail files is corrupt, let's say that a trail file on the target site became corrupt and the replicat can't read from it for one reason or another. Simply stop the replicat process, delete the corrupt trail file, restart the replicat process, and now it's going to rebuild that trail file from scratch based on the information from the source GoldenGate environment. And so it's very recoverable. Handles it all very well. 13:40 Nikita: And can the extract process bounce back in the same way? Nick: The extract process can also recover in a similar way. So if the extract process crashes, when it restarts itself, there's a number of things that it does. The first thing is it has to rebuild any open transactions. So it keeps all sorts of checkpoint information about the oldest transaction that it's keeping track of, any open transactions that haven't been committed, and any other transactions that have been committed that it's already written to the trail file. So as it's reprocessing that data, it knows exactly what it's committed to trail and what hasn't been committed. And there's a number of ways that it does this.  There's two main components here. One of them is called bounded recovery. Bounded recovery will allow you to set a time limit on transactions that span a certain length of time that they'll actually get flushed out to disk on that GoldenGate Hub. And that way it'll reduce the amount of time it takes GoldenGate to restart the extract process. And the other component is cache manager. Cache manager stores uncommitted transactions. And so it's a very elegant way of rebuilding itself from any kind of failure. You can also set up restart profiles so that if any process does crash, the GoldenGate service manager can automatically restart that service an x number of times across y time span. So if I say, hey, if my extract crashes, then attempt to restart it 100 times every 5 seconds. So there's a lot of things that you can do there to make it really nice and automatic repair itself and automatically resilient.  15:18 Lois: Well, that brings us to the end of this episode. Thank you, Nick, for going through the security strategies and recovery processes in such detail. Next week, we'll look at the installation of GoldenGate. Nikita: And if you want to learn more about the topics we discussed today, head over to mylearn.oracle.com and take a look at the Oracle GoldenGate 23ai Fundamentals course. Until next time, this is Nikita Abraham… Lois: And Lois Houston signing off! 15:44 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.

The Ravit Show
Data Security, AI Governance and much more

The Ravit Show

Play Episode Listen Later May 12, 2025 13:31


How should organizations protect data in the AI era? At Gartner Data & Analytics Summit in Orlando, security and data governance are top of mind. I spoke with Murali Balakrishnan, Data Security Expert, and Ganesh Kirti (Hiring), CEO of TrustLogix, about the biggest security challenges organizations face today.We discussed data access governance, AI data protection strategies, and the guardrails needed for secure data movement across cloud and on-prem environments. Murli also shared insights on how data platform owners can collaborate effectively with security teams.#GartnerDA #GenAI #GartnerOrlando2025 #theravitshow

The QCS Podcast
The Care Social Podcast Ep 13: What Social Care Providers Need to Know About Cyber Security and AI – with Michelle Corrigan

The QCS Podcast

Play Episode Listen Later May 12, 2025 31:17


Cyber security is no longer a future concern – it's a challenge facing social care providers right now.In this episode of The Care Social podcast, we speak to Michelle Corrigan, Programme Director at Digital Care Hub and NHS Cyber Leader of the Year, about the real risks – and opportunities – of going digital in social care.Michelle explains why data security matters so much in care, how AI is really being used, and what providers can do today to improve their cyber resilience, meet DSPT requirements, and protect the people they support.In this episode:What cyber security means for social care providersHow to protect personal care data from cyber threatsSimple steps to improve digital safety and readinessWhat AI can and can't do in a care settingWhy completing the Data Security and Protection Toolkit (DSPT) is so important – and easier than you thinkThis is a must-listen for registered managers, care home owners, supported living providers, and anyone interested in safer digital care.

TD Ameritrade Network
AVPT Powers Ahead: Growth Driven by Data Security & A.I. Demand

TD Ameritrade Network

Play Episode Listen Later May 9, 2025 7:39


Avepoint (AVPT) had a strong quarter, with over 20% year-over-year growth in all three regions and customer segments. CFO Jim Caci credits the company's focus on profitable growth and controlling what it can in an uncertain environment. He also highlights the growing importance of data security, governance, and resilience, particularly in the Microsoft (MSFT), Alphabet (GOOGL), and Salesforce (CRM) environments where Avepoint operates.======== Schwab Network ========Empowering every investor and trader, every market day.Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about

Artificial Intelligence in Industry with Daniel Faggella
Navigating Challenges and Solutions in Data Security with AI - with Dimitri Sirota of BigID

Artificial Intelligence in Industry with Daniel Faggella

Play Episode Listen Later May 8, 2025 29:28


As enterprises double down on generative AI initiatives, the intersection of data security, privacy, and unstructured data is quickly becoming mission-critical. In this episode, Dimitri Sirota, Co-founder and CEO of BigID, joins the podcast to explore how AI transformation is reshaping enterprise data governance, security, and compliance—and why understanding your “crown jewel” data is essential to building trustworthy AI systems. Dimitri outlines the three major forces driving today's enterprise data challenges: accelerated cloud migration, a rising tide of global data privacy regulations, and the explosion of generative AI tools that rely on sensitive, unstructured data. He explains how enterprises can gain visibility into their AI programs and the data fueling them, mitigate shadow AI risks, and prepare for the next wave of agentic systems by adopting zero-trust models and real-time monitoring strategies. This episode is sponsored by BigID. Learn how BigID helps enterprises govern AI, mitigate data risk, and stay compliant here.

Afternoon Drive with John Maytham
Factory reset fallacy: Why your data's is still at risk

Afternoon Drive with John Maytham

Play Episode Listen Later May 7, 2025 7:55


John Maytham is joined by Tech Journalist and Editor and Publisher of Stuff, Toby Shapshak, to unpack the hidden risks of discarding or selling old electronic devices. Despite factory resets, studies show that personal data — including passports, medical records, and passwords — often remains recoverable on second-hand electronics. Follow us on:CapeTalk on Facebook: www.facebook.com/CapeTalkCapeTalk on TikTok: www.tiktok.com/@capetalkCapeTalk on Instagram: www.instagram.com/capetalkzaCapeTalk on YouTube: www.youtube.com/@CapeTalk567CapeTalk on X: www.x.com/CapeTalkSee omnystudio.com/listener for privacy information.

Microsoft Mechanics Podcast
Unified data access & security with OneLake

Microsoft Mechanics Podcast

Play Episode Listen Later May 6, 2025 8:33 Transcription Available


Unify and secure your data—no matter where it lives—without sacrificing control using OneLake security, part of Microsoft Fabric. With granular permissions down to the row, column, and table level, you can confidently manage access across engines like Power BI, Spark, and T-SQL, all from one place. Discover, label, and govern your data with clarity using the integrated OneLake catalog that surfaces the right items fast. Aaron Merrill, Microsoft Fabric Principal Program Manager, shows how you can stay in control, from security to discoverability—owning, sharing, and protecting data on your terms. ► QUICK LINKS: 00:00 - OneLake & Microsoft Fabric core concepts 01:28 - Table level security 02:11 - Column level security 03:06 - Power BI report 03:28 - Row level security 04:23 - Data classification options 05:19 - OneLake catalog 06:22 - View and manage data 06:48 - Governance 07:36 - Microsoft Fabric integration 07:59 - Wrap up ► Link References Check out our blog at https://aka.ms/OneLakeSecurity Sign up for a 60-day free trial at https://fabric.microsoft.com ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics  

Microsoft Mechanics Podcast
Data security for agents and 3rd party AI in Microsoft Purview

Microsoft Mechanics Podcast

Play Episode Listen Later May 6, 2025 9:46 Transcription Available


Stay in control as GenAI adoption accelerates across your organization using Data Security Posture Management for AI in Microsoft Purview. With built-in visibility into how AI apps and agents interact with sensitive data—whether inside Microsoft 365 or across unmanaged consumer tools—you can detect risks early, take decisive action, and enforce the right protections without slowing innovation. Monitor usage trends, investigate prompts and responses, and respond to potential data oversharing or policy violations in real time. From compliance-ready audit logs to adaptive data protection, you'll have the insights and tools to keep data secure as AI becomes a part of everyday work. Shilpa Ranganathan, Microsoft Purview Principal Group PM, shares how to balance GenAI innovation with enterprise-grade data governance and security. ► QUICK LINKS: 00:00 - GenAI app security, governance, & compliance 01:30 - Take Action with DSPM for AI 02:08 - Activity logging 02:32 - Control beyond Microsoft services 03:09 - Use DSPM for AI to monitor data risk 05:06 - ChatGPT Enterprise 05:36 - Set AI Agent guardrails using DSPM for AI 06:44 - Data oversharing 08:30 - Audit logs 09:19 - Wrap up ► Link References Check out https://aka.ms/SecureGovernAI ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft.  • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics  

Cybercrime Magazine Podcast
Data Security. OCC Suffers Major Cyber Breach. Scott Schober, Author, "Hacked Again."

