Measurement standards laboratory in the United States
POPULARITY
Categories
Today, host Frank La Vigne and guest Candice Gillhoolley dive deep into IonQ's headline-making billion-dollar acquisitions that are reshaping the quantum landscape. From hardware with Skywater, to quantum networking through Skyloom Global, and even AI-driven software via Seed Innovations, IonQ is assembling a complete quantum ecosystem—building the supply chain of the future, right here and now.The conversation unpacks the big money flowing into quantum tech, why in-house chip fabrication matters in a world grappling with supply chain vulnerabilities, and what these moves mean for the industry's evolution. With insights on stock market reactions, defense tech hires, and the urgent quest for quantum-safe security, Frank La Vigne and Candice Gillhoolley explain why the next decade will be defined by quantum preparedness.Plus, they tease the launch of an inspiring new podcast, Women in Quantum, highlighting diverse journeys into the field and the culture-shaping opportunities ahead. Whether you're quantum curious or watching markets closely, this episode frames why the quantum age is truly dawning—and why it's time to start thinking quantum safe!LinksIonQ to buy SkyWater for $1.8 billion to expand hardware capabilities - https://www.reuters.com/technology/ionq-buy-skywater-18-billion-expand-hardware-capabilities-2026-01-26/?utm_source=chatgpt.com IonQ Finalizes Acquisition of Skyloom Global - https://thequantuminsider.com/2026/01/28/ionq-completes-skyloom-acquisition/ From Visibility to Advantage – Building a Quantum-Safe Intelligence Enterprise https://intelligencecommunitynews.com/ic-insiders-from-visibility-to-advantage-building-a-quantum-safe-intelligence-enterprise/ Time Stamps00:00 "Reflections on Tech Advancements"03:35 "Securing Semiconductor Supply Chains"07:49 "Quantum Industry Supply Chain Ambitions"11:34 Quantum Tech and Security Trends15:43 "Funny Daycare Story at NIST"16:55 "Data Protection & Future Predictions"22:16 "Winter Boots and School Sneakers"24:03 "Culture Shapes Opportunities"
In this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news. They discuss: La France is tres sérieux about ditching US productivity software China's Salt Typhoon was snooping on Downing Street Trump wields the mighty DISCOMBOBULATOR ESET says the Polish power grid wiper was Russia's GRU Sandworm crew US cyber institutions CISA and NIST are struggling Voice phishing for MFA bypass is getting even more polished This episode is sponsored by Sublime Security. Brian Baskin is one of the team behind Sublime's 2026 Email Threat Research report. He joins to talk through what they see of attackers' use of AI, as well as the other trends of the year. This episode is also available on Youtube. Show notes France to ditch US platforms Microsoft Teams, Zoom for ‘sovereign platform' amid security concerns | Euronews Suite Numérique plan - Google Search China hacked Downing Street phones for years Cyberattack Targeting Poland's Energy Grid Used a Wiper Trump says U.S. used secret 'discombobulator' on Venezuelan equipment during Maduro raid | PBS News Risky Bulletin: Cyberattack cripples cars across Russia - Risky Business Media Lawmakers probe CISA leader over staffing decisions | CyberScoop Trump's acting cyber chief uploaded sensitive files into a public version of ChatGPT - POLITICO Acting CISA director failed a polygraph. Career staff are now under investigation. - POLITICO NIST is rethinking its role in analyzing software vulnerabilities | Cybersecurity Dive Federal agencies abruptly pull out of RSAC after organizer hires Easterly | Cybersecurity Dive Real-Time phishing kits target Okta, Microsoft, Google Phishing kits adapt to the script of callers On the Coming Industrialisation of Exploit Generation with LLMs – Sean Heelan's Blog GitHub - SeanHeelan/anamnesis-release: Automatic Exploit Generation with LLMs Overrun with AI slop, cURL scraps bug bounties to ensure "intact mental health" - Ars Technica Bypassing Windows Administrator Protection - Project Zero Task Failed Successfully - Microsoft's “Immediate” Retirement of MDT - SpecterOps Kubernetes Remote Code Execution Via Nodes/Proxy GET Permission WhatsApp's Latest Privacy Protection: Strict Account Settings - WhatsApp Blog Microsoft gave FBI a set of BitLocker encryption keys to unlock suspects' laptops: Reports | TechCrunch He Leaked the Secrets of a Southeast Asian Scam Compound. Then He Had to Get Out Alive | WIRED Key findings from the 2026 Sublime Email Threat Research Report
Disease accelerates years in a month. Cancer cells reveal which patients might be most impacted by metastasis - a diagnosis invisible on Earth. Single crystals heal themselves through mechanisms we can't explain. These aren't projections. They're validated results from 2022-2025 that made 40-year NASA veterans say they'd never seen anything like it.The economics flipped. Merck flew Keytruda 30 days, discovered a crystal form missed in a decade of labs - $20B/year by 2030, exceeding SpaceX's entire revenue. The thesis: Two paths to space affordability: cut launch costs 10x AND multiply payload value 1,000x. Do what Earth cannot do at any price.Paradigm Shifts:
Recorded live at Cloud Connections, the Cloud Communications Alliance event in Delray Beach, Doug Green, Publisher of Technology Reseller News, spoke with Bill Placke, Co-Founder & President, Americas at SecurePII, about one of the most pressing challenges facing AI-driven communications today: how to scale AI while complying with global data privacy regulations—and how that challenge can become a competitive advantage. Placke explains that SecurePII was formed to address a growing structural problem in AI adoption. While organizations are eager to deploy AI and train large language models, regulatory uncertainty around personally identifiable information (PII) has stalled progress. Citing industry research showing that more than 60 percent of AI initiatives have been paused due to data privacy concerns, Placke argues that governance policies alone are not enough. Instead, SecurePII takes an architectural approach. At the core of SecurePII's solution is data minimization at the point of ingestion. The company's technology prevents sensitive information—such as credit card numbers, names, addresses, or social security numbers—from ever entering enterprise systems. SecurePII's existing PCI-focused offering already removes cardholder data from call flows, keeping organizations out of PCI scope entirely. The same approach is now being extended to broader categories of PII, enabling AI systems to operate and train on clean data streams that are free from regulated information. Placke emphasizes that this upstream architectural design fundamentally changes the compliance equation. Regulators and plaintiff attorneys, he notes, care about outcomes—not intent. If sensitive data never enters the system, compliance scope, audit costs, breach exposure, and regulatory risk are dramatically reduced. “Downstream controls don't scale with AI—architecture does,” Placke says, positioning data minimization as a foundation for both trust and growth. The discussion also highlights the role of consent and customer trust in an AI-enabled world. Rather than asking customers to consent to broad data use, SecurePII enables enterprises to clearly state that sensitive information is neither seen nor stored, while still allowing AI to learn from outcomes and sentiment. This approach removes what Placke calls the “creepy factor” associated with AI and personal data, while aligning with emerging frameworks such as the EU AI Act and long-standing NIST guidance. For MSPs, UCaaS providers, and channel partners, Placke frames compliance not as a cost center but as a revenue opportunity. By embedding privacy-preserving architectures into voice, AI, and communications solutions, service providers can differentiate themselves as trusted advisors—helping customers deploy AI safely, reduce regulatory exposure, and accelerate adoption. To learn more about SecurePII and its privacy-first AI architecture, visit https://www.securepii.cloud/.
Federal Tech Podcast: Listen and learn how successful companies get federal contracts
One of the biggest trends in software development over the past 10 years is the shift from writing code to "assembling" code from off-the-shelf components. During today's interview with Javed Hasan from Lineaje, we learned that 70% of that pre-assembled code is open source. In other words, an anonymous person in some countries modified software instructions. This casual approach may be fine for small businesses, but an organization like the federal government must be highly cautious. Hasan describes how his company was one of the first to work with the federal government to set standards for this existing code. These initial efforts began ten years ago and resulted in Executive Order #14028, which requires a Software Bill of Materials for any organization selling to the federal government. This initiative expanded in 2021-2022 when NIST published related guidelines. These efforts are a good start. However, federal leaders must evaluate SBOM technology from many perspectives. For example, how to incorporate this mandate into air-gapped networks, legacy COTS, or even in a classified environment. System administrators also need to know if they are exposed. Further, every organization has a varying definition of what "deep software transparency" is. Hassan also discusses Lineage's innovative approach to creating "Gold open source" software, ensuring it is free of malware and vulnerabilities. If you are interested in seeing a demonstration of how Lineaje can help with software forensics, there is an event at the Carahsoft office in Reston, Virginia, on January 30 = = Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com
In this episode of the Federal Help Center Podcast, Randie Ward breaks down what contractors must understand about CMMC, NIST scores, and SPRS before pursuing Department of Defense contracts. She explains why every DOD contractor must complete a NIST self-assessment—regardless of score—and how contracting officers are now required to enforce these cybersecurity requirements in every DOD RFP. Randie also walks through where your NIST score is housed inside SPRS through PIE, why eligibility depends on it, and how monthly expert-led CMMC webinars can help contractors stay compliant and confident as requirements continue to evolve. Key Takeaways No NIST score means no award: Positive or negative, you must have a score to be eligible for DOD contracts. SPRS is mandatory for CMMC compliance: Your self-assessment lives inside SPRS, accessed through PIE. Start with self-assessment before anything else: It reveals what protections, processes, and controls your business needs to put in place. If you want to learn more about the community and to join the webinars go to: https://federalhelpcenter.com/ Website: https://govcongiants.org/ Connect with Encore Funding: http://govcongiants.org/funding
In this episode of Absolute AppSec, Nathan Hunstad, Director of Security at Vanta, discusses the intersection of security policy, governance, and technical defense. Drawing on his unique background in political science and the Minnesota state legislature, Hunstad argues that policy acts as the essential "conductor" for an organization's security tools. A major theme of the conversation is the challenge of compliance for startups, with the group advising founders to prioritize business survival and basic security hygiene—like password managers and IAM—before pursuing intensive certifications like SOC 2. The discussion also explores how AI is accelerating both development velocity and the ability to automate tedious security questionnaires. Furthermore, Hunstad contrasts the security posture of modern, cloud-native startups against legacy enterprises, noting that older organizations often struggle with "dark corners" of un-inventoried, vulnerable legacy tech. The episode concludes with a critique of outdated authentication standards, specifically advocating for the removal of mandatory password rotation in favor of NIST-aligned, phishing-resistant MFA.
