Podcasts about Data security

  • 1,105PODCASTS
  • 2,352EPISODES
  • 35mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jul 3, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Data security

Show all podcasts related to data security

Latest podcast episodes about Data security

Consumer Finance Monitor
Aspen Institute Seems to be Making Great Strides in Fixing Our Online Scams Problem

Consumer Finance Monitor

Play Episode Listen Later Jul 3, 2025 80:33


The genesis of the podcast show we are releasing today was an article written by Nick Bourke titled “America Can Fix Its Scam Problem. But We Keep Gifting Billions to Transnational Criminals Because It Feels Too Hard” published on April 12, 2025 in Open Banker. We learned from that article about the great work being done by Aspen Institute's National Task Force on Fraud and Scam Prevention. The purpose of the podcast is to describe the work of this Task Force  The Aspen Institute states the following about the Task Force: Every day, criminals steal $430 million from American families, with total fraud proceeds reaching $158 billion annually. They are a critical funding source for transnational criminal organizations, fueling drug cartels, human trafficking, and terrorism. Fraud losses reported to the FBI increased 15-fold over roughly the last decade, and the rise of new technologies like AI has made scams more sophisticated and easier to perpetuate to harm American families. The Aspen Institute Financial Security Program launched the National Task Force on Fraud and Scam Prevention in 2024 to develop the first coordinated U.S. national strategy aimed at stopping financial fraud at its root. The guiding purpose of the Task Force is to bring together all parties with an interest in protecting consumers and restoring trust in our financial system. This is the first time such a broad collection of leaders from across government, law enforcement, private industry, and civil society are coming together to develop a nationwide strategy aimed at helping prevent fraud and scams. Our guests on this podcast are: Kate Griffin, Director of Programs, Aspen Institute Financial Security Program and Nick Bourke, Senior Policy Adviser, The Aspen Institute. Our guests covered the following topics: 1.  What is the Aspen Institute's Financial Security Program and how did the Aspen Institute come to launch the National Task Force on Fraud and Scam Prevention?  Who is participating in the Task Force?  Why is such a cross-sector (industry, consumer advocates and government) very important?  What is standing in the way of more robust, secure, cross-sector data-sharing today? 2.  How big is the fraud and scams problem in the United States right now? How has it changed over time?  3.  What are some of the implications of this problem? How should we be thinking about this beyond the consumer-level financial impacts? Where is all this money going, and what does that mean for our national security?  How do fraud/scams compare to other forms of organized crime? Why is it so difficult for victims to recover their financial losses? Are there any efforts ongoing in Congress to alleviate this?  Despite all the anti-fraud measures, educational resources, and even public media coverage, why do scammers still seem to be gaining ground?  What are some of the biggest gaps or weaknesses in the U.S. system that scammers exploit? Are there promising models from other countries or sectors the U.S. can learn from?  How is AI changing the landscape of scams — both in how they're perpetrated and how we might stop them? 4. What's the right balance between imposing duties on companies and offering legal safe harbors so they're not afraid to act?  5.  Some people still feel a stigma around sharing when they have been the victim of a scam. How do we shift the environment away from victim-blaming and toward support? 6.  The Task Force is driving toward developing a "national strategy" for fighting fraud and scams. What are some of the necessary components to make this truly effective?  What do you mean by the need for a "national front door for reporting”?   7.   Consumer education has to continue playing a role here. What kinds of public awareness campaigns or interventions have proven effective? What kinds of leadership or investment are needed from Congress, the White House, or federal agencies?  8.  Are there any incentives that could better align corporate interests around fraud and scam prevention? Are there examples of companies that are leading the way on this issue?  9.  What are the Task Force's next steps? When should we expect to hear more about the national strategy that's coming together? Alan Kaplinsky, founder of and former Chair for 25 years of the Consumer Financial Services Group, hosted the podcast show.

Podcasts – TechSpective
Why Data Security Is the Real AI Risk

Podcasts – TechSpective

Play Episode Listen Later Jun 30, 2025 49:02


Artificial intelligence may be the headline, but data is the story. In this episode of the TechSpective Podcast, I sat down with Todd Moore, VP of Data Security at Thales, to unpack the newly released 2025 Thales Data Threat Report. […] The post Why Data Security Is the Real AI Risk appeared first on TechSpective.

Cybercrime Magazine Podcast
Data Security. GCC Strengthening Cyber Resilience. Scott Schober, Author, "Hacked Again."

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 27, 2025 22:04


Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss how the Gulf Cooperation Council (GCC) is strengthening cyber resilience in today's digital age. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com

Microsoft Mechanics Podcast
Secure your AI apps with user-context-aware controls | Microsoft Purview SDK

Microsoft Mechanics Podcast

Play Episode Listen Later Jun 26, 2025 9:11 Transcription Available


Build secure, compliant AI apps with code-based controls that dynamically respond to user context using Microsoft Purview for AI app developers. With built-in protections, prevent data leaks, block unsafe prompts, and avoid oversharing without rewriting your app. As a developer, focus on innovation while meeting evolving security and compliance requirements. And as a security admin, gain full visibility into AI data interactions, user activity, and policy enforcement across environments. Shilpa Ranganathan, Microsoft Purview Principal GPM, shares how new SDKs and Azure AI Foundry integrations bring enterprise-grade security to custom AI apps. ► QUICK LINKS:  00:00 - Microsoft Purview controls for developers 00:16 - AI app protected by Purview 02:23 - User context aware 03:08 - Prevent data oversharing 04:15 - Behind the app 05:17 - API interactions 06:50 - Data security admin AI app protection 07:26 - Monitor and Govern AI Interactions 08:30 - Wrap up ► Link References Check out https://aka.ms/MicrosoftPurviewSDK Microsoft Purview API Explorer at https://github.com/microsoft/purview-api-samples/ For the Microsoft Purview Chat App go to https://github.com/johnea-chva/purview-chat ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics

Security Now (MP3)
SN 1031: How Salt Typhoon Gets In - What "AI" Really Means

Security Now (MP3)

Play Episode Listen Later Jun 25, 2025 180:38


China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

All TWiT.tv Shows (MP3)
Security Now 1031: How Salt Typhoon Gets In

All TWiT.tv Shows (MP3)

Play Episode Listen Later Jun 25, 2025 180:38 Transcription Available


China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

Security Now (Video HD)
SN 1031: How Salt Typhoon Gets In - What "AI" Really Means

Security Now (Video HD)

Play Episode Listen Later Jun 25, 2025


China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

Security Now (Video HI)
SN 1031: How Salt Typhoon Gets In - What "AI" Really Means

Security Now (Video HI)

Play Episode Listen Later Jun 25, 2025


China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

Radio Leo (Audio)
Security Now 1031: How Salt Typhoon Gets In

Radio Leo (Audio)

Play Episode Listen Later Jun 25, 2025 180:38 Transcription Available


China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

Security Now (Video LO)
SN 1031: How Salt Typhoon Gets In - What "AI" Really Means

Security Now (Video LO)

Play Episode Listen Later Jun 25, 2025


China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

All TWiT.tv Shows (Video LO)
Security Now 1031: How Salt Typhoon Gets In

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Jun 25, 2025 181:01 Transcription Available


China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

No Nonsense with Pamela Wallin
New Internet Laws and Data Security with Michael Geist

No Nonsense with Pamela Wallin

Play Episode Listen Later Jun 25, 2025 31:53


Ottawa is expanding state access to subscriber data and giving political parties a free ride when it comes to protecting voter data. Is this a red flag for what is to come in the new Ottawa? We'll ask internet law expert Michael Geist.

The Future of ERP
Episode 65: From Legacy to Leading Edge: How Cloud Solutions Empower Business Success

The Future of ERP

Play Episode Listen Later Jun 25, 2025 13:55


This episode explores how technology and business truly come together to drive meaningful change, focusing on the shift from on-premise to cloud ERP. You'll hear how companies are breaking free from outdated systems, overcoming technical debt, and embracing more agile, modular approaches to stay ahead in a fast-changing world. The conversation unpacks common myths about security and customization, explains why cloud ERP offers greater trust and flexibility, and highlights the priorities today's CIOs are setting to future-proof their organizations. With insights on continuous innovation, compliance, and keeping your business unique, this discussion will leave you rethinking what's possible for the future of work.

