POPULARITY
Categories
In this episode, we dive into the silent killer of e-commerce team productivity: using personal chat apps for work. Guy Weiss, CEO and founder of ZenZap, shares how relying on apps like WhatsApp can quietly harm your business through security risks, employee burnout, and lost data. He reveals the "hidden cost" of the "always on" culture and explains how a business-focused messenger can keep your company's secrets safe, integrate with your tools, and make your team highly productive.Topics discussed in this episode: Why personal chat apps break work. The hidden cost of "always on" culture. Why personal apps ruin work/life separation. How your business IP is lost on employee phones. Why unstructured group chats cause missed orders. Why staff privacy matters as a business grows. How ZenZap solves complex communication. Links & Resources Website: https://www.zenzap.co/LinkedIn: https://www.linkedin.com/company/zenzap/Instagram: https://www.instagram.com/zenzapappYouTube: https://www.youtube.com/@zenzap_app Get access to more free resources by visiting the show notes at https://tinyurl.com/yeym4uyb______________________________________________________ LOVE THE SHOW? HERE ARE THE NEXT STEPS! Follow the podcast to get every bonus episode. Tap follow now and don't miss out! Rate & Review: Help others discover the show by rating the show on Apple Podcasts at https://tinyurl.com/ecb-apple-podcasts Join our Free Newsletter: https://newsletter.ecommercecoffeebreak.com/ Support The Show On Patreon: https://www.patreon.com/EcommerceCoffeeBreak Partner with us: https://ecommercecoffeebreak.com/partner-with-us/
What does it take to be ready to deploy M365 Copilot in your organization? Richard talks to Nikki Chapple about her latest incarnation of the M365 Copilot Readiness Checklist, working step-by-step to bring M365 Copilot into the organization without causing data leak issues. Nikki discusses utilizing existing tools to accurately identify sensitive data, archiving outdated information, and monitoring data usage by both users and agents - allowing you to detect issues before they escalate. The conversation also delves into the process of identifying issues, discussing policy changes, and how to communicate those changes so that people can take advantage of the power of these new tools without feeling threatened. It's a journey!LinksMicrosoft PurviewSharePoint Advanced ManagementDefender for Cloud AppsRestricted SharePoint SearchMicrosoft 365 ArchiveSharePoint Restricted Content DiscoveryData Security Posture Management for AINikki's Readiness ChecklistM365 Copilot Oversharing BlueprintMicrosoft Purview Secure by Default BlueprintPrevent Data Leaks to Shadow AI BlueprintRecorded November 7, 2025
Back in 2011, FedRAMP was put together because each federal agency had to conduct its own time-consuming security audit. The idea was to standardize security to reduce costs and accelerate cloud adoption. About ten years later, state leaders saw the same problem. Over the years, they worked out a security guidance package that was released this year. GovRAMP was launched to address many of the same challenges faced by the federal government: to establish a standard that enables transparency, standardization, and community. GovRamp's framework is based on NIST 800-53 rev5. Tony O'Neil from Massachusetts observed that before GovRAMP, each state had a patchwork of security guidelines. With so much variation across states, a simplified environment could reduce costs and enable leaders to adopt a mindset of investing in people. Today, we sat down with data security experts who detailed the implementation of compliance to improve data security and compliance. The conversation also covered the importance of continuous monitoring, the role of CSPs in maintaining security, and the necessity of proper resource allocation for cybersecurity professionals.
Send us a textIn this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how BonFi AI is innovating in data security. Tune in to learn about the importance of context in data protection and the future of cybersecurity in a rapidly changing digital world.00:00:19 Introduction to Vishnu's Journey00:00:30 Entering the US and Cisco00:02:18 Cloud Security and AI00:02:48 Data Governance and Challenges00:08:47 The Expansiveness of Cloud00:11:00 AI's Appetite for Data00:12:11 Data Security in the JNI Era00:14:29 The Importance of Context00:16:13 Data Used by Enterprises00:22:24 Conclusion and Future Trendshttps://www.bonfy.ai/Bonfy.aiBonfy ACS is a next-gen DLP platform built for the AI era. Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast Affiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss how, according to DataBreachToday, a Chinese state-linked hacking group relied on the Claude Code model to automate most of a cyberespionage campaign against dozens of organizations. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
Canisius and Bill dug into the whole on-prem vs cloud debate through the lens of AI, pointing out that massive compute needs and generative models pretty much force serious work into the cloud, with most operators moving to a hybrid setup rather than pure on-prem or multi-cloud. They spent a lot of time on trust, encryption, and data ownership, stressing that customer data stays isolated, is not used to train models unless you opt in, and that Microsoft's job is to be the secure, scalable platform while companies like Collide handle the oil and gas specific workflows and “last mile” value. They also hit on why “we already have Azure and Copilot” is not the same as having a purpose-built solution, why a single-cloud plus good governance usually beats juggling multiple hyperscalers, and closed with a look ahead to a world where agents manage other agents and AI is wired into everyday work across legal, operations, and the field.Click here to watch a video of this episode.Join the conversation shaping the future of energy.Collide is the community where oil & gas professionals connect, share insights, and solve real-world problems together. No noise. No fluff. Just the discussions that move our industry forward.Apply today at collide.ioClick here to view the episode transcript. https://twitter.com/collide_iohttps://www.tiktok.com/@collide.iohttps://www.facebook.com/collide.iohttps://www.instagram.com/collide.iohttps://www.youtube.com/@collide_iohttps://bsky.app/profile/digitalwildcatters.bsky.socialhttps://www.linkedin.com/company/collide-digital-wildcatters
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss how, according to DataBreachToday, a Chinese state-linked hacking group relied on the Claude Code model to automate most of a cyberespionage campaign against dozens of organizations. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
From politically motivated attacks to basic configuration errors, purpose-driven orgs are now on the front lines of cyber risk. In this episode, Steve Sharer and Garrett Miller walk through five areas where B Corps are more vulnerable than they realize — and the practical steps that strengthen each one. They explain why these gaps matter and how to close them with straightforward practices that don't overwhelm small teams.View the show notes: https://go.lifteconomy.com/blog/5-cyber-risks-for-b-corps-and-how-you-can-fix-them-w/-steve-sharer-garrett-millerUnlock your free B Corp Values Assessment—plus tips and insights to help your business grow. https://go.lifteconomy.com/b-corp-newsletter
Send us a textIf you don't know where the patient's data is at every moment, you really can't protect it yet. That's the reality many healthcare organizations are facing. Regulations can help but legacy siloed systems keep patients exposed.In this episode of the HealthBiz Podcast, David Williams is joined by Aimee Cardwell, CISO-in-residence at Transcend. Aimee breaks down why compliance doesn't equal security, how legacy architectures and vendor ecosystems create hidden vulnerabilities, and what modern, identity-centric, AI-enabled security should look like.