AI is revolutionizing healthcare, but it's also giving cybercriminals unprecedented speed, scale, and precision.In this episode of Straight Out of Health IT, Ali Pabrai, Chief Executive Officer at ecfirst, explores how artificial intelligence is revolutionizing cybersecurity risk management in healthcare. While AI is accelerating innovation in diagnostics, workflows, and operations, it is also expanding attack surfaces through new data flows, third-party tools, and global supply chains. Despite updated guidance from HHS, NIST, and HIPAA-aligned frameworks, the healthcare sector remains under intense pressure from threats. Ransomware attacks and large-scale breaches continue to disrupt clinical operations and expose patient data, underscoring the stakes for healthcare organizations.Ali stresses that cybersecurity can no longer be treated as a compliance checkbox but must be approached as an enterprise-wide resilience strategy. Attackers are using AI to launch faster, more personalized, and more targeted attacks, exploiting vulnerabilities in devices, cloud systems, and human behavior. At the same time, healthcare organizations face growing financial exposure through class-action lawsuits, regulatory settlements, and long-term corrective action plans. Persistent gaps in configuration management, patching, and workforce awareness leave many organizations vulnerable, despite lessons learned from prior breaches.The conversation underscores the importance of robust AI governance, grounded in HIPAA security programs, NIST's AI Risk Management Framework, state-level AI mandates, and integrated standards, such as HITRUST. Ali emphasizes the importance of conducting AI-focused risk assessments, improving ransomware readiness, and establishing clear AI risk management policies. He also underscores the importance of building AI literacy across the workforce to reduce social engineering and insider risk. Ultimately, the discussion frames AI as both a threat and an opportunity, with resilience depending on leadership, knowledge, and proactive governance.Tune in to hear how healthcare leaders can turn AI from a growing liability into a powerful tool for resilience and trust! ResourcesConnect with Ali Pabrai on LinkedIn here.Follow ecfirst on LinkedIn here and visit their website here.Check out the ecfirst AICRP program here!Read the NIST AI Risk Management Framework here!
In this episode of the Federal Help Center Podcast, Randie Ward breaks down the systems and documentation contractors must have in place before pursuing Department of Defense opportunities. She explains why PIE registration is mandatory for DOD work, how SPRS ties directly to your NIST self-assessment and CMMC requirements, and where contractors often get stuck trying to navigate these platforms. Randie also walks through what a strong capability statement should include—clear competencies, NAICS codes, differentiators, and past performance—so contracting officers can quickly understand who you are and why you belong on their short list. Key Takeaways PIE is non-negotiable for DOD work: You cannot submit proposals, invoice, or receive awards without being registered and set up properly. SPRS and NIST scores matter early: Your self-assessment score is required and directly impacts eligibility for DOD contracts. Your capability statement must do the work for you: Clear branding, competencies, NAICS codes, and past performance make it easy for agencies to find and trust you. If you want to learn more about the community and to join the webinars go to: https://federalhelpcenter.com/ Website: https://govcongiants.org/ Connect with Encore Funding: http://govcongiants.org/funding
In this episode of the Federal Help Center Podcast, Randie Ward breaks down what real procurement readiness looks like beyond just registering in SAM. Using real client examples, Randie walks through professionally built project sheets and capability statements, explaining why clean branding, clear competencies, and visible past performance matter when agencies are evaluating vendors. She then dives into Department of Defense requirements—covering PIE registration, SPRS, and CMMC/NIST compliance—showing why contractors cannot submit proposals, receive awards, or get paid without these systems in place. The message is clear: preparation, compliance, and professionalism are no longer optional if you want to compete in GovCon. Key Takeaways Professional documentation matters: Project sheets and capability statements should be clean, branded, and easy for agencies to evaluate—no guesswork required. DOD contractors must be system-ready: PIE, SPRS, and related platforms are mandatory for submitting proposals, invoicing, and compliance. CMMC/NIST is non-negotiable: You cannot receive a DOD award without a NIST score—self-assessment or certification depending on the requirement. If you want to learn more about the community and to join the webinars go to: https://federalhelpcenter.com/ Website: https://govcongiants.org/ Connect with Encore Funding: http://govcongiants.org/funding
professorjrod@gmail.comIn this episode of Technology Tap: CompTIA Study Guide, we delve into the critical role of security governance in building secure organizations. Learn how governance frameworks—comprising policies, standards, procedures, and playbooks—transform strategic intent into consistent, auditable actions that both teams and auditors rely on. Whether you're preparing for your CompTIA exam or aiming to develop essential IT skills, understanding these governance principles is key to effective tech exam prep and technology education. Join us as we break down complex concepts in an easy-to-understand way, helping you succeed in your IT certification journey and beyond.We start with clear definitions that make exam questions and real-world decisions easier. Policies set high-level rules and expectations. Standards add measurable technical requirements like encryption strength and logging baselines. Procedures translate both into step-by-step action, and playbooks coordinate who does what, in what order, using which tools. Along the way, we compare external frameworks such as ISO 27001, NIST 800, PCI DSS, and FIPS with internal standards that tailor controls to your environment.Privacy law isn't a side quest; it shapes everything. We demystify GDPR, CCPA, FERPA, HIPAA, and COPPA, and clarify roles that exams love to test: the data owner who sets classification and usage, the data controller who defines purpose and lawful basis, the data processor who acts for the controller, and the data custodian who protects and maintains data without deciding how it's used. You'll learn practical cues to spot each role fast and avoid common pitfalls.Finally, we dig into change management as a risk control function. Its goal is to minimize risk while implementing changes, with impact analysis, approvals, testing, and rollback plans. Automation and orchestration can speed response and reduce error, but only when guided by policy and enforced by standards. Expect memorable exam tips, grounded examples, and a framework you can use right away on the job.If this helped sharpen your Security+ prep or your day-to-day practice, subscribe, share the show with a colleague, and leave a quick review. Your feedback helps more learners tap into technology with confidence.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Doug Green, Publisher of Technology Reseller News, spoke with Mark A. Daley, CEO of ROLM, and Cole McKinley, CTO of USX Cyber, about the Department of Defense's phased enforcement of Cybersecurity Maturity Model Certification (CMMC) requirements and what it means for small and mid-sized businesses (SMBs) in the Defense Industrial Base. With CMMC now actively enforced, hundreds of thousands of subcontractors—many without dedicated security teams—must demonstrate compliance to continue working with prime contractors. Daley stressed the urgency of the moment, noting that delays are over. “The government is no longer kicking the can down the road,” he said. “CMMC exists to protect the defense industrial base, and SMBs are now squarely in scope.” To address this challenge, ROLM and USX Cyber have partnered on an integrated, SMB-focused platform built around USX Cyber's Guardian solution. McKinley explained that Guardian was designed to make compliance achievable without stitching together multiple tools. “We built Guardian to be a one-stop platform that makes CMMC approachable, affordable, and audit-ready for SMBs,” he said, adding that the platform satisfies 83 of the 110 required NIST 800-171 controls while providing 24×7 monitoring, evidence management, and guided compliance workflows. Daley highlighted that the solution goes beyond certification prep, combining continuous security operations, governance, and AI-driven automation to reduce long-term cost and complexity. “This is not a one-and-done, check-the-box exercise,” he said. “You have to be ready not just for today's audit, but for the one coming three years from now.” The discussion underscored why CMMC represents both a major risk and a significant opportunity for MSPs and channel partners serving regulated industries. Learn more at https://rolm.ai/ and https://usxcyber.com/.
Stolen Target source code looks real. CISA pulls the plug on Gogs. SAP rushes patches for critical flaws. A suspected Russian spy emerges in Sweden, while Cloudflare threatens to walk away from Italy. Researchers flag a Wi-Fi chipset bug, a long-running Magecart skimming campaign, and a surge in browser-in-the-browser phishing against Facebook users. Mandiant releases a new Salesforce defense tool, and NIST asks how to secure agentic AI before it secures itself. Our guests are Christine Blake and Madison Farabaugh from Inside the Media Minds. Plus, a Dutch court says seven years is still the going rate for a USB-powered cocaine plot. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Christine Blake and Madison Farabaugh from W2 Communications and hosts of Inside the Media Minds podcast on their show joining the N2K CyberWire network. You can listen to the latest episode of Inside the Media Minds today and catch new installments every month on your favorite podcast app. Selected Reading Target employees confirm leaked code after ‘accelerated' Git lockdown (Bleeping Computer) Fed agencies urged to ditch Gogs as zero-day makes CISA list (The Register) SAP's January 2026 Security Updates Patch Critical Vulnerabilities (SecurityWeek) Sweden detains ex-military IT consultant suspected of spying for Russia (The Record) Cloudflare CEO threatens to pull out of Italy (The Register) One Simple Trick to Knock Out the Wi-Fi Network (GovInfo Security) Google's Mandiant releases free Salesforce access control checker (iTnews) Global Magecart Campaign Targets Six Card Networks (Infosecurity Magazine) Facebook login thieves now using browser-in-browser trick (Bleeping Computer) NIST Calls for Public to Help Better Secure AI Agents (GovInfo Security) Appeal fails for hacker who opened port to coke smugglers (The Register) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Artificial intelligence is reshaping the future of industrial operations — driving efficiency, precision, and safety like never before. In this episode of Cisco Champion Radio, we explore how AI-powered innovations such as data processing, machine vision, and robotics are revolutionizing industrial environments. Our experts discuss what it takes to support this transformation — from robust, low-latency networking to stronger cybersecurity and seamless collaboration between IT and OT teams. Discover how Cisco solutions like Cyber Vision enhance visibility and security across production networks, why compliance with frameworks like NIST and IEC 62443 is critical, and how targeted use cases are driving real success in modern industrial systems. Tune in for a practical look at how AI, automation, and security are converging to power the next generation of industrial operations. Resources Cisco guest Paul Didier, Internet of Things Solution Architect Champion hosts Len Ledford, Architect II, Advisor Services, Insight Ibrahim Ramku, Network & Security CTO, TD-K A/S Jonathan Mahady, Principal Network Engineer, BHP Moderator Danielle Carter, Customer Voices and Cisco Champion Program
„Cestuju tam už patnáct let. Stále jsem tady, nezraněná a pořád se tam vracím,“ říká v Blízkých setkáních cestovatelka, arabistka a fotografka Lenka Hrabalová. „Média často vytvářejí krvavý obraz tamního světa, ale pěkného se tam děje hodně,“ ujišťuje moderátorku Terezu Kostkovou. „V islámském světě nastává liberalizace a lidé tam žijí podobně jako my. Současně tam ale běží druhý trend,“ vysvětuje. Ve kterých zemích se dokonce cítí jako doma? Poslechněte si.Všechny díly podcastu Blízká setkání můžete pohodlně poslouchat v mobilní aplikaci mujRozhlas pro Android a iOS nebo na webu mujRozhlas.cz.