Radio Leo (Video HD)
Security Now 1031: How Salt Typhoon Gets In

Radio Leo (Video HD)

Play Episode Listen Later Jun 25, 2025 181:01 Transcription Available


China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security

Chatbot Talk with Sophie
#138 Prompt and Pray: Rasa's Neuanfang mit LLMs

Chatbot Talk with Sophie

Play Episode Listen Later Jun 25, 2025 16:40 Transcription Available


Input geben - Networking starten!Die Welt der Conversational AI hat sich mit dem Aufkommen von ChatGPT fundamental verändert. Wie reagieren etablierte Plattformen auf diese Revolution? In diesem faszinierenden Gespräch treffe ich Sebastian von Rasa, einem Pionier im Bereich der Chatbot-Entwicklung, mit dem meine eigene KI-Reise einst begann.Nach einer Phase der Zurückhaltung gegenüber Large Language Models hat Rasa nun ein beeindruckendes Comeback hingelegt. Sebastian stellt das innovative CALM-Framework vor – Conversational AI mit Large Language Models. Dieses verbindet die strukturierte Welt der klassischen Natural Language Understanding mit der Flexibilität moderner Sprachmodelle. Das Ergebnis? Vollständige Kontrolle über die KI-Antworten ohne auf die Vorteile von LLMs verzichten zu müssen.Besonders spannend: Die "Temperatur"-Einstellung ermöglicht eine präzise Steuerung, wie kreativ das System antworten darf – von strikt vordefinierten Antworten bis hin zu personalisierten Formulierungen, die sich an unterschiedliche Zielgruppen anpassen. Mit einer Zeitersparnis von 80% bei der Entwicklung und der Möglichkeit, jedes beliebige LLM zu nutzen, bietet Rasa eine vielversprechende Lösung für Unternehmen mit hohen Sicherheitsanforderungen, die dennoch von den Fortschritten der KI profitieren möchten.Entdeckt mit uns, wie die Zukunft der Conversational AI aussehen könnte – eine Welt, in der wir nicht mehr "prompt and pray" praktizieren müssen, sondern echte Kontrolle über KI-gestützte Kommunikation behalten. Hört jetzt rein und schreibt uns eure Gedanken zur Verbindung von strukturierter KI und Large Language Models! Support the showVielen Dank an unsere Starken Podcast-Partner CreaLog Software-Entwicklung und Beratung GmbH und VIER. Und als Medienpartner mit dabei CMM360.Ihr wollt mehr Networking? Dann kommt in meine WhatsApp Gruppe zu aktuellen Trends und News rund um AI und Chatbots: https://chat.whatsapp.com/BilAa1OLfELKJwuyodKgkXWeitere Links:Sophie auf WhatsApp kontaktierenSophie per Mail anfragenSophies WebseiteUnd noch mehr zu AI und Bots könnt ihr hier lesen.

Medics Money podcast
Ep 277: Streamlining Healthcare: Lexacom's Impact on Modern Medical Practices

Medics Money podcast

Play Episode Listen Later Jun 24, 2025 32:53


Book a demonstration here. In this episode of the Medics' Money Podcast, Tommy welcomes Dr. Andrew Whiteley, the founder of Lexacom, a widely-used health tech product. They discuss the origins of Lexacom, the challenges faced during its development, and the innovative features of its new version. Dr. Whiteley demonstrates Lexacom's capabilities, including streamlined email dictation, patient visit documentation via mobile, and AI-driven workflow enhancements. Ideal for GPs and hospital doctors, Lexacom aims to save time on administrative tasks and improve patient care. Watch the live demo to see Lexacom in action and learn how to integrate it into your practice. 00:00 Introduction and Guest Welcome 00:43 The Origin Story of Lexacom 03:55 Challenges and Growth of Lexacom 09:36 Innovations and New Features of Lexacom 11:58 Live Demonstration of Lexacom's Capabilities 27:07 Data Security and Privacy Measures 30:08 Conclusion and Final Thoughts   DISCLAIMER: This channel is for education purposes only and does not constitute financial advice and tax allowances and rates are subject to change.

Biotech Bytes: Conversations with Biotechnology / Pharmaceutical IT Leaders
How IT is Transforming Biotech with AI | Anthony Murabito on Data, Security & Innovation

Biotech Bytes: Conversations with Biotechnology / Pharmaceutical IT Leaders

Play Episode Listen Later Jun 19, 2025 37:35 Transcription Available


How IT is Transforming Biotech with AI | Anthony Murabito on Data, Security & Innovation #biotech #informationtechnology #aiinbiotechCan IT really revolutionize a biotech company's success in the AI era?In this episode, I talk with Anthony Murabito, VP of IT and Head of Data Security at Wave Life Sciences, to uncover how modern biotech companies are using AI to accelerate research, enhance security, and optimize workflows. Please visit our website to get more information: https://swangroup.net/ We dive into the real-world role of IT in biotech from crafting AI policies to managing data protection and aligning IT with R&D and commercial goals. Whether it's pharmacology modeling or auto-reporting for sales teams, AI is reshaping everything. If you're in life sciences, tech, or leadership, this conversation will give you practical tips, a new mindset, and fresh strategies to maximize IT's impact. Subscribe to hear more on AI in biotech, data governance, and tech-driven leadership.Links from this episode:✅ Get to know more about Anthony Murabito: https://www.linkedin.com/in/tonymurabito ✅ Learn more about Wave Life Sciences: https://www.wavelifesciences.com

Smart Software with SmartLogic
LangChain: LLM Integration for Elixir Apps with Mark Ericksen

Smart Software with SmartLogic

Play Episode Listen Later Jun 12, 2025 38:18


Mark Ericksen, creator of the Elixir LangChain framework, joins the Elixir Wizards to talk about LLM integration in Elixir apps. He explains how LangChain abstracts away the quirks of different AI providers (OpenAI, Anthropic's Claude, Google's Gemini) so you can work with any LLM in one more consistent API. We dig into core features like conversation chaining, tool execution, automatic retries, and production-grade fallback strategies. Mark shares his experiences maintaining LangChain in a fast-moving AI world: how it shields developers from API drift, manages token budgets, and handles rate limits and outages. He also reveals testing tactics for non-deterministic AI outputs, configuration tips for custom authentication, and the highlights of the new v0.4 release, including “content parts” support for thinking-style models. Key topics discussed in this episode: • Abstracting LLM APIs behind a unified Elixir interface • Building and managing conversation chains across multiple models • Exposing application functionality to LLMs through tool integrations • Automatic retries and fallback chains for production resilience • Supporting a variety of LLM providers • Tracking and optimizing token usage for cost control • Configuring API keys, authentication, and provider-specific settings • Handling rate limits and service outages with degradation • Processing multimodal inputs (text, images) in Langchain workflows • Extracting structured data from unstructured LLM responses • Leveraging “content parts” in v0.4 for advanced thinking-model support • Debugging LLM interactions using verbose logging and telemetry • Kickstarting experiments in LiveBook notebooks and demos • Comparing Elixir LangChain to the original Python implementation • Crafting human-in-the-loop workflows for interactive AI features • Integrating Langchain with the Ash framework for chat-driven interfaces • Contributing to open-source LLM adapters and staying ahead of API changes • Building fallback chains (e.g., OpenAI → Azure) for seamless continuity • Embedding business logic decisions directly into AI-powered tools • Summarization techniques for token efficiency in ongoing conversations • Batch processing tactics to leverage lower-cost API rate tiers • Real-world lessons on maintaining uptime amid LLM service disruptions Links mentioned: https://rubyonrails.org/ https://fly.io/ https://zionnationalpark.com/ https://podcast.thinkingelixir.com/ https://github.com/brainlid/langchain https://openai.com/ https://claude.ai/ https://gemini.google.com/ https://www.anthropic.com/ Vertex AI Studio https://cloud.google.com/generative-ai-studio https://www.perplexity.ai/ https://azure.microsoft.com/ https://hexdocs.pm/ecto/Ecto.html https://oban.pro/ Chris McCord's ElixirConf EU 2025 Talk https://www.youtube.com/watch?v=ojL_VHc4gLk Getting started: https://hexdocs.pm/langchain/gettingstarted.html https://ash-hq.org/ https://hex.pm/packages/langchain https://hexdocs.pm/igniter/readme.html https://www.youtube.com/watch?v=WM9iQlQSFg @brainlid on Twitter and BlueSky Special Guest: Mark Ericksen.