The U.S. Department of Justice's Data Security Program is reshaping how companies manage cross-border data activities. This episode of The Data Chronicles breaks down what the rule does, why it was created, and the types of transactions it restricts or prohibits—from data brokerage to vendor access to bulk genomic data. Host Scott Loughlin is joined by Hogan Lovells partner James Denvil and associate Lorea Mendiguren to walk through the rule's core elements and the open questions around implementation, risk, and compliance. They share practical insights from advising companies in e-commerce, health, and life sciences as they adjust to this new national-security-driven framework.
Send us a textWords can trigger audits, budget panic, or calm execution, and few words carry more weight than “leak” and “breach.” We unpack the real differences, the legal and regulatory implications of each, and how precise language shapes incident response. From there, we get hands-on with CISSP-ready concepts—data states, DLP, CASB, DRM, minimization, sovereignty, and sensitivity labels—and translate them into moves you can make this week.We start by mapping data states—at rest, in transit, in use—and explaining why data in use often deserves the strongest controls. You'll hear how teams over-index on storage encryption while under-protecting live workflows, and how to fix that with device posture checks, least privilege, just-in-time access, and application-layer monitoring. Then we dive into data minimization: setting clear retention rules, automating deletion, and killing the “we might need it someday” habit that inflates breach impact and eDiscovery pain. Along the way, sensitivity labels become the glue for governance, tying classification to access, encryption, and audit.Next, we stress-test common tools. DLP is great at stopping careless exfiltration but struggles with insiders who have legitimate access, so we show how to tune policies, coach users, and add approvals for mass exports. DRM protects intellectual property but introduces compatibility and friction; we outline how to pilot it with high-value content and measure productivity impact. For cloud journeys, CASB delivers visibility into sanctioned and shadow SaaS, enforces consistent policies, and even helps manage data egress costs—vital for budgets and compliance. Finally, we navigate data sovereignty, cross-border flows, and practical tactics like regional storage, masking, and pseudonymization to keep regulators satisfied and data safe.Whether you're studying for the CISSP or leading security strategy, you'll leave with clear definitions, sharper communication, and a toolkit for governing what you keep, protecting what you use, and deleting what you don't. If you found this helpful, subscribe, leave a review, and share it with a teammate who still calls every incident a breach.Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Defeating Porch Pirates and Holiday Scammers Welcome to The Secure Family Podcast with Andy Murphy! With the holiday shopping season upon us, Andy shares tips for safe online shopping and strategies to prevent porch piracy. He also discusses common holiday scams, offering advice on avoiding fraudulent ads and spotting the red flags of marketplace scams. Take control of your data with DeleteMe. Because they sponsor the podcast you can get 20% off a privacy plan from DeleteMe with promo code: DAD. Connect
Locate, assess, and prioritize high-risk data across Microsoft and non-Microsoft services using Microsoft Purview Data Security Posture Management (DSPM). Identify sensitive files, understand emerging data risks, and focus remediation efforts where they matter most without slowing down productivity. You can also remediate oversharing, enforce data loss prevention policies, and monitor AI agent activity with full visibility into their interactions with sensitive data. Talhah Mir, Microsoft Purview Partner GM, shares how to take control of your data security posture, act on top priorities, and build a sustainable discipline for protecting your organization's information at scale. ► QUICK LINKS: 00:00 - Unified solution with DSPM 01:48 - Day-to-day DSPM use 03:36 - Prevent oversharing 05:52 - AI observability 07:42 - Longer-term view of DSPM 08:25 - How to get DSPM working in your org 09:28 - Wrap up ► Link References Try it out at https://aka.ms/DSPM ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics
In this powerful episode of The Rebel Tech Podcast, TPPF's David Dunmoyer sits down with Maurine Molak, mother and co-founder of David's Legacy Foundation, for an emotional and eye-opening discussion about the darker side of technology, cyberbullying, and the real risks kids face online.Maurine shares her family's story and the tragic loss of her son, David, who struggled with cyberbullying and social media addiction. Together, David and Maurine explore the urgent need for online safety, stronger protections for kids, and meaningful tech policy reforms that help prevent digital harassment and harmful online behavior.If you're interested in internet safety, protecting children online, or technology policy, this episode offers essential insights and resources for families, educators, and policymakers.
Guests Don Campbell, Sr. Director, Product Management and Brent Vernon, Sr. Director, Technology & Product Management, are hosted by Matthew Lewis, Director of Product Marketing - all of HID GlobalIn this episode, we explore the evolving priorities of CISOs in a world where the boundaries between physical and logical security are changing. Host Matthew Lewis is joined by HID's product leaders Don Campbell and Brent Vernon for a candid conversation on the vulnerabilities that persist in modern enterprise environments—and the strategies that forward-thinking security leaders are using to address them.From the risks of credential harvesting and the push toward passwordless authentication, to the overlooked threat posed by contractors and third-party vendors, this discussion reveals why a holistic, always-on approach to identity and access management is no longer optional. Tune in to hear how convergence, collaboration, and smarter tooling are reshaping the security landscape—and what it means for your organization.Chapters:0:00 -- Introductions1:50 -- Data Considerations for CISOs11:00 -- Data Security and Risk That Come with Contractor Workforces14:25 -- Actionable Takeaways
In this episode host Max Havey dives deep into the world of unified security with guests Sinead O'Donovan, VP of Product Management, Identity and Network Access at Microsoft, and Eliot Sun, VP of Product Management at Netskope. Eliot and Sinead offer their perspectives on how an ideal unified strategy brings together data, network access, and identity. Additionally, they dig into the topline benefits, key metrics, and how organizations need to evolve to make a unified strategy a reality.
