Podcasts about Detection

  • 2,580PODCASTS
  • 6,143EPISODES
  • 32mAVG DURATION
  • 1DAILY NEW EPISODE
  • Mar 3, 2026LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about Detection

Show all podcasts related to detection

Latest podcast episodes about Detection

Speak Up For The Ocean Blue
The Ocean Is Visible Now, What Happens Next Is Up to Us

Speak Up For The Ocean Blue

Play Episode Listen Later Mar 3, 2026 11:11


The ocean is no longer invisible. Satellites can now track fishing vessels across the planet in near real time. So if we can see the exploitation, what happens next? In this episode of How to Protect the Ocean, we break down how satellite monitoring, AIS tracking, radar systems, and machine learning have fundamentally changed ocean enforcement. Industrial fishing now covers more than half of the ocean's surface. Some vessels turn off their tracking systems near marine protected areas. Others cluster just outside boundaries in a practice known as "fishing the line." But here is the shift: noncompliance now leaves digital fingerprints. The era of invisible exploitation is ending. We also examine what this means for illegal, unreported, and unregulated fishing, a global problem that costs an estimated 10 to 23 billion US dollars every year and disproportionately impacts developing coastal nations. Technology has increased detection. Detection increases deterrence. But data does not enforce itself. Satellites can expose violations, but governments must still act. The ocean is visible now. Accountability is possible. Enforcement is still a decision. Listen to the full episode and stay informed on how ocean protection is evolving in real time. Support Independent Podcasts: https://www.speakupforblue.com/patreon Help fund a new seagrass podcast: https://www.speakupforblue.com/seagrass Join the Undertow: https://www.speakupforblue.com/jointheundertow Connect with Speak Up For Blue Website: https://bit.ly/3fOF3Wf Instagram: https://bit.ly/3rIaJSG TikTok: https://www.tiktok.com/@speakupforblue Twitter: https://bit.ly/3rHZxpc YouTube: www.speakupforblue.com/youtube    

The 365 Days of Astronomy, the daily podcast of the International Year of Astronomy 2009
The Cosmic Savannah Ep. 79: RADHIANCE Research at the University of Oxford

The 365 Days of Astronomy, the daily podcast of the International Year of Astronomy 2009

Play Episode Listen Later Feb 28, 2026 59:48


Hosted by Dr. Jacinta Delhaize, Dr. Tshiamiso Makwela, Dr. Daniel Cunnama & François Campher With Tumelo Mangena, Leyya Stockenstroom and Ndivhuwo Netshiavha. In this episode, we hear from three postgraduate astronomy students from the University of Cape Town about their worldly adventures during a research trip to the University of Oxford in the UK!   PhD student Tumelo Mangena and Masters students Leyya Stockenstroom and Ndivhuwo Netshiavha are part of the RADHIANCE research group led by our very own Jacinta Delhaize! They use world-leading telescopes, like South Africa's MeerKAT, to examine the light from distant galaxies to try and understand why they have mysteriously changed and evolved over the history of the Universe. Their team name, RADHIANCE, stands for "Radio-Based Analysis and Detection of HI, AGN, star-formatioN, and their Cosmic Evolution" – and they even have a cute logo!   We've added a new way to donate to 365 Days of Astronomy to support editing, hosting, and production costs.  Just visit: https://www.patreon.com/365DaysOfAstronomy and donate as much as you can! Share the podcast with your friends and send the Patreon link to them too!  Every bit helps! Thank you! ------------------------------------ Do go visit http://www.redbubble.com/people/CosmoQuestX/shop for cool Astronomy Cast and CosmoQuest t-shirts, coffee mugs and other awesomeness! http://cosmoquest.org/Donate This show is made possible through your donations.  Thank you! (Haven't donated? It's not too late! Just click!) ------------------------------------ The 365 Days of Astronomy Podcast is produced by the Planetary Science Institute. http://www.psi.edu Visit us on the web at 365DaysOfAstronomy.org or email us at info@365DaysOfAstronomy.org.

Real Money Talks
Fraud Prevention for Owners Who “Trust Their Bookkeeper”

Real Money Talks

Play Episode Listen Later Feb 27, 2026 29:08 Transcription Available


In this episode, Loral sits down with Bev Ottone to expose what's really happening behind the scenes in small business fraud prevention, and why most owners don't catch fraud until it's too late.Bev shares real examples of fraud she's uncovered, including payroll tricks (ghost employees and reimbursements), vendor fraud inside bookkeeping software, ACH changes, check theft, and even points scams. You'll learn the most common red flags, why “trust but verify” matters, and how better systems, separation of duties, and weekly review habits strengthen small business fraud prevention.If you've ever wondered how to hire a bookkeeper without handing over “the keys to the kingdom,” this small business fraud prevention conversation is a must-listen.Loral's Takeaways:Bev's Journey and Initial Experience (02:07)Bev's Courses and Motivation (03:00)Importance of Accurate Bookkeeping (05:22)Fraud Prevention and Detection (06:47)Vendor Fraud and Security Measures (12:17)Immediate Response to Fraud (19:05)Course Details and Final Advice (23:04)Bev Ottone Fraud Course: https://askbookkeepingcoach.com/Meet Loral Langemeier:Loral Langemeier is a money expert, sought-after speaker, entrepreneurial thought leader, and best-selling author of five books.Her goal: to change the conversations people have about money worldwide and empower people to become millionaires.The CEO and Founder of Live Out Loud, Inc. – a multinational organization — Loral relentlessly and candidly shares her best advice without hesitation or apology. What sets her apart from other wealth experts is her innate ability to recognize and acknowledge the skills & talents of people, inspiring them to generate wealth.She has created, nurtured, and perfected a 3-5 year strategy to make millions for the “Average Jill and Joe.” To date, she and her team have served thousands of individuals worldwide and created hundreds of millionaires through wealth-building education keynotes, workshops, products, events, programs, and coaching services.Loral is truly dedicated to helping men and women, from all walks of life, to become millionaires AND be able to enjoy time with their families.She is living proof that anyone can have the life of their dreams through hard work, persistence, and getting things done in the face of opposition. As a single mother of two children, she is redefining the possibility for women to have it all and raise their children in an entrepreneurial and financially literate environment.Links and Resources:Ask Loral App: https://apple.co/3eIgGcXLoral on Facebook: https://www.facebook.com/askloral/Loral on YouTube: https://www.youtube.com/user/lorallive/videosLoral on LinkedIn: https://www.linkedin.com/in/lorallangemeier/Money Rules: https://integratedwealthsystems.com/money-rules/Millionaire Maker Store: https://millionairemakerstore.com/Real Money Talks Podcast: https://integratedwealthsystems.com/podcast/Integrated Wealth Systems: https://integratedwealthsystems.com/Affiliate Sign-Up: https://integratedwealthsystems.com/affiliatesThanks for listening!Thanks so much for listening to our podcast! If you enjoyed this episode and think that others could benefit from listening, please share it using the social media buttons on this page.Do you have some feedback or questions about this episode? Leave a comment in the section below!Subscribe to the podcastIf you would like to get automatic updates of new podcast episodes, you can subscribe to the podcast on iTunes or Stitcher. You can also subscribe from the podcast app on your mobile device.Leave us an iTunes reviewRatings and reviews from our listeners are extremely valuable to us and greatly appreciated. They help our podcast rank higher on iTunes, which exposes our show to more awesome listeners like you. If you have a minute, please leave an honest review on iTunes.

The Big Beard Theory
[ШоПоКо] Велике оновлення про океан Європи

The Big Beard Theory

Play Episode Listen Later Feb 26, 2026 17:28


00:00 Вступ01:52 Геотермальна активність на дні океану Європи09:51 Нові дані про товщину криги12:18 Аміак на поверхні ЄвропиНаукові публікаціїLittle to no active faulting likely at Europa's seafloor today https://www.nature.com/articles/s41467-025-67151-3Europa's ice thickness and subsurface structure characterized by the Juno microwave radiometer https://www.nature.com/articles/s41550-025-02718-0Detection of an NH3 Absorption Band at 2.2 μm on Europahttps://iopscience.iop.org/article/10.3847/PSJ/ae1291

K9s Talking Scents
#135 The Cutting Edge Of Detection Dogs with Brian Menace | Knife Detection K9s

K9s Talking Scents

Play Episode Listen Later Feb 26, 2026 64:58


Brian Menace from the UK reveals how his team pioneered knife detection dogs—a capability that sounds impossible but is backed by solid science. Working with Dr. Tatum and researchers, they discovered that edged weapons create a unique chemical signature when in contact with human skin, distinctly different from keys, coins, or other metal objects.The training evolved from "Wild West" experimentation to scientific methodology: dogs are imprinted on the specific chemical reaction between humans and sharpened metal, then taught to discriminate against non-target items through massive exposure to various metals. Like AI, more data inputs create better pattern recognition—dogs learn to find razor blades, tactical knives, and kitchen knives while ignoring silverware and tools.Key Topics:The chemical science behind knife detectionWhy knives smell different than spoons or keysTraining methodology: imprinting and discriminationOperational deployment at UK events and schoolsAddressing false positives (screwdrivers, hammers)Why scientific validation matters for credibilityEducating decision-makers on new capabilitiesCollaboration with Texas Tech researchCritical for event security, venue operators, and anyone facing knife crime threats. Brian emphasizes this isn't science fiction—it's validated science requiring patient education and demonstration.Brian Menace Background: UK-based detection dog trainer, pioneer in knife detection discipline, works with scientific researchers including Dr. Tatum and Texas Tech to validate and refine methodology.https://knifedetectiondogs.co.uk/________________________________________

The Future of ERP
Episode 82: From Prevention to Detection: Real-Time Security in a Digital World with Infosys