TD Ameritrade Network
Shana Sissel on Fed's Path, Inflation Data & Security Stock Picks

TD Ameritrade Network

Play Episode Listen Later Jun 12, 2025 8:16


Shana Sissel says tariffs complicate the Fed's fight against inflation because of uncertainty. She believes the central bank is waiting for a way to justify a rate cut, but doesn't believe one is coming soon. Shana is positioning her portfolio for further volatility and provides several stock picks she likes, including CrowdStrike (CRWD) and Leidos (LDOS). ======== Schwab Network ========Empowering every investor and trader, every market day.Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about

Next in Marketing
Should Paypal be building an ad business?

Next in Marketing

Play Episode Listen Later Jun 11, 2025 22:10


Next in Media spoke with Dr. Mark Grether SVP & General Manager, PayPal Ads, on why he thinks the company's 'transaction graph' may be even more powerful than some retailers' data for advertising, and why there's nothing to worry about with a company that has so many people's banking information to use that data for ad targeting. 

The Tech Leader's Playbook
What Does It Take to Lead Through Chaos and Still Win?

The Tech Leader's Playbook

Play Episode Listen Later Jun 11, 2025 47:24


In this episode of The Tech Leader's Playbook, Avetis Antaplyan interviews Philip Merrick, a seasoned technologist and CEO of pgEdge. They discuss Merrick's journey in the tech industry, the evolution of leadership styles, the importance of building great teams, and the vision behind pgEdge. The conversation also covers the evolution of cloud computing, data security, and fostering a culture of innovation within teams. In this conversation, Phillip Merrick shares his insights on the importance of mentorship in career growth, the key lessons for emerging leaders, and how to stay ahead of technology trends. He emphasizes the significance of building trust and accountability within teams and discusses the exciting potential of AI in leadership. Merrick distills his entrepreneurial philosophy into actionable advice, highlighting the need for adaptability and genuine care for team members.TakeawaysThe web protocols allowed for the automation of information exchange.Leadership styles evolve with experience and challenges faced.A great team is more important than a great idea.Transparency with the team builds trust and commitment.Curiosity drives innovation and problem-solving.Incremental innovation is often more impactful than radical changes.Cloud concentration risk is a growing concern for regulated industries.Data security and compliance are critical in software development.Fostering a culture of curiosity leads to better adaptability.Asking the right questions in interviews reveals a candidate's mindset.Mentorship is crucial for career growth and success.Emerging leaders should focus on articulating mission, vision, and values.Technology must be contextualized within business and societal trends.Building trust is essential for effective teamwork and accountability.AI has the potential to enhance leadership and management practices.Adaptability is key to overcoming challenges in entrepreneurship.Caring for team members fosters loyalty and engagement.Clear communication of company values prevents cultural drift.A strong team culture can be a competitive advantage. Chapters00:00 The Genesis of Innovation04:07 Leadership Evolution and Challenges08:52 Building a Great Team12:00 The Vision Behind pgEdge17:57 Navigating Cloud Evolution20:54 Data Security and Compliance23:55 Fostering Innovation and Adaptability27:38 The Importance of Mentorship in Career Growth31:19 Key Lessons for Emerging Leaders34:07 Staying Ahead of Technology Trends39:43 Building Trust and Accountability in Teams40:44 Exciting Trends in AI and Leadership43:16 Core Entrepreneurial PhilosophyPhillip Merrick's Social Media Links:https://www.linkedin.com/in/phillipmerrick/Phillip Merrick's Website:https://www.pgedge.com/Resources and Links:https://www.hireclout.comhttps://www.podcast.hireclout.comhttps://www.linkedin.com/in/hirefasthireright

Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Ep. 246 Thales Powers Federal Data Security Against Quantum-Era Threats

Federal Tech Podcast: Listen and learn how successful companies get federal contracts

Play Episode Listen Later Jun 10, 2025 25:40


Connect to John Gilroy on LinkedIn   https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com Years ago, the headline “Data Breach” was shocking; today, it is common. That may not be a problem for some, but the federal government maintains data stores that contain information about finances, health, and military matters. A recent report has shown that 50% of federal agencies have reported data breaches. It appears that it's time to find a solution. Today, we sat down with Blain Canavan from Thales Group to examine the usual suspects and the potential threats ahead. THE USUAL SUSPECTS:   MFA:  Protecting data can be accomplished with something as basic as phishing-resistant Multi-Factor Authentication. The first step in identity management can significantly reduce threats. Encryption: Deploying encryption can protect data at rest, in transit, and memory. Keys to the Kingdom: Little-known methods of managing the PKI system can help reduce risk in protecting data. THEAT DOWN THE ROAD: QUANTUM Now that you have checked the boxes for basic data protection, it is time to get a grasp on what lies ahead. We have read about quantum cryptography for twenty years. Today, we have pre-standardized quantum-resistant cryptographic algorithms available. One needs to take action a little sooner. During the interview, Blair Canavan highlights the proactive measures taken by the US federal government, including the implementation of PQC-safe digital signatures by 2025. The “down the road” also has a delimitation -- Blair emphasizes the urgency of replacing outdated cryptographic methods, such as RSA and ECC, by 2030 and 2035, respectively. Include the 2024 data threat report. = ==

Three Cartoon Avatars
EP 146: Bipul Sinha (CEO, Rubrik) on The New Rules of Silicon Valley

Three Cartoon Avatars

Play Episode Listen Later Jun 6, 2025


Logan sits down with Bipul Sinha, CEO and co-founder of Rubrik and former VC at Lightspeed and Blumberg Capital. Bipul shares what he learned transitioning from investor to founder, why intuition beats expertise, and how he built Rubrik into a category-defining business by betting on uncool ideas. They talk product-market fit in the AI era, what most VCs get wrong today, and why the enterprise IT market is still just getting started. It's a conversation packed with hard-earned wisdom and bold takes on building lasting companies. (00:00) Intro (01:42) Transitioning from VC to Founder (02:27) The Genesis of Rubrik (03:30) Navigating Uncertainty in Business (06:57) Product Market Fit and Early Success (08:56) Evolving with the Market (13:14) AI and Data Security (18:53) Leadership and Intuition (28:34) Building a Transparent Culture (31:52) Handling Tough Questions in Board Meetings (33:28) Changing Perspectives Over Time (34:57) Traits of Successful Entrepreneurs (36:46) The Future of Venture Capital and Startups (40:38) Balancing Forward and Lateral Motion in Business (42:35) The Impact of AI on Various Industries (01:00:28) The Evolution of Work and Technology (01:02:52) Fostering a Collaborative Company Culture (01:04:56) Looking Ahead: The Future of Rubrik Executive Producer: Rashad Assir Producer: Leah Clapper Mixing and editing: Justin Hrabovsky Check out Unsupervised Learning, Redpoint's AI Podcast: https://www.youtube.com/@UCUl-s_Vp-Kkk_XVyDylNwLA

Cybercrime Magazine Podcast
2025 State of Data Security. Latest Threats & More. Mike Thompson, Varonis.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 4, 2025 15:03


Mike Thompson is the Director, Cloud and Security Architecture at Varonis. In this episode, he joins host Paul John Spaulding to discuss Varonis' 2025 State of Data Security report, including the latest threats, how companies can stay protected, and more. This episode is brought to you by Varonis, whose AI-powered data security platform secures your data at scale – across IaaS, SaaS, and hybrid cloud environments. To learn more about our sponsor, visit https://www.Varonis.com.

The Future of Supply Chain
Episode 112: Smarter, Greener, Faster: AI-Driven Supply Chain Trends in Retail for 2025 with SAP's Amanda Spencer

The Future of Supply Chain

Play Episode Listen Later Jun 4, 2025 20:25 Transcription Available


This episode delves into the dynamic future of retail, spotlighting the pivotal role of AI in reshaping supply chains and customer interactions by 2025. Experts discuss how retailers are harnessing AI to deliver hyper-personalized shopping experiences, leveraging clean data to anticipate consumer needs and optimize inventory. The conversation explores the increasing importance of sustainability, with brands adopting eco-friendly practices and transparent supply chains to meet conscious consumer demands. The rise of social commerce platforms like TikTok is also examined, revealing how retailers are integrating social media into their sales strategies and supply chain management for unprecedented agility. This episode offers valuable insights into how technology, strategic data utilization, and a commitment to sustainability are converging to redefine the retail landscape and create new opportunities for brands and consumers alike.