Welcome to episode 305 of Grow Your Law Firm, hosted by Ken Hardison. On today's episode, Ken welcomes Raquel Gomes, Founder and CEO of Stafi, a virtual staffing company revolutionizing how law firms operate. With a background in psychology, corporate America, and technology, Raquel brings a unique perspective to leadership and sustainable growth. Her company was born from her own journey—balancing the demands of a high-powered career with motherhood and the desire for a more fulfilling life. Today, Stafi supports hundreds of law firms across the U.S., providing highly skilled virtual assistants, customized training, and hands-on coaching to help firms scale efficiently without sacrificing quality or well-being. What you'll learn about in this episode: Offshore Staffing for Growth - How virtual teams can cut labor costs and free up marketing budgets - Why effective delegation is key to scaling law firms sustainably Training and Support that Drive Results - Inside Stafi University's 800+ certifications tailored for PI firms - How coaching, KPIs, and emotional support enhance performance and retention Data Security and Confidentiality - How Stafi ensures compliance through advanced vetting, cybersecurity, and monitoring - Building trust with virtual teams through transparency and accountability The Role of AI in Staffing and Operations - Why AI won't replace humans—but will replace humans who don't use AI - How Stafi's coaches ensure proper adoption of firm tools and automation systems 24/7 Intake and the Future of Legal Operations - How Stafi Live helps firms close more leads through empathy-driven communication - Why offshore staffing and AI integration are essential to remain competitive in 2026 Resources: Email: raquel@getstafi.com Website: getstafi.com LinkedIn: linkedin.com/in/raquel-gomesstafi/ Facebook: facebook.com/GetStafi Instagram: instagram.com/getstafi Additional Resources: https://www.pilmma.org/the-mastermind-effect https://www.pilmma.org/resources https://www.pilmma.org/mastermind AI for PI Expo: www.pilmma.org/ai-for-pi-expo
Artificial intelligence is transforming every corner of theinvestment world — but what does that really mean for data, strategy, and decision-making? In this episode of The Alternative Investing Advantage, host Alex Perny welcomes Daniel Nikic, founder of Coras Research, to discuss how AI and machine learning are reshaping financial markets, venture capital, and risk analysis.From cleaning data sets to building machine learning models,Daniel shares his experience evaluating thousands of AI companies and explains what separates real innovation from hype. Tune in to learn how AI impacts investing, cybersecurity, and emerging industries, and what investors should prepare for as automation continues to evolve.00:00 Introduction to AI in Investment Strategies01:55 Daniel Nikic's Journey into AI and Data06:30 The Evolution of AI and Data Utilization16:45 AI's Role in Financial Markets20:28 AI Applications in Various Industries24:01 Integrating AI in Venture Capital Decision Making28:38 The Role of AI in Decision Making30:16 Human Interaction and AI Limitations34:01 Adoption and Correction in AI Implementation36:28 Investment Trends in AI40:03 Data Security and AI45:53 Ancillary Industries in the AI Boom51:25 Concerns and Opportunities in AI's FutureSubscribe to our YouTube channel and join our growing community for new videos every week.If you are interested in being a podcast guest speaker or have questions, contact us at Podcast@AdvantaIRA.com.Learn more about our guest, Daniel Nikic: https://www.linkedin.com/in/daniel-nikic/?originalSubdomain=hrLearn more about Advanta IRA: https://www.AdvantaIRA.com/ https://podcasters.spotify.com/pod/show/advanta-irahttps://www.linkedin.com/company/Advanta-IRA/https://twitter.com/AdvantaIRA https://www.facebook.com/AdvantaIRA/ https://www.instagram.com/AdvantaIRA/The Alternative Investing Advantage is brought to you by Advanta IRA.Advanta IRA does not offer investment, tax, or legal advice nor do we endorse any products, investments, or companies that offer such advice and/or investments. This includes any investments promoted or discussed during the podcast as neither Advanta IRA nor its employees, have reviewed or vetted any investments, persons, or companies that may discuss their services during this podcast. All parties are strongly encouraged to perform their own due diligence and consult with the appropriate professional(s) before entering into any type of investment.#AIInvesting #MachineLearning #Fintech #AlternativeInvesting#DataDrivenDecisions #Cybersecurity #ArtificialIntelligence #AdvantaIRA#InvestmentStrategy #AIFuture
In this episode of the Future of ERP podcast, Brian Jensen, Managing Director at KPMG, breaks down the complex world of compliance in Cloud ERP environments and how businesses can navigate shared responsibility models effectively. Brian explains why compliance should be seen not as a mere checkbox but as a powerful enabler for risk management and business agility. The discussion covers critical topics like data security, user access control, and the dynamic role of hyperscalers in cloud compliance. Listeners will gain practical advice on balancing rapid innovation with strict regulatory demands and how emerging technologies like AI and automation will reshape compliance roles in ERP systems. Memorable analogies, such as comparing compliance to a car's safety features, make complex ideas accessible. Whether you're a business leader or an IT professional, this episode offers valuable lessons on leveraging Cloud ERP and compliance as a competitive edge. Tune in for actionable insights and a forward-thinking vision of ERP's future.
Washington AI Network founder Tammy Haddad hosts Cohesity CEO and President Sanjay Poonen for a conversation on the intersection of data security and artificial intelligence. Poonen explains why protecting government and enterprise data is the foundation for trustworthy AI — and why, in his words, “You can't do AI before you've secured your data.” He also introduces Gaia, Cohesity's new generative-AI platform built with NVIDIA, and shares how AI can help government become more efficient, secure, and productive. From ransomware readiness to the President's AI Action Plan, Poonen outlines how agencies can build cyber resilience, strengthen data hygiene, and embrace innovation safely in the age of AI.