Cybercrime Magazine Podcast

Play Episode Listen Later May 2, 2025 18:12


Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss a cyberattack on The Office of the Comptroller of the Currency. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com

The MongoDB Podcast
EP. 264 Beyond the Database: Mastering Multi-Cloud Data, AI Automation & Integration (feat. Peter Ngai, SnapLogic)

The MongoDB Podcast

Play Episode Listen Later May 1, 2025 58:31


✨ Heads up! This episode features a demonstration of the SnapLogic UI and its AI Agent Creator towards the end. For the full visual experience, check out the video version on the Spotify app! ✨(Episode Summary)Tired of tangled data spread across multiple clouds, on-premise systems, and the edge? In this episode, MongoDB's Shane McAllister sits down with Peter Ngai, Principal Architect at SnapLogic, to explore the future of data integration and management in today's complex tech landscape.Dive into the challenges and solutions surrounding modern data architecture, including:Navigating the complexities of multi-cloud and hybrid cloud environments.The secrets to building flexible, resilient data ecosystems that avoid vendor lock-in.Strategies for seamless data integration and connecting disparate applications using low-code/no-code platforms like SnapLogic.Meeting critical data compliance, security, and sovereignty demands (think GDPR, HIPAA, etc.).How AI is revolutionizing data automation and providing faster access to insights (featuring SnapLogic's Agent Creator).The powerful synergy between SnapLogic and MongoDB, leveraging MongoDB both internally and for customer integrations.Real-world applications, from IoT data processing to simplifying enterprise workflows.Whether you're an IT leader, data engineer, business analyst, or simply curious about cloud strategy, iPaaS solutions, AI in business, or simplifying your data stack, Peter offers invaluable insights into making data connectivity a driver, not a barrier, for innovation.-Keywords: Data Integration, Multi-Cloud, Hybrid Cloud, Edge Computing, SnapLogic, MongoDB, AI, Artificial Intelligence, Data Automation, iPaaS, Low-Code, No-Code, Data Architecture, Data Management, Cloud Data, Enterprise Data, API Integration, Data Compliance, Data Sovereignty, Data Security, Business Automation, ETL, ELT, Tech Stack Simplification, Peter Ngai, Shane McAllister.

Corruption Crime & Compliance
DOJ Issues Data Security Program Requirements

Corruption Crime & Compliance

Play Episode Listen Later Apr 28, 2025 19:17


Could your routine data transfers now violate federal law? The DOJ's new Data Security Program (DSP) targets the flow of U.S. sensitive personal and government data to foreign adversaries — and the clock is ticking. In this episode of Corruption, Crime and Compliance, Michael Volkov breaks down the Justice Department's sweeping new Data Security Program, enacted under Executive Order 14117 and finalized in January 2025.You'll hear him discuss:The origins of the DSP, created through Executive Order 14117 under the Trump Administration, and the key national security concerns it addresses.What constitutes a “covered data transaction” and the thresholds for U.S. personal and government data that trigger compliance obligations.The list of “countries of concern” and what it means for companies doing business with entities tied to these regions.The types of U.S. data covered by the DSP, including biometric, genomic, financial, and geolocation data, and the specific quantity thresholds that trigger restrictions.Why data brokerage and bulk human genomic data transactions are prohibited outright, raising new compliance challenges for affected industries.How “restricted transactions” like cloud computing services and vendor agreements are subject to conditional exceptions under the DSP.The critical actions U.S. companies must take during the 90-day enforcement hiatus, including vendor assessments, renegotiations, and compliance system updates before the July 8th deadline.ResourcesMichael Volkov on LinkedIn | TwitterThe Volkov Law Group

IpX True North Podcast
AI Readiness Workshop: Demystifying AI with Avishkar Misra of Berrijam AI

IpX True North Podcast

Play Episode Listen Later Apr 28, 2025 35:08 Transcription Available


Dr. Avishkar Misra shares his expertise on implementing AI effectively in businesses and explains how his company Berrijam is making AI accessible, explainable, and useful for organizations of all sizes.• AI is not just one solution but a set of tools, techniques, and frameworks that allows for intelligent decision-making at various scales• Berrijam offers three main services: AI strategy development, custom AI implementation, and their proprietary BerryJam AI focused on analytical applications• The Berrijam AI5C framework breaks down AI capabilities into five areas: Find, Make, Connect, Predict, and Optimize• Organizations need to start with their specific pain points and business requirements before selecting AI tools or implementation strategies• AI will transform jobs rather than simply eliminate them, creating opportunities for those who learn to work alongside AI• Leadership plays a critical role in successful AI adoption by fostering the right cultural framework and strategic approach• The future workplace will see AI handling mundane tasks, allowing professionals to focus on higher-value creative work• The IPX-hosted AI Readiness Workshops will help participants understand AI fundamentals, build business cases, and develop implementation strategiesStay in touch with us! Follow us on social: LinkedIn, Twitter, Facebook Contact us for info on IpX or for interest in being a podcast guest: info@ipxhq.com All podcasts produced by Elevate Media Group.

Brilliance Security Magazine Podcast
Reclaiming Control: Smarter Data Security for AI Era Challenges

Brilliance Security Magazine Podcast

Play Episode Listen Later Apr 28, 2025 22:59


In Episode S7E7, Steven welcomes Glenn Day, CEO of NVISIONx, to discuss data risk intelligence and emerging threats in the age of AI and complex data environments. Glenn shares insights on data governance, the importance of proper data organization for AI adoption, and how NVISIONx helps organizations manage and purge data responsibly. The conversation underscores the significance of intelligent data classification in cybersecurity and the need for collaborative data governance across departments to achieve enhanced protection, compliance, and a competitive edge through AI models.

HPE Tech Talk
What is sovereignty in AI?

HPE Tech Talk

Play Episode Listen Later Apr 24, 2025 23:40


 What does it mean for artificial intelligence to be sovereign? This week, Technology Now explores how more than just data can be sovereign, our AI models using the data can be too. We ask what it actually means for AI models to be sovereign and why companies, and indeed entire countries, would be interested in this concept. Andreas Geiss, Vice-President Automotive & Manufacturing at Aleph Alpha tells us more. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.Andreas Geiss: https://www.linkedin.com/in/andreas-geissSources cited in this week's episode:Data Privacy Framework:https://www.dataprivacyframework.gov/Program-Overviewhttps://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/eu-us-data-transfer-challenges.html Photonic chips: Ahmed, S.R., Baghdadi, R., Bernadskiy, M. et al. Universal photonic artificial intelligence acceleration. Nature 640, 368–374 (2025). https://doi.org/10.1038/s41586-025-08854-xhttps://www.reuters.com/science/lightmatter-shows-new-type-computer-chip-that-could-reduce-ai-energy-use-2025-04-09/History of the cordless home phone:https://www.britishtelephones.com/hawk.htmhttp://www.samhallas.co.uk/repository/sales/cp-ms_43.pdf 

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise

 What does it mean for artificial intelligence to be sovereign? This week, Technology Now explores how more than just data can be sovereign, our AI models using the data can be too. We ask what it actually means for AI models to be sovereign and why companies, and indeed entire countries, would be interested in this concept. Andreas Geiss, Vice-President Automotive & Manufacturing at Aleph Alpha tells us more. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.Andreas Geiss: https://www.linkedin.com/in/andreas-geissSources cited in this week's episode:Data Privacy Framework:https://www.dataprivacyframework.gov/Program-Overviewhttps://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/eu-us-data-transfer-challenges.html Photonic chips: Ahmed, S.R., Baghdadi, R., Bernadskiy, M. et al. Universal photonic artificial intelligence acceleration. Nature 640, 368–374 (2025). https://doi.org/10.1038/s41586-025-08854-xhttps://www.reuters.com/science/lightmatter-shows-new-type-computer-chip-that-could-reduce-ai-energy-use-2025-04-09/History of the cordless home phone:https://www.britishtelephones.com/hawk.htmhttp://www.samhallas.co.uk/repository/sales/cp-ms_43.pdf 

HPE Tech Talk, SMB
What is sovereignty in AI?