Artificial Intelligence in Industry with Daniel Faggella
Driving Data Security in Unstructured and Structured Data for Customer Analytics - with Jiaxi Zhu of Google

Artificial Intelligence in Industry with Daniel Faggella

Play Episode Listen Later Jun 3, 2025 26:21


Today's guest is Jiaxi Zhu, Head of Analytics & Insights at Google. Jiaxi joins Emerj Editorial Director Matthew DeMello to explore how enterprises can strengthen data security and governance as customer analytics increasingly relies on both structured and unstructured data. As organizations expand their use of sources like call transcripts, social media posts, and third-party platforms, traditional data protection models are no longer sufficient. Jiaxi explains how modernizing data governance with comprehensive data dictionaries and metadata management is essential for understanding data lineage and ensuring compliance. Learn how brands work with Emerj and other Emerj Media options at emerj.com/ad1. Want to share your AI adoption story with executive peers? Click emerj.com/expert2 for more information and to be a potential future guest on the ‘AI in Business' podcast!

Cybercrime Magazine Podcast
Data Security. Marks & Spencer Hit By Ransomware Attack. Scott Schober, Author, "Hacked Again."

Cybercrime Magazine Podcast

Play Episode Listen Later May 30, 2025 18:23


Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss the ransomware attack that recently hit Marks & Spencer. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com

Microsoft Business Applications Podcast
Why Copilot Fails Without Data Security

Microsoft Business Applications Podcast

Play Episode Listen Later May 28, 2025 23:53 Transcription Available


Get featured on the show by leaving us a Voice Mail: https://bit.ly/MIPVM FULL SHOW NOTES https://www.microsoftinnovationpodcast.com/692 When organizations rush to adopt AI tools like Microsoft Copilot, they often overlook a critical prerequisite: a secure, well-structured data environment. In this episode, Åsne Holtklimpen—Cloud Solution Architect at Crayon and Microsoft MVP—shares how her journey from SharePoint veteran to Copilot expert revealed a hard truth: without strong information governance, AI can do more harm than good. Åsne walks us through real-world challenges, practical frameworks, and the mindset shift needed to make AI adoption safe, scalable, and truly transformative. KEY TAKEAWAYS Security Before AI: Successful Copilot implementation starts with robust information security—classification, labeling, and governance must come first. Start Small, Scale Smart: Åsne recommends a phased approach using Microsoft Purview, beginning with basic data classification before layering on policies and automation. Expose the Risks: Demonstrating real data exposure—like personal identity numbers or health info—helps organizations understand the urgency of securing their environments. AI Readiness ≠ Cloud Presence: Many companies assume they're ready for AI because they use Teams or SharePoint, but Åsne stresses the need for deeper structural alignment. Public Sector Pressure: Norway's public sector faces a mandate to adopt AI by 2030, but Åsne warns that without guidance and foundational readiness, this push could backfire.  RESOURCES MENTIONED

AWS for Software Companies Podcast
Ep101: Beyond Chat - How Asana and Amazon Q Are Embedding AI Into Enterprise Workflows

AWS for Software Companies Podcast

Play Episode Listen Later May 27, 2025 25:13


Victoria Chin of Asana and Michael Horn of AWS demonstrate how Amazon Q integrates with Asana to enable AI-powered workflows while dramatically reducing manual work and improving cross-functional collaboration.Topics Include:Victoria Chin introduces herself as Asana's CPO Chief of StaffMichael Horn from AWS discusses customer feedback on generative AIAI agents limited by quality of data pulled into themAmazon Q Business created to analyze information and take actionHundreds of customers using Q Business across various industries dailyAWS hosts most business applications, ideal for AI journeyAmazon Q has most built-in, managed, secure data connectors availableQ Index creates comprehensive, accessible index of all company dataSecurity permissions automatically pulled in, no manual configuration neededSupports both structured and unstructured data from multiple sourcesVictoria returns to discuss Asana's integration with Q IndexBillions invested in integrations, but usage still lags behindTeams switch between apps 1000 times daily, missing connectionsRoot problem: no reliable way to track who/what/when/whyContent platforms store work but don't manage or coordinateAsana bridges content and communication for effective teamwork scalingAI disrupting software, but questions remain about real valueSoftware must provide structured framework to guide LLMs effectivelyAI needs data AND structure to separate signal from noiseAsana Work Graph maps how work actually gets done organizationallyWork Graph visualized as interconnected data, not rows and columnsMost strategic work is cross-functional, requiring multiple teams collaboratingTraditional integrations require manual setup and knowing when to useQ Index gives Asana access to 40+ different data connectorsUsers can ask questions, get answers with cross-application contextAI Studio enables no-code building of workflows with AI agentsProduct launch example shows intake, planning, execution, and reporting stagesAI can surface relevant documents, research, and updates automaticallyChat is tip of iceberg; real power comes from embedded workflowsIntegration evolves from feature-level to AI-powered product-level connectionsParticipants:Victoria J. Chin – Chief of Staff / Product Strategy, AI, AsanaMichael Horn – Principal Head of Business Development – Artificial Intelligence & Machine Learning, AWSSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon/isv/

Rebel Tech
The Rebel Tech Podcast | Episode 22: Phones in The Classroom

Rebel Tech

Play Episode Listen Later May 21, 2025 17:58


On this episode of the Rebel Tech Podcast, TPPF's John Mondi is joined by Richardson ISD Assistant Superintendent Dr. Matthew Gibbins and Jeanne Mallory,  a teacher from Rancier Middle School in Killeen ISD to discuss how their districts have taken the initiative to eliminate the distractions of phones in the classroom as well as some potential support from the state in the form of legislation. 