Charlie Spears explores the existential threat of quantum computing to Bitcoin. Shor's algorithm and the heated debate surrounding Satoshi's 1 million BTC stash. We break down the difference between bits and qubits, explain why Shor's algorithm threatens elliptic curve cryptography, and debate the fate of Satoshi's vulnerable coins. It's a deep dive into encryption, timeline predictions, and the massive coordination challenge facing the Bitcoin network to upgrade before it's too late. Subscribe to the newsletter: https://newsletter.blockspacemedia.com Notes: * Satoshi has ~1M quantum vulnerable BTC. * 2-4 million total BTC are currently exposed. * 10-20% of supply is vulnerable to Shor's algo. * Breaking BTC needs ~4,000 logical qubits. * Google's Willow chip has 105 physical qubits. * NIST finalized quantum standards in 2024. Timestamps: 00:00 Start 01:02 Overview 05:08 The Algorithm 10:59 Satoshi's Coins 13:09 How Long Do We Have? 15:18 Where Do We Stand? 17:22 Post Quantum Migration -
Doug Green, Publisher of Technology Reseller News, sat down with JLINC's Dean Landsman, Strategy and Business Development, to explore a career-spanning conversation that connects radio, telecom, and today's AI-driven communications landscape through a single unifying theme: trust. Landsman traced his professional journey from early days in radio—where understanding audiences meant far more than chasing ratings—to telecom and, ultimately, to AI governance. Along the way, he witnessed a recurring pattern: industries drifting toward commoditization, treating users and their data as interchangeable units rather than as people whose information carries meaning, context, and rights. That experience now shapes JLINC's mission in the AI era. At the center of the discussion was JLINC's role in data governance for AI workflows, particularly its integration with the emerging vCon (virtual conversation) standard. While much of today's AI governance focuses on compliance frameworks like ISO and NIST, JLINC provides the operational layer—cryptographic provenance, consent enforcement, and auditable controls—that ensures data integrity throughout an AI workflow. As Landsman explained, “We provide the guardrails that make sure what goes in is what comes out—unaltered, authorized, and trustworthy.” This capability becomes especially critical as vCons—often described as a “PDF for conversations”—are increasingly used to capture voice, text, and interaction data that may later feed AI systems, analytics platforms, or even legal proceedings. JLINC ensures that permissions, provenance, and integrity are preserved end to end, preventing errors, hallucinations, or unauthorized changes by either humans or AI systems. In regulated environments such as healthcare, finance, government, and contact centers, Landsman emphasized that this trust layer is not optional—it is foundational. As organizations grapple with growing public skepticism around AI, Landsman positioned JLINC as a practical answer to the trust question. “People are worried their words will be misrepresented or altered,” he said. “Our role is to make sure the data remains clean, provable, and respected—so AI becomes something you can actually trust.” For channel partners, carriers, and enterprises alike, the message was clear: in an AI-driven future, governance is not just about compliance—it's about confidence. Learn more about JLINC at https://www.jlinc.com/.
Gary Shapiro has spent decades at the center of the global consumer technology industry, leading the Consumer Technology Association (CTA) and building CES into one of the most important stages for innovation, policy, and deal-making on the planet. In this first episode of 2026, Gary joins Charlie, Rony, and Ted to preview CES, unpack the explosion of AI across every category, and deliver unusually blunt takes on tariffs, China, manufacturing, and U.S. innovation policy. He explains how CES has evolved from a TV-and-gadgets show into a global platform where boards meet, standards are set, and policymakers, chip designers, robotics firms, and health-tech startups all collide.In the News: Before Gary joins, the hosts break down Nvidia's $20 billion “not-a-deal” with Singapore's Groq, the stake in Intel, and what that combo might signal about the edge of the GPU bubble and the shift toward inference compute, x86, and U.S. industrial policy. They also dig into Netflix's acquisition of Ready Player Me and what it suggests about a Netflix metaverse and location-based entertainment strategy, plus Starlink's rapid growth and an onslaught of “AI everything” products ahead of CES.Gary walks through new features at this year's show: CES Foundry at the Fontainebleau for AI and quantum, expanded tracks on manufacturing, wearables, women's health, and accessibility, plus an AI-powered show app already fielding thousands of questions (top query: where to pick up badges). He also talks candidly about his biggest concern—that fragmented state-level AI regulation (1,200+ state bills in 2025) will crush startups while big players shrug—and why he believes federal standards via NIST are the only realistic path. The discussion ranges from AI-driven healthcare and precision agriculture to robotics, demographics, labor culture, global supply chains, and what CES might look like in 2056.5 Key Takeaways from Gary:AI is now the spine of CES. CES 2026 centers on AI as infrastructure: CES Foundry at the Fontainebleau for AI + quantum, AI training tracks for strategy, implementation, agentic AI, and AI-driven marketing, and an AI-powered app helping attendees navigate the show.Fragmented state AI laws are an existential risk for startups. Over 1,200 state AI bills in 2025—including proposals to criminalize agentic AI counseling—could create a compliance maze only large incumbents can survive, which is why Gary argues for federal standards via NIST.Wearables are becoming systems, not gadgets. Oura rings, wrist devices, body sensors, and subdermal glucose monitors are starting to be designed as interoperable families of devices, with partnerships emerging to combine data into unified health services.Robotics is breaking out of the industrial niche. CES will showcase the largest robotics presence yet, moving beyond factory arms and drones to humanoids, logistics, social companions, and applied AI systems across sectors.Tariffs, alliances, and AI will reshape manufacturing. Gary is skeptical of “Fortress USA” strategies that try to onshore everything, pointing instead to allied reshoring (Latin America, Europe, Japan, South Korea) and the long-term role of AI-powered robotics in changing labor economics and global supply chains.This episode is brought to you by Zappar, creators of Mattercraft—the leading visual development environment for building immersive 3D web experiences for mobile headsets and desktop. Mattercraft combines the power of a game engine with the flexibility of the web, and now features an AI assistant that helps you design, code, and debug in real time, right in your browser. Whether you're a developer, designer, or just getting started, start building smarter at mattercraft.io.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
There's a new definition of artificial general intelligence in town, and unsurprisingly... it's bad! Alex and Emily rip up the tissue-paper-thin premises behind this latest attempt to define "intelligence." Plus, we discover that AI hypers love using logos that look like buttholes.References:"A Definition of AGI" landing page and paper-shaped objectFresh AI Hell:"What If Sea Monkeys Constantly, Sometimes Dangerously, Bullshitted People"Doctronic, the "AI doctor"NIST reports companies cheat on "AI" evaluations"Microsoft Lowers Sales Staff's Growth Targets For Newer AI Software""PEN Guild wins landmark arbitration on AI protections""AI" assistant pop-up whack-a-moleCheck out future streams on Twitch. Meanwhile, send us any AI Hell you see.Our book, 'The AI Con,' is out now! Get your copy now.Subscribe to our newsletter via Buttondown. Follow us!Emily Bluesky: emilymbender.bsky.social Mastodon: dair-community.social/@EmilyMBender Alex Bluesky: alexhanna.bsky.social Mastodon: dair-community.social/@alex Twitter: @alexhanna Music by Toby Menon.Artwork by Naomi Pleasure-Park. Production by Ozzy Llinas Goodman.
Over his decade of service at the National Institute of Standards and Technology, Rodney Petersen has had a front row seat to the evolving state of the cyber workforce across government, industry and academia. In his role as director of education and workforce at NIST's Applied Cybersecurity Division, Petersen led efforts to standardize cyber workforce roles and better understand skills gaps that are now a recurring theme in cyber policy discussions. With Petersen retiring at the end of 2025, I spoke with him about the evolution of NIST's cyber workforce programs, the progress made on the pernicious cyber talent gap, and what comes next for cyber workforce and education amid the rise of artificial intelligence.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
The White House bans foreign-made drones. African law enforcement agencies crackdown on cybercrime. A new phishing campaign targets Russian military personnel and defense-related organizations. A University of Phoenix data breach affects about 3.5 million people. A pair of Chrome extensions covertly hijack user traffic. Romania's national water authority suffered a ransomware attack. A cyberattack in France disrupts postal, identity, and banking services for millions of customers. NIST and MITRE announce a $20 million partnership for AI research centers. A think-tank says the U.S. needs to go on the cyber offensive. Tim Starks from CyberScoop discusses the passage of the defense Authorization Bill and a look back at 2025. In high school, it's no child left unscanned. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Tim Starks from CyberScoop discussing the passage of the Defense Authorization Bill and a look back at 2025. Selected Reading Trump Administration Declares Foreign-Made Drones a Security Threat (The New York Times) Hundreds of Arrests as Operation Sentinel Recovers $3m (Infosecurity Magazine) Cyber spies use fake New Year concert invites to target Russian military (The Record) University of Phoenix Data Breach - 3.5 Million+ Individuals Affected (CybersecurityNews) Malicious extensions in Chrome Web store steal user credentials (BleepingComputer) Ransomware Hits Romanian Water Authority, 1000 Systems Knocked Offline (Hackread) Cyberattack knocks offline France's postal, banking services (BleepingComputer) NIST, MITRE announce $20 million research effort on AI cybersecurity (CyberScoop) US Must Go on Offense in Cyberspace, Report Warns (Govifosecurity) AI Bathroom Monitors? Welcome To America's New Surveillance High Schools (Forbes) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Jason Taule, CISO, Luminis Health, and Chris Ray, Field CTO, GigaOm Thanks to our show sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in Orlando, plus a live CISO Series episode on March 6. Get $200 off with ZTWCISO26 at ztw.com. All links and the video of this episode can be found on CISO Series.com
The National Institute of Standards and Technology drives many cyber workforce and education initiatives under the NICE program. And for the last decade, Rodney Petersen has been the familiar face in charge of leading NICE. Petersen is retiring at the start of the new year. He recently sat down with Federal News Network's Justin Doubleday to discuss the evolution of the cyber workforce during his time in government and what comes next in the age of artificial intelligence. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Higher education enters 2026 under conditions that are no longer hypothetical. In this 8th annual end-of-year episode of the Changing Higher Ed® podcast, Dr. Drumm McNaughton is joined by Tom Netting of TEN Government Strategies to review how the predictions made at the end of 2024 played out during the 2025 operating year and what those outcomes mean for institutional planning in 2026. Rather than offering speculative forecasts, this episode uses 2025 as a calibration year. When predictions materialize, they remove ambiguity. They clarify which pressures are structural, which risks persist, and which leadership assumptions are no longer defensible. For presidents, boards, and senior leadership teams preparing for 2026, this conversation provides a grounded planning context based on conditions already in motion. Topics Covered What 2025 confirmed about federal policy instability, accountability, cost pressure, enrollment volatility, and governance risk Why the Department of Education is likely to remain in place through 2026 and why its continued existence should not be mistaken for stability How redistribution of authority across federal agencies increases compliance complexity for institutions Where student loans are likely to move within the federal system and why institutions face growing exposure to borrower outcomes Why broad student debt forgiveness remains unlikely and what limited relief options may realistically emerge How accountability is shifting toward program-level scrutiny and the implications for academic realignment Why accreditation reform remains unsettled and why leaders should treat accreditation as a strategic risk factor Workforce Pell expansion, quality oversight challenges, and the risk of fraud and abuse in short-term credentials The growing role of states in accountability as federal capacity contracts Research funding as political leverage and the planning risk created by funding uncertainty Polarization as an operational challenge affecting enrollment, safety, governance, and public trust Technology, AI, cybersecurity, and NIST compliance as board-level responsibilities Enrollment, demographic decline, cost escalation, and financial pressure entering the 2026 planning cycle Mergers, closures, and structural collaboration as necessary adaptation strategies Key Planning Judgments for 2026 The Department of Education will persist but continue to shrink and fragment Student loans will move further away from the Department, increasing institutional exposure Accountability pressure will intensify, particularly at the program level Accreditation reform will remain unresolved beyond 2026 Workforce Pell will expand, bringing both opportunity and heightened oversight risk Research funding will remain politically vulnerable Cost pressure will continue to drive consolidation and closures Technology and cybersecurity will demand sustained leadership attention This episode is especially relevant for presidents and trustees navigating compressed decision timelines, thinner margins for error, and declining tolerance for ambiguity. The focus is not prediction for its own sake, but clarity about the forces institutions must plan around as they enter 2026. #HigherEducation #HigherEd2026StrategicPlanning #HigherEducationPodcast