The Future of ERP

Play Episode Listen Later Feb 25, 2026 17:44


How real-time security transforms ERP systems in a cloud-driven world, spotting threats instantly, leveraging AI for proactive defense, and closing common blind spots before breaches escalate. Curious about staying ahead of cyber risks?=====Mohammed Moidheen, SAP security architect at Infosys, unpacks why real-time monitoring is vital amid 2,200 daily cyber attacks costing trillions annually. He highlights blind spots like unmonitored access vulnerabilities, ignored audit logs, unsecured APIs, privileged accounts, insider threats, and poor event correlation in S/4HANA Cloud setups. AI evolves detection with predictive intelligence, automated responses, natural language queries, and cross-system pattern spotting, shifting from reactive to proactive security. Real-world cases show systems halting unusual data downloads and insider data exfiltration in minutes. Advice includes aligning with governance, prioritizing crown jewels, setting baselines, training teams, and correlating data. Infosys aids via assessments and foundational builds.Listen now and rethink what ERP can do for your organization!⁠⁠⁠⁠Download Episode Transcript⁠⁠⁠⁠Useful Links: ⁠SAP Cloud ERP⁠Infosys.comFollow Us on Social Media!SAP S/4HANA Cloud ERP: LinkedIn=====Guest: Mohammed Khan Moidheen, SAP Security Architect at Infosys ConsultingMohammed Khan Moidheen is a Senior SAP Security architect with over 12 years of experience securing and operating large scale SAP landscapes across global enterprises. His expertise spans SAP S/4HANA security, ERP platform services, DevSecOps enablement, and designing audit ready security architectures aligned with frameworks such as ISO 27001, NIST, and GDPR.Mohammed is CISSP and CISA certified and I excel at translating complex security requirements into actionable strategies that are practical , strategically aligned and strengthen organisational resilience.Host 1: Richard Howells, SAPRichard Howells has been working in the Supply Chain Management and Manufacturing space for over 30 years. He is responsible for driving the thought leadership and awareness of SAP's ERP, Finance, and Supply Chain solutions and is an active writer, podcaster, and thought leader on the topics of supply chain, Industry 4.0, digitization, and sustainability.Follow Richard Howell on ⁠⁠⁠⁠LinkedIn⁠⁠⁠⁠ and ⁠⁠⁠⁠X⁠⁠⁠⁠Host 2: Oyku Ilgar, SAPOyku Ilgar is a marketer and thought leader specializing in SAP's digital supply chain and ERP solutions since 2017. As a marketer, blogger, and podcaster, she creates engaging content that highlights innovative SAP technologies and explores key topics including business trends, AI, Industry 4.0, and sustainability.She holds dual bachelor's degrees in Finance & Accounting and English Translation, along with a master's degree in Business Administration and Foreign Trade, specializing in marketing. With her background in digital transformation, Oyku communicates technology trends and industry insights to help professionals navigate the evolving business landscape.Oyku's ⁠LinkedIn⁠ and ⁠SAP Community⁠=====Key Topics: real-time security, ERP monitoring, cloud threats, SAP S/4HANA, access management, audit logs, AI threat detection, insider threats, privileged accounts, predictive intelligence

JACC Speciality Journals
Multisite, External Validation of an AI-Enabled ECG Algorithm for Detection of Low Ejection Fraction | JACC: Advances

JACC Speciality Journals

Play Episode Listen Later Feb 25, 2026 2:19


Darshan H. Brahmbhatt, Podcast Editor of JACC: Advances, discusses a recently published original research paper on Multisite, External Validation of an AI-Enabled ECG Algorithm for Detection of Low Ejection Fraction.

K9 Detection Collaborative
Dr. Jenny Essler: Goby Fish and Spotted Lantern Fly Detection (Pt. 2)

K9 Detection Collaborative

Play Episode Listen Later Feb 24, 2026 49:01


What to listen for:In the second half of the conversation with Dr. Jennifer Essler, our hosts, Robin Greubel and Stacy Barnett, discuss her current research and future goals bridging academic science with real-world handler expertise!At SUNY Cobleskill, Dr. Essler's conservation work demonstrates how detection dogs fill practical niches. Her Round Goby project (tracking invasive fish from the Black and Caspian Seas) uses dogs for water sampling rather than locating individual fish.This mirrors eDNA methodology but delivers immediate field results instead of days of laboratory processing. Dogs trade some sensitivity for real-time assessment, making them viable alternatives when speed matters. The project's success has attracted government conservation agencies interested in applying dogs to other invasive species like hydrilla plants and certain crawfish.Her Penn Vet ovarian cancer research revealed the limitations of lab-based detection. While dogs successfully identified cancer in blood plasma, clinical deployment was never the goal. Instead, the objective was helping develop electronic detection systems.The fundamental problem is that even superstar dogs have off days without visible behavioral indicators explaining poor performance. Unlike field work, where handlers notice changes, lab settings offer no safety net for medical diagnosis. Repetitive scent wheel searches also eventually bored excellent performers into retirement.That shows all the difference between detection work and examination work.Dr. Essler's future priorities center on quantifying practitioner expertise. That's documenting how experienced trainers accurately assess young dogs through seemingly instinctive judgments. Key Topics:Conservation Detection Research Projects (01:11)Round Goby Invasive Species Work (02:20)eDNA vs. Dogs: Trade-offs and Applications (11:32)Ovarian Cancer Detection Research Insights (20:51)Why Dogs Can't Replace Medical Testing (24:02)Future Research on Quantifying Handler Expertise (29:15)Puppy Selection Science and Practitioner Knowledge (35:07)Quarterly Research Review Plans (42:44)Understanding Research Sample Size Constraints (44:04) Resources:Dr. Essler's WebsiteSUNY Cobleskill Canine Science Program We want to hear from you:Check out the K9 Detection Collaborative FB page and comment on the episode post!K9Sensus Detection Dog Trainer AcademyK9Sensus Foundation can be found on Facebook and Instagram. We have a Trainer's Group on Facebook!Scentsabilities Nosework is also on Facebook. Here is a Facebook group you should join!You can follow us for notifications of upcoming episodes, find us at k9detectioncollaborative.com to enjoy the freebies, and tell your friends so you can keep the conversations going.And don't forget to check out the YouTube Channel!

Detection at Scale
Google's Michael Sinno on Autonomous Detection at 7 Trillion Logs Per Day

Detection at Scale

Play Episode Listen Later Feb 24, 2026 37:48


What does it actually take to automate security operations when you're processing 7 trillion log lines daily and a single missed threat could compromise billions of users? Michael Sinno, Director of Detection & Response at Google, explains how his team handles this with less than 1% requiring human intervention through strategic AI implementation. He explores Google's methodical approach to AI autonomy, including fine-tuned models trained on golden datasets, validation through overseer agents, and the critical distinction between traditional automation and agentic AI that exercises judgment. Michael also discusses groundbreaking work with Sec-Gemini and Timesketch that enables forensic analysis to surface attack patterns humans would never detect manually. Michael shares concrete metrics like reducing executive incident notifications from 30 minutes to 90 seconds, achieving 95% precision in ticket deduplication, and automating vulnerability coordination from hours to minutes. Topics discussed:Processing 7 trillion log lines daily with less than 1% of a million annual tickets requiring human intervention at GoogleStrategic evolution from AI-assisted to AI-led to autonomous security operations using fine-tuned models and golden datasetsBuilding modular detection agents as pluggable components that can be combined like Legos for specific security use casesImplementing quality assurance through overseer agents that review other agents' work to ensure precision in security decisionsReducing executive incident notifications from 30 minutes to 90 seconds using AI-powered summarization and context gatheringAchieving 95% precision in ticket deduplication while managing the trade-off between precision and 38% recall ratesIntegrating Sec-Gemini with Timesketch to surface attack patterns in forensic investigations that humans would never find manuallyShifting from traditional detection and response to infer-and-interrupt models that contain threats immediately before escalationAutomating vulnerability coordination workflows from hours to minutes through AI-powered data collection and impact analysisDistinguishing between traditional automation and agentic AI that exercises judgment rather than following if-then logicSetting a stretch goal of 70% automation in operations work while focusing humans on novel and complex security challengesMeasuring success through time-to-mitigation metrics and evaluating AI performance against human baseline capabilitiesListen to more episodes: Apple Spotify YouTubeWebsite

Reefer MEDness
E167-1 Is Irradiated Cannabis Safe? New Research Reveals the Truth with Saji George & Mamta Rani Part 1

Reefer MEDness

Play Episode Listen Later Feb 24, 2026 31:02


Does irradiated cannabis still contain mold spores?In this deep-dive episode, Trevor and Kirk explore the science behind cannabis irradiation, fungal contamination, and the hidden risks of mycotoxins. Dr. Saji George and Mamta Rani from McGill University break down how gamma irradiation is used to sterilize cannabis—and why even this industry-standard sterilization may not eliminate all harmful fungal spores or toxins. They reveal that while irradiation significantly reduces fungal contamination, advanced testing still detected viable spores and residual mycotoxins in some cannabis legal products.For immunocompromised patients, even minimal exposure to spores or toxins can matter. We explore testing gaps, regulatory limits, workplace risks, and new biocontrol solutions to prevent contamination at the source.Listen now to understand how cannabis irradiation works — and where the cracks in the system may be.Detection of Mycotoxigenic Fungi and Residual Mycotoxins in Cannabis Buds Following Gamma Irradiation - PaperSaji George - LinkedInMamta Rani - LinkedInTranscripts, papers and so much more at: reefermed.ca

Bench Boost by Inorganic Ventures
Method Detection Limits in Mining: Why MDLs are Higher than You Expect

Bench Boost by Inorganic Ventures

Play Episode Listen Later Feb 24, 2026 11:27


Send a textIn this episode of Bench Boost our team revisits method detection limits (MDLs) with a focus on why mining applications often produce higher MDLs than expected. Autumn contrasts instrument detection limits with method detection limits, which reflect real sample matrices, interferences, and method variability. Liv explains mining-specific drivers of elevated MDLs, including aggressive sample preparation and impacts from dilution and high total dissolved solids. Mike closes the episode this week by discussing practical ways to improve MDLs.

The Leadership in Insurance Podcast (The LIIP)
From Distraction to Detection: The Future of Commercial Auto with Dan Grimwood-Bird

The Leadership in Insurance Podcast (The LIIP)

Play Episode Listen Later Feb 23, 2026 28:55


This week's episode features Dan Grimwood-Bird, Head of Insurance at Nauto, an AI company at the forefront of commercial auto safety technology. This conversation covers everything from cutting-edge AI to the deeply human side of our industry.Dan shares how Nauto's AI-powered device is transforming fleet safety by tackling the root cause of the problem: with 70% of collisions caused by driver distraction or inattention, Nauto's windscreen-mounted system identifies risks in real time, alerts drivers, and provides critical video evidence for claims. The results? Significantly lower collision rates across commercial fleets.The conversation goes much deeper than technology. Dan and host Alex explore:

Montana Public Radio News
Opioid overdoses rise in Montana, despite decline in fentanyl detection

Montana Public Radio News

Play Episode Listen Later Feb 21, 2026 2:07


There are signs the presence of fentanyl, a powerful synthetic opioid, may be declining in Montana. The drug was largely responsible for the increase of opioid overdose deaths during the pandemic. Now other dangerous drugs are emerging in the state.