Oracle University Podcast
Oracle GoldenGate 23ai Security Strategies

Oracle University Podcast

Play Episode Listen Later May 20, 2025 16:13


GoldenGate 23ai takes security seriously, and this episode unpacks everything you need to know. GoldenGate expert Nick Wagner breaks down how authentication, access roles, and encryption protect your data.   Learn how GoldenGate integrates with identity providers, secures communication, and keeps passwords out of storage. Understand how trail files work, why they only store committed data, and how recovery processes prevent data loss.   Whether you manage replication or just want to tighten security, this episode gives you the details to lock things down without slowing operations.   Oracle GoldenGate 23ai: Fundamentals: https://mylearn.oracle.com/ou/course/oracle-goldengate-23ai-fundamentals/145884/237273 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu   Special thanks to Arijit Ghosh, David Wright, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode.   --------------------------------------------------------------   Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:25 Lois: Hello and welcome to the Oracle University Podcast! I'm Lois Houston, Director of Innovation Programs with Oracle University, and with me is Nikita Abraham, Team Lead: Editorial Services.  Nikita: Welcome, everyone! This is our fourth episode on Oracle GoldenGate 23ai. Last week, we discussed the terminology, different processes and what they do, and the architecture of the product at a high level. Today, we have Nick Wagner back with us to talk about the security strategies of GoldenGate. 00:56 Lois: As you know by now, Nick is a Senior Director of Product Management for GoldenGate at Oracle. He's played a key role as one of the product designers behind the latest version of GoldenGate. Hi Nick! Thank you for joining us again. Can you tell us how GoldenGate takes care of data security? Nick: So GoldenGate authentication and authorization is done in a couple of different ways. First, we have user credentials for GoldenGate for not only the source and target databases, but also for GoldenGate itself. We have integration with third-party identity management products, and everything that GoldenGate does can be secured. 01:32 Nikita: And we must have some access roles, right? Nick: There's four roles built into the GoldenGate product. You have your security role, administrator, operator, and user. They're all hierarchical. The most important one is the security user. This user is going to be the one that provides the administrative tasks. This user is able to actually create additional users and assign roles within the product. So do not lose this password and this user is extremely important. You probably don't want to use this security user as your everyday user. That would be your administrator. The administrator role is able to perform all administrative tasks within GoldenGate. So not only can they go in and create new extracts, create new replicats, create new distribution services, but they can also start and stop them. And that's where the operator role is and the user role. So the operator role allows you to go in and start/stop processes, but you can't create any new ones, which is kind of important. So this user would be the one that could go in and suspend activity. They could restart activity. But they can't actually add objects to replication. The user role is really a read-only role. They can come in. They can see what's going on. They can look at the log files. They can look at the alerts. They can look at all the watches and see exactly what GoldenGate is doing. But they're unable to make any changes to the product itself. 02:54 Lois: You mentioned the roles are hierarchical in nature. What does that mean? Nick: So anything that the user role does can be done by the operator. Anything that the operator and user roles can do can be done by the administrator. And anything that the user, operator, and administrator roles do can be done by the security role. 03:11 Lois: Ok. So, is there a single sign-on available for GoldenGate? Nick: We also have a password plugin for GoldenGate Connections. A lot of customers have asked for integration with whatever their single sign-on utility is, and so GoldenGate now has that with GoldenGate 23ai. So these are customer-created entities. So, we have some examples that you can use in our documentation on how to set up an identity provider or a third-party identity provider with GoldenGate. And this allows you to ensure that your corporate standards are met. As we started looking into this, as we started designing it, every single customer wanted something different. And so instead of trying to meet the needs for every customer and every possible combination of security credentials, we want you to be able to design it the way you need it. The passwords are never stored. They're only retrieved from the identity provider by the plugin itself. 04:05 Nikita: That's a pretty important security aspect…that when it's time to authenticate a user, we go to the identity provider. Nick: We're going to connect in and see if that password is matching. And only then do we use it. And as soon as we detect that it's matched, that password is removed. And then for the extract and replicats themselves, you can also use it for the database, data source, and data target connections, as well as for the GoldenGate users. So, it is a full-featured plugin. So, our identity provider plugin works with IAM as well as OAM. These are your standard identity manager authentication methods. The standard one is OAuth 2, as well as OIDC. And any Identity Manager that uses that is able to integrate with GoldenGate. 04:52 Lois: And how does this work? Nick: The way that it works is pretty straightforward. Once the user logs into the database, we're going to hand off authentication to the identity provider. Once the identity provider has validated that user's identity and their credentials, then it comes back to GoldenGate and says that user is able to log in to either GoldenGate or the application or the database. Once the user is logged in, we get that confirmation that's been sent out and they can continue working through GoldenGate. So, it's very straightforward on how it works. There's also a nice little UI that will help set up each additional user within those systems. All the communication is also secured as well. So any communication done through any of the GoldenGate services is encrypted using HTTPS. All the REST calls themselves are all done using HTTPS as well. All the data protection calls and all the communication across the network when we send data across a distribution service is encrypted using a secure WebSocket. And there's also trail file encryption at the operating system level for data at REST. So, this really gives you the full level of encryption for customers that need that high-end security. GoldenGate does have an option for FIPS 140-2 compliance as well. So that's even a further step for most of those customers. 06:12 Nikita: That's impressive! Because we want to maintain the highest security standards, right? Especially when dealing with sensitive information. I now want to move on to trail files. In our last episode, we briefly spoke about how they serve as logs that record and track changes made to data. But what more can you tell us about them, Nick? Nick: There's two different processes that write to the trail files. The extract process will write to the trail file and the receiver service will write to the trail file. The extract process is going to write to the trail file as it's pulling data out of that source database. Now, the extract process is controlled by a parameter file, that says, hey, here's the exact changes that I'm going to be pulling out. Here's the tables. Here's the rows that I want. As it's pulling that data out and writing it to the trail files, it's ensuring that those trail files have enough information so that the replicat process can actually construct a SQL statement and apply that change to that target platform. And so there's a lot of ways to change what's actually stored in those trail files and how it's handled. The trail files can also be used for initial loads. So when we do the initial load through GoldenGate, we can grab and write out the data for those tables, and that excludes the change data. So initial loads is pulling the data directly from the tables themselves, whereas ongoing replication is pulling it from the transaction logs. 07:38 Lois: But do we need to worry about rollbacks? Nick: Our trail files contain committed data only and all data is sequential. So this is two important things. Because it contains committed data only, we don't need to worry about rollbacks. We also don't need to worry about position within that trail file because we know all data is sequential. And so as we're reading through the trail file, we know that anything that's written in a prior location in that trial file was committed prior to something else. And as we get into the recovery aspects of GoldenGate, this will all make a lot more sense. 08:13 Lois: Before we do that, can you tell us about the naming of trail files? Nick: The trail files as far as naming, because these do reside on the operating system, you start with a two-letter trail file abbreviation and then a nine-digit sequential value. So, you almost look at it as like an archive log from Oracle, where we have a prefix and then an affix, which is numeric. Same kind of thing. So, we have our two-letter, in this case, an ab, and then we have a nine-digit number. 08:47 Transform the way you work with Oracle Database 23ai! This cutting-edge technology brings the power of AI directly to your data, making it easier to build powerful applications and manage critical workloads. Want to learn more about Database 23ai? Visit mylearn.oracle.com to pick from our range of courses and enroll today! 09:12 Nikita: Welcome back! Ok, Nick. Let's get into the GoldenGate recovery process. Nick: When we start looking at the GoldenGate recovery process, it essentially makes GoldenGate kind of point-in-time like. So on that source database, you have your extract process that's going to be capturing data from the transaction logs. In the case of Oracle, the Oracle Database is actually going to be reading those transaction logs from us and passing the change records directly to GoldenGate. We call them an LCR, Logical Change Record. And so the integrated extract and GoldenGate, the extract portion tells the database, hey, I'm now going to be interested in the following list of tables. And it gives a list of tables to that internal component, the log mining engine within the database. And it says, OK, I'm now pulling data for those tables and I'm going to send you those table changes. And so as the extract process gets sent those changes, it's going to have checkpoint information. So not only does it know where it was pulling data from out of that source database, but what it's also writing to the trail file. The trail files themselves are all sequential and they have only committed data, as we talked about earlier. The distribution service has checkpoint information that says, hey, I know where I'm reading from in the previous trail file, and I know what I've sent across the network. The receiver service is the same thing. It knows what it's receiving, as well as what it's written to the trail file and the target system. The replicat also has a checkpoint. It knows where it's reading from in the trail file, and then it knows what it's been applying into that target database.  This is where things start to become a little complicated. Our replicat process in most cases are parallel, so it'll have multiple threads applying data into that target database. Each of those threads is applying different transactions. And because of the way that the parallelism works in the replicat process, you can actually get situations where one replicat thread might be applying a transaction higher than another thread. And so you can eliminate that sequential or serial aspect of it, and we can get very high throughput speeds to the replicat. But it means that the checkpoint needs to be kind of smart enough to know how to rebuild itself if something fails. 11:32 Lois: Ok, sorry Nick, but can you go through that again? Maybe we can work backwards this time?  Nick: If the replicat process fails, when it comes back up, it's going to look to its checkpoint tables inside that target database. These checkpoint tables keep track of where each thread was at when it crashed. And so when the replicat process restarts, it goes, oh, I was applying these threads at this location in these SCNs. It'll then go and read from the trail file and say, hey, let me rebuild that data and it only applies transactions that it hasn't applied yet to that target system. There is a synchronized replicat command as well that will tell a crashed replicat to say, hey, bring all your threads up to the same high watermark. It does that process automatically as it restarts and continues normal replication. But there is an option to do it just by itself too. So that's how the replicat kind of repairs and recovers itself. It'll simply look at the trail files. Now, let's say that the replicat crashed, and it goes to read from the trail files when it restarts and that trail profile is missing. It'll actually communicate to the distribution, or excuse me, to the receiver service and say, hey, receiver service, I don't have this trail file. Can you bring it back for me? And the receiver service will communicate downstream and say, hey, distribution service, I need you to resend me trail find number 6. And so the distribution service will resend that trail file so that the replicat can reprocess it. So it's often nice to have redundant environments with GoldenGate so we can have those trail files kind of around for availability. 13:13 Nikita: What if one of these files gets corrupted? Nick: If one of those trail files is corrupt, let's say that a trail file on the target site became corrupt and the replicat can't read from it for one reason or another. Simply stop the replicat process, delete the corrupt trail file, restart the replicat process, and now it's going to rebuild that trail file from scratch based on the information from the source GoldenGate environment. And so it's very recoverable. Handles it all very well. 13:40 Nikita: And can the extract process bounce back in the same way? Nick: The extract process can also recover in a similar way. So if the extract process crashes, when it restarts itself, there's a number of things that it does. The first thing is it has to rebuild any open transactions. So it keeps all sorts of checkpoint information about the oldest transaction that it's keeping track of, any open transactions that haven't been committed, and any other transactions that have been committed that it's already written to the trail file. So as it's reprocessing that data, it knows exactly what it's committed to trail and what hasn't been committed. And there's a number of ways that it does this.  There's two main components here. One of them is called bounded recovery. Bounded recovery will allow you to set a time limit on transactions that span a certain length of time that they'll actually get flushed out to disk on that GoldenGate Hub. And that way it'll reduce the amount of time it takes GoldenGate to restart the extract process. And the other component is cache manager. Cache manager stores uncommitted transactions. And so it's a very elegant way of rebuilding itself from any kind of failure. You can also set up restart profiles so that if any process does crash, the GoldenGate service manager can automatically restart that service an x number of times across y time span. So if I say, hey, if my extract crashes, then attempt to restart it 100 times every 5 seconds. So there's a lot of things that you can do there to make it really nice and automatic repair itself and automatically resilient.  15:18 Lois: Well, that brings us to the end of this episode. Thank you, Nick, for going through the security strategies and recovery processes in such detail. Next week, we'll look at the installation of GoldenGate. Nikita: And if you want to learn more about the topics we discussed today, head over to mylearn.oracle.com and take a look at the Oracle GoldenGate 23ai Fundamentals course. Until next time, this is Nikita Abraham… Lois: And Lois Houston signing off! 15:44 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.

TD Ameritrade Network
AVPT Powers Ahead: Growth Driven by Data Security & A.I. Demand

TD Ameritrade Network

Play Episode Listen Later May 9, 2025 7:39


Avepoint (AVPT) had a strong quarter, with over 20% year-over-year growth in all three regions and customer segments. CFO Jim Caci credits the company's focus on profitable growth and controlling what it can in an uncertain environment. He also highlights the growing importance of data security, governance, and resilience, particularly in the Microsoft (MSFT), Alphabet (GOOGL), and Salesforce (CRM) environments where Avepoint operates.======== Schwab Network ========Empowering every investor and trader, every market day.Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about

Artificial Intelligence in Industry with Daniel Faggella
Navigating Challenges and Solutions in Data Security with AI - with Dimitri Sirota of BigID

Artificial Intelligence in Industry with Daniel Faggella

Play Episode Listen Later May 8, 2025 29:28


As enterprises double down on generative AI initiatives, the intersection of data security, privacy, and unstructured data is quickly becoming mission-critical. In this episode, Dimitri Sirota, Co-founder and CEO of BigID, joins the podcast to explore how AI transformation is reshaping enterprise data governance, security, and compliance—and why understanding your “crown jewel” data is essential to building trustworthy AI systems. Dimitri outlines the three major forces driving today's enterprise data challenges: accelerated cloud migration, a rising tide of global data privacy regulations, and the explosion of generative AI tools that rely on sensitive, unstructured data. He explains how enterprises can gain visibility into their AI programs and the data fueling them, mitigate shadow AI risks, and prepare for the next wave of agentic systems by adopting zero-trust models and real-time monitoring strategies. This episode is sponsored by BigID. Learn how BigID helps enterprises govern AI, mitigate data risk, and stay compliant here.

Afternoon Drive with John Maytham
Factory reset fallacy: Why your data's is still at risk

Afternoon Drive with John Maytham

Play Episode Listen Later May 7, 2025 7:55


John Maytham is joined by Tech Journalist and Editor and Publisher of Stuff, Toby Shapshak, to unpack the hidden risks of discarding or selling old electronic devices. Despite factory resets, studies show that personal data — including passports, medical records, and passwords — often remains recoverable on second-hand electronics. Follow us on:CapeTalk on Facebook: www.facebook.com/CapeTalkCapeTalk on TikTok: www.tiktok.com/@capetalkCapeTalk on Instagram: www.instagram.com/capetalkzaCapeTalk on YouTube: www.youtube.com/@CapeTalk567CapeTalk on X: www.x.com/CapeTalkSee omnystudio.com/listener for privacy information.

Microsoft Mechanics Podcast
Data security for agents and 3rd party AI in Microsoft Purview

Microsoft Mechanics Podcast

Play Episode Listen Later May 6, 2025 9:46 Transcription Available


Stay in control as GenAI adoption accelerates across your organization using Data Security Posture Management for AI in Microsoft Purview. With built-in visibility into how AI apps and agents interact with sensitive data—whether inside Microsoft 365 or across unmanaged consumer tools—you can detect risks early, take decisive action, and enforce the right protections without slowing innovation. Monitor usage trends, investigate prompts and responses, and respond to potential data oversharing or policy violations in real time. From compliance-ready audit logs to adaptive data protection, you'll have the insights and tools to keep data secure as AI becomes a part of everyday work. Shilpa Ranganathan, Microsoft Purview Principal Group PM, shares how to balance GenAI innovation with enterprise-grade data governance and security. ► QUICK LINKS: 00:00 - GenAI app security, governance, & compliance 01:30 - Take Action with DSPM for AI 02:08 - Activity logging 02:32 - Control beyond Microsoft services 03:09 - Use DSPM for AI to monitor data risk 05:06 - ChatGPT Enterprise 05:36 - Set AI Agent guardrails using DSPM for AI 06:44 - Data oversharing 08:30 - Audit logs 09:19 - Wrap up ► Link References Check out https://aka.ms/SecureGovernAI ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft.  • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics  

Microsoft Mechanics Podcast
Unified data access & security with OneLake

Microsoft Mechanics Podcast

Play Episode Listen Later May 6, 2025 8:33 Transcription Available


Unify and secure your data—no matter where it lives—without sacrificing control using OneLake security, part of Microsoft Fabric. With granular permissions down to the row, column, and table level, you can confidently manage access across engines like Power BI, Spark, and T-SQL, all from one place. Discover, label, and govern your data with clarity using the integrated OneLake catalog that surfaces the right items fast. Aaron Merrill, Microsoft Fabric Principal Program Manager, shows how you can stay in control, from security to discoverability—owning, sharing, and protecting data on your terms. ► QUICK LINKS: 00:00 - OneLake & Microsoft Fabric core concepts 01:28 - Table level security 02:11 - Column level security 03:06 - Power BI report 03:28 - Row level security 04:23 - Data classification options 05:19 - OneLake catalog 06:22 - View and manage data 06:48 - Governance 07:36 - Microsoft Fabric integration 07:59 - Wrap up ► Link References Check out our blog at https://aka.ms/OneLakeSecurity Sign up for a 60-day free trial at https://fabric.microsoft.com ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics  

Cybercrime Magazine Podcast
Data Security. OCC Suffers Major Cyber Breach. Scott Schober, Author, "Hacked Again."

Cybercrime Magazine Podcast

Play Episode Listen Later May 2, 2025 18:12


Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss a cyberattack on The Office of the Comptroller of the Currency. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com

The MongoDB Podcast
EP. 264 Beyond the Database: Mastering Multi-Cloud Data, AI Automation & Integration (feat. Peter Ngai, SnapLogic)

The MongoDB Podcast

Play Episode Listen Later May 1, 2025 58:31


✨ Heads up! This episode features a demonstration of the SnapLogic UI and its AI Agent Creator towards the end. For the full visual experience, check out the video version on the Spotify app! ✨(Episode Summary)Tired of tangled data spread across multiple clouds, on-premise systems, and the edge? In this episode, MongoDB's Shane McAllister sits down with Peter Ngai, Principal Architect at SnapLogic, to explore the future of data integration and management in today's complex tech landscape.Dive into the challenges and solutions surrounding modern data architecture, including:Navigating the complexities of multi-cloud and hybrid cloud environments.The secrets to building flexible, resilient data ecosystems that avoid vendor lock-in.Strategies for seamless data integration and connecting disparate applications using low-code/no-code platforms like SnapLogic.Meeting critical data compliance, security, and sovereignty demands (think GDPR, HIPAA, etc.).How AI is revolutionizing data automation and providing faster access to insights (featuring SnapLogic's Agent Creator).The powerful synergy between SnapLogic and MongoDB, leveraging MongoDB both internally and for customer integrations.Real-world applications, from IoT data processing to simplifying enterprise workflows.Whether you're an IT leader, data engineer, business analyst, or simply curious about cloud strategy, iPaaS solutions, AI in business, or simplifying your data stack, Peter offers invaluable insights into making data connectivity a driver, not a barrier, for innovation.-Keywords: Data Integration, Multi-Cloud, Hybrid Cloud, Edge Computing, SnapLogic, MongoDB, AI, Artificial Intelligence, Data Automation, iPaaS, Low-Code, No-Code, Data Architecture, Data Management, Cloud Data, Enterprise Data, API Integration, Data Compliance, Data Sovereignty, Data Security, Business Automation, ETL, ELT, Tech Stack Simplification, Peter Ngai, Shane McAllister.

Corruption Crime & Compliance
DOJ Issues Data Security Program Requirements

Corruption Crime & Compliance

Play Episode Listen Later Apr 28, 2025 19:17


Could your routine data transfers now violate federal law? The DOJ's new Data Security Program (DSP) targets the flow of U.S. sensitive personal and government data to foreign adversaries — and the clock is ticking. In this episode of Corruption, Crime and Compliance, Michael Volkov breaks down the Justice Department's sweeping new Data Security Program, enacted under Executive Order 14117 and finalized in January 2025.You'll hear him discuss:The origins of the DSP, created through Executive Order 14117 under the Trump Administration, and the key national security concerns it addresses.What constitutes a “covered data transaction” and the thresholds for U.S. personal and government data that trigger compliance obligations.The list of “countries of concern” and what it means for companies doing business with entities tied to these regions.The types of U.S. data covered by the DSP, including biometric, genomic, financial, and geolocation data, and the specific quantity thresholds that trigger restrictions.Why data brokerage and bulk human genomic data transactions are prohibited outright, raising new compliance challenges for affected industries.How “restricted transactions” like cloud computing services and vendor agreements are subject to conditional exceptions under the DSP.The critical actions U.S. companies must take during the 90-day enforcement hiatus, including vendor assessments, renegotiations, and compliance system updates before the July 8th deadline.ResourcesMichael Volkov on LinkedIn | TwitterThe Volkov Law Group

IpX True North Podcast
AI Readiness Workshop: Demystifying AI with Avishkar Misra of Berrijam AI

IpX True North Podcast

Play Episode Listen Later Apr 28, 2025 35:08 Transcription Available


Dr. Avishkar Misra shares his expertise on implementing AI effectively in businesses and explains how his company Berrijam is making AI accessible, explainable, and useful for organizations of all sizes.• AI is not just one solution but a set of tools, techniques, and frameworks that allows for intelligent decision-making at various scales• Berrijam offers three main services: AI strategy development, custom AI implementation, and their proprietary BerryJam AI focused on analytical applications• The Berrijam AI5C framework breaks down AI capabilities into five areas: Find, Make, Connect, Predict, and Optimize• Organizations need to start with their specific pain points and business requirements before selecting AI tools or implementation strategies• AI will transform jobs rather than simply eliminate them, creating opportunities for those who learn to work alongside AI• Leadership plays a critical role in successful AI adoption by fostering the right cultural framework and strategic approach• The future workplace will see AI handling mundane tasks, allowing professionals to focus on higher-value creative work• The IPX-hosted AI Readiness Workshops will help participants understand AI fundamentals, build business cases, and develop implementation strategiesStay in touch with us! Follow us on social: LinkedIn, Twitter, Facebook Contact us for info on IpX or for interest in being a podcast guest: info@ipxhq.com All podcasts produced by Elevate Media Group.

HPE Tech Talk
What is sovereignty in AI?

HPE Tech Talk

Play Episode Listen Later Apr 24, 2025 23:40


 What does it mean for artificial intelligence to be sovereign? This week, Technology Now explores how more than just data can be sovereign, our AI models using the data can be too. We ask what it actually means for AI models to be sovereign and why companies, and indeed entire countries, would be interested in this concept. Andreas Geiss, Vice-President Automotive & Manufacturing at Aleph Alpha tells us more. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.Andreas Geiss: https://www.linkedin.com/in/andreas-geissSources cited in this week's episode:Data Privacy Framework:https://www.dataprivacyframework.gov/Program-Overviewhttps://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/eu-us-data-transfer-challenges.html Photonic chips: Ahmed, S.R., Baghdadi, R., Bernadskiy, M. et al. Universal photonic artificial intelligence acceleration. Nature 640, 368–374 (2025). https://doi.org/10.1038/s41586-025-08854-xhttps://www.reuters.com/science/lightmatter-shows-new-type-computer-chip-that-could-reduce-ai-energy-use-2025-04-09/History of the cordless home phone:https://www.britishtelephones.com/hawk.htmhttp://www.samhallas.co.uk/repository/sales/cp-ms_43.pdf 

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise

 What does it mean for artificial intelligence to be sovereign? This week, Technology Now explores how more than just data can be sovereign, our AI models using the data can be too. We ask what it actually means for AI models to be sovereign and why companies, and indeed entire countries, would be interested in this concept. Andreas Geiss, Vice-President Automotive & Manufacturing at Aleph Alpha tells us more. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.Andreas Geiss: https://www.linkedin.com/in/andreas-geissSources cited in this week's episode:Data Privacy Framework:https://www.dataprivacyframework.gov/Program-Overviewhttps://www.infosecurityeurope.com/en-gb/blog/regulation-and-policy/eu-us-data-transfer-challenges.html Photonic chips: Ahmed, S.R., Baghdadi, R., Bernadskiy, M. et al. Universal photonic artificial intelligence acceleration. Nature 640, 368–374 (2025). https://doi.org/10.1038/s41586-025-08854-xhttps://www.reuters.com/science/lightmatter-shows-new-type-computer-chip-that-could-reduce-ai-energy-use-2025-04-09/History of the cordless home phone:https://www.britishtelephones.com/hawk.htmhttp://www.samhallas.co.uk/repository/sales/cp-ms_43.pdf 

Command Control Power: Apple Tech Support & Business Talk
614: Navigating AI in IT Consulting: Insights from Michael Thomsen of Origin 84

Command Control Power: Apple Tech Support & Business Talk

Play Episode Listen Later Apr 22, 2025 58:46


Navigating AI in IT Consulting: Insights from Michael Thomsen   In this episode of Command Control Power, hosts welcome Michael Thomsen of Origin 84, dialing in from Australia. Michael shares critical insights into the use of AI in IT consulting. Topics range from the pros and cons of binge-listening to tech podcasts to the practical uses of AI tools like ChatGPT and Google's Gemini. Michael emphasizes the importance of balancing automation with human interaction, sharing examples of how AI can enhance efficiency, such as generating meeting summaries, handling complex client requests, and improving ticketing systems. The discussion also touches on the risks of data leakage, the necessity of well-defined policies, and the future implications of AI in both enhancing productivity and posing security challenges.   00:00 Introduction and Guest Welcome 00:36 Listener Feedback and Follow-Up 02:41 AI Tools in Daily Work 05:51 AI Integration in Business 09:08 Real-World AI Use Cases 13:52 Challenges and Best Practices with AI 23:50 AI in Education and Policy 27:22 Understanding AI Policies and Data Leakage 28:28 Balancing AI Empowerment and Security Risks 29:21 Credential Stuffing and Security Examples 30:49 Implementing Effective AI Policies 32:10 Microsoft Tools for Data Security 35:03 Challenges in Modern Security Practices 39:14 Leveraging AI for Productivity 42:09 AI in Client Communication and Ticketing 47:48 The Human Element in AI Integration 51:32 Concluding Thoughts on AI and Security

Data Security Decoded
The State of Data Security: A Distributed Crisis

Data Security Decoded

Play Episode Listen Later Apr 22, 2025 28:25


Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. Join our host Caleb Tolin and Head of Rubrik Zero Labs Joe Hladik as they dive deep into the evolving landscape of cybersecurity, from incident response to emerging threats. Joe shares insights from two decades of experience, including his work on high-profile cases like the SolarWinds breach, and breaks down the complex relationship between nation-state actors and cybercrime. Learn about the challenges of data sprawl, identity management, and why treating identity as the new perimeter isn't as simple as it seems. Joe also shares insights into the new report from Rubrik Zero Labs, The State of Data Security: A Distributed Crisis. Whether you're a security practitioner or executive, this episode offers valuable perspectives on data security posture management and the future of threat detection.