À l'heure des bilans technologiques, Patrice Duboé décrypte les grandes ruptures de 2025 et trace les lignes de force de 2026, entre IA générative, robots industriels, enjeux énergétiques, cybersécurité et transformation profonde des entreprises mondiales.En partenariat avec CapgeminiInterview : Patrice Duboé, directeur de l'Innovation pour l'Europe du Sud chez CapgeminiQuelles grandes tendances technologiques retenez-vous de l'année 2025 ?2025 a été une année extrêmement riche. Impossible de ne pas parler de l'IA générative et surtout de l'arrivée concrète des agents. Ils sont désormais déployés à grande échelle, avec des cas d'usage très opérationnels. Dans les centres de support, par exemple, on utilise des agents capables d'analyser des décennies de tickets pour identifier instantanément les causes probables d'un problème, en s'appuyant sur des technologies issues de l'IA générative telles que celles développées par des acteurs comme OpenAI ou intégrées dans des solutions d'entreprise. Résultat : jusqu'à 25 % de gains de productivité. On n'est plus dans l'expérimentation, mais clairement dans l'industrialisation.L'informatique quantique progresse aussi. Où en est-on réellement ?Le quantique reste encore très orienté recherche, mais ses promesses sont majeures. On le voit déjà dans la météorologie, où l'on parvient à allonger les prévisions grâce à des modèles toujours plus complexes, développés notamment par des instituts de recherche et des industriels comme IBM Quantum. Demain, cela va transformer la recherche médicale, en particulier sur le cancer. Mais il y a aussi un enjeu critique en cybersécurité : le jour où les ordinateurs quantiques pourront casser nos clés de chiffrement actuelles. C'est pour cela que les entreprises travaillent dès maintenant sur la cryptographie post-quantique, par exemple à travers les recommandations du NIST.Robots, humanoïdes, “dark factories” : que faut-il attendre de 2026 ?2026 sera clairement une année d'accélération. Les robots et les humanoïdes vont encore gagner du terrain, portés par l'IA. On voit émerger en Chine les premières dark factories, des usines entièrement automatisées, inspirées des modèles déployés par des groupes industriels comme Xiaomi ou dans l'automobile électrique. Ces sites fonctionnent sans éclairage ni présence humaine, 24h/24, et consomment moins d'énergie. Ils répondent aussi à une pénurie mondiale de main-d'œuvre. Contrairement aux craintes habituelles, il ne s'agit pas seulement de supprimer des emplois, mais de transformer le travail et de créer de nouveaux métiers, notamment autour de l'ingénierie et de la supervision des systèmes.Faut-il craindre une bulle de l'IA ?Je distinguerais la bulle financière de la bulle technologique. Il y a sans doute une surévaluation financière, notamment autour des fabricants de puces comme NVIDIA, dont les technologies sont devenues centrales pour l'IA, et un ajustement est probable fin 2026. En revanche, sur le plan technologique, l'IA n'est pas une bulle. Les gains sont réels, mesurables et déjà intégrés dans les usages. Contrairement à d'autres concepts comme le métaverse, l'IA va transformer durablement notre façon de travailler, d'apprendre et de produire.-----------♥️ Soutien : https://mondenumerique.info/don
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ( Thread Local Storage ) and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND6 Router Advertisements A critical vulnerability in FreeBSD allows for remote code execution. But an attacker must be on the same network. https://www.freebsd.org/security/advisories/FreeBSD-SA-25:12.rtsold.asc NIST Time Server Problems The atomic ensemble time scale at the NIST Boulder campus has failed due to a prolonged utility power outage. One impact is that the Boulder Internet Time Services no longer have an accurate time reference. https://tf.nist.gov/tf-cgi/servers.cgi https://groups.google.com/a/list.nist.gov/g/internet-time-service/c/o0dDDcr1a8I
Jak složité je pro humanitární organizace působení v současném Afghánistánu, jedné z nejchudších zemí světa? „Specifikem mezi státy Blízkého východu je vládnoucí hnutí Tálibán. Jelikož v zemi působíme legálně, jiná možnost než interakce s vedením v podstatě není. Oni jsou ti, kdo nám schvalují projekty, jejichž výsledky jim také posléze reportujeme,“ vysvětluje diplomatickou stránku věci Naďa Aliová z humanitární organizace Člověk v tísni.
Conflicting jobs data indicates a complex economic landscape for IT service providers, as the unemployment rate in the tech sector has risen to 4% with a loss of 134,000 jobs between October and November 2025. Despite a drop in the overall unemployment rate to 4.2% and a projected growth of managed services contributing $608 billion to the B2B technology sector, the mixed signals from economic indicators complicate decision-making for the Federal Reserve and raise concerns about consumer spending. Analysts emphasize that the current job losses reflect a shift in responsibility from internal roles to external managed service providers (MSPs), which may not alleviate underlying risks.The National Institute of Standards and Technology (NIST) has released a draft profile addressing cybersecurity challenges posed by artificial intelligence (AI), highlighting the need for organizations to manage AI-related security risks effectively. This profile outlines how AI can enhance cybersecurity defenses while also detailing the responsibilities that come with its deployment. Recent assessments reveal that while some AI models perform better in security contexts, the lack of clarity around accountability when AI systems make decisions remains a significant concern for MSPs.Private equity activity is accelerating in the managed services sector, exemplified by Broadwing Capital's acquisition of CloudScale365, which aims to create a platform addressing gaps in the fragmented IT-managed services market. This consolidation trend raises questions for MSPs about operational norms and the potential loss of control over their business models. As platforms seek to standardize pricing and decision-making processes, MSPs must consider how these changes will affect their service delivery and customer relationships.For MSPs and IT service leaders, the evolving landscape underscores the importance of understanding where risk is shifting and how to price and govern accordingly. The retreat from AGI hype and the focus on practical AI applications signal a need for clarity in decision-making processes, particularly as automation becomes more prevalent. MSPs that can articulate the limitations of their AI systems and establish clear accountability frameworks will be better positioned to navigate the complexities of the current market. Four things to know today00:00 As Jobs Data Conflicts and Tech Employment Slips, Managed Services Absorb Risk and Responsibility05:46 NIST's AI Security Framework Meets Reality as Model Safety Gaps Expose Accountability Risks08:54 Broadwing Launches MSP Platform to Standardize Scale, Signaling Growing PE Pressure on MSP Operations11:03 AI Rebrands Itself as Open Source Expands, Automation Scales, and Accountability Gets Murkier This is the Business of Tech. Supported by: https://saasalerts.com/mspradio/
Alexandru Voica, Head of Corporate Affairs and Policy at Synthesia, discusses how the world's largest enterprise AI video platform has approached trust and safety from day one. He explains Synthesia's "three C's" framework—consent, control, and collaboration: never creating digital replicas without explicit permission, moderating every video before rendering, and engaging with policymakers to shape practical regulation. Voica acknowledges these safeguards have cost some business, but argues that for enterprise sales, trust is competitively essential. The company's content moderation has evolved from simple keyword detection to sophisticated LLM-based analysis, recently withstanding a rigorous public red team test organized by NIST and Humane Intelligence. Voica criticizes the EU AI Act's approach of regulating how AI systems are built rather than focusing on harmful outcomes, noting that smaller models can now match frontier capabilities while evading compute-threshold regulations. He points to the UK's outcome-focused approach—like criminalizing non-consensual deepfake pornography—as more effective. On adoption, Voica argues that AI companies should submit to rigorous third-party audits using ISO standards rather than publishing philosophical position papers—the thesis of his essay "Audits, Not Essays." The conversation closes personally: growing up in 1990s Romania with rare access to English tutoring, Voica sees AI-powered personalized education as a transformative opportunity to democratize learning. Alexandru Voica is the Head of Corporate Affairs and Policy at Synthesia, the UK's largest generative AI company and the world's leading AI video platform. He has worked in the technology industry for over 15 years, holding public affairs and engineering roles at Meta, NetEase, Ocado, and Arm. Voica holds an MSc in Computer Science from the Sant'Anna School of Advanced Studies and serves as an advisor to MBZUAI, the world's first AI university. Transcript Audits, Not Essays: How to Win Trust for Enterprise AI (Transformer) Synthesia's Content Moderation Systems Withstand Rigorous NIST, Humane Intelligence Red Team Test (Synthesia) Computerspeak Newsletter
The House on Monday passed a bill that would revamp how agencies purchase software, putting the legislation in the same place it was a year ago: waiting for the Senate to follow suit as the clock ticks down on the congressional calendar. The Strengthening Agency Management and Oversight of Software Assets (SAMOSA) Act would require agencies to examine their software licensing practices, with the aim of streamlining IT buying practices to avoid duplicative purchases. The bill is identical to legislation that passed the House last December but did not move forward in the Senate. The House bill, co-sponsored by Reps. Nancy Mace, R-S.C., Shontel Brown, D-Ohio, Pat Fallon, R-Texas, and April McClain Delaney, D-Md., would press agencies to better manage their software without limiting procurement options. They would be required to submit IT assessments to the Office of Management and Budget, the General Services Administration and Congress, so better oversight could be conducted. On the House floor Monday, Brown credited her three co-sponsors as well as former Rep. Gerry Connolly, D-Va., who died of cancer in May after taking the lead on this bill in addition to his myriad other government IT efforts. Brown, ranking member of the House Oversight Cybersecurity, Information Technology, and Government Innovation subcommittee, said the SAMOSA Act is a “straightforward good government bill that has strong bipartisan support from members of the Oversight Committee.” A new bill from Sens. John Fetterman, D-Pa., and Ted Budd, R-N.C., would establish a national network of cloud laboratories led by the National Science Foundation and supported by the National Institute of Standards and Technology, with the goal of enhancing collaboration between institutions while improving research efficiency with AI. If passed, NSF will select up to six programmable cloud laboratories from a range of applicants, including academic institutions and private-sector research groups. NIST would be tasked with setting standards and reporting to Congress about the feasibility for expansion. The bill, introduced last week, aligns with provisions laid out by the Trump administration's AI Action Plan and aims to codify existing NSF proposals, according to the sponsors. NSF earmarked $100 million for a similar AI-powered cloud network in August as it looked to expand access to emerging technologies. Researchers in the co-sponsors' home states have developed methods to ease automated discoveries, which will serve as a blueprint for the national effort. NSF will judge applicants on the level of existing data integration and automated capability infrastructure and capacity to support multi-user cloud workflows, among other criteria. In addition to bipartisan backing, the legislation garnered support from officials at Carnegie Mellon University, the Accelerate Science Now coalition and the Allegheny Conference on Community Development. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
Send us a textCheck us out at: https://www.cisspcybertraining.com/Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkoutGet access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouvWhat happens when cybersecurity meets the engine room of the business? We dig into the partnership between the CISO and COO and show how shared risk, clear language about money, and practical tabletop drills turn security into operational resilience. Ransomware, supply chain delays, and customer impact aren't just IT issues—they're revenue issues—so we map exactly how to build alignment before a crisis hits.We break down CISSP Domain 1.5 with a plain-English tour of law categories and the statutes you actually need to know: CFAA and NIIPA for unauthorized access and critical infrastructure, FISMA and the NIST standards for federal-grade security programs, and the federal modernization that centralized oversight under DHS. Then we go deeper into intellectual property: what copyrights, trademarks, patents, and trade secrets protect; how DMCA and AI complicate ownership; and how licensing and click-through terms can quietly put your data and code at risk if you don't read them with counsel.Cross-border data is now daily business, so we unpack export controls on chips and encryption, transborder data flow obligations, and privacy regimes that carry real teeth: GDPR's 72-hour notification, China's PIPL and local representation, and state laws like CCPA that mirror EU rights. The practical takeaway is a tighter incident playbook: define “breach” with evidence-based thresholds, pre-wire stakeholder communications, and use tabletop exercises to test both technical recovery and regulatory reporting.If you're studying for the CISSP or leading a security program, this is the legal-ops blueprint you can use today. Subscribe, share this with your ops and legal teams, and leave a review to tell us which regulation gives you the biggest headache—we'll tackle it next.Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