Canine Conversations
Raising spaniels for detection with Reetta Kangaslampi and Dr. Natasha Underwood

Canine Conversations

Play Episode Listen Later Feb 19, 2026 46:34


Join Kayla Fratt, co-founder of K9Conservationists, as she chats with Reetta Kangaslampi, a PhD researcher from the University of Eastern Finland and Dr. Natasha Underwood, an ecologist, environmental consultant, and specialist conservation detection dog handler about their journeys raising cocker and springer spaniels for detection. Reetta and Natasha discuss how they went about choosing their perfect spaniel, early training, and some of the classic spaniel hurdles they run into. Reetta Kangaslampi Instagram: K9barkbeetles https://www.instagram.com/k9sbarkbeetles?utm_source=ig_web_button_share_sheet&igsh=ZDNlZDc0MzIxNw==Dr. Natasha UnderwoodInstagram: NHU Ecology and detection dogshttps://www.instagram.com/nhu_ecology_and_detection_dogs/Host: Kayla FrattEditor: Sara Fangton Guest logistics: Brooke Schoeder Intern: Grace KoskiWebsite: Meg du BrayMentoring group: Madison Davis

university phd raising detection underwood spaniels eastern finland reetta
Obstetrics & Gynecology: Editor's Picks and Perspectives
March 2026: Pregnancy Testing and Timing of Pregnancy Detection

Obstetrics & Gynecology: Editor's Picks and Perspectives

Play Episode Listen Later Feb 19, 2026 14:23


A Podcast from Obstetrics & Gynecology highlighting the latest research and practice updates in the field. This episode features an interview with Dr. Alexandra C. Sundermann, author of "Pregnancy Test Use and Timing of Pregnancy Detection in a Prospective Cohort of Pregnancy Planners."

Bob Sirott
Thought Leader Joseph Lenzie explains how banks are turning detection into prevention

Bob Sirott

Play Episode Listen Later Feb 19, 2026


Joseph Lenzie, Senior Vice President, Treasury Management Officer Lead at Associated Bank, joins Steve Grzanich on this week's Thought Leader conversation to break down why traditional fraud detection isn't enough anymore, and how the financial world is evolving, from smarter fraud defense to the broader economic and risk trends shaping 2026.

JCO Precision Oncology Conversations
ctDNA in Metastatic Invasive Lobular Carcinoma