Cybercrime Magazine Podcast
AI, Data Security, & The CISO's Evolving Role. Insights From Varonis. Yaki Faitelson, Varonis.

Cybercrime Magazine Podcast

Play Episode Listen Later Apr 20, 2025 8:19


Yaki Faitelson is the co-founder and CEO at Varonis. In this episode, he joins host Amanda Glassner to discuss Varonis' AI-powered data security platform, including what CISOs across the industry are saying and whether their goalposts have shifted, as well as how cybersecurity teams of all sizes can address new threats, and more. This episode is brought to you by Varonis, whose AI-powered data security platform secures your data at scale – across IaaS, SaaS, and hybrid cloud environments. To learn more about our sponsor, visit https://Varonis.com.

Coffee w/#The Freight Coach
1179. #TFCP - Ways To Spot Integration Illusions & Improve Data Security!

Coffee w/#The Freight Coach

Play Episode Listen Later Apr 18, 2025 31:47 Transcription Available


In today's episode, we discuss effective back-office integrations in transportation, data processing, and the risks of automation and data security with Sean Smith of Denim! Sean highlights how integrations can help with operational efficiency, reduce errors, and ensure confidence, as well as best practices to minimize risks, such as using different credentials for automation, data limitation, and multi-layer verification due to threats like deepfakes!   About Sean Smith Sean Smith, VP of Product at Denim, has spent 10 years building and scaling products in the financial services and logistics industries. While leading Product at Denim, he has pioneered new capabilities for the factoring space including risk automation and pricing.  Sean has also led work on our client dashboard, job management and collaboration that have revolutionized the process and workflow for broker clients looking to save time on back office operations. He excels at combining his passion for technology with the ability to drive impact on a balance sheet.   Connect with Sean Website: https://www.denim.com/  LinkedIn: https://www.linkedin.com/in/smithseanp/  Twitter (X): https://x.com/smithseanp  

DisrupTV
How is AI changing data security and leadership culture? | Bruno Kurtic and Shanda Gore

DisrupTV

Play Episode Listen Later Apr 18, 2025 58:24


This week on DisrupTV, we interviewed Bruno Kurtic, CEO/Co-founder of Bedrock Security, previously Co-founder of Sumo Logic and Shanda Gore, founder of Mays Associates and author of The PinLeader Path: Identify, Engage, and Develop Effective Human and AI Leadership for Your Organizational Culture. Bruno discussed the convergence of AI and data security, emphasizing the importance of AI governance and the need for enterprises to center data in their security strategies. He highlighted Bedrock Security's metadata lake, which uses AI to classify and manage data at scale, addressing regulatory concerns and improving data security posture. Shanda shared insights on effective leadership in the age of AI, stressing the importance of human-AI collaboration, critical thinking, and ethical AI use. Both guests underscored the evolving landscape of leadership and the necessity for organizations to adapt to AI's growing influence. DisrupTV is a weekly podcast with hosts R "Ray" Wang and Vala Afshar. The show airs live at 11:00 a.m. PT/ 2:00 p.m. ET every Friday. Brought to you by Constellation Executive Network: constellationr.com/CEN.

Thrive LOUD with Lou Diamond
1081: Ed Crump - "Breaking Boundaries in Tech: Alexa and Beyond"

Thrive LOUD with Lou Diamond

Play Episode Listen Later Apr 3, 2025 37:15


What if the next big leap in technology isn't just another gadget, but a transformative bridge to a smarter, more efficient future? In this eye-opening episode of Thrive LouD with Lou Diamond, meet Edward Crump, the remarkable inventor of Amazon Alexa and a significant force behind innovation at companies like Netflix and Nike. Now serving as the CTO of Champion Venture Partners, Crump shares the secrets behind his incredible journey through technology and entrepreneurship. Key Highlights: Discover how a lifelong technologist like Ed Crump started his career by selling his first program at the age of 12 and eventually played a pivotal role in creating Amazon Alexa. Learn about the pioneering projects he led at major companies like Netflix and Nike, and how he transitioned to the venture capital world with Champion Venture Partners. Gain insights into Crump's vision for the future, where personal AIs and smart environments revolutionize our daily lives while respecting data privacy. Understand the importance of interdisciplinary collaboration, as demonstrated by Champion Venture Partners, in driving innovative solutions in sports science, health, and wellness. Join Lou Diamond and Ed Crump on this enlightening exploration into the future of technology and innovation, and discover how you can be a part of this thrilling journey. TIMESTAMPED OVERVIEW 00:00 Entrepreneurial Journey: From Startups to Amazon 06:36 Tech Giants' Race: Amazon Outpaces Apple 09:52 Leveraging Innovation in Digital Experiences 10:40 Future of Personal AI and Data 14:17 Data Privacy Concerns in AI 19:57 New Venture Collaboration Insights 21:20 "Unique Access to Sports Ecosystem" 25:48 "Passion for Management Collaboration" 28:40 "Digital Twins: A Matrix Parallel" 30:52 Sugar-Free Mental Clarity 35:44 "Ed Crump: Coolest Guest Spotlight" Connect with Ed Check out Champion Venture Partners company's website Follow Us:

Code Story
The Gene Simmons of Data Protection – KISS (Keep It Simple, Stupid): A Data Security Dilemma

Code Story

Play Episode Listen Later Apr 2, 2025 24:55


The Gene Simmons of Data P rotection: Protegrity's KISS MethodToday, we are kicking off a new series on the podcast, entitled The Gene Simmons of Data Protection - the KISS Method, brought to you by none other than Protegrity. Protegrity is AI-powered data security for data consumption, offering fine grain data protection solutions, so you can enable your data security, compliance, sharing and analytics.Episode Title: KISS (Keep It Simple, Stupid): A Data Security Dilemma with James RiceIn this episode, we are talking with James Rice, VP at Protegrity. He is going to help us strip away the nonsense, when it comes to securing data, and help us understand why we don't need a fortress... just a kill switch. While companies throw billions at firewalls, AI driven threat detection, and fortress like defenses - attackers still find their way in. James reminds us to keep it simple, with Protegrity's KISS Method which stands for Keep It Simple Stupid - and how when data is useless to attackers, breaches become mere inconveniences instead of existential threats.Questions:What exactly is the KISS method, and how does it apply to cybersecurity?Why are traditional cybersecurity approaches failing to stop breaches?What are some of the biggest myths about security that lead businesses to waste money on ineffective defenses?How do encryption, tokenization, and de-identification work together to make stolen data useless?Can you share an example where a company's focus on complex security backfired, and how a simpler approach could have helped?What's the biggest pushback you hear from companies hesitant to adopt a simpler, data-first security model? If a company wanted to implement the KISS method tomorrow, what are the first three steps they should take?Linkshttps://www.protegrity.com/https://www.linkedin.com/in/jamesrice1/Our Sponsors:* Check out Kinsta: https://kinsta.com* Check out Vanta: https://vanta.com/CODESTORYSupport this podcast at — https://redcircle.com/code-story/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

a16z
Jensen Huang and Arthur Mensch on Winning the Global AI Race

a16z

Play Episode Listen Later Mar 21, 2025 55:03


The global race for AI leadership is no longer just about companies—it's about nations. AI isn't just computing infrastructure; it's cultural infrastructure, economic strategy, and national security all rolled into one.In this episode, Jensen Huang, founder and CEO of NVIDIA, and Arthur Mensch, cofounder and CEO of Mistral, sit down to discuss sovereign AI, national AI strategies, and why every country must take ownership of its digital intelligence.How AI will reshape global economies and GDPThe full AI stack—from chips to models to AI factoriesWhy AI is both a general purpose technology and deeply specializedThe open-source vs. closed AI debate and its impact on sovereigntyWhy no one will build AI for you—you have to do it yourselfIs this the most consequential technology shift of all time? If so, the stakes have never been higher.Resources: Find Arthur on X: https://x.com/arthurmenschFind Anjney on X: https://www.linkedin.com/in/anjney/Find NVIDIA on X: https://x.com/nvidiaFind Mistral: https://x.com/MistralAI Stay Updated: Let us know what you think: https://ratethispodcast.com/a16zFind a16z on Twitter: https://twitter.com/a16zFind a16z on LinkedIn: https://www.linkedin.com/company/a16zSubscribe on your favorite podcast app: https://a16z.simplecast.com/Follow our host: https://twitter.com/stephsmithioPlease note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.