HPE Tech Talk, SMB

Play Episode Listen Later Apr 24, 2025 23:40


 What does it mean for artificial intelligence to be sovereign? This week, Technology Now explores how more than just data can be sovereign, our AI models using the data can be too. We ask what it actually means for AI models to be sovereign and why companies, and indeed entire countries, would be interested in this concept. Andreas Geiss, Vice-President Automotive & Manufacturing at Aleph Alpha tells us more. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.Andreas Geiss: https://www.linkedin.com/in/andreas-geissSources cited in this week's episode:Data Privacy Framework:https://www.dataprivacyframework.gov/Program-Overviewhttps://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/eu-us-data-transfer-challenges.html Photonic chips: Ahmed, S.R., Baghdadi, R., Bernadskiy, M. et al. Universal photonic artificial intelligence acceleration. Nature 640, 368–374 (2025). https://doi.org/10.1038/s41586-025-08854-xhttps://www.reuters.com/science/lightmatter-shows-new-type-computer-chip-that-could-reduce-ai-energy-use-2025-04-09/History of the cordless home phone:https://www.britishtelephones.com/hawk.htmhttp://www.samhallas.co.uk/repository/sales/cp-ms_43.pdf 

Command Control Power: Apple Tech Support & Business Talk
614: Navigating AI in IT Consulting: Insights from Michael Thomsen of Origin 84

Command Control Power: Apple Tech Support & Business Talk

Play Episode Listen Later Apr 22, 2025 58:46


Navigating AI in IT Consulting: Insights from Michael Thomsen   In this episode of Command Control Power, hosts welcome Michael Thomsen of Origin 84, dialing in from Australia. Michael shares critical insights into the use of AI in IT consulting. Topics range from the pros and cons of binge-listening to tech podcasts to the practical uses of AI tools like ChatGPT and Google's Gemini. Michael emphasizes the importance of balancing automation with human interaction, sharing examples of how AI can enhance efficiency, such as generating meeting summaries, handling complex client requests, and improving ticketing systems. The discussion also touches on the risks of data leakage, the necessity of well-defined policies, and the future implications of AI in both enhancing productivity and posing security challenges.   00:00 Introduction and Guest Welcome 00:36 Listener Feedback and Follow-Up 02:41 AI Tools in Daily Work 05:51 AI Integration in Business 09:08 Real-World AI Use Cases 13:52 Challenges and Best Practices with AI 23:50 AI in Education and Policy 27:22 Understanding AI Policies and Data Leakage 28:28 Balancing AI Empowerment and Security Risks 29:21 Credential Stuffing and Security Examples 30:49 Implementing Effective AI Policies 32:10 Microsoft Tools for Data Security 35:03 Challenges in Modern Security Practices 39:14 Leveraging AI for Productivity 42:09 AI in Client Communication and Ticketing 47:48 The Human Element in AI Integration 51:32 Concluding Thoughts on AI and Security

Data Security Decoded
The State of Data Security: A Distributed Crisis

Data Security Decoded

Play Episode Listen Later Apr 22, 2025 28:25


Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. Join our host Caleb Tolin and Head of Rubrik Zero Labs Joe Hladik as they dive deep into the evolving landscape of cybersecurity, from incident response to emerging threats. Joe shares insights from two decades of experience, including his work on high-profile cases like the SolarWinds breach, and breaks down the complex relationship between nation-state actors and cybercrime. Learn about the challenges of data sprawl, identity management, and why treating identity as the new perimeter isn't as simple as it seems. Joe also shares insights into the new report from Rubrik Zero Labs, The State of Data Security: A Distributed Crisis. Whether you're a security practitioner or executive, this episode offers valuable perspectives on data security posture management and the future of threat detection.

Microsoft Mechanics Podcast
Microsoft Purview protections for Copilot

Microsoft Mechanics Podcast

Play Episode Listen Later Apr 22, 2025 9:11 Transcription Available


Use Microsoft Purview and Microsoft 365 Copilot together to build a secure, enterprise-ready foundation for generative AI. Apply existing data protection and compliance controls, gain visibility into AI usage, and reduce risk from oversharing or insider threats. Classify, restrict, and monitor sensitive data used in Copilot interactions. Investigate risky behavior, enforce dynamic policies, and block inappropriate use—all from within your Microsoft 365 environment.  Erica Toelle, Microsoft Purview Senior Product Manager, shares how to implement these controls and proactively manage data risks in Copilot deployments.  ► QUICK LINKS: 00:00 - Microsoft Purview controls for Microsoft 365 Copilot 00:32 - Copilot security and privacy basics 01:47 - Built-in activity logging 02:24 - Discover and Prevent Data Loss with DSPM for AI 04:18 - Protect sensitive data in AI interactions 05:08 - Insider Risk Management 05:12 - Monitor and act on inappropriate AI use 07:14 - Wrap up ► Link References Check out https://aka.ms/M365CopilotwithPurview Watch our show on oversharing at https://aka.ms/OversharingMechanics ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics  

Shoot Your Shot
Photographer turned away at the Canada US Border

Shoot Your Shot

Play Episode Listen Later Apr 21, 2025 53:08


Lindsay and Tim discuss the implications of new border control regulations affecting Canadians traveling to the U.S. They explore the impact of these changes on travel preferences, the economy, and the challenges faced by content creators at the border. The episode features a story about a photographer's experience with border regulations and insights from immigration experts, culminating in a discussion about environmental initiatives related to border control. In this episode, the conversation delves into the complexities of traveling across the US-Canada border, particularly for Canadians. The speakers discuss the shift in travel motivations, the rights and powers of border officials, and the implications of discrimination at the border. They also explore the legalities surrounding work permits and the risks associated with crossing borders for work without proper documentation. Practical tips for travellers, especially photographers, are provided to navigate these challenges effectively. In this episode, the hosts discuss the intricacies of traveling as a photographer, focusing on privacy concerns, customs regulations, and the ethical dilemmas faced when crossing borders with equipment. They share personal anecdotes, including a cautionary tale about a friend who faced serious consequences due to his actions while traveling for work. The conversation highlights the importance of understanding border security protocols and the implications of carrying new gear, as well as the psychological attachment to packaging and the need for ethical behaviour in the photography industry.   Want us to feature your question, photography story, or industry hot take on an episode? Send us a DM, voice note, or video on instagram @TheShootYourShotPodcast. Your privacy is important to us. If you want to remain anonymous just let us know :)   Sign up with Imagen AI to streamline your photo editing and get 1500 edits free! Sign up below for this rad AF offer: https://tinyurl.com/mt46dz6n   Become an IG reel-creating machine with Social Templates! with Promo code: LINDSAY. socialtemplates.co/lindsay Chapters 00:00 Introduction to Border Control and Its Relevance 04:00 Impact on Canadian Travelers and Economy 07:58 Content Creation and Border Control Challenges 11:49 Environmental Initiatives and Border Regulations 16:00 Summary of Key Takeaways and Closing Thoughts 17:24 Traveling Across Borders: The New Normal 18:35 Understanding Border Powers and Rights 21:00 The Reality of Border Searches and Detentions 24:42 Discrimination at the Border: A Personal Perspective 27:00 Navigating Legalities of Cross-Border Work 30:31 The Risks of Working Without a Visa 32:50 Tips for Traveling as a Tourist with Gear 35:27 Navigating Privacy and Data Security at Borders 36:50 Understanding Border Agent Scrutiny for Photographers 38:44 Traveling with Equipment: What to Know 40:00 Crossing Borders: Regulations for Photographers 41:43 The Dilemma of New Gear and Customs 43:30 The Psychological Attachment to Packaging 45:19 A Cautionary Tale: The Photographer's Misadventures 51:33 Lessons Learned: Ethics and Border Security      

Cybercrime Magazine Podcast
AI, Data Security, & The CISO's Evolving Role. Insights From Varonis. Yaki Faitelson, Varonis.

Cybercrime Magazine Podcast

Play Episode Listen Later Apr 20, 2025 8:19


Yaki Faitelson is the co-founder and CEO at Varonis. In this episode, he joins host Amanda Glassner to discuss Varonis' AI-powered data security platform, including what CISOs across the industry are saying and whether their goalposts have shifted, as well as how cybersecurity teams of all sizes can address new threats, and more. This episode is brought to you by Varonis, whose AI-powered data security platform secures your data at scale – across IaaS, SaaS, and hybrid cloud environments. To learn more about our sponsor, visit https://Varonis.com.

Coffee w/#The Freight Coach
1179. #TFCP - Ways To Spot Integration Illusions & Improve Data Security!