Jim Caci, CFO at AvePoint (AVPT), looks at their latest quarterly earnings and how the company is using AI. He notes “strong performance” in revenue and new customers around the world. He discusses the exploding need for data security with the advent of AI and their fastest growing global market, AIPAC. “There's great opportunity in all parts of the world,” though, he stresses.======== Schwab Network ========Empowering every investor and trader, every market day. Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/ About Schwab Network - https://schwabnetwork.com/about
With me in this episode is John Ackerly, co-founder and CEO of Virtru. John started Virtru with his brother Will over a decade ago to make data security more pervasive across mediums such as emails and files. Virtru has raised over $150 million to this point from investors such as ICONIQ and Bessemer and built a very healthy business on one of the core pillars of cybersecurity. John has an atypical background in business well-complemented by his brother's technical experience at NSA. One of my favorite lines from the episode: he always thought he would start a business with his other brother. In the episode we discuss pricing strategy, which is certainly not all science, the founder outlook when starting a company, founding with family, and more. Website: https://www.virtru.com/
Imagine stepping into a role and discovering your predecessor had been severely underreporting vulnerabilities, leaving your systems 300 days behind on patches. Join G Mark Hardy and Ross Young in this riveting episode of CISO Tradecraft as they unveil a startling real-world scenario and a proven strategy to revolutionize your patching process. Learn how to tackle the ever-growing number of vulnerabilities, leverage AI and automation, and instill a culture of accountability and gamification among your team. With expert insights and practical steps, this episode is a must-watch for every cybersecurity leader looking to stay ahead of threats and secure their organization's future.Big thanks to our sponsor, Forcepoint. Check out how they can help you shut down ShadowAI. https://www.forcepoint.com/resources/ebooks/shadow-ai-security-guide?utm_source=linkedin&sf_src_cmpid=701a600000exxd7AAA&utm_medium=display&utm_content=AW_NC_LinkedInAds_October25_ban&utm_campaign=LinkedInAds_October25Slides can be found here: https://www.linkedin.com/posts/mrrossyoung_patch-or-perish-activity-7389964440546471936--I_F?utm_source=share&utm_medium=member_desktop&rcm=ACoAABnnk5MBYbK8I-lYgI25f6ro7t6rOeP-OdsChapters00:00 Introduction: The CISO Challenge 00:31 The Importance of Data Security 01:05 Welcome to CISO Tradecraft 02:01 Ross Young's Patching Journey 03:34 The Growing Threat of Vulnerabilities 05:16 AI and Cybersecurity 07:34 Developing a Comprehensive Security Approach 10:51 Accountability and Metrics 15:30 Improving Vulnerability Management Processes 19:28 Advanced Tooling and Automation 23:16 Future Trends in Cybersecurity 27:06 Conclusion: Adapting to the Future
Juan Loaiza is the EVP of Database Technologies at Oracle. In today's special episode of Cloud Wars Live, Loaiza joins Bob Evans to discuss how AI is transforming the way businesses interact with data. He spotlights Oracle's new AI-native database, the importance of trust and security in enterprise AI, and why business users now play a bigger role in data strategy. It's a revealing look at how Oracle is shaping the future of intelligent data systems.The AI Data RevolutionThe Big Themes:Trust, Governance, and Privacy Must Be Built Into the AI‑Data Stack: One of the strongest points made by Loaiza is about the risk of AI in enterprises: hallucinations, mis‑use of data, privacy violations, regulatory consequences. When mission‑critical systems (hospitals, banks, telecoms) are involved, errors are unacceptable and can be illegal. Oracle's approach is to embed privacy and access controls down into the database engine: the system knows who the end user is, what they can see, and ensures AI cannot leak unauthorized data.Multi‑Cloud, On‑Premises, Hybrid — Customers Want Flexibility: Loaiza describes how Oracle is enabling customers to run their database and AI workloads wherever they need: on‑premises, in public clouds (AWS, Azure, Google Cloud), or via “cloud at your data center” options like Exadata Cloud@Customer. This speaks to regulatory, latency, data sovereignty and operational constraints. For enterprises, the takeaway is that deployment flexibility is essential. A one‑size‑fits‑all cloud model may not meet strategic needs.Business Users and Developers Now Have Voices in Database Strategy: Historically, databases were the domain of DBAs, IT operations, and infrastructure teams. Now business users and developers also have meaningful voices because of AI democratizing access. This shift means organizational structures, roles and processes must change. Data governance, training, tool‑selection and deployment pipelines need to reflect that the “consumer” of the database is broader.The Big Quote: “[AI] can translate English to this language of computers, the language of data, which is SQL. So, what that means is you don't have to learn this crazy language anymore. So pretty much anyone, business people, lay people, can now talk using their normal natural language to the database, and the database will understand what they're saying and give them answers, build applications to all these and this is something I honestly never thought I'd see in my entire life, and it's here today."More from Juan Loaiza and Oracle:Follow Juan on LinkedIn or learn more about Oracle's approach to security. Visit Cloud Wars for more.
Oftentimes, organizations view training simply as another obligation; however, tailored and hands-on privacy and cybersecurity training are essential to safeguard data and ensure operations run smoothly in the event of a breach.
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss the news that SimonMed Imaging was targeted by the Medusa ransomware group, which claimed to have stolen 200 Gb of data, according to SecurityWeek. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
In today's Tech3 from Moneycontrol, we unpack how Bengaluru-based Pantherun Technologies is rewriting the rules of data security with a handshake-free encryption breakthrough. Then, we look at Zerodha's shift to fixed deposits, the latest buzz around Lenskart's IPO and its cooling grey market premium, and finally, boAt's parent company securing SEBI approval for its Rs 1,500-crore public issue.