JCO Precision Oncology Conversations

Play Episode Listen Later Feb 18, 2026 27:46


JCO PO author Dr. Foldi at UPMC Hillman Cancer Center and University of Pittsburgh School of Medicine shares insights into the JCO PO article, "Personalized Circulating Tumor DNA Testing for Detection of Progression and Treatment Response Monitoring in Patients With Metastatic Invasive Lobular Carcinoma of the Breast." Host Dr. Rafeh Naqash and Dr. Foldi discuss how serial ctDNA testing in patients with mILC is feasible and may enable personalized surveillance and real-time therapeutic monitoring. TRANSCRIPT Dr. Rafeh Naqash: Hello, and welcome to JCO Precision Oncology Conversations, where we bring you engaging conversations with authors of clinically relevant and highly significant JCO PO articles. I am your host, Dr. Rafeh Naqash, podcast editor for JCO Precision Oncology and Associate Professor at the OU Health Stephenson Cancer Center at the University of Oklahoma. Today, we are thrilled to be joined by Dr. Julia Foldi, Assistant Professor of Medicine in the Division of Hematology-Oncology at University of Pittsburgh School of Medicine and the Magee-Womens Hospital of the UPMC. She is also the lead and corresponding author of the JCO Precision Oncology article entitled "Personalized Circulating Tumor DNA Testing for Detection of Progression and Treatment Response Monitoring in Patients with Metastatic Invasive Lobular Carcinoma of the Breast." At the time of this recording, our guest's disclosures will be linked in the transcript. Julia, welcome to our podcast, and thank you for joining us today. Dr. Julia Foldi: Thank you so much for having me. It is a pleasure. Dr. Rafeh Naqash: Again, your manuscript and project address a few interesting things, so we will start with the basics, since we have a broad audience that comprises trainees, community oncologists, and obviously precision medicine experts as well. So, let us start with invasive lobular breast carcinoma. I have been out of fellowship for several years now, and I do not know much about invasive lobular carcinoma. Could you tell us what it is, what some of the genomic characteristics are, why it is different, and why it is important to have a different way to understand disease biology and track disease status with this type of breast cancer? Dr. Julia Foldi: Yes, thank you for that question. It is really important to frame this study. So, lobular breast cancers, which we shorten to ILC, are the second most common histologic subtype of breast cancer after ductal breast cancers. ILC makes up about 10 to 15 percent of all breast cancers, so it is relatively rare, but in the big scheme of things, because breast cancer is so common, this represents actually over 40,000 new diagnoses a year in the US of lobular breast cancers. What is unique about ILC is it is characterized by loss of an adhesion molecule, E-cadherin. It is encoded by the CDH1 gene. What it does is these tumors tend to form discohesive, single-file patterns and infiltrate into the tumor stroma, as opposed to ductal cancers, which generally form more cohesive masses. As we generally explain to patients, ductal cancers tend to form lumps, while lobular cancers often are not palpable because they infiltrate into the stroma. This creates several challenges, particularly when it comes to imaging. In the diagnostic setting, we know that mammograms and ultrasounds have less sensitivity to detect lobular versus ductal breast cancer. When it comes to the metastatic setting, conventional imaging techniques like CT scans have less sensitivity to detect lobular lesions often. One other unique characteristic of ILC is that these tumors tend to have lower proliferation rates. Because our glucose-based PET scans depend on glucose uptake of proliferating cells, often these tumors also are not avid on conventional FDG-PET scans. It is a challenge for us to monitor these patients as they go through treatment. If you think about the metastatic setting, we start a new treatment, we image people every three to four cycles, about every three months, and we combine the imaging results with clinical assessment and tumor markers to decide if the treatment is working. But if your imaging is not reliable, sometimes even at diagnosis, to really detect these tumors, then really, how are we following these patients? This is really the unique challenge in the metastatic setting in patients with lobular breast cancer: we cannot rely on the imaging to tell if patients are responding to treatment. This is where liquid biopsies are really, really important, and as the field is growing up and we have better and better technologies, lobular breast cancer is going to be a field where they are going to play an important role. Dr. Rafeh Naqash: Thank you for that easy-to-understand background. The second aspect that I would like to have some context on, to help the audience understand why you did what you did, is ctDNA, tumor informed and non-informed. Could you tell us what these subtypes of liquid biopsies are and why you chose a tumor informed assay for your study? Dr. Julia Foldi: Yes, it is really important to understand these differences. As you mentioned, there are two main platforms for liquid biopsy assays, circulating tumor DNA assays. I think what is more commonly used in the metastatic setting are non-tumor informed assays, or agnostic assays. These are generally next-generation sequencing-based assays that a lot of companies offer, like Guardant, Tempus, Caris, and FoundationOne. These do not require tumor tissue; they just require a blood sample, a plasma sample, essentially. The next-generation sequencing is done on cell-free DNA that is extracted from the plasma, and it is looking for any cell-free DNA and essentially, figuring out what part of the cell-free DNA comes from the tumor is done through a bioinformatics approach. Most of these assays are panel tests for cancer-associated mutations that we know either have therapeutic significance or biologic significance. So, the results we receive from these tests generally read out specific mutations in oncogenic genes, or sometimes things like fusions where we have specific targeted drugs. Some of the newer assays can also read out tumor fraction; for example, the newest generation Guardant assay that is methylation-based, they can also quantify tumor fraction. But the disadvantage of the tumor agnostic approach is that it is a little bit less sensitive. Opposed to that, we have our tumor informed tests, and these require tumor tissue. Essentially, the tumor is sequenced; this can either be whole exome or whole genome sequencing. The newer generation assays are now using whole genome sequencing of the tumor tissue, and a personalized, patient-specific panel of alterations is essentially barcoded on that tumor tissue. This can be either structural variants or it can be mutations, but generally, these are not driver mutations, but sort of things that are present in the tumor tissue that tend to stay unchanged over time. For each particular patient, a personalized assay, if you want to call it a fingerprint or barcode, is created, and then that is what then is used to test the plasma sample. Essentially, you are looking for that specific cancer in the blood, that barcode or fingerprint in the blood. Because of this, this is a much more sensitive way of looking for ctDNA, and obviously, this detects only that particular tumor that was sequenced originally. So, it is much more sensitive and specific to that tumor that was sequenced. You can argue for both approaches in different settings. We use them in different settings because they give us different information. The tumor agnostic approach gives us mutations, which can be used to determine what the next best therapy to use is, while the tumor informed assay is more sensitive, but it is not going to give us information on therapeutic targets. However, it is quantified, and we can follow it over time to see how it changes. We think that it is going to tell us how patients respond to treatment because we see our circulating tumor DNA levels rise and fall as the cancer burden increases or decreases. We decided to use the tumor informed approach in this particular study because we were really interested in how to determine if patients are having response to treatment versus if they are going to progress on their treatment, more so than looking for specific mutations. Dr. Rafeh Naqash: When you think about these tumor informed assays and you think about barcoding the mutations on the original tumor that you try to track or follow in subsequent blood samples, plasma samples, in your experience, if you have done it in non-lobular cancers, do you think shedding from the tumor has something to do with what you capture or how much you capture? Dr. Julia Foldi: Absolutely. I think there are multiple factors that go into whether someone has detectable ctDNA or not, and that has to do with the type of cancer, the location, right, where is the metastatic site? This is something that we do not fully understand yet: what are tumors that shed more versus not? There is also clearance of ctDNA, and so how fast that clearance occurs is also something that will affect what you can detect in the blood. ctDNA is very short-lived, only has a half-life of hours, and so you can imagine that if there is little shedding and a lot of excretion, then you are not going to be detecting a lot of it. In general, in the metastatic setting, we see that we can detect ctDNA in a lot of cases, especially when patients are progressing on treatment, because we imagine their tumor burden is higher at that point. Even with the non-tumor informed assays, we detect a lot of ctDNA. Part of this study was to actually assess: what is the proportion of patients where we can have this information? Because if we are only going to be able to detect ctDNA in less than 50 percent of patients, then it is not going to be a useful method to follow them with. Because this field is new and we have not been using a lot of tumor informed assays in the metastatic setting, we did not really know what to expect when we set out to look at this. We did not know what was going to be the baseline detection rate in this patient population, so that was one of the first things that we wanted to answer. Dr. Rafeh Naqash: Excellent. Now going to this manuscript in particular, what was the research question, what was the patient population, and what was the strategy that you used to investigate some of these questions? Dr. Julia Foldi: So, we partnered with Natera, and the reason was that their Signatera tumor-informed assay was the first personalized, tumor-informed, really an MRD assay, minimal residual disease detection assay. It has been around the longest and has been pretty widely used commercially already, even though some of our data is still lacking. but we know that people are using this in the real world. We wanted to gather some real-world data specifically in lobular patients. So, we asked Natera to look at their database of commercial Signatera testing and look for patients with stage 4 lobular breast cancer. The information all comes from the submitting physicians sending in pathologic reports and clinical notes, and so they have that information from the requisitions essentially that are sent in by the ordering physician. We found 66 patients who were on first-line or close to first-line endocrine-based therapies for their metastatic lobular breast cancer and had serial collections of Signatera tests. The way we defined baseline was that the first Signatera had to be sent within three months of starting treatment. So, it is not truly baseline, but again, this is a limitation of looking at real-world data is that you are not always going to get the best time point that you need. We had over 350 samples from those 66 patients, again longitudinal ctDNA samples, and our first question was what is the baseline detection rate using this tumor informed assay? Then, most importantly, what is the concordance between changes in ctDNA and clinical response to treatment? That is defined by essentially radiologic response to treatment. Dr. Rafeh Naqash: Interesting. So, what were some of your observations in terms of ctDNA dynamics, whether baseline levels made a difference, whether subsequent levels at different time points made a difference, or subsequent levels at, let us say, cycle three made a difference? Were there any specific trends that you saw? Dr. Julia Foldi: So, first, at baseline, 95 percent of patients had detectable ctDNA, which is, I think, a really important data point because it tells us that this can be a really useful test. If we can detect it in almost all patients before they start treatment, we are going to be able to follow this longitudinally. And again, these were not true baseline samples. So, I think if we look really at baseline before starting treatment, almost all patients will have detectable ctDNA in the metastatic setting. The second important thing we saw was that disease progression correlated very well with increase in ctDNA. So, in most patients who had disease progression by imaging, we saw increase in ctDNA. Conversely, in most patients who had clinical benefit from their treatment, so they had a response or stable disease, we saw decrease in ctDNA levels. It seems that what we call molecular response based on ctDNA is tracking very nicely along with the radiographic response. So, those were really the two main observations. Again, this is a small cohort, limited by its real-world nature and the time points that ctDNA assay was sent was obviously not mandated. This is a real-world data set, and so we could not really look at specific time points like you asked about, let us say, cycle three of therapy, right? We did not have all of the right time points for all of the patients. But what we were able to do was to graph out some specific patient scenarios to illustrate how changes in ctDNA correlate with imaging response. I can talk a little bit about that. Dr. Rafeh Naqash: That was going to be my question. Did you see patients who had serial monitoring using the tumor informed ctDNA assay where the assay became positive a few months before the imaging? Did you have any of those kinds of observations? Dr. Julia Foldi: Yes, so I think this is where the field is going: are we able to use this technology to maybe detect progression before it becomes clinically apparent? Of course, there are lots of questions about: does that really matter? But it seems like, based on some of the patient scenarios that we present in the paper, that this testing can do that. So, we had a specific scenario, and this is illustrated in a figure in the paper, really showing the treatment as well as the changes in ctDNA, tumor markers, and also radiographic response. So, this particular patient was on first-line endocrine therapy and CDK4/6 inhibitor with palbociclib. Initially, she had a low-level detectable ctDNA. It became undetectable during treatment, and the patient had a couple of serial ctDNA assays that were negative, so undetectable. And then we started, after about seven months on this combination therapy, the ctDNA levels started rising. She actually had three serial ctDNA assays with increasing level of ctDNA before she even had any imaging tests. And then around the time that the ctDNA peaked, this patient had radiographic evidence of progression. There was also an NGS-based assay sent to look for specific mutations at that point. The patient was found to have an ESR1 mutation, which is very common in this patient population. She was switched to a novel oral SERD, elacestrant, and the ctDNA fell again to undetectable within the first couple months of being on elacestrant. And then a very similar thing happened: while she was on this second-line therapy, she had three serial negative ctDNA assays, and then the fourth one was positive. This was two months before the patient had a scan that showed progression again. Dr. Rafeh Naqash: And Julia, like you mentioned, this is a small sample size, limited number of patients, in this case, one patient case scenario, but provides insights into other important aspects around escalation or de-escalation of therapy where perhaps ctDNA could be used as an integral biomarker rather than an exploratory biomarker. What are some of your thoughts around that and how is the breast cancer space? I know like in GI and bladder cancer, there has been a significant uptrend in MRD assessments for therapeutic decision making. What is happening in the breast cancer space? Dr. Julia Foldi: So, super interesting. I think this is where a lot of our different fields are going. In the breast cancer space, so far, I have seen a lot of escalation attempts. It is not even necessarily in this particular setting where we are looking at dynamics of ctDNA, but in the breast cancer world, of course, we have a lot of data on resistance mutations. I mentioned ESR1 mutation in a particular patient in our study. ESR1 mutations are very common in patients with ER-positive breast cancer who are on long-term endocrine therapy, and ESR1 mutations confer resistance to aromatase inhibitors. So, that is an area that there has been a lot of interest in trying to detect ESR1 mutations earlier and switching therapy early. So, this was the basis of the SERENA-6 trial, which was presented last year at ASCO and created a lot of excitement. This was a trial where patients had non-tumor-informed NGS-based Guardant assay sent every three to six months while they were on first-line endocrine therapy with a CDK4/6 inhibitor. If they had an ESR1 mutation detected, they were randomized to either continue the same endocrine therapy or switch to an oral SERD. The trial showed that the population of patients who switched to the oral SERD did better in terms of progression-free survival than those who stayed on their original endocrine therapy. There are a lot of questions about how to use this in routine practice. Of course, it is not trivial to be sending a ctDNA assay every three to six months. The rate of detection of these mutations was relatively low in that study; again, the incidence increases in later lines of therapy. So, there are a lot of questions about whether we should be doing this in all of our first-line patients. The other question is, even the patients who stayed on their original endocrine therapy were able to stay on that for another nine months. So, there is this question of: are we switching patients too early to a new line of therapy by having this escalation approach? So, there are a lot of questions about this. As far as I know, at least in our practice, we are not using this approach just yet to escalate therapy. Time will tell how this all pans out. But I think what is even more interesting is the de-escalation question, and I think that is where tumor informed assays like Signatera and the data that our study generated can be applied. Actually, our plan is to generate some prospective data in the lobular breast cancer population, and I have an ongoing study to do that, to really be able to tease out the early ctDNA dynamics as patients first start on endocrine therapy. So, this is patients who are newly diagnosed, they are just starting on their first-line endocrine therapy, and measure, with sensitive assays, measure ctDNA dynamics in the first few months of therapy. In those patients who have a really robust response, that is where I think we can really think about de-escalation. In the patients whose ctDNA goes to undetectable after just a few weeks of therapy with just an endocrine agent, they might not even need a CDK4/6 inhibitor in their first-line treatment. So, that is an area where we are very interested in our group, and I know that other groups are looking at this too, to try to de-escalate therapy in patients who clear their ctDNA early on. Dr. Rafeh Naqash: Thank you so much. Well, lots of questions, but at the same time, progress comes through questions asked, and your project is one of those which is asking an interesting question in a rarer cancer and perhaps will lead to subsequent improvement in how we monitor these individuals and how we escalate or de-escalate therapy. Hopefully, we will get to see more of what you are working on in subsequent submissions to JCO Precision Oncology and perhaps talk more about it in a couple of years and see how the space and field is moving. Thanks again for sharing your insights. I do want to take one to two quick minutes talking about you as an investigator, Julia. If you could speak to your career pathway, your journey, the pathway to mentorship, the pathway to being a mentor, and how things have shaped for you in your personal professional growth. Dr. Julia Foldi: Sure, yeah, that is great. Thank you. So, I had a little bit of an unconventional path to clinical medicine. I actually thought I was going to be a basic scientist when I first started out. I got a PhD in Immunology right out of college and was studying not even anything cancer-related. I was studying macrophage signaling in inflammatory diseases, but I was in New York City. This was right around the time that the first checkpoint inhibitors were approved. Actually, some of my friends from my PhD program worked in Jim Allison's lab, who was the basic scientist responsible for ipilimumab. So, I got to kind of first-hand experience the excitement around bringing something from the lab into the clinic that actually changed really the course of oncology. And so, I got very excited about oncology and clinical medicine. So, I decided to kind of switch gears from there and I went back to medical school after finishing my PhD and got my MD at NYU. I knew I wanted to do oncology, so I did a research track residency and fellowship combined at Yale. I started working early on with the breast cancer team there. At the time, Lajos Pusztai was the head of translational research there at Yale, and I started working with him early in my residency and then through my fellowship. I worked on several trials with him, including a neoadjuvant checkpoint inhibitor trial in triple-negative breast cancer patients. During my last year in fellowship, I received a Conquer Cancer Young Investigator Award to study estrogen receptor heterogeneity using spatial transcriptomics in this subset of breast cancers that have intermediate estrogen receptor expression. From there, I joined the faculty at the University of Pittsburgh in 2022. So, I have been there about almost four years at this point. My interests really shifted slowly from triple-negative breast cancers towards ER-positive breast cancers. When I arrived in Pittsburgh, I started working very closely with some basic and translational researchers here who are very interested in estrogen signaling and mechanisms of resistance to endocrine therapy, and there is a large group here interested in lobular breast cancers. During my training, I was not super aware even that lobular breast cancer was a unique subtype of breast cancers, and that is, I think, changing a little bit. There is a lot more awareness in the breast cancer clinical and research community about ILC being a unique subtype, but it is not even really part of our training in fellowship, which we are trying to change. But I have become a lot more aware of this because of the research team here and through that, I have become really interested also on the clinical side. And so, we do have a Lobular Breast Cancer Research Center of Excellence here at the University of Pittsburgh and UPMC, and I am the leader on the clinical side. We have a really great team of basic and translational researchers looking at different aspects of lobular breast cancers, and some of the work that I am doing is related to this particular manuscript we discussed and the next steps, as I mentioned, a prospective study of early ctDNA dynamics in lobular patients. I also did some more clinical research work in collaboration with the NSABP looking at long-term outcomes of patients with lobular versus ductal breast cancers in some of their older trials. And so, that is, in a nutshell, a little bit about how I got here and how I became interested in ILC. Dr. Rafeh Naqash: Well, thank you for sharing those personal insights and personal journey. I am sure it will inspire other trainees, fellows, and perhaps junior faculty in trying to find their niche. The path, as you mentioned, is not always straight; it often tends to be convoluted. And then finding an area that you are interested in, taking things forward, and being persistent is often what matters. Dr. Julia Foldi: Thank you so much for having me. It was great. Dr. Rafeh Naqash: It was great chatting with you. And thank you for listening to JCO Precision Oncology Conversations. Don't forget to give us a rating or review, and be sure to subscribe so you never miss an episode. You can find all ASCO shows at asco.org/podcasts. The purpose of this podcast is to educate and to inform. This is not a substitute for professional medical care and is not intended for use in the diagnosis or treatment of individual conditions. Guests on this podcast express their own opinions, experience, and conclusions. Guest statements on the podcast do not express the opinions of ASCO. The mention of any product, service, organization, activity, or therapy should not be construed as an ASCO endorsement.  