IonQ Vice President and GM of Quantum Platform Matthew Keesan joins BioTalk for a clear look at how they are advancing quantum computing from its home base in the BioHealth Capital Region. He shares the story of IonQ's Maryland roots and explains quantum computing in straightforward terms for listeners seeking a high-level understanding. The conversation moves into why biohealth leaders should track the hardware race, what distinguishes IonQ's approach, and how quantum is already being paired with AI to strengthen modeling and analysis. Keesan walks through early use cases showing traction today, challenges common myths about timelines, and shares which biohealth applications he expects to gain mainstream momentum by 2030. Editing and post-production work for this episode was provided by The Podcast Consultant (https://thepodcastconsultant.com). Matthew Keesan is Vice President and GM of Quantum Platform at IonQ and a member of the BHI Board. He joined IonQ in 2017 to lead the development of the company's Quantum OS, the software stack that controls IonQ's quantum computers. In 2021, he oversaw the launch of IonQ's Harmony systems on Amazon Braket, Microsoft Azure Quantum, and Google Cloud, making IonQ the first quantum hardware provider available across all three hyperscalers. He built IonQ's security function to meet commercial and government frameworks, including SOC 2, NIST 800-171, NIST 800-53, and ISO 27001, and established a globally distributed operations team managing IonQ's fleet of quantum computers across the United States and Europe. Before joining IonQ, Keesan served as CTO of the restaurant technology company Ando, which was acquired by Uber, and advised startups in manufacturing, e-commerce, and identity-as-a-service. He also helped create the technology behind the interactive HBO series Mosaic with Steven Soderbergh. He holds patents in quantum compilation, hybrid quantum computation, and quantum control automation, and has co-authored papers published in Nature and Physical Review A.
In today's Cloud Wars Minute, I look at how IBM and Cisco are teaming up to pioneer long-distance quantum networks.Highlights00:03 — Although not the only company invested in the development of quantum computing, IBM is certainly considered the most active. The company has the highest number of patents, a clear road map for fault tolerant quantum systems, and the most prestigious track record across quantum hardware, software and the commercialization of these tools.00:28 — Now, IBM and Cisco Systems have revealed plans to link a network of quantum computers over long distances — and the result, perhaps the introduction of the quantum internet. Before I get carried away on this, leaders from both IBM and Cisco have confirmed that the technology to power these networks doesn't yet exist, but they are working on it.00:59 — The bottleneck is getting qubits, the unit of information used by quantum computers, to travel along fiber optic cables between Cisco switches. IBM and Cisco hope to have the first proof-of-concept ready within five years, a network that connects individual, large scale, fault-tolerant quantum computers with the power to run computations over 10s to hundreds of 1000s of qubits.01:49 — So, why do we need the quantum internet? Well, beyond the massive enhancement in computational power, which is the primary driver for companies to enter this space, if quantum computing itself becomes widespread, we'll need quantum structures in the Internet to protect ourselves from our very own creation.02:28 — Technology is advancing at an unfathomable speed, and just like in the AI space, we need to ensure it's contained. In fact, researchers at IBM co-developed three of the four quantum resistant algorithms that the U.S. National Institute of Standards and Technology, or NIST, have earmarked for future standardization. Visit Cloud Wars for more.
Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com In the world of federal technology we are being deluged with so much information about Artificial Intelligence that we may not see what some of other technologies that may have as great an impact as AI. The White House, the OMB (M-23-02), the Office of the National Cyber Director have made it clear that the time to prepare for post-quantum cryptography is now. Agencies are required to inventory cryptographic systems, prioritize high-value assets, and build migration plans in line with NIST standards. Today, we sit down with Eric Hay from Quantum Xchange to look at making this transition. During the interview, Hay handles issues like technology, operations and appropriate strategy. He highlights the role of NIST in developing and approving new algorithms like NIST PQC Post Quantum Encryption, ML, and CHEM. Eric explains the five-step process for transitioning to these new standards: discovery, prioritization, deployment, monitoring, and management. Rather than spending time evaluating algorithms, Eric Hay stresses the importance of a network-centric approach, suggesting that agencies focus on securing data transport first. Eric predicts Q day, when current encryption methods could be compromised, within 3-5 years, with some European partners aiming for 2029.
Jak vypadá život člověka, který prošel 601. skupinou speciálních sil, velel 43. výsadkovému pluku a později radil premiérovi i ministryni obrany? S plukovníkem Petrem Matoušem mluvíme o cestě od komiksového omylu při zápisu na Univerzitu obrany až po ostré operace v Afghánistánu, spolupráci s elitními americkými jednotkami a o fyzických i mentálních limitech vojáků. Proč šel ve čtyřiceti letech do MMA klece a v čem mu to připomíná reálné bojové operace? A jak se dívá na realitu české armády po zkušenosti z Ukrajiny?Soutěžíme o podepsaný výtisk rozšířeného vydání knihy Navzdory. Napište nám, kolik udělal Petr Matouš shybů při posledním přezkoušení. Knihu Navzdory můžete zakoupit zde: https://shelfie.cz/knihy-/785-navzdory-9788090970014.html?utm_source=Podcast&utm_medium=Insider+podcast&utm_campaign=Insider+podcast&utm_id=InsiderPartnerem podcastu je advokátní kancelář ROWAN LEGAL a mezinárodní poradenská společnost RSM.
35K YouTube Views and 1K comments in just 1 day | 145K Views on "X" and 250 Comments on the first day.We were quite grateful to get a note from Bret Weinstein's popular Dark Horse Podcast about his posting the interview with Senator Ron Johnson, which was an extraordinary dive into the 9/11 events. We wrote back to Bret and encouraged him to bring the hard, explosive evidence of the World Trade Center to his audience to back up his and the senators' claims about controlled demolition. He was game. We scheduled it right away.We were very honored to be asked onto the Dark Horse podcast. Bret has 521K YouTube subscribers and 1.1M followers on X. He's a frequent guest on the Joe Rogan and Tucker Carlson platforms, and he's shown a keen awareness of the truth about 9/11 and isn't afraid to talk about it.Right out of the gate, Bret acknowledged that he had been following our work for quite a while and that “when somebody is accused of being a conspiracy theorist, my only question is, ‘are they any good at it?' ” :)Then he made me blush: “and I have to say, you set the standard….extremely diligent.…really appreciate the rigor that you bring to that puzzle.”Well, I needed to shift gears and jump right into WTC 7 with both feet, so we introduced the sudden, straight-down, symmetrical, free fall of the building — after witnesses heard and saw explosions. Then we launched into the extreme heat — 3 to 4,000 degrees F — which, of course, was also unaccounted for in the official narrative.Bret was a very active listener and an engaged student of each scientific piece of evidence we presented, and he shared his wisdom with us liberally. For instance, when hearing of the mysterious billions of “previously molten iron microspheres” of “unknown origin” distributed ubiquitously through out the WTC dust, and that the equally puzzling “red-gray chips” of nano-thermite actually produce those same iron microspheres when ignited, he drew the following inference: “Let me just say logically speaking, what you've got is a material, these tiny spheres of formerly molten iron, a mechanism which demonstrably generates them.And that puts the burden of proof on somebody who says that what brought these towers down was fire. And in the case of the Twin Towers, some structural damage. It puts the onus on them to generate a competing explanation for those anomalous, readily observed phenomena. They don't. The burden of proof logically falls on them.And the question then is not, for those of us who are suspicious here, The question is, well come up with anything that is as plausible. Let's see you demonstrate it.When we arrived at the explosive evidence of the Twin Towers, he saw each piece building upon the last and arriving at the proof of the fraud of NIST in the fabrication of their theory that the top section of the building above the point of plane impacts drove the rest of the building down to the ground and then destroyed itself. The building was quite obviously blown up.It was quite disappointing to read some of the comments that chastised Weinstein for delving into these particular conspiracy theories. People really react emotionally and, obviously, without even watching the interview, make quite self-revealing comments on the YouTube video platform, despite supporting his other “conspiracy theories.” They, some of them, just couldn't stomach this one. If only they'd take the time to watch. You can lead a horse to water, but you can't make them drink.Support the show
What Security Congress Reveals About the State of CybersecurityThis discussion focuses on what ISC2 Security Congress represents for practitioners, leaders, and organizations navigating constant technological change. Jon France, Chief Information Security Officer at ISC2, shares how the event brings together thousands of cybersecurity practitioners, certification holders, chapter leaders, and future professionals to exchange ideas on the issues shaping the field today. Themes That Stand OutAI remains a central point of attention. France notes that organizations are grappling not only with adoption but with the shift in speed it introduces. Sessions highlight how analysts are beginning to work alongside automated systems that sift through massive data sets and surface early indicators of compromise. Rather than replacing entry-level roles, AI changes how they operate and accelerates the decision-making path. Quantum computing receives a growing share of focus as well. Attendees hear about timelines, standards emerging from NIST, and what preparedness looks like as cryptographic models shift. Identity-based attacks and authorization failures also surface throughout the program. With machine-driven compromises becoming easier to scale, the community explores new defenses, stronger controls, and the practical realities of machine-to-machine trust. Operational technology, zero trust, and machine-speed threats create additional urgency around modernizing security operations centers and rethinking human-to-machine workflows. A Place for Every Stage of the CareerFrance describes Security Congress as a cross-section of the profession: entry-level newcomers, certification candidates, hands-on practitioners, and CISOs who attend for leadership development. Workshops explore communication, business alignment, and critical thinking skills that help professionals grow beyond technical execution and into more strategic responsibilities. Looking Ahead to the Next CongressThe next ISC2 Security Congress will be held in October in the Denver/Aurora area. France expects AI and quantum to remain key themes, along with contributions shaped by the call-for-papers process. What keeps the event relevant each year is the mix of education, networking, community stories, and real-world problem-solving that attendees bring with them.The ISC2 Security Congress 2025 is a hybrid event taking place from October 28 to 30, 2025 Coverage provided by ITSPmagazineGUEST:Jon France, Chief Information Security Officer at ISC2 | On LinkedIn: https://www.linkedin.com/in/jonfrance/HOST:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comFollow our ISC2 Security Congress coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/isc2-security-congress-2025Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageISC2 Security Congress: https://www.isc2.orgNIST Post-Quantum Cryptography Standards: https://csrc.nist.gov/projects/post-quantum-cryptographyISC2 Chapters: https://www.isc2.org/chaptersWant to share an Event Briefing as part of our event coverage? Learn More
Back in 2011, FedRAMP was put together because each federal agency had to conduct its own time-consuming security audit. The idea was to standardize security to reduce costs and accelerate cloud adoption. About ten years later, state leaders saw the same problem. Over the years, they worked out a security guidance package that was released this year. GovRAMP was launched to address many of the same challenges faced by the federal government: to establish a standard that enables transparency, standardization, and community. GovRamp's framework is based on NIST 800-53 rev5. Tony O'Neil from Massachusetts observed that before GovRAMP, each state had a patchwork of security guidelines. With so much variation across states, a simplified environment could reduce costs and enable leaders to adopt a mindset of investing in people. Today, we sat down with data security experts who detailed the implementation of compliance to improve data security and compliance. The conversation also covered the importance of continuous monitoring, the role of CSPs in maintaining security, and the necessity of proper resource allocation for cybersecurity professionals.