X: @MarshaBlackburn @ileaderssummit @americasrt1776 @NatashaSrdoc @JoelAnandUSA @supertalk Join America's Roundtable (https://americasrt.com/) radio co-hosts Natasha Srdoc and Joel Anand Samy with U.S. Senator Marsha Blackburn, senior senator for Tennessee and the first woman to represent the Volunteer State in the United States Senate. She serves on the Deputy Whip Team and is a member of the Finance Committee; the Commerce, Science & Transportation Committee; the Veterans' Affairs Committee; and the Judiciary Committee. Senator Marsha Blackburn serves as the Ranking Member on the Commerce Subcommittee on Consumer Protection, Product Safety, and Data Security and on the Judiciary Subcommittee on Human Rights and the Law. Before her election to the Senate, Marsha represented Tennessee's 7th Congressional District in the United States House of Representatives. americasrt.com (https://americasrt.com/) https://ileaderssummit.org/ | https://jerusalemleaderssummit.com/ America's Roundtable on Apple Podcasts: https://podcasts.apple.com/us/podcast/americas-roundtable/id1518878472 X: @MarshaBlackburn @ileaderssummit @americasrt1776 @NatashaSrdoc @JoelAnandUSA @supertalk America's Roundtable is co-hosted by Natasha Srdoc and Joel Anand Samy, co-founders of International Leaders Summit and the Jerusalem Leaders Summit. America's Roundtable (https://americasrt.com/) radio program focuses on America's economy, healthcare reform, rule of law, security and trade, and its strategic partnership with rule of law nations around the world. The radio program features high-ranking US administration officials, cabinet members, members of Congress, state government officials, distinguished diplomats, business and media leaders and influential thinkers from around the world. Tune into America's Roundtable Radio program from Washington, DC via live streaming on Saturday mornings via 68 radio stations at 7:30 A.M. (ET) on Lanser Broadcasting Corporation covering the Michigan and the Midwest market, and at 7:30 A.M. (CT) on SuperTalk Mississippi — SuperTalk.FM reaching listeners in every county within the State of Mississippi, and neighboring states in the South including Alabama, Arkansas, Louisiana and Tennessee. Tune into WTON in Central Virginia on Sunday mornings at 6:00 A.M. (ET). Listen to America's Roundtable on digital platforms including Apple Podcasts, Spotify, Amazon, Google and other key online platforms. Listen live, Saturdays at 7:30 A.M. (CT) on SuperTalk | https://www.supertalk.fm
This episode featuring Dr David Tuffley, Senior Lecturer Senior Fellow | Higher Education Academy School of Information & Communication Technology Institute of Integrated & Intelligent Systems (IIIS), Griffith University, dives into the high-stakes world of cybersecurity at major sporting events, where protecting critical systems like ticketing, broadcasting, and athlete data is non-negotiable. Listeners will hear how organisers implement continuous monitoring to detect and respond to threats in real time, and why success depends on seamless collaboration between local, national, and international cyber teams. It's a behind-the-scenes look at what it takes to keep the Games safe, connected, and running smoothly. Dr David Tuffley, Senior Lecturer Senior Fellow | Higher Education Academy School of Information & Communication Technology Institute of Integrated & Intelligent Systems (IIIS), Griffith University For more great insights head to www.PublicSectorNetwork.co
In this episode of the Ardan Labs Podcast, Bill Kennedy talks with Zack Holland, CEO & Founder of Averi AI, about his journey from early life in Ecuador's Amazon rainforest to building an AI-powered marketing platform. Zack shares lessons from early business ventures, the challenges of running startups, and the evolution of his entrepreneurial mindset. They explore how Averi AI helps marketers become more creative and efficient, the importance of data security and trust in AI, and what it takes to innovate in a rapidly evolving digital landscape.00:00 Introduction02:54 Marketing and AI Evolution05:58 Changing Digital Landscape09:04 Early Life and Influences12:02 From Ecuador to Utah18:00 First Business in High School29:53 LLMs and Entrepreneurship39:44 Lessons from Failure43:46 Starting a Marketing Agency56:19 Founding Avery AI01:08:10 Trust and Data Security01:13:14 Marketing and AI Adoption01:17:58 AI Challenges and Opportunities01:26:00 Contact Info Connect with Zack: Linkedin: https://www.linkedin.com/in/zackhollandX: https://x.com/zack_hollandMentioned in this Episode:Averi AI: https://www.averi.ai/Want more from Ardan Labs? You can learn Go, Kubernetes, Docker & more through our video training, live events, or through our blog!Online Courses : https://ardanlabs.com/education/ Live Events : https://www.ardanlabs.com/live-training-events/ Blog : https://www.ardanlabs.com/blog Github : https://github.com/ardanlabs
The AWS Meltdown: $50 Billion Lost and Nobody's Talking About It | Karel Cast 25-134 When Amazon Web Services (AWS) went down, the internet itself nearly broke — apps crashed, transactions froze, and the global economy took a $50 BILLION hit in just hours. But the real story isn't just about one outage… it's about how dangerously dependent we've become on a single company's servers. Karel breaks down the truth behind the AWS crash, why it's scarier than you think, and what it says about the fragile state of our tech-driven world. Also on today's show:
Send us a textIn this episode, Joe sits down with Gidi Cohen, a cybersecurity expert with a rich background in the Israeli 8200 unit, to explore the evolving landscape of data security. They delve into the challenges of managing large data sets, the impact of AI on cybersecurity, and the innovative solutions offered by Bonfy AI. Whether you're a seasoned professional or new to the field, this conversation offers valuable insights into the complexities and opportunities within data security. Tune in to learn how to navigate the ocean of data and protect your organization's most valuable assets.00:00 Introduction to Gidi Cohen and His Background01:49 The Role of 8200 Unit in Cybersecurity04:25 Transitioning from Military to Industry11:32 Identifying Problems in Data Security16:00 The Challenges of Data Management in Organizations23:58 The Challenge of Data Classification26:59 Understanding Context in Data Security29:44 Adaptive Learning in AI Solutions32:22 Proactive Risk Mitigation Strategies34:57 Integrating Data Security Across Platforms37:33 The Future of Data Security SolutionsBonfy ACS is a next-gen DLP platform built for the AI era, combining contextual intelligence and adaptive remediation to secure sensitive data and enable AI innovation at scale. With high accuracy and out-of-the-box policies, it delivers fast time to value while reducing false alerts and investigation overhead. Trusted by regulated organizations, Bonfy ensures compliance and integrates seamlessly with Microsoft 365, Salesforce, Slack, and Google Workspace.Speaker: Gidi Cohen, CEO and Co-Founder of Bonfy.AIhttps://www.bonfy.ai/Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifyBonfy.aiBonfy ACS is a next-gen DLP platform built for the AI era. Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast Affiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.