The Mike Hosking Breakfast
Glen Dobson: Drug Detection Agency CEO on the workplace testing results showing increased use of cocaine

The Mike Hosking Breakfast

Play Episode Listen Later Feb 18, 2026 2:35 Transcription Available


New workplace testing results reveal cocaine detections have sharply risen across the country. The Drug Detection Agency's results for the three months to December show cocaine was present in 3.7% of positive tests – more than double the amount from last quarter. Bay of Plenty, Auckland West, and Waikato were identified as the regions with the sharpest rises. Chief Executive Glenn Dobson told Mike Hosking that New Zealand already has a strong use base of methamphetamine, and now they're starting to see a real increase in cocaine usage, which is a real concern for them. LISTEN ABOVE See omnystudio.com/listener for privacy information.

Got a Minute with John Ed Mathison
AI Detection Mistake

Got a Minute with John Ed Mathison

Play Episode Listen Later Feb 17, 2026 0:57


Proper behavior will produce helpful results.  In life, use your clarinets to make music and not to fool AI detection systems.

Cloud Security Podcast by Google
EP263 SOC Refurbishing: Why New Tools Won't Fix Broken Processes (Even With AI)

Cloud Security Podcast by Google

Play Episode Listen Later Feb 16, 2026 32:34


Guest: Daniel Lyman, VP of Threat Detection and Response, Fiserv Topics: What is the right way for people to bridge the gap and translate executive dreams and board goals into the reality of life on the ground? How do we talk to people who think they have "transformed" their SOC simply by buying a better, shinier product (like a modern SIEM) while leaving their old processes intact? What are the specific challenges and advantages you've seen with a federated SOC versus a centralized one? What does a "federated" or "sub-SOC" model actually mean in practice? Why is the message that "EDR doesn't cover everything" so hard for some people to hear? Is this obsession with EDR a business decision or technology debt? How do you expect AI to change the calculus around data centralization versus data federation? What is your favorite example of telemetry that is useful, but usually excluded from a SIEM? What are the Detection and Response organizational metrics that you think are most valuable? Is the continued use of Excel an issue of tooling, laziness, or just because it is a fundamentally good way to interact with a small database? Resources: Video version "In My Time of Dying" book EP258 Why Your Security Strategy Needs an Immune System, Not a Fortress with Royal Hansen EP197 SIEM (Decoupled or Not), and Security Data Lakes: A Google SecOps Perspective The Gravity of Process: Why New Tech Never Fixes Broken Process and Can AI Change It? blog

Becker’s Payer Issues Podcast
From Detection to Prevention: AI's Role in Payment Integrity

Becker’s Payer Issues Podcast

Play Episode Listen Later Feb 13, 2026 9:38


In this episode, Steve Sutherland, Senior Vice President of Information Systems at CERIS, shares how AI and machine learning are reshaping payment integrity across the full claims lifecycle. He discusses the shift toward prepayment solutions, the importance of governance and data quality, and how leaders can balance automation with accuracy, fairness, and trust.This episode is spon sponsored by CERIS.

K9s Talking Scents
#134 Electronic Storage Device (ESD) Detection Dogs with Derek Ramierez

K9s Talking Scents

Play Episode Listen Later Feb 12, 2026 72:18


Derek Ramirez, the first ESD (Electronic Storage Device) K9 handler in his large Southern California agency, breaks down why electronic detection is the most challenging discipline in K9 work. Despite working in a major metro area with high demand, Derek's biggest hurdle wasn't finding work—it was educating decision-makers about what ESD dogs can do.Unlike narcotics or explosives with consistent target odors, electronic devices present massive challenges: thousands of manufacturers, constantly evolving technology, and micro-level odor signatures from SD cards and circuit components. Derek explains why handlers must become experts at reading subtle behavioral changes, why "interest" often matters more than full alerts, and how missing a hidden device can mean lost evidence in child exploitation cases.Key Topics:Why the nonprofit model creates handler limitationsESD vs. narcotics detection: fundamental differencesGeneralization training across device types and manufacturersReading dogs in low-odor scenariosWhy double-blind testing is essential for ESD teamsSearch methodology: how hiding spots affect successBuilding an ESD program from 5 to 16 dogsEssential for anyone considering ESD capabilities for event security, corporate environments, or law enforcement applications where electronic device detection matters.Derek Ramirez Background: First ESD K9 handler in major SoCal agency, built program from ground up, now manages growing unit of 16 dogs, works both ESD and narcotics detection.________________________________________

WP Builds
456 – WordPress vulnerabilities and the power of AI-powered malware detection

WP Builds

Play Episode Listen Later Feb 12, 2026 84:54


In this WP Builds episode, Nathan Wrigley talks with Thomas Raef about WordPress website security. Thomas shares his journey founding We Watch Your Website, discusses the prevalence of attacks on US WordPress sites, and explores how hackers increasingly use stolen credentials and AI-powered methods. The episode gets into AI tools for both attackers and defenders, highlighting strategies like behavioural analysis and other mathematical things I don't understand! It wraps up with advice on implementing security measures like 2FA and device trust, and the ongoing AI "arms race" in cybersecurity. Go listen...

SECURE AF
MSI Mayhem – RATs Hiding in Phishing Installers to Evade Detection

SECURE AF

Play Episode Listen Later Feb 11, 2026 6:00


Got a question or comment? Message us here!Attackers are hiding remote access trojans (RATs) inside malicious MSI installers disguised as legit software, and it's surging in early 2026. We break down how these phishing attacks bypass EDR, what to look for, and how SOC teams can stop them before they turn into full-blown breaches. Support the showWatch full episodes at youtube.com/@aliascybersecurity.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

CERIAS Security Seminar Podcast
Bethanie Williams, AI-Assisted Cyber-Physical Attack Detection in Smart Manufacturing Systems

CERIAS Security Seminar Podcast

Play Episode Listen Later Feb 11, 2026 47:07


The rise of Industry 4.0 has transformed manufacturing through the integration of cyber-physical systems, connectivity, and real-time data exchange into increasingly automated and intelligent platforms. While these advances improve productivity and efficiency, they also introduce vulnerabilities to cyber-physical attacks that can degrade product quality, damage equipment, and pose safety risks. Effective detection depends on understanding which data sources and levels of granularity provide sufficient visibility for accurate anomaly detection and attack identification. Replicated environments, such as digital twins (DTs), help address the challenges of collecting high-fidelity data and executing complex attack scenarios in live production systems.This talk presents an AI-assisted framework for detecting cyber-physical attacks in smart manufacturing using real machine experimentation complemented by DT–based replication. The framework evaluates multiple data sources, ranging from high-level operational data to low-level control and side-channel signals, to understand how data fidelity and context influence detection performance. A hardware-in-the-loop (HIL) DT is used to replicate machine behavior, safely execute attacks, and enable controlled experimentation that would be impractical in live production environments.Through experiments on a real CNC machining system and its corresponding HIL-based DT, multiple cyber-physical attack scenarios are evaluated using statistical, machine learning, and deep learning-based detection methods. Results demonstrate that detection effectiveness is highly dependent on attack type and data granularity, highlighting the need for domain-aware, multi-source monitoring strategies. The framework is further extended to additive manufacturing, illustrating how insights derived from CNC systems can guide attack detection in related manufacturing domains.Overall, this work demonstrates how combining AI-based detection with real-world experimentation and DT technologies enables more robust and practical security analysis for cyber-physical manufacturing systems. About the speaker: Dr. Bethanie Williams is an R&D, S&E Cybersecurity Engineer at Sandia National Laboratories, where she specializes in applying artificial intelligence (AI) to enhance the security and resilience of cyber-physical systems in critical infrastructure, including power grid systems, healthcare facilities, and advanced manufacturing. She is also actively involved in the Cybersecurity Manufacturing Innovation Institute (CyManII) through her work at Sandia. Bethanie earned her Bachelor of Arts degree as a triple major in Mathematics, Spanish, and Computer Science from Berea College in 2020. During her time at Berea, she was a Bonner Scholar and a member of the women's basketball team, earning All-American honors for her athletic achievements. She completed her Master of Science in Computer Science with a concentration in Cybersecurity at Tennessee Technological University in 2022, under the supervision of Dr. Ambareen Siraj, and earned her Ph.D. in Engineering with a major in Computer Science in 2025 under the guidance of Dr. Muhammad Ismail. Her dissertation, titled "Multi-Source Data Analysis and an Effective AI-Assisted Detection Framework for Cyber-Physical Attacks in Smart Manufacturing," focused on leveraging AI-driven approaches and analyzing various data sources to detect and mitigate cyber-physical attacks in manufacturing systems. Throughout her graduate studies, Bethanie received the College of Engineering Distinguished Fellowship and the National Science Foundation (NSF) Scholarship for Service (SFS). She was a year-round intern at Sandia National Laboratories as part of the Center for Cyber Defenders (CCD) program, where she contributed to national research initiatives under CyManII. Bethanie held several executive leadership roles at Tennessee Tech, including Vice President of Cyber Eagles and Graduate Student Club. She also served as a Ph.D. advisor for Women in Cybersecurity (WiCyS). Through these roles, she actively mentored students, organized outreach events, and fostered a supportive community for women in cybersecurity. Bethanie's current research interests include cyber-physical security, modeling and simulation of industrial control systems, and leveraging AI for advanced manufacturing. As an Early Career R&D, S&E Cybersecurity Engineer at Sandia, she is committed to bridging academic innovation and national security applications to protect critical infrastructure and ensure its resilience.