Coffee w/#The Freight Coach

Play Episode Listen Later Apr 18, 2025 31:47 Transcription Available


In today's episode, we discuss effective back-office integrations in transportation, data processing, and the risks of automation and data security with Sean Smith of Denim! Sean highlights how integrations can help with operational efficiency, reduce errors, and ensure confidence, as well as best practices to minimize risks, such as using different credentials for automation, data limitation, and multi-layer verification due to threats like deepfakes!   About Sean Smith Sean Smith, VP of Product at Denim, has spent 10 years building and scaling products in the financial services and logistics industries. While leading Product at Denim, he has pioneered new capabilities for the factoring space including risk automation and pricing.  Sean has also led work on our client dashboard, job management and collaboration that have revolutionized the process and workflow for broker clients looking to save time on back office operations. He excels at combining his passion for technology with the ability to drive impact on a balance sheet.   Connect with Sean Website: https://www.denim.com/  LinkedIn: https://www.linkedin.com/in/smithseanp/  Twitter (X): https://x.com/smithseanp  

DisrupTV
How is AI changing data security and leadership culture? | Bruno Kurtic and Shanda Gore

DisrupTV

Play Episode Listen Later Apr 18, 2025 58:24


This week on DisrupTV, we interviewed Bruno Kurtic, CEO/Co-founder of Bedrock Security, previously Co-founder of Sumo Logic and Shanda Gore, founder of Mays Associates and author of The PinLeader Path: Identify, Engage, and Develop Effective Human and AI Leadership for Your Organizational Culture. Bruno discussed the convergence of AI and data security, emphasizing the importance of AI governance and the need for enterprises to center data in their security strategies. He highlighted Bedrock Security's metadata lake, which uses AI to classify and manage data at scale, addressing regulatory concerns and improving data security posture. Shanda shared insights on effective leadership in the age of AI, stressing the importance of human-AI collaboration, critical thinking, and ethical AI use. Both guests underscored the evolving landscape of leadership and the necessity for organizations to adapt to AI's growing influence. DisrupTV is a weekly podcast with hosts R "Ray" Wang and Vala Afshar. The show airs live at 11:00 a.m. PT/ 2:00 p.m. ET every Friday. Brought to you by Constellation Executive Network: constellationr.com/CEN.

Paul's Security Weekly TV
I SIEM, you SIEM, we all SIEM for a Data Security Strategy - Colby DeRodeff - ESW #402

Paul's Security Weekly TV

Play Episode Listen Later Apr 14, 2025 35:43


We wanted security data? We got it! Now, what the heck do we DO with all of it? The core challenge of security operations, incident response, and even compliance is still a data management and analysis problem. Which is why we're seeing companies like Abstract Security pop up to address some of these challenges. Abstract just released a comprehensive eBook on security data strategy, linked below, and you don't even need to give up an email address to read it! In this interview, we'll talk through some of the highlights: Challenges Myths Pillars of a data security strategy Understanding the tools available Segment Resources A Leader's Guide to Security Data Strategy eBook Show Notes: https://securityweekly.com/esw-402

The Effortless Podcast
Sonika Johri Explains Quantum Computing, AI, and the Next Tech Revolution- Episode 13: The Effortless Podcast

The Effortless Podcast

Play Episode Listen Later Apr 14, 2025 108:49


Episode 13 | The Effortless PodcastIn this episode of The Effortless Podcast, hosts Dheeraj Pandey and Amit Prakash sit down with Dr. Sonika Johri, Founder and CEO of Coherent Computing, to dive deep into the revolutionary world of quantum computing. Dr. Johri, a physicist with a PhD in condensed matter physics from Princeton University, takes us on her journey from engineering physics at IIT Delhi to becoming a leading figure in the quantum industry, having worked at Intel and IonQ.Sonika explains the core concepts of quantum computing—superposition, entanglement, and the quantum state space—and how they fundamentally change how we approach complex problems in fields like chemistry, material science, and AI. She discusses the future potential of quantum technologies, including the exciting prospects for Quantum AI and the shift in programming paradigms as we move from low-level machine code to higher-level abstractions.They also cover: The evolution of quantum hardware: From small qubits to scaling quantum systemsWhat makes quantum computing different from classical computingThe intersection of quantum computing and artificial intelligence Sonika's mission to democratize quantum through Coherent ComputingThe current state of quantum software and the tools that will shape the futureThis episode offers insights into quantum computing, AI, and how these emerging technologies will reshape the future of computing. Whether you're a tech enthusiast, developer, or entrepreneur, this conversation is a must-listen for anyone curious about the next frontier in technology.Key Topics & Timestamps:[00:00] – Introduction to Dr. Sonika Johri & Her Journey into Quantum Tech[03:00] – Sonika's early influences: Einstein and IIT Delhi[06:30] – Understanding Condensed Matter Physics[12:00] – Quantum Computing vs Classical Computing[20:00] – How Quantum Can Solve Complex Problems (Chemistry, Optimization, AI)[28:00] – Quantum Hardware: The Role of Qubits and Their Physical Realization[35:00] – Programming Quantum Computers: From Low-Level Gates to High-Level Abstractions[43:00] – Building Quantum Applications: Real-World Use Cases from IonQ and Coherent Computing[52:00] – The Future of Quantum AI: Machine Learning and Quantum Reasoning[1:00:00] – Quantum's Impact on Cryptography and Data Security[1:05:00] – The Mission of Coherent Computing: Making Quantum Accessible[1:12:00] – Looking Ahead: Future Episodes on Quantum Computing and AI[1:20:00] – Wrap-Up and Final ThoughtsHosts:Dheeraj Pandey: Co-founder and CEO at DevRev, formerly CEO of Nutanix, a tech visionary passionate about AI and systems thinking.Amit Prakash: Co-founder and CTO at ThoughtSpot, former engineer at Google and Microsoft, and expert in distributed systems and machine learning.Guest:Dr. Sonika Johri: Founder and CEO of Coherent Computing, a quantum software startup aiming to make quantum models accessible through developer-friendly tools. Formerly at Intel and IonQ, Sonika brings her experience in building quantum software and applications for industries like finance, chemistry, and optimization.Follow the Host and the Guest:Dheeraj Pandey: LinkedIn | XAmit Prakash: LinkedIn | XDr. Sonika Johri: LinkedIn | XHave questions or thoughts on quantum computing? Drop us a mail at EffortlessPodcastHQ@gmail.comDon't forget to like, comment, and subscribe for more deep dives into the future of technology, AI, and quantum computing!

Enterprise Security Weekly (Video)
I SIEM, you SIEM, we all SIEM for a Data Security Strategy - Colby DeRodeff - ESW #402

Enterprise Security Weekly (Video)

Play Episode Listen Later Apr 14, 2025 35:43


We wanted security data? We got it! Now, what the heck do we DO with all of it? The core challenge of security operations, incident response, and even compliance is still a data management and analysis problem. Which is why we're seeing companies like Abstract Security pop up to address some of these challenges. Abstract just released a comprehensive eBook on security data strategy, linked below, and you don't even need to give up an email address to read it! In this interview, we'll talk through some of the highlights: Challenges Myths Pillars of a data security strategy Understanding the tools available Segment Resources A Leader's Guide to Security Data Strategy eBook Show Notes: https://securityweekly.com/esw-402

Public Sector Podcast
The 2025 Cyber Security Landscape in SA: Navigating the Year Ahead - Darren Van Sommeren - Episode 129

Public Sector Podcast

Play Episode Listen Later Apr 14, 2025 14:36


In this episode, Darren Van Sommeren discusses the future of cybersecurity in South Australia heading into 2025. He outlines the rise in sophisticated cyber threats, driven by geopolitical instability, and calls for collaboration over fear as the key to resilience. Darren also unpacks how AI is reshaping the threat landscape, from deepfakes to phishing, and highlights the need for proactive defence strategies like threat hunting and clear communication to stay ahead. He emphasises that cybersecurity is a shared responsibility, requiring coordination across government, industry, and the community. With a realistic yet hopeful outlook, Darren encourages organisations to stay alert, informed, and united in the face of growing digital threats. Darryn Van Someren Acting Government Chief Information Security Officer, Department of Treasury and Finance, SA For more great insights head to www.PublicSectorNetwork.co    

HPE Tech Talk
How do you cut off cloud computing from the internet?

HPE Tech Talk

Play Episode Listen Later Apr 10, 2025 23:05


How can cloud computing be completely isolated from the internet? This week, Technology Now explores the next step in data storage and processing: the concept of a disconnected cloud. Why would someone want their cloud cut off like this? From a single building to an entire country, what are the security and regulatory compliance benefits?! Rich Bird, Worldwide Hybrid Cloud Marketing at HPE tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.Sources cited in this week's episode:Gartner Report on cloud usage and spending:https://www.gartner.com/en/newsroom/press-releases/2024-11-19-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-total-723-billion-dollars-in-2025History of the Cloud: https://www.bcs.org/articles-opinion-and-research/history-of-the-cloud/Dark Matter and Dark Energy (Today I Learnt):https://www.cfa.harvard.edu/research/topic/dark-energy-and-dark-matterhttps://www.nature.com/articles/d41586-024-01273-4https://www.newscientist.com/article/2471743-dark-energy-isnt-what-we-thought-and-that-may-transform-the-cosmos/History of Daylight Savings in the US (This Week in History):https://unrememberedhistory.com/tag/march-31-1918-daylight-saving-time/https://www.thecongressproject.com/standard-time-act-of-1918

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise
How do you cut off cloud computing from the internet?

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise

Play Episode Listen Later Apr 10, 2025 23:05


How can cloud computing be completely isolated from the internet? This week, Technology Now explores the next step in data storage and processing: the concept of a disconnected cloud. Why would someone want their cloud cut off like this? From a single building to an entire country, what are the security and regulatory compliance benefits?! Rich Bird, Worldwide Hybrid Cloud Marketing at HPE tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.Sources cited in this week's episode:Gartner Report on cloud usage and spending:https://www.gartner.com/en/newsroom/press-releases/2024-11-19-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-total-723-billion-dollars-in-2025History of the Cloud: https://www.bcs.org/articles-opinion-and-research/history-of-the-cloud/Dark Matter and Dark Energy (Today I Learnt):https://www.cfa.harvard.edu/research/topic/dark-energy-and-dark-matterhttps://www.nature.com/articles/d41586-024-01273-4https://www.newscientist.com/article/2471743-dark-energy-isnt-what-we-thought-and-that-may-transform-the-cosmos/History of Daylight Savings in the US (This Week in History):https://unrememberedhistory.com/tag/march-31-1918-daylight-saving-time/https://www.thecongressproject.com/standard-time-act-of-1918

HPE Tech Talk, SMB
How do you cut off cloud computing from the internet?

HPE Tech Talk, SMB

Play Episode Listen Later Apr 10, 2025 23:05


How can cloud computing be completely isolated from the internet? This week, Technology Now explores the next step in data storage and processing: the concept of a disconnected cloud. Why would someone want their cloud cut off like this? From a single building to an entire country, what are the security and regulatory compliance benefits?! Rich Bird, Worldwide Hybrid Cloud Marketing at HPE tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.Sources cited in this week's episode:Gartner Report on cloud usage and spending:https://www.gartner.com/en/newsroom/press-releases/2024-11-19-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-total-723-billion-dollars-in-2025History of the Cloud: https://www.bcs.org/articles-opinion-and-research/history-of-the-cloud/Dark Matter and Dark Energy (Today I Learnt):https://www.cfa.harvard.edu/research/topic/dark-energy-and-dark-matterhttps://www.nature.com/articles/d41586-024-01273-4https://www.newscientist.com/article/2471743-dark-energy-isnt-what-we-thought-and-that-may-transform-the-cosmos/History of Daylight Savings in the US (This Week in History):https://unrememberedhistory.com/tag/march-31-1918-daylight-saving-time/https://www.thecongressproject.com/standard-time-act-of-1918

Hotel Moment
How technology is transforming hotel data security | with Matthijs Welle

Hotel Moment

Play Episode Listen Later Apr 9, 2025 29:21


In this episode of Hotel Moment, Bryson Koehler, CEO of Revinate, sits down with Matthijs Welle, CEO of Mews, to discuss the rapidly evolving landscape of hotel data security. Matthijs shares insights on how cybercriminals are becoming increasingly sophisticated in their tactics, and why education is the hotel industry's strongest defense against data breaches. From phishing attempts to AdWord exploitation, they explore practical strategies for protecting guest data and the importance of building a security-focused culture within hotel operations. This conversation offers valuable guidance for hoteliers looking to strengthen their security practices while maximizing the benefits of their technology stack.

Microsoft Mechanics Podcast
Microsoft Purview: New data security controls for the browser & network

Microsoft Mechanics Podcast

Play Episode Listen Later Apr 9, 2025 9:57 Transcription Available


Protect your organization's data with Microsoft Purview. Gain complete visibility into potential data leaks, from AI applications to unmanaged cloud services, and take immediate action to prevent unwanted data sharing. Microsoft Purview unifies data security controls across Microsoft 365 apps, the Edge browser, Windows and macOS endpoints, and even network communications over HTTPS —all in one place. Take control of your data security with automated risk insights, real-time policy enforcement, and seamless management across apps and devices. Strengthen compliance, block unauthorized transfers, and streamline policy creation to stay ahead of evolving threats. Roberto Yglesias, Microsoft Purview Principal GPM, goes beyond Data Loss Prevention (DLP) and shows how to ensure your data stays protected no matter where it goes. ► QUICK LINKS: 00:00 - Data Loss Prevention in Microsoft Purview 01:33 - Assess DLP Policies with DSPM 03:10 - DLP across apps and endpoints 04:13 - Unmanaged cloud apps in Edge browser 04:39 - Block file transfers across endpoints 05:27 - Network capabilities 06:41 - Updates for policy creation 08:58 - New options 09:36 - Wrap up ► Link References Get started at https://aka.ms/PurviewDLPUpdates ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics 

Grow A Small Business Podcast
Dr. Donna Smith Bellinger of DS Bellinger Consulting on Building a 6-Figure Business, Mastering Sales Without Selling, and Why the ‘Queen of Revenue Generation' Believes Confidence Is the Ultimate Sales Tool. (Episode 654 - Dr. Donna Smith Bellinger)

Grow A Small Business Podcast

Play Episode Listen Later Apr 8, 2025 37:41


In this episode of Grow a Small Business, host Troy Trewin interviews Dr. Donna Smith Bellinger, founder of DS Bellinger Consulting, specializes in helping business owners and sales teams enhance their sales performance by mastering revenue-generating conversations. She launched the business part-time nine years ago, growing it into a thriving enterprise with a team of five and multiple six-figure revenues. Dr. Bellinger also brings a wealth of entrepreneurial experience, including successfully exiting a tech company. In this discussion, she shares her journey, the challenges she faced as a woman and a person of color, the critical role of financial literacy, the art of delegation, and the importance of fostering a strong business culture. Other Resources: Sales Is Not About Wait And See: Do You Want To Get Paid Now or Eventually? by Dr. Donna Smith Bellinger (Author) You Lost Me @ Hello: Actionable principles that move you beyond "Networking."  by Dr. Donna Smith Bellinger (Author) Why would you wait any longer to start living the lifestyle you signed up for? Balance your health, wealth, relationships and business growth. And focus your time and energy and make the most of this year. Let's get into it by clicking here.   Troy delves into our guest's startup journey, their perception of success, industry reconsideration, and the pivotal stress point during business expansion. They discuss the joys of small business growth, vital entrepreneurial habits, and strategies for team building, encompassing wins, blunders, and invaluable advice.   And a snapshot of the final five Grow A Small Business Questions: What do you think is the hardest thing in growing a small business? According to Dr. Donna Smith Bellinger, the hardest thing about growing a small business is understanding your value statement. She emphasises not trying to be all things to all people within your area of expertise. You simply cannot please everyone, so it is best to focus on what you do best and excel at that. What's your favorite business book that has helped you the most? According to Dr. Donna Smith Bellinger, her favourite business book that has helped her the most is The E Myth. However, she also mentions that The Purpose Driven Life, while not a business book, was very important to her. Therefore, she highlights two books as being particularly impactful. Are there any great podcasts or online learning resources you'd recommend to help grow a small business? Dr. Donna Smith Bellinger, doesn't recommend specific podcasts or online learning tools. Instead, she emphasises the importance of tailored research within the specific industry of a new client to remain relevant. She takes "a little bit of everything" for her own professional development. The host, Troy Trewin, suggests the Grow Small Business podcast itself as a helpful resource. What tool or resource would you recommend to grow a small business? She recommends the most direct tool recommendation for growing a small business is to have a good, robust CRM (Customer Relationship Management) system. She states that the days of just using a spreadsheet are over. What advice would you give yourself on day one of starting out in business? Her advice for herself on day one of starting out in business would be straightforward: "If you can't laugh at it, don't do it" Book a 20-minute Growth Chat with Troy Trewin to see if you qualify for our upcoming course. Don't miss out on this opportunity to take your small business to new heights! Enjoyed the podcast? Please leave a review on iTunes or your preferred platform. Your feedback helps more small business owners discover our podcast and embark on their business growth journey.     Quotable quotes from our special Grow A Small Business podcast guest: Confidence is your most powerful sales strategy—own it before you pitch it – Dr. Donna Smith Bellinger Revenue generation starts with a mindset, not a marketing plan – Dr. Donna Smith Bellinger Stop asking for permission to succeed—just go get it  – Dr. Donna Smith Bellinger

Topline
E103: AI Agents and the Future of Enterprise Tech with Box CTO Ben Kus

Topline

Play Episode Listen Later Apr 6, 2025 67:42


In this episode, Sam, Asad, and AJ sit down with Ben Kus, Chief Technology Officer at Box, to unpack how AI is reshaping enterprise tech—from the seismic shift to cloud-native infrastructure to the rise of AI agents that collaborate across platforms. We dive into the realities of leading through volatility, why AI adoption is moving faster than past platform shifts, and how enterprises can navigate the “FOMO” of generative AI without sacrificing trust. Plus, Ben's take on the future of software engineering, the myth of “non-technical founders,” and the books that keep him thinking ahead.Thanks for tuning in! Want more content from Pavilion? You're invited! Join the free Topline Slack channel to connect with 600+ revenue leaders, share insights, and keep the conversation going beyond the podcast!Subscribe to the Topline Newsletter to get the latest industry developments and emerging go-to-market trends delivered to your inbox every Thursday.Tune into The Revenue Leadership Podcast with Kyle Norton every Wednesday. Kyle dives deep into the strategies and tactics that drive success for revenue leaders like Jason Lemkins of SaaStr, Stevie Case of Vanta, and Ron Gabrisko of Databricks.Key Moments:[01:14] – Meet Ben Kus: Box's AI Visionary[05:26] – Leading Through Volatility: COVID, ZIRP, and AI's Sudden Rise[11:57] – Why AI Adoption Is Moving Faster Than Cloud or Mobile[17:05] – Data Security in the Age of AI: Box's Guardrails[24:17] – AI Agents: The Next Frontier (or Hype)?[31:41] – Open vs. Walled Gardens: The Future of Enterprise Platforms[38:45] – Is Software Engineering Still a Valuable Skill?[46:33] – Stagnation, Patience, and the Long Game

Rebel Tech
Rebel Tech Podcast | Episode 21: App Store Accountability and More with Joel Thayer

Rebel Tech

Play Episode Listen Later Apr 4, 2025 52:14


On this episode of The Rebel Tech Podcast, TPPF's David Dunmoyer and Greyson Gee sit down with President of the Digital Progress Institute, Joel Thayer, to discuss tech policy issues like responsible use of AI, empowering parents to parent in the digital age with the App Store Accountability Act, and much more.

Thrive LOUD with Lou Diamond
1081: Ed Crump - "Breaking Boundaries in Tech: Alexa and Beyond"

Thrive LOUD with Lou Diamond

Play Episode Listen Later Apr 3, 2025 37:15


What if the next big leap in technology isn't just another gadget, but a transformative bridge to a smarter, more efficient future? In this eye-opening episode of Thrive LouD with Lou Diamond, meet Edward Crump, the remarkable inventor of Amazon Alexa and a significant force behind innovation at companies like Netflix and Nike. Now serving as the CTO of Champion Venture Partners, Crump shares the secrets behind his incredible journey through technology and entrepreneurship. Key Highlights: Discover how a lifelong technologist like Ed Crump started his career by selling his first program at the age of 12 and eventually played a pivotal role in creating Amazon Alexa. Learn about the pioneering projects he led at major companies like Netflix and Nike, and how he transitioned to the venture capital world with Champion Venture Partners. Gain insights into Crump's vision for the future, where personal AIs and smart environments revolutionize our daily lives while respecting data privacy. Understand the importance of interdisciplinary collaboration, as demonstrated by Champion Venture Partners, in driving innovative solutions in sports science, health, and wellness. Join Lou Diamond and Ed Crump on this enlightening exploration into the future of technology and innovation, and discover how you can be a part of this thrilling journey. TIMESTAMPED OVERVIEW 00:00 Entrepreneurial Journey: From Startups to Amazon 06:36 Tech Giants' Race: Amazon Outpaces Apple 09:52 Leveraging Innovation in Digital Experiences 10:40 Future of Personal AI and Data 14:17 Data Privacy Concerns in AI 19:57 New Venture Collaboration Insights 21:20 "Unique Access to Sports Ecosystem" 25:48 "Passion for Management Collaboration" 28:40 "Digital Twins: A Matrix Parallel" 30:52 Sugar-Free Mental Clarity 35:44 "Ed Crump: Coolest Guest Spotlight" Connect with Ed Check out Champion Venture Partners company's website Follow Us:

Code Story
The Gene Simmons of Data Protection – KISS (Keep It Simple, Stupid): A Data Security Dilemma

Code Story

Play Episode Listen Later Apr 2, 2025 24:55


The Gene Simmons of Data P rotection: Protegrity's KISS MethodToday, we are kicking off a new series on the podcast, entitled The Gene Simmons of Data Protection - the KISS Method, brought to you by none other than Protegrity. Protegrity is AI-powered data security for data consumption, offering fine grain data protection solutions, so you can enable your data security, compliance, sharing and analytics.Episode Title: KISS (Keep It Simple, Stupid): A Data Security Dilemma with James RiceIn this episode, we are talking with James Rice, VP at Protegrity. He is going to help us strip away the nonsense, when it comes to securing data, and help us understand why we don't need a fortress... just a kill switch. While companies throw billions at firewalls, AI driven threat detection, and fortress like defenses - attackers still find their way in. James reminds us to keep it simple, with Protegrity's KISS Method which stands for Keep It Simple Stupid - and how when data is useless to attackers, breaches become mere inconveniences instead of existential threats.Questions:What exactly is the KISS method, and how does it apply to cybersecurity?Why are traditional cybersecurity approaches failing to stop breaches?What are some of the biggest myths about security that lead businesses to waste money on ineffective defenses?How do encryption, tokenization, and de-identification work together to make stolen data useless?Can you share an example where a company's focus on complex security backfired, and how a simpler approach could have helped?What's the biggest pushback you hear from companies hesitant to adopt a simpler, data-first security model? If a company wanted to implement the KISS method tomorrow, what are the first three steps they should take?Linkshttps://www.protegrity.com/https://www.linkedin.com/in/jamesrice1/Our Sponsors:* Check out Kinsta: https://kinsta.com* Check out Vanta: https://vanta.com/CODESTORYSupport this podcast at — https://redcircle.com/code-story/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Marketing Espresso
What is a CRM, what platform do I recommend and do you need one?

Marketing Espresso

Play Episode Listen Later Apr 2, 2025 19:00


CRMs! Do you need one? What is a CRM Customer Relationship Management (CRM) system? You asked I am delivering! What part do CRMs play in driving business success (and customer relationship success... and sales success... and pipeline success... and you get the point.) Whether you're a solopreneur, a small business owner, or managing a large team, understanding and implementing the right CRM can be a game-changer for your business. We explore a variety of CRM options including Salesforce, HubSpot, Zoho, and ActiveCampaign, highlighting their unique features, price points, and functionalities. I emphasise the importance of cloud-based CRMs for secure data storage and easy accessibility. Learn about crucial CRM functionalities such as email automation, lead scoring, pipeline management, and data segmentation. Discover why clean data and proper implementation are vital for maximising the benefits of your CRM system. This episode also sheds light on overcoming common challenges businesses face, such as transitioning from Excel spreadsheets and ensuring team buy-in. Tune in to gain actionable insights on selecting, setting up, and effectively using a CRM to enhance your customer journey, streamline your sales processes, and ultimately boost your business growth. If you need personalised advice on choosing the right CRM for your business, feel free to reach out. Happy listening!DOWNLOAD MY CONTENT PLANNER - https://becchappell.com.au/content-planner/Instagram @bec_chappellLinkedIn – Bec Chappell If you're ready to work together, I'm ready to work with you and your team.How to work with me:1. Marketing foundations and strategy consultation 2. Marketing Coaching/ Whispering for you a marketing leader or your team who you want to develop into marketing leaders3. Book me as a speaker or advisor for your organisation4. Get me on your podcastThis podcast has been produced and edited by Snappystreet Creative

Car Stuff Podcast
Rivian goes Micro, Lexus Plug-in Impresses, Carmakers and Your Personal Data

Car Stuff Podcast

Play Episode Listen Later Apr 1, 2025 56:17


The hosts opened the show by discussion Rivian's “micromobility” operation, which was recently spun off from the parent company. "ALSO," as the new concern is called, is headquartered in California, and will focus on designing and building e-bikes, scooters, and other small electric vehicles. Tom also briefly addressed the tariff situation, which is likely to become much bigger news in the next day or so. The hosts also lamented the violence being wrought upon Tesla cars and showrooms. Tom expressed his surprise regarding the general excellence of the new-for-2025 Kia K4 small sedan. A replacement for the brand's Forte model, the K4 is efficient, fun to drive, and also surprisingly affordable. Jill reviewed the 2025 Lexus NX 450h+, a plug-in hybrid version of the Japanese luxury carmaker's compact crossover. Though Jill balked at the price, her impressions were mostly positive. Listen in for her full review. In the second segment, Jill and Tom welcome Derek Kravitz of Consumer Reports to the show. Derek shared research conducted by Consumer Reports regarding car data privacy, and what consumers can do to protect themselves from makers sharing their personal information. In the last segment, Jill is subjected to Tom's “Fake Paint” quiz. 