SaaStr 825: How the AI Era Has Directly Impacted Marketing and Sales with Snowflake‘s CMO and Founding CRO Join us for an insightful episode discussing the impact of AI on marketing and sales at Snowflake. Hosts Chris Degnan, founding CRO of Snowflake, and Denise Persson, CMO at Snowflake, delve into how AI has revolutionized their operations. They share key learnings from Snowflake's data cloud market strategies and their record-breaking IPO. Discover the significance of company culture, security, and a centralized data foundation in leveraging AI. Hear about Snowflake's AI Council, customer use cases, task automation, and the consolidation of intelligence teams. Don't miss this comprehensive discussion on the transformative role of AI in the enterprise and valuable hiring insights for staying ahead in the AI era. 00:00 Introduction and Speaker Backgrounds 02:05 Impact of AI on Company Culture 05:09 Snowflake's AI Strategy and Data Security 08:03 AI Use Cases in Marketing 21:26 AI Use Cases in Sales 29:42 Governance and Security in AI Implementation 32:10 AI's Influence on Hiring and Company Growth 34:58 Closing Thoughts and Resources --------------------- This episode is Sponsored in part by Salesforce: Connect data, automate busywork and empower teams like nobody's business with the one platform that grows with you, every step of the way. Learn how Salesforce works for Startups at salesforce.com/smb. --------------------- This episode is Sponsored in part by Intercom:  Fin is the #1 AI Agent for resolving complex queries like refunds, transaction disputes, and technical troubleshooting—all with speed and reliability. See how Fin can deliver the highest resolution rates and highest-quality customer experience at fin.ai/saastr. --------------------- If you're serious about B2B and AI, you need to be in London this December. SaaStr AI London is bringing together more than 2,000 leaders and founders for two days of practical advice on scaling into the new year. We'll have speakers flying in from OpenAI, Wiz, Clay, Intercom, and all your favorite SaaS companies, including yours truly with Harry Stebbings for a live 20VC podcast. It'll be fun, and it's all in the heart of London. Don't miss out: get your tickets with my exclusive discount by going to podcast.saastrlondon.com --------------------- Hey everybody, the biggest B2B + AI event of the year will be back - SaaStr AI in the SF Bay Area, aka the SaaStr Annual, will be back in May 2026. With 68% VP-level and above, 36% CEOs and founders and a growing 25% AI-first professional, this is the very best of the best S-tier attendees and decision makers that come to SaaStr each year. But here's the reality, folks: the longer you wait, the higher ticket prices can get. Early bird tickets are available now, but once they're gone, you'll pay hundreds more so don't wait. Lock in your spot today by going to podcast.saastrannual.com to get my exclusive discount SaaStr AI SF 2026. We'll see you there.
Every day, critical infrastructure is under siege with about 1.2 million cyberattacks per day. For facility managers, that means cybersecurity isn't just an IT issue, it's a frontline responsibility. In today's episode, Stacey Shepard and E.J. von Schaumburg from Building Cybersecurity, discuss why facility managers must treat digital threats with the same urgency as physical ones and how leaders can use proactive strategies, assessments and insurance awareness to stay prepared. Together, they share how facility managers can build resilience, safeguard their organizations, and lead the way in a world where cyber risk is constant.Sponsor:This episode is sponsored by ODP Business Solutions! 00:00 Introduction: The Growing Threat of Cyber Attacks00:19 Podcast Overview and Guest Introduction01:23 Understanding Cybersecurity in Facility Management02:24 The Importance of Data Management02:54 Building Cybersecurity: Framework and Training03:38 The Role of Facility Managers in Cybersecurity05:01 Cybersecurity Training and Preparedness08:11 Insurance and Risk Management11:11 Leadership and Legal Implications11:48 Resources and Conclusion Connect with Us:LinkedIn: https://www.linkedin.com/company/ifmaFacebook: https://www.facebook.com/InternationalFacilityManagementAssociation/Twitter: https://twitter.com/IFMAInstagram: https://www.instagram.com/ifma_hq/YouTube: https://youtube.com/ifmaglobalVisit us at https://ifma.org
The MacVoices Live! panel discuss the Rivian CEO's claim that drivers will eventually appreciate cars without Apple CarPlay, sparking debate about automakers' push for control and subscription models. Chuck Joiner, David Ginsburg, Web Bixby, Marty Jencius, Brian Flanigan-Arthurs, Jeff Gamet, Eric Bolden, and Jim Rea explore consumer frustration over losing convenience and the rise of tech-based add-ons. More privacy concerns from the UK's renewed backdoor encryption request link to a discussion about broader issues of digital trust and data security that include a leak of iPhone schematics. MacVoices is supported by MacPaw and the Cloud Cleanup feature. Get Tidy Today! Try 7 days free and use my code MACVOICES20 for 20% off at clnmy.com/MACVOICES. Show Notes: Chapters: [0:00] Rivian questions the need for CarPlay [1:52] Tesla and control over in-car systems [3:20] Automakers' motives and data ownership [5:19] Rivian's CEO vision and user reactions [7:52] Subscription-based features debate [8:30] Convenience and continuity in CarPlay use [13:24] Apple's challenges with CarPlay Ultra [21:22] UK government revisits encryption backdoor request [26:36] Risks of mandated access and data leaks [29:53] Closing reflections on privacy and technology trust Links: Rivian says ‘customers will appreciate' lack of CarPlay eventually https://9to5mac.com/2025/10/06/rivian-says-customers-will-appreciate-lack-of-carplay-eventually/ UK government resumes row with Apple by demanding access to British users' data https://www.theguardian.com/technology/2025/oct/01/uk-government-apple-data-british-telecoms FCC accidentally leaked iPhone schematics, potentially giving rivals a peek at company secrets https://www.engadget.com/big-tech/fcc-accidentally-leaked-iphone-schematics-potentially-giving-rivals-a-peek-at-company-secrets-154551807.html Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss why he wrote it, how he got it done so quickly, and who needs to read it. Segment Resources: Get the book on Amazon: Data Security in the Age of AI (available in Kindle and print) Segment 2 - Topic: The reasons why CISOs buy (and the things that don't matter to them) Val Tsanev, founder of ExecWeb, part of the CyberRisk Alliance family, posted shared some VERY spicy insights about how CISOs buy products. This elicited some passionate responses. There are many interesting insights, but the biggest and most interesting is that 76% of CISOs choose products that presents the least risk to them, personally. Career safety trumps product performance, it would seem. Segment 3 - News In the enterprise security news, Shifting Zero Cyber insurance, unlike cyber crime, doesn't pay New AI security categories are popping up to serve Agentic and MCP servers how tech companies measure AI impact first malicious MCP server in the wild is your computer mouse listening to you? The Korean government did not follow the backup rule of three Think you've seen the absolute worst idea for a mobile app? Wait until you hear about Neon. We have no less than three squirrel stories involving bullets, lasers, and greasy snacks All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-428
Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss why he wrote it, how he got it done so quickly, and who needs to read it. Segment Resources: Get the book on Amazon: Data Security in the Age of AI (available in Kindle and print) Segment 2 - Topic: The reasons why CISOs buy (and the things that don't matter to them) Val Tsanev, founder of ExecWeb, part of the CyberRisk Alliance family, posted shared some VERY spicy insights about how CISOs buy products. This elicited some passionate responses. There are many interesting insights, but the biggest and most interesting is that 76% of CISOs choose products that presents the least risk to them, personally. Career safety trumps product performance, it would seem. Segment 3 - News In the enterprise security news, Shifting Zero Cyber insurance, unlike cyber crime, doesn't pay New AI security categories are popping up to serve Agentic and MCP servers how tech companies measure AI impact first malicious MCP server in the wild is your computer mouse listening to you? The Korean government did not follow the backup rule of three Think you've seen the absolute worst idea for a mobile app? Wait until you hear about Neon. We have no less than three squirrel stories involving bullets, lasers, and greasy snacks All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-428
Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss why he wrote it, how he got it done so quickly, and who needs to read it. Segment Resources: Get the book on Amazon: Data Security in the Age of AI (available in Kindle and print) Segment 2 - Topic: The reasons why CISOs buy (and the things that don't matter to them) Val Tsanev, founder of ExecWeb, part of the CyberRisk Alliance family, posted shared some VERY spicy insights about how CISOs buy products. This elicited some passionate responses. There are many interesting insights, but the biggest and most interesting is that 76% of CISOs choose products that presents the least risk to them, personally. Career safety trumps product performance, it would seem. Segment 3 - News In the enterprise security news, Shifting Zero Cyber insurance, unlike cyber crime, doesn't pay New AI security categories are popping up to serve Agentic and MCP servers how tech companies measure AI impact first malicious MCP server in the wild is your computer mouse listening to you? The Korean government did not follow the backup rule of three Think you've seen the absolute worst idea for a mobile app? Wait until you hear about Neon. We have no less than three squirrel stories involving bullets, lasers, and greasy snacks All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-428
Amanda Silberling joins Mikah Sargent on Tech News Weekly this week! Casio has a new smart toy companion powered by AI. The UK is still seeking to develop backdoor encryption for Apple users. ChatGPT is looking to act more like an operating system. And how the 'Buy Now, Pay Later' model has built a $120 billion industry. Amanda has her hands on a new AI-powered smart companion from Casio! She and Mikah talk about the device, how it works, and the possible data security and privacy concerns. Mikah talks about the UK's continued push to create backdoor encryption for Apple users in the country. Sabrina Ortiz of ZDNet joins the show to discuss OpenAI's Dev Day and the company's ambitions to make OpenAI function like an OS with the launch of the Apps SDK. Finally, Mikah shares an article from The New York Times Magazine about the 'Buy Now, Pay Later' market, which allows buyers to obtain their items easily and traps users in a swarm of debt. Hosts: Mikah Sargent and Amanda Silberling Guest: Sabrina Ortiz Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io threatlocker.com/twit cachefly.com/twit
Amanda Silberling joins Mikah Sargent on Tech News Weekly this week! Casio has a new smart toy companion powered by AI. The UK is still seeking to develop backdoor encryption for Apple users. ChatGPT is looking to act more like an operating system. And how the 'Buy Now, Pay Later' model has built a $120 billion industry. Amanda has her hands on a new AI-powered smart companion from Casio! She and Mikah talk about the device, how it works, and the possible data security and privacy concerns. Mikah talks about the UK's continued push to create backdoor encryption for Apple users in the country. Sabrina Ortiz of ZDNet joins the show to discuss OpenAI's Dev Day and the company's ambitions to make OpenAI function like an OS with the launch of the Apps SDK. Finally, Mikah shares an article from The New York Times Magazine about the 'Buy Now, Pay Later' market, which allows buyers to obtain their items easily and traps users in a swarm of debt. Hosts: Mikah Sargent and Amanda Silberling Guest: Sabrina Ortiz Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io threatlocker.com/twit cachefly.com/twit
Amanda Silberling joins Mikah Sargent on Tech News Weekly this week! Casio has a new smart toy companion powered by AI. The UK is still seeking to develop backdoor encryption for Apple users. ChatGPT is looking to act more like an operating system. And how the 'Buy Now, Pay Later' model has built a $120 billion industry. Amanda has her hands on a new AI-powered smart companion from Casio! She and Mikah talk about the device, how it works, and the possible data security and privacy concerns. Mikah talks about the UK's continued push to create backdoor encryption for Apple users in the country. Sabrina Ortiz of ZDNet joins the show to discuss OpenAI's Dev Day and the company's ambitions to make OpenAI function like an OS with the launch of the Apps SDK. Finally, Mikah shares an article from The New York Times Magazine about the 'Buy Now, Pay Later' market, which allows buyers to obtain their items easily and traps users in a swarm of debt. Hosts: Mikah Sargent and Amanda Silberling Guest: Sabrina Ortiz Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io threatlocker.com/twit cachefly.com/twit
Amanda Silberling joins Mikah Sargent on Tech News Weekly this week! Casio has a new smart toy companion powered by AI. The UK is still seeking to develop backdoor encryption for Apple users. ChatGPT is looking to act more like an operating system. And how the 'Buy Now, Pay Later' model has built a $120 billion industry. Amanda has her hands on a new AI-powered smart companion from Casio! She and Mikah talk about the device, how it works, and the possible data security and privacy concerns. Mikah talks about the UK's continued push to create backdoor encryption for Apple users in the country. Sabrina Ortiz of ZDNet joins the show to discuss OpenAI's Dev Day and the company's ambitions to make OpenAI function like an OS with the launch of the Apps SDK. Finally, Mikah shares an article from The New York Times Magazine about the 'Buy Now, Pay Later' market, which allows buyers to obtain their items easily and traps users in a swarm of debt. Hosts: Mikah Sargent and Amanda Silberling Guest: Sabrina Ortiz Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io threatlocker.com/twit cachefly.com/twit