Heart podcast
Cardiac imaging in oncology: the detection of cardiotoxicity

Heart podcast

Play Episode Listen Later Feb 10, 2026 20:57


In this episode of the Heart podcast, Digital Media Editor, Professor James Rudd, is joined by Professor Kazuaki Negishi from Sydney, Australia. They discuss the optimal use of imaging to detect cardiac effects of cancer therapies. If you enjoy the show, please leave us a positive review wherever you get your podcasts. It helps us to reach more people - thanks! Link to published paper: https://heart.bmj.com/content/111/22/1057

AM Best Radio Podcast
Coalition's Toomey: Rising Cyber Interconnectedness Pushes Insurers to Boost Detection, Response

AM Best Radio Podcast

Play Episode Listen Later Feb 10, 2026 26:14 Transcription Available


Joe Toomey, vice president, underwriting security, Coalition, discusses emerging cyber vulnerabilities such as React2Shell, and how insurers help clients strengthen resilience and manage evolving risk.

The John Batchelor Show
S8 Ep435: HEADLINE: Hunting Particles Underground and in Space. GUEST: Govert Schilling. SUMMARY: Schilling discusses Cosmic Microwave Background evidence and direct detection efforts, including underground xenon tanks and antimatter searches on the Inter

The John Batchelor Show

Play Episode Listen Later Feb 9, 2026 13:47


HEADLINE: Hunting Particles Underground and in Space. GUEST: Govert Schilling. SUMMARY: Schilling discusses Cosmic Microwave Background evidence and direct detection efforts, including underground xenon tanks and antimatter searches on the International Space Station.1956

Central Line by American Society of Anesthesiologists
Impact of Sedation Type on Polyp Detection and of NMBAs in Patients with Chronic Kidney Disease

Central Line by American Society of Anesthesiologists

Play Episode Listen Later Feb 9, 2026 28:20


Dr. Adam Striker speaks with Dr. Jason Chi, editor for Summaries of Emerging Evidence (SEE), about two topics featured in SEE Volume 42A: the relationship between sedation type and the rate of precancerous polyp detection in colonoscopies, and rates of respiratory and acute cardiovascular complications, as well as 30-day mortality in patients with chronic kidney disease who received neuromuscular blocking agents (NMBAs). Recorded January 2026.

mnemonic security podcast
Cloud Detection and Response

mnemonic security podcast

Play Episode Listen Later Feb 9, 2026 32:24


"We are not really seeing as many attacks in the cloud where people hack in. It's more likely that they simply log in."In this episode of the mnemonic security podcast, we're exploring Cloud Detection & Response (CDR) together with Brian Contos; returning guest, fellow podcast host, author, and serial security entrepreneur. In his conversation with Robby, he shares from his new role as Field CISO for the Cloud Detection & Response platform Mitiga.They discuss the Salesforce supply chain attack and the challenges of protecting interconnected cloud ecosystems, the evolution of Cloud Detection & Response so far, and what we should expect in the near future.Send us a text

CISSP Cyber Training Podcast - CISSP Training Program
CCT 322: From Firewalls To AI: Building A Smarter Defense - CISSP Domain 7.7

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Feb 9, 2026 36:02 Transcription Available


Send us a textThe weakest link is often sitting on the edge, blinking away with expired firmware and no vendor support. We kick off with a blunt reality check on outdated firewalls, load balancers, and IoT gateways, and why waiting two years to retire them is a gift to attackers. From there, we guide you through Domain 7.7 with a practical blueprint for operating and maintaining detective and preventive measures that actually hold up under pressure.We unpack firewall fundamentals with clear, real‑world tradeoffs: when a simple packet filter is enough, when stateful inspection and deep packet inspection earn their keep, and how a WAF stops the web attacks your L3/L4 controls will miss. You'll hear how RTBH can deflect denial‑of‑service floods upstream, and why segmentation is your best friend for reducing blast radius—whether you use internal segmentation firewalls for R&D, Purdue‑style tiers for industrial networks, or controlled air gaps for the most sensitive systems. In the cloud, we separate security groups from true firewalls and show how to stitch policies across hybrid environments without creating blind spots.Detection makes prevention smarter, so we break down IDS versus IPS in plain language. Baseline first, then block with intent to avoid outages. We compare host‑based and network‑based sensors, explain where to place them, and share tactics for cutting alert noise. You'll also get straight talk on allowlists and blacklists, the right way to maintain them, and why stale entries cause the ugliest outages. We explore sandboxing for safe detonation and learning, and give an unvarnished take on honeypots and honeynets—where they help, where they waste time, and what legal lines to respect.Not every team can build a 24x7 SOC, so we outline how MSSPs can extend your coverage with clear SLAs and ownership. Endpoint anti‑malware remains non‑negotiable, but tool sprawl is a trap—choose a strong EDR and manage it well. Finally, we dive into AI and machine learning: how they supercharge detection, triage, and response—and how adversaries use them too. The throughline is simple: shrink attack surface, raise signal quality, and respond faster than threats can pivot. If this helps you secure one more edge box or tune one more control, share it with a teammate, subscribe for more practical walkthroughs, and drop a review so we can keep raising the bar together.Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

Leerburg's Dog Training Podcast
Understanding the Character Traits of Your Detection Dog

Leerburg's Dog Training Podcast

Play Episode Listen Later Feb 6, 2026 4:40


This course is designed for civilian scent work trainers—both beginners and experienced handlers—as well as law enforcement professionals, including police officers who are starting the detection training process with a new police dog. Kevin Sheldahl's experience and bias come from a practical working dog application, but our attendees and their variety of dogs challenged him to expand his perspective on a variety of scent sports and canine enrichment activities. This makes the Foundations to Detection course good for all dog owners and trainers to learn something useful that they can apply to their own training and relationship with their dog. | Links mentioned: Foundations of Scent Work - https://university.leerburg.com/Catalog/viewCourse/cid/243

That UFO Podcast
UAP Detection, Tracking & the Data Problem | Reed Summers & Rich Hoffman

That UFO Podcast

Play Episode Listen Later Feb 5, 2026 74:20


In this episode, Andy is joined by Reed Summers, organiser of the UAP Detection and Tracking Summit, and Rich Hoffman, veteran UAP researcher and Strategic Advisor to the summit.The conversation focuses on why detection and tracking are now the most critical steps in UAP research, the limitations of leaked military footage, the growing role of citizen science, and why transparent, multi-sensor data is essential if the subject is ever to move beyond speculation.Reed and Rich discuss how modern technology makes civilian-led UAP detection possible, the importance of international data standards, and how public participation may be key to meaningful progress on the issue.This episode serves as a practical overview of the goals, thinking, and scientific approach behind the upcoming UAP Detection and Tracking Summit.Use Code UAPDetect30 or ThatUFOPodcast30 for 30% off your tickethttps://uapsummit.org/event/uap-summit-2026/

Nutrition with Judy
371. From Explosives to Drugs: How K9 Detection Identifies Mold – Steven Antommarchi from Mold Dog Knows

Nutrition with Judy

Play Episode Listen Later Feb 5, 2026 67:39


Support your health journey with our private practice! Explore comprehensive lab testing, functional assessments, and expert guidance for your wellness journey. Find exclusive offers for podcast listeners at nutritionwithjudy.com/podcast. _____Steven and I dive into how mold detection dogs are transforming mold identification and remediation. We talk about how their superior sense of smell can detect both active and dormant mold, even when conventional testing fails. Steven shares how trained K9s can help you get remediation right the first time; saving time, money, and your health. Make sure to watch the full interview to learn more.Steven Antommarchi is a law enforcement professional, K9 detection trainer, and researcher whose work bridges environmental health, science, and service. With 16+ years in law enforcement, he's held roles from K9 Handler to Interim Chief of Police and now co-leads Mold Dog Knows, a company training dogs to detect mold in homes and buildings. He also trains and mentors over 150 K9 units globally and serves in roles at Florida International University, Texas State University, and the American Working Dog Association.We discuss the following:Steven's law enforcement and K9 training backgroundDog's olfactory system and its emotional detection capabilitiesHow dogs are profiled and trained to detect mold speciesReal-world deployment: HVAC, home inspections, and limitations of human testingDormant mold detectionCost of Mold Dog Detection ServiceMold Dog Certification and Identifying a legitimate mold detection dog companyProtecting dogs from mold exposure and developing mycotoxin detectionMore About Mold Dog Knows_____EPISODE RESOURCESWebsiteInstagramAmerican Working Dog AssociationCIRS ERMI Guide Bundle_____WEEKLY NEWSLETTER 

Canine Conversations
Part 2: Emma Gaalaas Mullaney- Heterodox Approach to Selecting and Raising Detection Dogs

Canine Conversations

Play Episode Listen Later Feb 5, 2026 76:10


If you haven't heard part one- we highly recommend going back and listening to that fist! Then head right back here and listen to this second part of our two part interview with Emma Gaalaas Mullaney, PhD. Learn more about her roll as the director of detection and search and rescue at the Penn Vet Working Dog Center and about the extraordinary dog teams she works with today. Host: Kayla FrattEditor: Sara Fangton Guest logistics: Brooke Schoeder Intern: Grace KoskiWebsite: Meg du BrayMentoring group: Madison Davis

The Good Trouble Show with Matt Ford
Breakthroughs in UAP Tracking Technology: New Advances in UFO Detection at UAP Summit

The Good Trouble Show with Matt Ford

Play Episode Listen Later Feb 4, 2026 38:27


UAP Tracking technology is finally here. In this episode, we reveal the hard science behind UFO detection and the new sensor systems designed to capture UAP data In this episode, Matt sits down with Reed Summers and Rich Hoffman to break down the groundbreaking developments that will be revealed at the upcoming UAP Tracking Summit. We explore the specific technologies being deployed to detect and track Unidentified Anomalous Phenomena in our airspace. From new radar systems to coordinated citizen science data, learn how the scientific community is building the ultimate "UAP Trap."  This summit includes Congressman Eric Burlison, Dr. Garry Nolan, Dr. Beatriz Villarroel, Richard Dolan, Ryan Graves, and the field work of John and Jerry Tedesco.Join the two day UAP Summit: https://uapsummit.org/Become a supporter of this podcast: https://www.spreaker.com/podcast/the-good-trouble-show-ufo-uap-politics-interviews--5808897/support.Sponsorship Inquires:  sponsors@thegoodtroubleshow.comSubstack:  https://substack.com/@thegoodtroubleshowLinktree: https://linktr.ee/thegoodtroubleshowPatreon: https://www.patreon.com/TheGoodTroubleShowYouTube: https://www.youtube.com/@TheGoodTroubleShowTwitter: https://twitter.com/GoodTroubleShowInstagram: https://www.instagram.com/thegoodtroubleshow/TikTok: https://www.tiktok.com/@goodtroubleshowFacebook: https://www.facebook.com/The-Good-Trouble-Show-With-Matt-Ford-106009712211646Threads: @TheGoodTroubleShowBlueSky: @TheGoodTroubleShow

The IFMA Podcast
Episode 19: NFPA 715 Fuel Gas Detection with Richard Roberts

The IFMA Podcast

Play Episode Listen Later Feb 2, 2026 30:01


Recent incidents of fuel gas leaking into homes and businesses and the resulting fires and explosions has motivated legislatures to take action to monitor for and alert occupants to these hazards. The fuel gas industry saw the need for a new standard that prescribed how to accomplish this goal and NFPA 715 was born.   Richard Roberts an Industry Affairs Manager for Honeywell Building Automation and has been involved in the development of NFPA 715 and other documents. He shares his insight into the why and how this standard is developed and what a Fire Marshal should know going forward.   You can contact Richard directly at Richard.Roberts@systemsensor.com  

News/Talk 94.9 WSJM
Southwest Michigan's Morning News: Police searching for Benton Harbor homicide suspect; First bird flu detection of 2026 is in SW Michigan

News/Talk 94.9 WSJM

Play Episode Listen Later Feb 2, 2026 9:14


Southwest Michigan's Morning News podcast is prepared and delivered by the WSJM Newsroom. For these stories and more, visit https://www.wsjm.com and follow us for updates on Facebook. See omnystudio.com/listener for privacy information.

Somewhere in the Skies
JOIN US at the 2026 UAP Detection and Tracking Summit!

Somewhere in the Skies

Play Episode Listen Later Jan 29, 2026 2:46


Are you ready to explore the frontier of UAP science and technology? Join us February 7th and 8th, 2026 for the 2026 UAP Detection and Tracking Summit, a premier two-day virtual conference bringing together the world's leading researchers, technologists, policymakers, and citizen scientists — all focused on advancing how we detect, track, and understand Unidentified Aerospace-Undersea Phenomena. Discount Code: SUMMIT35 Link: https://ryansprague.pursuingx.com/ Hear from top voices including Congressman Eric Burlison of the U.S. House of Representatives, Stanford pathologist Dr. Garry Nolan, aerospace strategist James Fowler, UAP historian Richard Dolan, and Ryan Graves, former U.S. Navy pilot and founder of Americans for Safe Aerospace. Plus, dozens more experts from academia, industry, and research will tackle sessions on flight safety, international collaboration, data infrastructure, and public engagement. Don't miss this opportunity to be part of the conversation shaping the future of UAP science! #science #uap #uapresearch #uaptwitter #uaptiktok #uaps #summit #disclosure Learn more about your ad choices. Visit megaphone.fm/adchoices

K9s Talking Scents
#133 The Reality of Explosive Detection with Hank Wong

K9s Talking Scents

Play Episode Listen Later Jan 29, 2026 103:13


Hank Wong, veteran law enforcement K9 handler turned DHS contractor, reveals shocking findings from government READY events that test bomb dog teams nationwide: NO team passes odor recognition tests 100% correctly on first attempt. The culprit? Over-reliance on single training kits and lack of exposure to varied manufacturers, packaging, and storage methods.Cameron and Hank break down the critical difference between discrimination (target vs. non-target) and generalization (recognizing target across variations), exposing how most handlers excel at one while failing the other. They discuss why dogs alert to "their version" of explosives but miss real-world threats, how training culture creates false confidence, and what event security teams must do differently.Key Topics:Why training on one kit creates operational gapsThe "chaos factor" science can't measureAction-on-find procedures for security vs. law enforcementHow to read your dog in low-odor scenariosWhy double-blind testing is essentialDiscrimination vs. generalization trainingEssential listening for event security K9 teams, handlers, and anyone responsible for explosive detection programs.Hank Wong Background: 20+ year LE K9 handler (Orlando area), worked dogs Recon, Gunner, Smash, and Keno. Now DHS contractor conducting READY events nationwide, bridging science and practitioner perspectives.________________________________________

Becker’s Healthcare Podcast
From Detection to Prevention: AI's Role in Payment Integrity

Becker’s Healthcare Podcast

Play Episode Listen Later Jan 27, 2026 9:38


In this episode, Steve Sutherland, Senior Vice President of Information Systems at CERIS, shares how AI and machine learning are reshaping payment integrity across the full claims lifecycle. He discusses the shift toward prepayment solutions, the importance of governance and data quality, and how leaders can balance automation with accuracy, fairness, and trust.This episode is sponsored by CERIS.

K9 Detection Collaborative
What Sport and Professional Detection Teams Can Learn from Each Other with Bob Deeds

K9 Detection Collaborative

Play Episode Listen Later Jan 27, 2026 48:28


What to listen for:“Trust your dog, but trust your training first.”Our hosts, Robin Greubel and Stacy Barnett, welcome back veteran USAR handler Bob Deeds to talk about the artificial divide between working dog and sport detection communities, and why both sides desperately need each other!Bob shares his journey from FEMA disaster work into nose work, leading into his innovative "geo-scenting" protocol. This hybrid sport combines geocaching with scent detection using clove oil, specifically chosen to avoid the venue-hopping confusion he observed in sport handlers who switched between organizations.Sport handlers often remain clique-ish, loyal to single venues (K9 Nose Work vs. NACSW) despite identical underlying science. Bob advocates aggressively for cross-training, noting how watching elite sport handlers transformed his leash skills after a Belgian trainer bluntly told him they "sucked."Meanwhile, working dog handlers can learn environmental assessment and body language reading from sport competitors operating under time pressure. Bob describes sport handlers' eyes "scanning like machines" upon room entry.He also considers puzzle work as the great equalizer. He recounts how a struggling student's reactive Standard Poodle transformed after two weeks of pure puzzle training.All this and more in this episode of K9 Detection Collaborative! Key Topics:Geo-Scenting Origins and Clove Oil Selection (08:04)Building Confidence Through Scent Work in Reactive Dogs (16:00)Environmental Assessment Skills in Sport vs. Working Dogs (17:56)Leash Handling Skills and Learning from Sport Handlers (19:34)Final Response Debate and Reading Body Language (21:02)The Clique Problem in Sport Detection Communities (26:13)Puzzle Training Philosophy and Adapting on the Fly (35:58)Takeaways (41:15) Resources:Dog Scouts of America: GeoScentingCanine ConnectionK9 Sensus: Using Chickens to Train TrainersFenzi Dog Sports Academy: Schedule We want to hear from you:Check out the K9 Detection Collaborative FB page and comment on the episode post!K9Sensus Detection Dog Trainer AcademyK9Sensus Foundation can be found on Facebook and Instagram. We have a Trainer's Group on Facebook!Scentsabilities Nosework is also on Facebook. Here is a Facebook group you should join!You can follow us for notifications of upcoming episodes, find us at k9detectioncollaborative.com to enjoy the freebies, and tell your friends so you can keep the conversations going.And don't forget to check out the YouTube Channel!

Paul's Security Weekly
The future of data control, why detection fails, and the weekly news - Thyaga Vasudevan - ESW #443

Paul's Security Weekly

Play Episode Listen Later Jan 26, 2026 95:59


Segment 1: Interview with Thyaga Vasudevan Hybrid by Design: Zero Trust, AI, and the Future of Data Control AI is reshaping how work gets done, accelerating decision-making and introducing new ways for data to be created, accessed, and shared. As a result, organizations must evolve Zero Trust beyond an access-only model into an inline data governance approach that continuously protects sensitive information wherever it moves. Securing access alone is no longer enough in an AI-driven world. In this episode, we'll unpack why real-time visibility and control over data usage are now essential for safe AI adoption, accurate outcomes, and regulatory compliance. From preventing data leakage to governing how data is used by AI systems, security teams need controls that operate in the moment - across cloud, browser, SaaS, and on-prem environments - without slowing the business. We'll also explore how growing data sovereignty and regulatory pressures are driving renewed interest in hybrid architectures. By combining cloud agility with local control, organizations can keep sensitive data protected, governed, and compliant, regardless of where it resides or how AI is applied. This segment is sponsored by Skyhigh Security. Visit https://securityweekly.com/skyhighsecurity to learn more about them! Segment 2: Why detection fails Caleb Sima put together a nice roundup of the issues around detection engineering struggles that I thought worth discussing. Amélie Koran also shared some interesting thoughts and experiences. Segment 3: Weekly Enterprise News Finally, in the enterprise security news, Fundings and acquisitions are going strong can cyber insurance be profitable? some new free tools shared by the community RSAC gets a new CEO Large-scale enterprise AI initiatives aren't going well LLM impacts on exploit development AI vulnerabilities global risk reports floppies are still used daily, but not for long? All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-443

Airtalk
Are we at a political turning point after the second Minnesota shooting by a federal agent? AI deepfake detection, and more

Airtalk

Play Episode Listen Later Jan 26, 2026 99:03


Today on AirTalk: Are we at a political turning point after the second Minnesota shooting by a federal agent? (0:30) In the AI era, how are deepfake images being detected? (16:01) SoCal History: New book explores infamous murder of Elizabeth Short (33:59) Is there legal basis for an administrative warrant granting ICE entry into private spaces? (51:38) How is ICE impacting businesses in Orange County? (1:05:06) Are older folks more screen addicted than their younger peers? (1:28:42) A previous version of this podcast incorrectly ascribed the killing of Alex Pretti to Immigration and Customs Enforcement (ICE). This has been corrected. Visit www.preppi.com/LAist to receive a FREE Preppi Emergency Kit (with any purchase over $100) and be prepared for the next wildfire, earthquake or emergency