Many small and mid-size businesses breathe a sigh of relief once they earn a compliance certification, but the work doesn't stop there. Certifications like SOC 2, ISO, or CMMC aren't one-time milestones. They're ongoing commitments that require fresh evidence, updated controls, and regular monitoring.In this episode, Marie Joseph, Manager of Compliance Advisory at Trava, breaks down the reality of maintaining compliance over time. She discusses why frameworks evolve and how managed compliance services can take the stress off your team's plate. Plus, she shares common mistakes businesses make during recertification and how to stay audit ready all year long.Key takeaways:How compliance frameworks evolve and why it mattersCommon mistakes companies make before audits and how to avoid themHow managed compliance services free up your team's time One of the top tips Marie shared in this episode for staying proactive and organized with compliance is using a Compliance Calendar. You can download a free copy today—based on the same calendar Marie uses every day to manage SOC 2, ISO 27001, CMMC, NIST, and other frameworks: https://travasecurity.com/pod-compliance-calendarEpisode highlights:(00:00) Compliance: What happens after you get certified?(02:32) Framework changes and renewals(05:17) Why compliance is never “done”(09:14) The audit mistake SMBs make most oftenConnect with the host:Jara Rowe's LinkedIn - @jararoweConnect with the guest:Marie Joseph's LinkedIn - https://www.linkedin.com/in/marie-joseph-a81394143/ Connect with Trava:Website - www.travasecurity.comBlog - www.travasecurity.com/learn-with-trava/blogLinkedIn - @travasecurityYouTube - @travasecurity
Episode overviewJohn Martinis, Nobel laureate and former head of Google's quantum hardware effort, joins Sebastian Hassinger on The New Quantum Era to trace the arc of superconducting quantum circuits—from the first demonstrations of macroscopic quantum tunneling in the 1980s to today's push for wafer-scale, manufacturable qubit processors. The episode weaves together the physics of “synthetic atoms” built from Josephson junctions, the engineering mindset needed to turn them into reliable computers, and what it will take for fabrication to unlock true large-scale quantum systems.Guest bioJohn M. Martinis is a physicist whose experiments on superconducting circuits with John Clarke and Michel Devoret at UC Berkeley established that a macroscopic electrical circuit can exhibit quantum tunneling and discrete energy levels, work recognized by the 2025 Nobel Prize in Physics “for the discovery of macroscopic quantum mechanical tunnelling and energy quantisation in an electric circuit.” He went on to lead the superconducting quantum computing effort at Google, where his team demonstrated large-scale, programmable transmon-based processors, and now heads Qolab (also referred to in the episode as CoLab), a startup focused on advanced fabrication and wafer-scale integration of superconducting qubits.Martinis's career sits at the intersection of precision instrumentation and systems engineering, drawing on a scientific “family tree” that runs from Cambridge through John Clarke's group at Berkeley, with strong theoretical influence from Michel Devoret and deep exposure to ion-trap work by Dave Wineland and Chris Monroe at NIST. Today his work emphasizes solving the hardest fabrication and wiring challenges—pursuing high-yield, monolithic, wafer-scale quantum processors that can ultimately host tens of thousands of reproducible qubits on a single 300 mm wafer.Key topicsMacroscopic quantum tunneling on a chip: How Clarke, Devoret, and Martinis used a current-biased Josephson junction to show that a macroscopic circuit variable obeys quantum mechanics, with microwave control revealing discrete energy levels and tunneling between states—laying the groundwork for superconducting qubits. The episode connects this early work directly to the Nobel committee's citation and to today's use of Josephson circuits as “synthetic atoms” for quantum computing.From DC devices to microwave qubits: Why early Josephson devices were treated as low-frequency, DC elements, and how failed experiments pushed Martinis and collaborators to re-engineer their setups with careful microwave filtering, impedance control, and dilution refrigerators—turning noisy circuits into clean, quantized systems suitable for qubits. This shift to microwave control and readout becomes the through-line from macroscopic tunneling experiments to modern transmon qubits and multi-qubit gates.Synthetic atoms vs natural atoms: The contrast between macroscopic “synthetic atoms” built from capacitors, inductors, and Josephson junctions and natural atomic systems used in ion-trap and neutral-atom experiments by groups such as Wineland and Monroe at NIST, where single-atom control made the quantum nature more obvious. The conversation highlights how both approaches converged on single-particle control, but with very different technological paths and community cultures.Ten-year learning curve for devices: How roughly a decade of experiments on quantum noise, energy levels, and escape rates in superconducting devices built confidence that these circuits were “clean enough” to support serious qubit experiments, just as early demonstrations such as Yasunobu Nakamura's single-Cooper-pair box showed clear two-level behavior. This foundational work set the stage for the modern era of superconducting quantum computing across academia and industry.Surface code and systems thinking: Why Martinis immersed himself in the surface code, co-authoring a widely cited tutorial-style paper “Surface codes: Towards practical large-scale quantum computation” (Austin G. Fowler, Matteo Mariantoni, John M. Martinis, Andrew N. Cleland, Phys. Rev. A 86, 032324, 2012; arXiv:1208.0928), to translate error-correction theory into something experimentalists could build. He describes this as a turning point that reframed his work at UC Santa Barbara and Google around full-system design rather than isolated device physics.Fabrication as the new frontier: Martinis argues that the physics of decent transmon-style qubits is now well understood and that the real bottleneck is industrial-grade fabrication and wiring, not inventing ever more qubit variants. His company's roadmap targets wafer-scale integration—e.g., ~100-qubit test chips scaling toward ~20,000 qubits on a 300 mm wafer—with a focus on yield, junction reproducibility, and integrated escape wiring rather than current approaches that tile many 100-qubit dies into larger systems.From lab racks of cables to true integrated circuits: The episode contrasts today's dilution-refrigerator setups—dominated by bulky wiring and discrete microwave components—with the vision of a highly integrated superconducting “IC” where most of that wiring is brought on-chip. Martinis likens the current state to pre-IC TTL logic full of hand-wired boards and sees monolithic quantum chips as the necessary analog of CMOS integration for classical computing.Venture timelines vs physics timelines: A candid discussion of the mismatch between typical three-to-five-year venture capital expectations and the multi-decade arc of foundational technologies like CMOS and, now, quantum computing. Martinis suggests that the most transformative work—such as radically improved junction fabrication—looks slow and uncompetitive in the short term but can yield step-change advantages once it matures.Physics vs systems-engineering mindsets: How Martinis's “instrumentation family tree” and exposure to both American “build first, then understand” and French “analyze first, then build” traditions shaped his approach, and how system engineering often pushes him to challenge ideas that don't scale. He frames this dual mindset as both a superpower and a source of tension when working in large organizations used to more incremental science-driven projects.Collaboration, competition, and pre-competitive science: Reflections on the early years when groups at Berkeley, Saclay, UCSB, NIST, and elsewhere shared results openly, pushing the field forward without cut-throat scooping, before activity moved into more corporate settings around 2010. Martinis emphasizes that many of the hardest scaling problems—especially in materials and fabrication—would benefit from deeper cross-organization collaboration, even as current business constraints limit what can be shared.Papers and research discussed“Energy-Level Quantization in the Zero-Voltage State of a Current-Biased Josephson Junction” – John M. Martinis, Michel H. Devoret, John Clarke, Physical Review Letters 55, 1543 (1985). First clear observation of quantized energy levels and macroscopic quantum tunneling in a Josephson circuit, forming a core part of the work recognized by the 2025 Nobel Prize in Physics. Link: https://link.aps.org/doi/10.1103/PhysRevLett.55.1543“Quantum Mechanics of a Macroscopic Variable: The Phase Difference of a Josephson Junction” – J. Clarke et al., Science 239, 992 (1988). Further development of macroscopic quantum tunneling and wave-packet dynamics in current-biased Josephson junctions, demonstrating that a circuit-scale degree of freedom behaves as a quantum variable. Link (PDF via Cleland group):
Dr. Jamey Jacob is Executive Director of the Oklahoma Aerospace Institute for Research and Education and the Williams Chair in Energy Technology at Oklahoma State University. Under his leadership, OSU launched the Counter-UAS Center of Excellence, now the nation's central hub for coordinated research, development, testing and evaluation of counter-drone systems. Working closely with the Joint Force CUAS University at Fort Sill, the center assesses vendor technologies, establishes performance standards and accelerates next-generation defenses—all while addressing the growing national shortage of highly trained engineers in this mission-critical domain. With unique testing environments and deep alignment with military needs, OSU plays a pivotal role in strengthening national security and maintaining U.S. leadership in UAS innovation. Beyond directing the Center, Dr. Jacob is a Regents Professor of Aerospace Engineering and a nationally recognized leader in emerging aerospace systems, securing nearly $50 million in research funding from federal agencies and industry partners. He has testified before Congress on the critical need for sustained investment in drone research and advanced air mobility, and he leads major initiatives including the EDA-funded LaunchPad and UAS Flight Corridor, NASA's WINDMAP weather program, OSU's work within the Tulsa Hub for Ethical and Trustworthy Autonomy, and the NIST initiative developing certification standards for next-generation aircraft. A native Oklahoman, he holds degrees from the University of Oklahoma and UC Berkeley, and is an FAA Part 107 pilot with roughly 500 flight hours. In this episode of the Drone Radio Show, Dr. Jacob talks about OSU's efforts to advance the nation's counter-UAS capabilities; what Ukraine's drone innovations reveal about the future of warfare, and how OSU's research in atmospheric science, public safety, and wildlife applications is shaping the next generation of drone operations.
What happens when AI generates photorealistic content in seconds… and quantum computers can break encryption just as fast?Roman Cyganov (Founder/CEO of Antix) has spent a decade building digital twin technology, creating content for HBO, Warner Brothers, and AAA games. His platform now generates digital twins instantly, with AI agents that manage social media, track trends, and conduct tasks autonomously.Nauman (Founder of BeQuantum.ai) is addressing the quantum security threat. With quantum computers demonstrating computational supremacy, he's implementing post-quantum cryptography to protect digital identities and blockchain systems.Together, they're building a verified marketplace where creators monetize AI twins through blockchain verification and quantum-grade security.Key Topics:Digital twins: from year-long projects to instant creationQuantum threats to current encryptionAI agents for autonomous content creationBlockchain verification for deepfake detectionMonetizing digital identityPartnerships exclusiveExplore AIGE with Antix at https://linktr.ee/aige.inLearn more about Quantum Security at Bequantum.aiSubscribe, share, and join the conversations on Facebook, Twitter, LinkedIn and Discord!To contact us, you can email us directly at bandoftraderspodcast@gmail.com Check out our directory for other amazing interviews we've done in the past!If you like our show, please let us know by rating and subscribing on your platform of choice!If you like our show and hate social media, then please tell all your friends!If you have no friends and hate social media and you just want to give us money for advertising to help you find more friends, then you can donate to support the show here!Roman:Roman Cyganov is the founder and CEO of Antix, an AI platform for digital twins and autonomous agents. He's built products for HBO, Warner Brothers, Tencent, and AAA titles like Game of Thrones, FIFA, and PUBG. An internationally recognized artist whose work appeared on Times Square, Roman pioneered digital twin technology in 2013. Based in Dubai and advised by Aether co-founder Mark Rydon, he's building infrastructure for creators to monetize verified digital identities.Learn More Here: https://linktr.ee/aige.inConnect with Roman on LinkedInNauman:Nauman Arshad, founder of BeQuantum.ai, is protecting digital assets in the post-quantum era. With decades in cryptography, embedded systems, and cybersecurity since the 1990s internet boom, he implements quantum random number generators and post-quantum cryptography following NIST and NSA standards. Based in Dubai, he's future-proofing security infrastructure as quantum computers threaten traditional encryption, ensuring AI platforms are built on unbreakable foundations.Learn More Here: BeQuantum.AIConnect with Nauman on LinkedInAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
Trista and Theresa Nist recap Mel's Golden Bachelor finale and AFR! Theresa brings her own unique perspective to the promise of commitment, and Trista gives her unfiltered opinion on how Cindy was treated! Do the ladies think "MEG" will go the distance?? Plus, Theresa gets candid on some of Trista's burning questions. See omnystudio.com/listener for privacy information.
In "Scaling Logistics Innovation at Descartes Systems Group", Joe Lynch and Dan Cicerchi, the General Manager of Transportation Management Solutions at Descartes Systems Group, discuss the strategic integration of trustworthy AI to enhance existing core logistics technology and solve practical pain points across the global supply chain. About Dan Cicerchi Dan Cicerchi is the General Manager of Transportation Management Solutions at Descartes Systems Group, where he leads strategy and innovation for one of the industry's most widely adopted logistics technology platforms. A seasoned entrepreneur and logistics tech pioneer, Dan co-founded MacroPoint, a real-time freight visibility solution that transformed how brokers, shippers, and carriers track and manage loads. Following its acquisition by Descartes, he has continued to champion technology that drives efficiency, transparency, and resilience across global supply chains. With decades of experience spanning startup growth and enterprise leadership, Dan is passionate about applying practical AI and automation to solve the freight industry's most pressing challenges. He frequently shares insights on freight visibility, fraud prevention, and the future of transportation management. About Descartes Systems Group Descartes Systems Group is a global leader in providing on-demand, software-as-a-service solutions designed to improve the productivity, performance, and security of logistics-intensive businesses. Headquartered in Waterloo, Ontario, with offices and customers worldwide, Descartes helps shippers, carriers, freight forwarders, and logistics service providers connect, collaborate, and automate across the supply chain. Its portfolio includes transportation management, visibility, customs and regulatory compliance, and e-commerce logistics solutions. By combining deep industry expertise with innovative technology, Descartes enables organizations to streamline operations, reduce costs, and deliver superior customer experiences. Thousands of companies around the world rely on Descartes' logistics network and software to move goods more efficiently, mitigate risk, and stay ahead in an increasingly complex global marketplace. Key Takeaways: Scaling Logistics Innovation at Descartes Systems Group In "Scaling Logistics Innovation at Descartes Systems Group", Joe Lynch and Dan Cicerchi, the General Manager of Transportation Management Solutions at Descartes Systems Group, discuss the strategic integration of trustworthy AI to enhance existing core logistics technology and solve practical pain points across the global supply chain. Trust First: AI adoption in logistics must be built on governance and trust, using frameworks like NIST to ensure data security and accountability. AI Augments, Doesn't Replace: AI is a powerful enhancer for core systems (TMS, visibility), not a standalone replacement. Its primary role is to improve efficiency. Focus on Practical Pain Points: Start AI implementation by targeting tedious manual tasks (e.g., check calls, data entry, carrier onboarding) for rapid, measurable ROI. Stability Over Startups: Partnering with existing, integrated tech vendors (like Descartes) ensures greater stability, expertise, and roadmap alignment than relying on new AI-only startups. Audit Your Current Tech: Before investing in new AI, ensure you are fully utilizing the latest features and integrations of your current mission-critical systems. Build Trust with Staff: Overcome internal resistance by layering AI into current workflows and establishing clear performance baselines (ROI) before deployment. Enhance What Works: The path to resilience is through strategically integrating AI into proven, existing workflows step-by-step, not by chasing every new technology trend. Learn More About Scaling Logistics Innovation at Descartes Systems Group Dan Cicerchi | Linkedin Descartes Systems Group | Linkedin Descartes Systems Group The Logistics of Logistics Podcast If you enjoy the podcast, please leave a positive review, subscribe, and share it with your friends and colleagues. The Logistics of Logistics Podcast: Google, Apple, Castbox, Spotify, Stitcher, PlayerFM, Tunein, Podbean, Owltail, Libsyn, Overcast Check out The Logistics of Logistics on Youtube
Shandy is thrilled to welcome Theresa Nist for an EXCLUSIVE in-studio conversation. You know Theresa as the winner of the mega-hit season 1 of The Golden Bachelor. She wound up engaged to Gerry Turner, their televised wedding was watched by millions, but they announced their divorce only 3 months later. What *really* happened behind the scenes, after the wedding, and after the cameras turned off?In light of Gerry's new tell-all book describing his version of events, Theresa sits down with Shandy for her most raw, unfiltered interview to date. How did it feel for Theresa to learn that Gerry wondered if he should have chosen his runner-up, Leslie? Did she mislead Gerry about quitting her career, did she misrepresent her finances, and did she read "How To Win The Bachelor" during filming, as he claimed in the book? Did she really make Gerry sleep on the sofa?! Theresa is normally very private but could not stay silent in light of the book's many accusations. Do not miss her brutally honest account.Thanks to our sponsors!- Go to https://www.squarespace.com/SHANDY and use code SHANDY for 10% off your first website or domain!- Get up to 40% off your entire order at https://laundrysauce.com/SHANDY (their biggest sale of the year!)- Go to https://mudwtr.com and use code SHANDY to get up to 43% off your entire order, Free Shipping and a Free Rechargeable Frother!More Theresa:- Instagram: https://www.instagram.com/theresa_nist- TikTok: https://www.tiktok.com/@theresa_nistPast Dear Shandy episodes covering Gerry & Theresa:- Love Fest: https://youtu.be/hWCr91mBGb0?si=LOOwxXqEToxIpIBY- Golden Divorce: https://youtu.be/PyiFysUZJMc?si=OzqnEI2Ee4_gm8gSTime Stamps:0:00 - Welcome To Theresa Nist10:08 - Leslie19:32 - Temper22:22 - “East Coast Mentality”27:44 - Finances, Her Work, The Prenup42:18 - Lifestyle45:00 - House Shopping47:50 - Her Home49:26 - Physical Intimacy55:50 - Her Intentions1:05:59 - Her Character1:16:05 - Regrets1:20:18 - Message To GerryIf you have a relationship question, write us at: dearshandy@gmail.comSubscribe and watch the episodes on YouTube! https://bit.ly/SubscribeDearShandyMore Dear ShandyInstagram - https://www.instagram.com/dearshandyFacebook - https://fb.me/dearshandyMore SharleenInstagram - https://www.instagram.com/sharleenjoyntBlog - http://www.alltheprettypandas.comMore AndyInstagram - https://www.instagram.com/machinelevineProduced by Gabrielle Galon - https://www.instagram.com/gabsamillionSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
Think your mouse is harmless? Steve and Leo uncover how modern optical mice might be secretly "listening" in, and reveal why satellite data pouring down on us is almost entirely unsecured. The long awaited lawsuit to block Texas SB2420. Embattled Texas SB2420 also impacts Google Play. At long last, NIST modernizes their password policy. Scattered LAPSUS$ Hunters demise was exaggerated. China claims that the NSA has been hacking them. Half of all geosynchronous satellite traffic is unencrypted. The AWS outage highlights the rising risk of Internet monoculture. A terrific collection of listener feedback and... Could your PC's mousehave much bigger ears than you know? https://www.grc.com/sn/SN-1048-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: Melissa.com/twit hoxhunt.com/securitynow threatlocker.com for Security Now joindeleteme.com/twit promo code TWIT bitwarden.com/twit
VHEADLINE: DeepSeek AI: Chinese LLM Performance and Security Flaws Revealed Amid Semiconductor Export Circumvention GUEST NAME: Jack Burnham SUMMARY: John Batchelor speaks with Jack Burnham about competition in Large Language Models between the US and China's DeepSeek. A NIST study found US models superior in software engineering, though DeepSeek showed parity in scientific questions. Critically, DeepSeek models exhibited significant security flaws. China attempts to circumvent US export controls on GPUs by smuggling and using cloud computing centers in Southeast Asia. Additionally, China aims to dominate global telecommunications through control of supply chains and legal mechanisms granting the CCP access to firm data.E 1959