Amanda Silberling joins Mikah Sargent on Tech News Weekly this week! Casio has a new smart toy companion powered by AI. The UK is still seeking to develop backdoor encryption for Apple users. ChatGPT is looking to act more like an operating system. And how the 'Buy Now, Pay Later' model has built a $120 billion industry. Amanda has her hands on a new AI-powered smart companion from Casio! She and Mikah talk about the device, how it works, and the possible data security and privacy concerns. Mikah talks about the UK's continued push to create backdoor encryption for Apple users in the country. Sabrina Ortiz of ZDNet joins the show to discuss OpenAI's Dev Day and the company's ambitions to make OpenAI function like an OS with the launch of the Apps SDK. Finally, Mikah shares an article from The New York Times Magazine about the 'Buy Now, Pay Later' market, which allows buyers to obtain their items easily and traps users in a swarm of debt. Hosts: Mikah Sargent and Amanda Silberling Guest: Sabrina Ortiz Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io threatlocker.com/twit cachefly.com/twit
Amanda Silberling joins Mikah Sargent on Tech News Weekly this week! Casio has a new smart toy companion powered by AI. The UK is still seeking to develop backdoor encryption for Apple users. ChatGPT is looking to act more like an operating system. And how the 'Buy Now, Pay Later' model has built a $120 billion industry. Amanda has her hands on a new AI-powered smart companion from Casio! She and Mikah talk about the device, how it works, and the possible data security and privacy concerns. Mikah talks about the UK's continued push to create backdoor encryption for Apple users in the country. Sabrina Ortiz of ZDNet joins the show to discuss OpenAI's Dev Day and the company's ambitions to make OpenAI function like an OS with the launch of the Apps SDK. Finally, Mikah shares an article from The New York Times Magazine about the 'Buy Now, Pay Later' market, which allows buyers to obtain their items easily and traps users in a swarm of debt. Hosts: Mikah Sargent and Amanda Silberling Guest: Sabrina Ortiz Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: pantheon.io threatlocker.com/twit cachefly.com/twit
When you're running a large industrial operation, tracking all of the elements of your process to know where they are and what they're doing in real-time, can be a huge challenge. Today, we're spotlighting a company whose revolutionary platform can help solve that problem. Ed Nabrotzky is the CEO and co-founder of Dot Ai, a company specializing in industrial asset intelligence solutions. Ed brings with him over 25 years of experience in technology development, and has held executive leadership roles at large public enterprises, including Molex and Panasonic. Ed joins us to discuss Dot Ai's competitive advantage, how AI is changing the game when it comes to asset intelligence, and how their tech helps make companies more efficient. Highlights:What Dot Ai does (1:53)The gap in the market (2:25)The customers (3:21)Inflection point (4:01)The current emphasis asset intelligence (5:51)ROI (7:09)The Dot Ai platform (8:36)Data Security (12:04)Meeting Unique Client Needs (13:25)R&D (14:40)Puerto Rico Manufacturing (16:15)SPAC (18:49)Forces reshaping supply chains (22:59)Misconceptions about automated asset tracking (25:04)Future outlook (26:10) Links:Ed's LinkedInDot Ai LinkedInDot Ai WebsiteICR LinkedInICR TwitterICR Website Feedback:If you have questions about the show, or have a topic in mind you'd like discussed in future episodes, email our producer, joe@lowerstreet.co.
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to cover the recent Jaguar Land Rover hack, the following production halt, what the incident says about the current hacking landscape, and more. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
Welcome back to another episode of the Microsoft Cloud IT Pro Podcast! In this episode, we dive deep into one of Microsoft Purview's AI monitoring and protection capabilities: Data Security Posture Management (DSPM) for AI - your secret weapon for monitoring and securing AI usage across your organization. Your support makes this show possible! Please consider becoming a premium member for access to live shows and more. Check out our membership options. Show Notes Learn about Data Security Posture Management Learn about Data Security Posture Management (DSPM) for AI Governing AI Shadow IT with the Microsoft Purview Browser Extension Get started with the Microsoft Purview extension for Chrome Considerations for DSPM for AI to manage data security and compliance protections for AI interactions Learn about Microsoft Purview billing models List of AI sites supported by Microsoft Purview Data Security Posture Management for AI About the sponsors Would you like to become the irreplaceable Microsoft 365 resource for your organization? Let us know!
During this episode, Santosh is joined by Pedro Neto, a supply chain data scientist at HP. Pedro discusses the real-world impact of generative AI on supply chain management. The conversation also explores practical opportunities for AI adoption, common challenges like model drift and data security, and the importance of starting with small, high-impact use cases. Pedro emphasizes the need for robust model evaluation, strong data governance, and empowering teams with accessible AI tools. Listeners will gain actionable insights on how to approach AI implementation, avoid common pitfalls, foster a culture of innovation within their organizations, and so much more.Highlights from their conversation include:Pedro's Introduction & Background (0:41)Opportunities and Challenges of Generative AI (3:00)AI Fatigue Among Practitioners (5:15)Prioritizing Gen AI in Supply Chain (7:39)Best Use Cases for Gen AI (10:28)Concrete Examples of Gen AI Impact (13:30)Handling Model Drift and Evaluation (16:45)Data Security and Governance in Gen AI (19:13)Keys to Successful AI Adoption (21:27)Rapid Fire: Overhyped AI, Irrelevant KPIs, and Dream Tools (23:26)Final Thoughts and Takeaways (25:37)Dynamo is a VC firm led by supply chain and mobility specialists that focus on seed-stage, enterprise startups.Find out more at: https://www.dynamo.vc/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
The EU fines Google $3.5 billion over adtech abuses. Cloudflare blocks record-breaking Distributed Denial of Service (DDoS) attacks. The Salesforce-Salesloft breach began months earlier with GitHub access. Researchers say the new TAG-150 cybercriminal group has been active since March. Hackers use stolen secrets to leak more than 6,700 Nx private repositories. Subsea cable outages disrupt internet connectivity across India, Pakistan, and parts of the UAE. Monday Business Breakdown. On our Industry Voices segment Todd Moore, Global Vice President, Data Security at Thales, unpacks the perils of insider risk. Hackers claim Burger King's security flaws are a real whopper. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Industry Voices On our Industry Voices segment, we are joined by Todd Moore, Global Vice President, Data Security at Thales, discussing the biggest threat to your data has a badge, a password, and years of goodwill. Check out Todd's full conversation here. Selected Reading EU fines Google $3.5 billion for anti-competitive ad practices (Bleeping Computer) Cloudflare blocks massive 11.5 Tbps DDoS attack (SDxCentral) Salesloft GitHub Account Compromised Months Before Salesforce Attack (SecurityWeek) From CastleLoader to CastleRAT: TAG-150 Advances Operations with Multi-Tiered Infrastructure (Recorded Future) Over 6,700 Private Repositories Made Public in Nx Supply Chain Attack (SecurityWeek) Red Sea cable cuts disrupt internet across Asia and the Middle East (Reuters) N2K Pro Business Briefing update (N2K Networks) Burger King hacked, attackers 'impressed by the commitment to terrible security practices' — systems described as 'solid as a paper Whopper wrapper in the rain,' other RBI brands like Tim Hortons and Popeyes also vulnerable (Tom's Hardware) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices