Podcasts about nist

Measurement standards laboratory in the United States

  • 1,035PODCASTS
  • 2,464EPISODES
  • 37mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • May 28, 2025LATEST
nist

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about nist

Show all podcasts related to nist

Latest podcast episodes about nist

Paul's Security Weekly
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Jordan Avnaim, Chris Hickman, Amit Sinha, Albert Estevez Polo - BSW #397

Paul's Security Weekly

Play Episode Listen Later May 28, 2025 67:59


This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional firewalls. From cutting-edge innovations to expert insights, discover what security leaders should prioritize to stay ahead of evolving threats. This segment is sponsored by Zero Networks. Visit https://securityweekly.com/zerorsac to learn more about them! In this segment, Keyfactor CSO Chris Hickman takes stock of industry progress towards quantum-resistant cryptography. Using recent guidance from NIST and his company's data on which certificates and keys pose the largest threats to organization now, Chris unpacks what it means to be risk intelligent and quantum safe. Segment Resources: • Command Risk Intelligence press release: https://www.keyfactor.com/press-releases/keyfactor-unveils-worlds-first-certificate-risk-management-solution/ • Recent blog post on the transition to PQC: https://www.keyfactor.com/blog/getting-quantum-ready-why-2030-matters-for-post-quantum-cryptography/ To learn more about the road to being quantum ready, stop by Keyfactor's booth at the conference, number #748, or visit: https://securityweekly.com/keyfactorrsac As cyber threats become increasingly difficult to detect and the technology to combat them continues to evolve, organizations must be prepared to move faster than ever. Looking ahead, the rise of post-quantum computing will bring both new opportunities and challenges, further reshaping the cybersecurity landscape. With the launch of Entrust's Cryptographic Security Platform (announcement coming April 16th) as a backdrop, Jordan can discuss why all organizations – large and small – must prioritize post-quantum preparedness before it's too late. He can also address emerging fraud technologies (e.g., deepfakes, GenAI) and fraud attacks (account takeovers, synthetic identities, impersonation), which are drawing more attention to the need for cyber-resilient methods, such as post-quantum cryptography, to protect against new fraud risks in the digital future. This segment is sponsored by Entrust. Visit https://securityweekly.com/entrustrsac to learn more about them! As quantum computing advances, the security foundations of our digital world face unprecedented challenges. This session explores how integrating Public Key Infrastructure (PKI) and Domain Name System (DNS) technologies can fortify digital trust in the quantum era. We'll delve into strategies for transitioning to post-quantum cryptography, ensuring interoperability, and maintaining the integrity of digital communications. Join us to understand the roadmap for achieving quantum resilience and safeguarding the future of digital trust. Segment Resources: https://www.digicert.com/what-is-pki https://www.digicert.com/faq/dns https://www.digicert.com/faq/dns/what-is-dns https://www.linkedin.com/posts/amitsinhadigitaltrust-trustsummit-pki-activity-7315749270505037824-lUBf?utmsource=share&utmmedium=memberdesktop&rcm=ACoAAAC22mYBCeB_s0YvGTVQsGiChh7wRXa4jRg https://www.digicert.com/blog/compliance-the-foundation-of-digital-trust https://www.digicert.com/blog/digital-trust-as-an-it-imperative This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-397

The CyberWire
BEAR-ly washed and dangerous.

The CyberWire

Play Episode Listen Later May 27, 2025 35:43


“Laundry Bear” airs dirty cyber linen in the Netherlands. AI coding agents are tricked by malicious prompts in a Github MCP vulnerability.Tenable patches critical flaws in Network Monitor on Windows. MathWorks confirms ransomware behind MATLAB outage. Feds audit NVD over vulnerability backlog. FBI warns law firms of evolving Silent Ransom Group tactics. Chinese hackers exploit Cityworks flaw to breach US municipal networks. Everest Ransomware Group leaks Coca-Cola employee data. Nova Scotia Power hit by ransomware.  On today's Threat Vector, ⁠David Moulton⁠ speaks with ⁠his Palo Alto Networks colleagues Tanya Shastri⁠ and ⁠Navneet Singh about a strategy for secure AI by design.  CIA's secret spy site was… a Star Wars fan page? Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector In this segment of Threat Vector, host ⁠David Moulton⁠ speaks with ⁠Tanya Shastri⁠, SVP of Product Management, and ⁠Navneet Singh⁠, VP of Marketing - Network Security, at Palo Alto Networks. They explore what it means to adopt a secure AI by design strategy, giving employees the freedom to innovate with generative AI while maintaining control and reducing risk. You can hear their full discussion on Threat Vector ⁠here⁠ and catch new episodes every Thursday on your favorite podcast app. Selected Reading Dutch intelligence unmasks previously unknown Russian hacking group 'Laundry Bear' (The Record) GitHub MCP Server Vulnerability Let Attackers Access Private Repositories (Cybersecurity News) Tenable Network Monitor Vulnerabilities Let Attackers Escalate Privileges (Cybersecurity News) Ransomware attack on MATLAB dev MathWorks – licensing center still locked down (The Register) US Government Launches Audit of NIST's National Vulnerability Database (Infosecurity Magazine) Law Firms Warned of Silent Ransom Group Attacks  (SecurityWeek) Chinese Hackers Exploit Cityworks Flaw to Target US Local Governments (Infosecurity Magazine) Everest Ransomware Leaks Coca-Cola Employee Data Online (Hackread) Nova Scotia Power Suffers Ransomware Attack; 280,000 Customers' Data Compromised (GB Hackers) The CIA Secretly Ran a Star Wars Fan Site (404 Media) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber Briefing
May 26, 2025 - Cyber Briefing

Cyber Briefing

Play Episode Listen Later May 26, 2025 10:43


If you like what you hear, please subscribe, leave us a review and tell a friend!