CBS EYE ON THE WORLD WITH JOHN BATCHELOR 1900 KYIV THE SHOW BEGINS IN THE DOUBTS THAT CONGRESS IS CAPABLE OF CUTTING SPENDING..... 10-8-25 FIRST HOUR 9-915 HEADLINE: Arab Intellectuals Fail Palestinians by Prioritizing Populism and Victimhood Narrative in Gaza ConflictGUEST NAME: Hussain Abdul-Hussain SUMMARY: John Batchelor speaks with Hussain Abdul-Hussain about Hamas utilizing the power of victimhood to justify atrocities and vilify opponents. Arab and Muslim intellectuals have failed Palestinians by prioritizing populism over introspection and self-critique. Regional actors like Egypt prioritize populist narratives over national interests, exemplified by refusing to open the Sinai border despite humanitarian suffering. The key recommendation is challenging the narrative and fostering a reliable, mature Palestinian government. 915-930 HEADLINE: Arab Intellectuals Fail Palestinians by Prioritizing Populism and Victimhood Narrative in Gaza ConflictGUEST NAME: Hussain Abdul-Hussain SUMMARY: John Batchelor speaks with Hussain Abdul-Hussain about Hamas utilizing the power of victimhood to justify atrocities and vilify opponents. Arab and Muslim intellectuals have failed Palestinians by prioritizing populism over introspection and self-critique. Regional actors like Egypt prioritize populist narratives over national interests, exemplified by refusing to open the Sinai border despite humanitarian suffering. The key recommendation is challenging the narrative and fostering a reliable, mature Palestinian government. 930-945 HEADLINE: Russian Oil and Gas Revenue Squeezed as Prices Drop, Turkey Shifts to US LNG, and China Delays Pipeline GUEST NAME: Michael Bernstam SUMMARY: John Batchelor speaks with Michael Bernstam about Russia facing severe budget pressure due to declining oil prices projected to reach $40 per barrel for Russian oil and global oil surplus. Turkey, a major buyer, is abandoning Russian natural gas after signing a 20-year LNG contract with the US. Russia refuses Indian rupee payments, demanding Chinese renminbi, which India lacks. China has stalled the major Power of Siberia 2 gas pipeline project indefinitely. Russia utilizes stablecoin and Bitcoin via Central Asian banks to circumvent payment sanctions. 945-1000 HEADLINE: UN Snapback Sanctions Imposed on Iran; Debate Over Nuclear Dismantlement and Enrichment GUEST NAME: Andrea Stricker SUMMARY: John Batchelor speaks with Andrea Stricker about the US and Europe securing the snapback of UN sanctions against Iran after 2015 JCPOA restrictions expired. Iran's non-compliance with inspection demands triggered these severe sanctions. The discussion covers the need for full dismantlement of Iran's nuclear program, including both enrichment and weaponization capabilities, to avoid future conflict. Concerns persist about Iran potentially retaining enrichment capabilities through low-level enrichment proposals and its continued non-cooperation with IAEA inspections. SECOND HOUR 10-1015 HEADLINE: Commodities Rise and UK Flag Controversy: French Weather, Market Trends, and British Politics GUEST NAME: Simon Constable SUMMARY: John Batchelor speaks with Simon Constable about key commodities like copper up 16% and steel up 15% signaling strong economic demand. Coffee prices remain very high at 52% increase. The conversation addresses French political turmoil, though non-citizens cannot vote. In the UK, the St. George's flag has become highly controversial, viewed by some as associated with racism, unlike the Union Jack. This flag controversy reflects a desire among segments like the white working class to assert English identity. 1015-1030 HEADLINE: Commodities Rise and UK Flag Controversy: French Weather, Market Trends, and British Politics GUEST NAME: Simon Constable SUMMARY: John Batchelor speaks with Simon Constable about key commodities like copper up 16% and steel up 15% signaling strong economic demand. Coffee prices remain very high at 52% increase. The conversation addresses French political turmoil, though non-citizens cannot vote. In the UK, the St. George's flag has become highly controversial, viewed by some as associated with racism, unlike the Union Jack. This flag controversy reflects a desire among segments like the white working class to assert English identity. 1030-1045 HEADLINE: China's Economic Contradictions: Deflation and Consumer Wariness Undermine GDP Growth ClaimsGUEST NAME: Fraser Howie SUMMARY: John Batchelor speaks with Fraser Howie about China facing severe economic contradictions despite high World Bank forecasts. Deflation remains rampant with frequently negative CPI and PPI figures. Consumer wariness and high youth unemployment at one in seven persist throughout the economy. The GDP growth figure is viewed as untrustworthy, manufactured through debt in a command economy. Decreased container ship arrivals point to limited actual growth, exacerbated by higher US tariffs. Economic reforms appear unlikely as centralization under Xi Jinping continues. 1045-1100 HEADLINE: Takaichi Sanae Elected LDP Head, Faces Coalition Challenge to Become Japan's First Female Prime Minister GUEST NAME: Lance Gatling SUMMARY: John Batchelor speaks with Lance Gatling about Takaichi Sanae being elected head of Japan's LDP, positioning her to potentially become the first female Prime Minister. A conservative figure, she supports visits to the controversial Yasukuni Shrine. Her immediate challenge is forming a majority coalition, as the junior partner Komeito disagrees with her conservative positions and social policies. President Trump praised her election, signaling potential for strong bilateral relations. THIRD HOUR 1100-1115 VHEADLINE: DeepSeek AI: Chinese LLM Performance and Security Flaws Revealed Amid Semiconductor Export Circumvention GUEST NAME: Jack Burnham SUMMARY: John Batchelor speaks with Jack Burnham about competition in Large Language Models between the US and China's DeepSeek. A NIST study found US models superior in software engineering, though DeepSeek showed parity in scientific questions. Critically, DeepSeek models exhibited significant security flaws. China attempts to circumvent US export controls on GPUs by smuggling and using cloud computing centers in Southeast Asia. Additionally, China aims to dominate global telecommunications through control of supply chains and legal mechanisms granting the CCP access to firm data.E V 1115-1130 HEADLINE: DeepSeek AI: Chinese LLM Performance and Security Flaws Revealed Amid Semiconductor Export Circumvention GUEST NAME: Jack Burnham SUMMARY: John Batchelor speaks with Jack Burnham about competition in Large Language Models between the US and China's DeepSeek. A NIST study found US models superior in software engineering, though DeepSeek showed parity in scientific questions. Critically, DeepSeek models exhibited significant security flaws. China attempts to circumvent US export controls on GPUs by smuggling and using cloud computing centers in Southeast Asia. Additionally, China aims to dominate global telecommunications through control of supply chains and legal mechanisms granting the CCP access to firm data. 1130-1145 HEADLINE: Taiwanese Influencer Charged for Threatening President; Mainland Chinese Influence Tactics ExposedGUEST NAME: Mark Simon SUMMARY: John Batchelor speaks with Mark Simon about internet personality Holger Chen under investigation in Taiwan for calling for President William Lai's decapitation. This highlights mainland Chinese influence operations utilizing influencers who push themes of military threat and Chinese greatness. Chen is suspected of having a mainland-affiliated paymaster due to lack of local commercial support. Taiwan's population primarily identifies as Taiwanese and is unnerved by constant military threats. A key propaganda goal is convincing Taiwan that the US will not intervene. 1145-1200 HEADLINE: Sentinel ICBM Modernization is Critical and Cost-Effective Deterrent Against Great Power CompetitionGUEST NAME: Peter Huessy SUMMARY: John Batchelor speaks with Peter Huessy about the Sentinel program replacing aging 55-year-old Minuteman ICBMs, aiming for lower operating costs and improved capabilities. Cost overruns stem from necessary infrastructure upgrades, including replacing thousands of miles of digital command and control cabling and building new silos. Maintaining the ICBM deterrent is financially and strategically crucial, saving hundreds of billions compared to relying solely on submarines. The need for modernization reflects the end of the post-Cold War "holiday from history," requiring rebuilding against threats from China and Russia. FOURTH HOUR 12-1215 HEADLINE: Supreme Court Battles Over Presidential Impoundment Authority and the Separation of Powers GUEST NAME: Josh Blackman SUMMARY: John Batchelor speaks with Josh Blackman about Supreme Court eras focusing on the separation of powers. Currently, the court is addressing presidential impoundment—the executive's authority to withhold appropriated funds. Earlier rulings, particularly 1975's Train v. City of New York, constrained this power. The Roberts Court appears sympathetic to reclaiming presidential authority lost during the Nixon era. The outcome of this ongoing litigation will determine the proper balance between executive and legislative branches. 1215-1230 HEADLINE: Supreme Court Battles Over Presidential Impoundment Authority and the Separation of Powers GUEST NAME: Josh Blackman SUMMARY: John Batchelor speaks with Josh Blackman about Supreme Court eras focusing on the separation of powers. Currently, the court is addressing presidential impoundment—the executive's authority to withhold appropriated funds. Earlier rulings, particularly 1975's Train v. City of New York, constrained this power. The Roberts Court appears sympathetic to reclaiming presidential authority lost during the Nixon era. The outcome of this ongoing litigation will determine the proper balance between executive and legislative branches. 1230-1245 HEADLINE: Space Force Awards Contracts to SpaceX and ULA; Juno Mission Ending, Launch Competition Heats UpGUEST NAME: Bob Zimmerman SUMMARY: John Batchelor speaks with Bob Zimmerman about Space Force awarding over $1 billion in launch contracts to SpaceX for five launches and ULA for two launches, highlighting growing demand for launch services. ULA's non-reusable rockets contrast with SpaceX's cheaper, reusable approach, while Blue Origin continues to lag behind. Other developments include Firefly entering defense contracting through its Scitec acquisition, Rocket Lab securing additional commercial launches, and the likely end of the long-running Juno Jupiter mission due to budget constraints. 1245-100 AM HEADLINE: Space Force Awards Contracts to SpaceX and ULA; Juno Mission Ending, Launch Competition Heats UpGUEST NAME: Bob Zimmerman SUMMARY: John Batchelor speaks with Bob Zimmerman about Space Force awarding over $1 billion in launch contracts to SpaceX for five launches and ULA for two launches, highlighting growing demand for launch services. ULA's non-reusable rockets contrast with SpaceX's cheaper, reusable approach, while Blue Origin continues to lag behind. Other developments include Firefly entering defense contracting through its Scitec acquisition, Rocket Lab securing additional commercial launches, and the likely end of the long-running Juno Jupiter mission due to budget constraints.
VHEADLINE: DeepSeek AI: Chinese LLM Performance and Security Flaws Revealed Amid Semiconductor Export Circumvention GUEST NAME: Jack Burnham SUMMARY: John Batchelor speaks with Jack Burnham about competition in Large Language Models between the US and China's DeepSeek. A NIST study found US models superior in software engineering, though DeepSeek showed parity in scientific questions. Critically, DeepSeek models exhibited significant security flaws. China attempts to circumvent US export controls on GPUs by smuggling and using cloud computing centers in Southeast Asia. Additionally, China aims to dominate global telecommunications through control of supply chains and legal mechanisms granting the CCP access to firm data. 1942