Canine Conversations
Emma Gaalaas Mullaney- Heterodox Approach to Selecting and Raising Detection Dogs

Canine Conversations

Play Episode Listen Later Jan 22, 2026 54:02


In this episode of K9Conservationists, Kayla Fratt is joined by Emma Gaalaas Mullaney as they discuss her heterodox (unconventional) approach to selecting and raising detection dogs. In this episode, Emma discusses her first detection dog, Toby, and how his unorthodox breed, personality, and drive lead Emma to her deep understanding and empathy for not only Toby, but for the dogs she works with today. This is a two part episode, so join us for the next one to learn more about her roll at Penn Vet and to learn more about the dog teams she works with today.Host: Kayla FrattEditor: Sara Fangton Guest logistics: Brooke Schoeder Intern: Grace KoskiWebsite: Meg du BrayMentoring group: Madison Davis

Cloud Security Podcast
Why AI Can't Replace Detection Engineers: Build vs. Buy & The Future of SOC

Cloud Security Podcast

Play Episode Listen Later Jan 21, 2026 52:08


Is the AI SOC a reality, or just vendor hype? In this episode, Antoinette Stevens (Principal Security Engineer at Ramp) joins Ashish to dissect the true state of AI in detection engineering.Antoinette shares her experience building detection program from scratch, explaining why she doesn't trust AI to close alerts due to hallucinations and faulty logic . We explore the "engineering-led" approach to detection, moving beyond simple hunting to building rigorous testing suites for detection-as-code .We discuss the shrinking entry-level job market for security roles , why software engineering skills are becoming non-negotiable , and the critical importance of treating AI as a "force multiplier, not your brain".Guest Socials - ⁠⁠⁠Antoinette's LinkedinPodcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠If you are interested in AI Security, you can check out our sister podcast -⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ AI Security Podcast⁠Questions asked:(00:00) Introduction(02:25) Who is Antoinette Stevens?(04:10) What is an "Engineering-Led" Approach to Detection? (06:00) Moving from Hunting to Automated Testing Suites (09:30) Build vs. Buy: Is AI Making it Easier to Build Your Own Tools? (11:30) Using AI for Documentation & Playbook Updates (14:30) Why Software Engineers Still Need to Learn Detection Domain Knowledge (17:50) The Problem with AI SOC: Why ChatGPT Lies During Triage (23:30) Defining AI Concepts: Memory, Evals, and Inference (26:30) Multi-Agent Architectures: Using Specialized "Persona" Agents (28:40) Advice for Building a Detection Program in 2025 (Back to Basics) (33:00) Measuring Success: Noise Reduction vs. False Positive Rates (36:30) Building an Alerting Data Lake for Metrics (40:00) The Disappearing Entry-Level Security Job & Career Advice (44:20) Why Junior Roles are Becoming "Personality Hires" (48:20) Fun Questions: Wine Certification, Side Quests, and Georgian Food

Slow Burn
Decoder Rings Back | Why the Mona Lisa?

Slow Burn

Play Episode Listen Later Jan 14, 2026 25:05


We are really lucky to get lots of listener suggestions for the show, more good questions than we can possibly answer in a mailbag episode once or twice a year. So we're starting a new segment we call… Decoder Rings Back! Every month, host Willa Paskin will personally call up a listener to answer their question. In this inaugural installment of Decoder Rings Back, Willa calls up listener Dustin Malek about his cultural mystery: Why did the Mona Lisa, of all paintings, become the most famous in the world, bar none? Willa shares the story of daring heist that turned Leonardo da Vinci's enigmatic smiling subject into a celebrity.Future episodes of Decoder Rings Back will only be available to Slate Plus subscribers. So if you want to be sure not to miss them, sign up for Slate Plus! You'll get exclusive episodes and ad-free listening not just on our show, but all your favorite Slate podcasts. Subscribe from the Decoder Ring show page on Apple Podcasts or Spotify, or visit slate.com/decoderplus for access wherever you listen. This episode was produced by Max Freedman. Decoder Ring is also produced by Katie Shepherd and Evan Chung, our supervising producer. Merritt Jacob is Senior Technical Director.If you have any cultural mysteries you want us to decode, email us at DecoderRing@slate.com or leave a message on our hotline at (347) 460-7281.Sources for This EpisodeCumming, Laura. “The man who stole the Mona Lisa,” The Guardian, August 5, 2011.Hoobler, Dorothy, and Thomas Hoobler. “Stealing Mona Lisa,” Vanity Fair, April 16, 2009.Hoobler, Dorothy, and Thomas Hoobler. The Crimes of Paris: A True Story of Murder, Theft, and Detection, Bison Books, 2010.Isaacson, Walter. Leonardo da Vinci, Simon & Schuster, 2018.Roberts, Sam. “Happy Birthday to the Man Who Stole the Mona Lisa and Took It to Italy,” The New York Times, October 7, 2022.Sassoon, Donald. “Mona Lisa: The Best-Known Girl in the Whole Wide World,” History Workshop Journal, Spring 2001.Sassoon, Donald. Mona Lisa: The History of the World's Most Famous Painting, HarperCollins, 2016.“The Theft That Made The 'Mona Lisa' A Masterpiece,” NPR, July 30, 2011.Zug, James. “Stolen: How the Mona Lisa Became the World's Most Famous Painting,” Smithsonian Magazine, June 15, 2011. Hosted on Acast. See acast.com/privacy for more information.

Decoder Ring
Decoder Rings Back | Why the Mona Lisa?

Decoder Ring

Play Episode Listen Later Jan 14, 2026 25:05


We are really lucky to get lots of listener suggestions for the show, more good questions than we can possibly answer in a mailbag episode once or twice a year. So we're starting a new segment we call… Decoder Rings Back! Every month, host Willa Paskin will personally call up a listener to answer their question. In this inaugural installment of Decoder Rings Back, Willa calls up listener Dustin Malek about his cultural mystery: Why did the Mona Lisa, of all paintings, become the most famous in the world, bar none? Willa shares the story of daring heist that turned Leonardo da Vinci's enigmatic smiling subject into a celebrity.Future episodes of Decoder Rings Back will only be available to Slate Plus subscribers. So if you want to be sure not to miss them, sign up for Slate Plus! You'll get exclusive episodes and ad-free listening not just on our show, but all your favorite Slate podcasts. Subscribe from the Decoder Ring show page on Apple Podcasts or Spotify, or visit slate.com/decoderplus for access wherever you listen. This episode was produced by Max Freedman. Decoder Ring is also produced by Katie Shepherd and Evan Chung, our supervising producer. Merritt Jacob is Senior Technical Director.If you have any cultural mysteries you want us to decode, email us at DecoderRing@slate.com or leave a message on our hotline at (347) 460-7281.Sources for This EpisodeCumming, Laura. “The man who stole the Mona Lisa,” The Guardian, August 5, 2011.Hoobler, Dorothy, and Thomas Hoobler. “Stealing Mona Lisa,” Vanity Fair, April 16, 2009.Hoobler, Dorothy, and Thomas Hoobler. The Crimes of Paris: A True Story of Murder, Theft, and Detection, Bison Books, 2010.Isaacson, Walter. Leonardo da Vinci, Simon & Schuster, 2018.Roberts, Sam. “Happy Birthday to the Man Who Stole the Mona Lisa and Took It to Italy,” The New York Times, October 7, 2022.Sassoon, Donald. “Mona Lisa: The Best-Known Girl in the Whole Wide World,” History Workshop Journal, Spring 2001.Sassoon, Donald. Mona Lisa: The History of the World's Most Famous Painting, HarperCollins, 2016.“The Theft That Made The 'Mona Lisa' A Masterpiece,” NPR, July 30, 2011.Zug, James. “Stolen: How the Mona Lisa Became the World's Most Famous Painting,” Smithsonian Magazine, June 15, 2011. Hosted on Acast. See acast.com/privacy for more information.

Slate Culture
Decoder Rings Back | Why the Mona Lisa?

Slate Culture

Play Episode Listen Later Jan 14, 2026 25:05


We are really lucky to get lots of listener suggestions for the show, more good questions than we can possibly answer in a mailbag episode once or twice a year. So we're starting a new segment we call… Decoder Rings Back! Every month, host Willa Paskin will personally call up a listener to answer their question. In this inaugural installment of Decoder Rings Back, Willa calls up listener Dustin Malek about his cultural mystery: Why did the Mona Lisa, of all paintings, become the most famous in the world, bar none? Willa shares the story of daring heist that turned Leonardo da Vinci's enigmatic smiling subject into a celebrity.Future episodes of Decoder Rings Back will only be available to Slate Plus subscribers. So if you want to be sure not to miss them, sign up for Slate Plus! You'll get exclusive episodes and ad-free listening not just on our show, but all your favorite Slate podcasts. Subscribe from the Decoder Ring show page on Apple Podcasts or Spotify, or visit slate.com/decoderplus for access wherever you listen. This episode was produced by Max Freedman. Decoder Ring is also produced by Katie Shepherd and Evan Chung, our supervising producer. Merritt Jacob is Senior Technical Director.If you have any cultural mysteries you want us to decode, email us at DecoderRing@slate.com or leave a message on our hotline at (347) 460-7281.Sources for This EpisodeCumming, Laura. “The man who stole the Mona Lisa,” The Guardian, August 5, 2011.Hoobler, Dorothy, and Thomas Hoobler. “Stealing Mona Lisa,” Vanity Fair, April 16, 2009.Hoobler, Dorothy, and Thomas Hoobler. The Crimes of Paris: A True Story of Murder, Theft, and Detection, Bison Books, 2010.Isaacson, Walter. Leonardo da Vinci, Simon & Schuster, 2018.Roberts, Sam. “Happy Birthday to the Man Who Stole the Mona Lisa and Took It to Italy,” The New York Times, October 7, 2022.Sassoon, Donald. “Mona Lisa: The Best-Known Girl in the Whole Wide World,” History Workshop Journal, Spring 2001.Sassoon, Donald. Mona Lisa: The History of the World's Most Famous Painting, HarperCollins, 2016.“The Theft That Made The 'Mona Lisa' A Masterpiece,” NPR, July 30, 2011.Zug, James. “Stolen: How the Mona Lisa Became the World's Most Famous Painting,” Smithsonian Magazine, June 15, 2011. Hosted on Acast. See acast.com/privacy for more information.