HPE Tech Talk
Manufacturing and the struggle to become 'smart'

HPE Tech Talk

Play Episode Listen Later Mar 27, 2025 21:30


In this episode we are looking at a sector where IT and tech innovation is taking efficiency to a whole new level - manufacturing.Manufacturing is in a precarious position as an industry. In the global north, growth is largely stagnant, according to those same UN statistics. Even in high-growth economies like China, it's slowing down. It's also notoriously inefficient. So, can tech help? And if so, what does that look like? Joining us to discuss is Dan Klein, an advisor on data and digital transformation with a special interest in the manufacturing sector.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Dan Klein: https://www.linkedin.com/in/dplklein/?originalSubdomain=uk Sources cited in this week's episode: UN stats on the state of global manufacturing: https://stat.unido.org/portal/storage/file/publications/qiip/World_Manufacturing_Production_2024_Q1.pdfStatista report on global manufacturing and efficiency: https://www.statista.com/outlook/io/manufacturing/worldwide Water on Mars: https://pubs.geoscienceworld.org/gsa/geology/article/52/12/939/648640/Seismic-discontinuity-in-the-Martian-crust

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise
Manufacturing and the struggle to become 'smart'

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise

Play Episode Listen Later Mar 27, 2025 21:30


In this episode we are looking at a sector where IT and tech innovation is taking efficiency to a whole new level - manufacturing.Manufacturing is in a precarious position as an industry. In the global north, growth is largely stagnant, according to those same UN statistics. Even in high-growth economies like China, it's slowing down. It's also notoriously inefficient. So, can tech help? And if so, what does that look like? Joining us to discuss is Dan Klein, an advisor on data and digital transformation with a special interest in the manufacturing sector.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Dan Klein: https://www.linkedin.com/in/dplklein/?originalSubdomain=uk Sources cited in this week's episode: UN stats on the state of global manufacturing: https://stat.unido.org/portal/storage/file/publications/qiip/World_Manufacturing_Production_2024_Q1.pdfStatista report on global manufacturing and efficiency: https://www.statista.com/outlook/io/manufacturing/worldwide Water on Mars: https://pubs.geoscienceworld.org/gsa/geology/article/52/12/939/648640/Seismic-discontinuity-in-the-Martian-crust

Cybercrime Magazine Podcast
Data Security. Indiana School District Hit By Ransomware. Scott Schober, Author, "Hacked Again."

Cybercrime Magazine Podcast

Play Episode Listen Later Mar 27, 2025 18:23


Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss a recent ransomware attack on the Penn-Harris-Madison school district in Indiana, including a broader look at how cyberattacks are impacting K-12 schools across the country. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com

Microsoft Mechanics Podcast
Introducing Microsoft Purview Data Security Investigations

Microsoft Mechanics Podcast

Play Episode Listen Later Mar 24, 2025 13:54


Investigate data security, risk and leak cases faster by leveraging AI-driven insights with Microsoft Purview Data Security Investigations. This goes beyond the superficial metadata and activity-only signals found in incident management and SIEM tools, by analyzing the content itself within compromised files, emails, messages, and Microsoft Copilot interactions. Data Security Investigations allows you to pinpoint sensitive data and assess risks at a deeper level—quickly understanding the value of what's been exposed. Then by mapping connections between compromised data and activities, you can easily find the source of the security risk or exposure. And using real-time risk insights, you can also apply the right protections to minimize future vulnerabilities. Data Security Investigations is also integrated with Microsoft Defender incident management as part your broader SOC toolset. Nick Robinson, Microsoft Purview Principal Product Manager, joins Jeremy Chapman to share how to enhance your ability to safeguard critical information.  ► QUICK LINKS: 00:00 - Microsoft Purview Data Security Investigations 01:00 - Risks of data theft & data leaks 03:20 - Start an investigation 04:45 - Results of an investigation 06:15 - Vector-based search & semantic indexing 08:00 - Use AI for the investigation 09:21 - Map activities 10:44 - Connect SOC & Data Security teams 11:21 - Known leaked information 12:26 - Steps to get DSI up and running 13:15 - Wrap up  ► Link References Get started at https://aka.ms/DataSecurityInvestigations Stay up-to-date with our blog at https://aka.ms/DSIBlog ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics 

Cyber Security Today
The Escalating Cyber Threats Against K-12 Schools: Insights and Solutions: Cyber Security Today

Cyber Security Today

Play Episode Listen Later Mar 22, 2025 35:29 Transcription Available


The Escalating Cyber Threats Against K-12 Schools: Insights and Solutions In this episode of 'Cybersecurity Today,' host Jim Love discusses the rising trends and severe impacts of cyber attacks on K-12 schools with Randy Rose, VP of Security Operations and Intelligence at the Center for Internet Security (CIS). They scrutinize recent studies showing a surge in cyber threats targeting educational institutions, emphasizing the vulnerability of schools and the motives behind these attacks. The discussion covers how cyber criminals exploit budgetary information and schedules to maximize impact, the profound repercussions of ransomware attacks on school communities, and the critical need for better cybersecurity practices and support. Randy Rose shares insights from the 2025 CIS MS-ISAC K-12 Cyber​security Report and offers practical advice on elevating security standards and fostering community resilience to protect sensitive school data from cyber threats. 00:00 Introduction to Cybersecurity in Schools 00:02 Iconic Hacking Movies and Real-Life Cyber Threats 00:41 The Seriousness of School Cybersecurity 01:10 Interview with Randy Rose: Introduction and CIS Overview 01:40 CIS's Role and Randy's Journey 03:27 Supporting Various Organizations 04:26 Challenges Faced by Schools and Local Governments 06:21 Cybersecurity Threats and Attack Patterns 09:11 Impact of Cyber Attacks on Schools 13:22 Detailed Findings from the CIS Report 19:16 Human Factor in Cybersecurity 19:29 Supply Chain and Data Security 27:13 The Role of AI in Cybersecurity 30:49 Ransomware and Its Devastating Effects 32:27 Recommendations for Improving School Cybersecurity 34:01 Conclusion and Final Thoughts

a16z
Jensen Huang and Arthur Mensch on Winning the Global AI Race

a16z

Play Episode Listen Later Mar 21, 2025 55:03


The global race for AI leadership is no longer just about companies—it's about nations. AI isn't just computing infrastructure; it's cultural infrastructure, economic strategy, and national security all rolled into one.In this episode, Jensen Huang, founder and CEO of NVIDIA, and Arthur Mensch, cofounder and CEO of Mistral, sit down to discuss sovereign AI, national AI strategies, and why every country must take ownership of its digital intelligence.How AI will reshape global economies and GDPThe full AI stack—from chips to models to AI factoriesWhy AI is both a general purpose technology and deeply specializedThe open-source vs. closed AI debate and its impact on sovereigntyWhy no one will build AI for you—you have to do it yourselfIs this the most consequential technology shift of all time? If so, the stakes have never been higher.Resources: Find Arthur on X: https://x.com/arthurmenschFind Anjney on X: https://www.linkedin.com/in/anjney/Find NVIDIA on X: https://x.com/nvidiaFind Mistral: https://x.com/MistralAI Stay Updated: Let us know what you think: https://ratethispodcast.com/a16zFind a16z on Twitter: https://twitter.com/a16zFind a16z on LinkedIn: https://www.linkedin.com/company/a16zSubscribe on your favorite podcast app: https://a16z.simplecast.com/Follow our host: https://twitter.com/stephsmithioPlease note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.

ASOG Podcast
Episode 207 - Kathleen Callahan Discusses Right To Repair and Industry Advocacy

ASOG Podcast

Play Episode Listen Later Mar 10, 2025 65:04


Don't get to the end of this year wishing you had taken action to change your business and your life.Click here to schedule a free discovery call for your business: https://geni.us/IFORABEShop-Ware gives you the tools to provide your shop with everything needed to become optimally profitable.Click here to schedule a free demo: https://info.shop-ware.com/profitabilityUtilize the fastest and easiest way to look up and order parts and tires with PartsTech absolutely free.Click here to get started: https://geni.us/PartsTechTransform your shop's marketing with the best in the automotive industry, Shop Marketing Pros!Get a free audit of your shop's current marketing by clicking here: https://geni.us/ShopMarketingPros In this episode, Lucas and David are joined by Kathleen Callahan, who delves into her role in fostering relationships within the automotive industry through her involvement with Women in Auto Care and ACA. Kathleen shares her eye-opening experience of testifying before Congress on HR 906, emphasizing the importance of supporting independent shop owners in the legislative process. The conversation also touches on the impacts of right-to-repair legislation and the need for better collaboration between shop owners and manufacturers. Before you think the automotive industry isn't for you or consider the legislative impacts on your shop, make sure to tune in!00:00 Writer's Creative Autonomy08:32 "Unexpected Heatwave Adventure"14:44 Female Front Desk Success15:52 Manufacturer Vision vs. Engineering Teams25:51 Tent Lunch Tensions Erupt26:45 Women Leaders in Auto Care32:39 Florida Lawsuit over Shared Driving Data37:02 Collaboration Over Conflict in Auto Industry43:56 Compounding Pharmacies and Price Gouging48:36 Back Pain, Dispensary, Police Encounter56:23 Concerns for Vagrants' Well-being57:27 Missing Person's Human Story01:02:40 Membership Sign-Up Button

Cyber Security Today
Understanding Insider Threats With Eran Barak, CEO of MIND: Cyber Security Today for March 8, 2025

Cyber Security Today

Play Episode Listen Later Mar 8, 2025 35:49 Transcription Available


Understanding Insider Threats in Cybersecurity with Eran Barak Join host Jim Love as he discusses the critical issue of insider threats in cybersecurity with Eran Barak, CEO of MIND, a data security firm. In this episode, they explore the various types of insider threats, from innocent mistakes to malicious actors, and how companies can effectively protect their sensitive data. Learn about data loss prevention strategies, the impact of remote work, and the role of AI in enhancing data security. Get insights on practical steps that CISOs can take to mitigate risks and safeguard their organization's crown jewels. 00:00 Introduction and Guest Welcome 00:10 Understanding Insider Threats 01:20 Types of Insider Threats 02:18 Monitoring and Preventing Data Leaks 03:37 Remote Work and Security Risks 06:03 Access Control and Permissions 08:41 Real-World Scenarios and Solutions 21:20 The Role of AI in Data Security 34:53 Final Thoughts and Conclusion

ITSPmagazine | Technology. Cybersecurity. Society
Bridging Digital and Physical Security: Protecting Executives in an Evolving Threat Landscape | A BlackCloak Brand Story with Chris Pierson

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 5, 2025 29:36


In an era where personal and professional lives are increasingly intertwined in the digital realm, the security of high-profile individuals extends far beyond corporate firewalls. Executives, board members, and high-net-worth individuals face growing threats not just to their businesses but also to their families and personal lives. The convergence of cybersecurity and physical security has never been more evident, and BlackCloak is at the forefront of addressing this modern challenge.In this episode of ITSPmagazine's Brand Story series, hosts Marco Ciappelli and Sean Martin sit down with Dr. Chris Pierson, CEO and Founder of BlackCloak, to explore the increasing risks posed by cybercriminals, data brokers, and even nation-state actors, all of whom exploit publicly available information to orchestrate real-world threats. With the rise of doxing, swatting, and targeted attacks on corporate leadership, it is clear that safeguarding digital identities is no longer optional—it is essential.Dr. Pierson shares insights on how BlackCloak's concierge approach blends cutting-edge technology with a personalized human touch, ensuring that executives and their families can navigate the digital world securely. From removing personal information from data broker websites to mitigating deep web threats, BlackCloak's unique approach focuses on proactive protection rather than reactive crisis management. The conversation also touches on recent high-profile security breaches and their implications, highlighting the urgent need for businesses to extend cybersecurity measures beyond the enterprise network.As digital and physical threats continue to merge, organizations must rethink their approach to executive security. This episode is a wake-up call for leaders who may underestimate the exposure they and their families face. Tune in to learn why digital executive protection is no longer a luxury but a necessity, and how BlackCloak is setting the standard for safeguarding the modern executive.For those looking to take control of their digital privacy and security, visit BlackCloak.io and connect with Dr. Chris Pierson on LinkedIn. The intersection of cybersecurity and personal safety is here—how prepared are you?Learn more about BlackCloak: https://itspm.ag/itspbcwebNote: This story contains promotional content. Learn more. Guest: Chris Pierson, Founder and CEO of BlackCloak | On Linkedin: https://www.linkedin.com/in/drchristopherpierson/ResourcesDownload the Whitepaper | Executive Protection at Home is the Major Gap in Cybersecurity: https://itspm.ag/blackcue74Learn more and catch more stories from BlackCloak: https://www.itspmagazine.com/directory/blackcloakAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
AI, Cybersecurity, and the High-Stakes Risks in Healthcare | A HIMSS 2025 Conversation with Lee Kim | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 3, 2025 28:18


The intersection of cybersecurity and healthcare is more critical than ever, as technology continues to shape the way patient care is delivered. At HIMSS 2025 in Las Vegas, we sat down with Lee Kim, Senior Principal of Cybersecurity and Privacy at HIMSS, to discuss the pressing security challenges facing healthcare organizations, the role of artificial intelligence, and the balance between innovation and risk.AI in Healthcare: Promise and PerilArtificial intelligence is rapidly being adopted across the healthcare sector, yet many organizations still lack structured governance around its use. Kim highlights the “wild west” nature of AI adoption, where policies are either non-existent or underdeveloped, creating risks related to privacy, data security, and patient outcomes. While AI-powered diagnostic tools, like those used in radiology, have the potential to improve patient care by identifying critical conditions early, blind trust in AI-generated results presents serious risks. Without proper oversight, reliance on AI could lead to incorrect medical decisions, putting patient safety in jeopardy.Cybersecurity Gaps in Healthcare OrganizationsOne of the biggest concerns in healthcare cybersecurity is the over-reliance on security tools without a clear strategy. Many organizations invest in the latest technology but neglect foundational security practices, such as governance, policy development, and staff training. Kim points out that less than half of cybersecurity budgets are allocated to governance, leading to disorganized security programs.Another persistent challenge is the human factor. Social engineering and phishing attacks remain the top attack vectors, exploiting the inherent culture of healthcare professionals who are trained to help and trust others. Organizations must focus on proactive security measures, such as regular training and simulated attacks, to reduce human error and strengthen defenses.The Financial and Operational RealityBudget constraints continue to be a challenge, particularly for smaller hospitals and community healthcare providers. While larger organizations may have more resources, cybersecurity spending often focuses on acquiring new tools rather than optimizing existing defenses. Kim stresses the importance of a balanced approach—investing in both technology and governance to ensure long-term resilience.Another concern is the increasing dependence on third-party services and cloud-based AI tools. If these services become too expensive or go offline, healthcare organizations may face operational disruptions. The lack of contingency planning, such as backup vendors or alternative systems, leaves many institutions vulnerable to supply chain risks.Building a More Resilient Healthcare Security ModelAs technology continues to drive innovation in healthcare, organizations must adopt a proactive cybersecurity stance. Business impact analyses, vendor risk assessments, and tabletop exercises should be standard practice to prepare for disruptions. Kim also raises the idea of cyber mutual aid—a model similar to emergency medical mutual aid, where healthcare organizations collaborate to support each other in times of crisis.HIMSS 2025 provides a forum for these critical conversations, bringing together global healthcare leaders to share insights, challenges, and solutions. For those interested in diving deeper, the HIMSS Cybersecurity Survey is available online, offering a comprehensive look at the current state of healthcare security.To hear the full discussion on these topics and more, listen to the episode featuring Lee Kim, Sean Martin, and Marco Ciappelli from HIMSS 2025 On Location.Guest: Lee Kim, Senior Principal of Cybersecurity and Privacy at HIMSS | On LinkedIn: https://www.linkedin.com/in/leekim/Hosts:Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________ResourcesLearn more and catch more stories from HIMSS 2025 coverage: https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegasHIMSS 2024 Cybersecurity Report: https://www.himss.org/resources/himss-healthcare-cybersecurity-survey/____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More

The Wellness Mama Podcast
What Every Parent Should Know Before Having Their Kid (Or Themselves) Take a Genetic Test with Dr. Erika Gray

The Wellness Mama Podcast

Play Episode Listen Later Feb 4, 2025 31:56


Episode Highlights with Dr. Erika GrayUnderstanding privacy concerns with genetic testing, especially in light of the security breach with a major DNA company recently Samples sent to testing companies are de-identified and not connected to personal dataSecurity concerns and how to make sure yours is safeHow their specific testing has layers of encryption and is not even mined for dataYou can use an alias on your genetic testing The limits of genetic testing and what it can and can't tell us Genetics is a screening tool and not a diagnostic tool — related to cancer risk and expressionMore related to choline and how this can be really beneficial for focus and attention Resources We MentionMy Toolbox Genomics - Use code wellnessmama for a discount