Cyber Briefing
May 21, 2025 - Cyber Briefing

Cyber Briefing

Play Episode Listen Later May 21, 2025 8:48


If you like what you hear, please subscribe, leave us a review and tell a friend!

The CyberWire
The Take It Down Act walks a fine line.

The CyberWire

Play Episode Listen Later May 20, 2025 35:13


President Trump signs the Take It Down Act into law. A UK grocer logistics firm gets hit by ransomware. Researchers discover trojanized versions of the KeePass password manager. Researchers from CISA and NIST promote a new metric to better predict actively exploited software flaws. A new campaign uses SEO poisoning to deliver Bumblebee malware. A sophisticated phishing campaign is impersonating Zoom meeting invites to steal user credentials. CISA has added six actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. A bipartisan bill aims to strengthen the shrinking federal cybersecurity workforce. Our guest is Chris Novak, Vice President of Global Cybersecurity Solutions at Verizon, sharing insights on their 2025 DBIR. DOGE downsizes, and the UAE recruits. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Chris Novak, Vice President of Global Cybersecurity Solutions at Verizon, sharing insights on their 2025 Data Breach Investigations Report (DBIR).Selected Reading Trump signs the Take It Down Act into law |(The Verge) Supplier to Tesco, Aldi and Lidl hit with ransomware (Computing) Fake KeePass password manager leads to ESXi ransomware attack (Bleeping Computer) Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers (Security Week) Threat Actors Deliver Bumblebee Malware Poisoning Bing SEO (Cybersecurity News) New Phishing Attack Poses as Zoom Meeting Invites to Steal Login Credentials (GB Hackers) CISA Adds Six Known Exploited Vulnerabilities to Catalog (CISA) Federal cyber workforce training institute eyed in bipartisan House bill (CyberScoop) UAE Recruiting US Personnel Displaced by DOGE to Work on AI for its Military (Zetter Sero Day) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Drone Radio Show
Training Tomorrow's Drone Pilots: Michael Hill, Unmanned Safety Institute

Drone Radio Show

Play Episode Listen Later May 20, 2025 33:53


Michael Hill is Program Manager of College Workforce Programs at the Unmanned Safety Institute.  The Unmanned Safety Institute or USI is an approved training partner of ASTM International and the International Business Aviation Council. The Institute is dedicated to improving safety in unmanned aviation by applying time-honored aviation safety practices to unmanned aircraft systems. USI accomplishes this mission by developing workforce readiness programs, providing training to UAS crews, and helping flight service providers meet their safety goals. Michael is a certified UAV pilot in three countries with over 6,000 flight hours and more than 7,800 successful, incident-free missions as a Remote Pilot-in-Command. He holds industry and safety certifications from FEMA, OSHA, NIST, and USI. He is a highly sought-after public speaker and industry influencer, passionate about sharing his expertise on UAV technology applications for land, air, and sea operations. He brings a wealth of experience to USI, including aerial mapping, telecom and wind turbine inspections, oil and gas and critical infrastructure assessments, search and rescue operations, as well as involvement with state and federal regulations. An active advocate for the drone industry, he has served as the Policy and Legislative Chairman for the North Central Texas Council of Governments UAS Taskforce and as the Training Officer for the North Texas Public Safety Unmanned Response Team.  Additionally, he holds the role of 2nd Lieutenant and the former Director of Unmanned Operations for the Texas Wing of the Civil Air Patrol. In this addition of the Drone Radio Show, Michael talks about the Unmanned Safety Institute and how it helps prepare students for viable careers in the drone industry.

AMERICA OUT LOUD PODCAST NETWORK
For every action there is inaction: Questions being raised about the fall of the Twin Towers

AMERICA OUT LOUD PODCAST NETWORK

Play Episode Listen Later May 14, 2025 58:00


The National Security Hour with Blanquita Cullum – Architects and engineers question how the Twin Towers collapsed in ‘essential free fall' despite Newton's Third Law. 18 years ago, a petition challenged NIST's report under the Information Quality Act, demanding explanations for total collapse. Join Blanquita Cullum with Richard Gage and Kamal Obeid as they probe hidden data and rare research into this mystery.

The National Security Hour
For every action there is inaction: Questions being raised about the fall of the Twin Towers

The National Security Hour

Play Episode Listen Later May 14, 2025 58:00


The National Security Hour with Blanquita Cullum – Architects and engineers question how the Twin Towers collapsed in ‘essential free fall' despite Newton's Third Law. 18 years ago, a petition challenged NIST's report under the Information Quality Act, demanding explanations for total collapse. Join Blanquita Cullum with Richard Gage and Kamal Obeid as they probe hidden data and rare research into this mystery.

RichardGage911:UNLEASHED!
Ray Doustdar // Deep Shallow Dive Podcast Interviews RG911!

RichardGage911:UNLEASHED!

Play Episode Listen Later May 14, 2025 80:42


In this conversation, Richard Gage, a renowned architect, discusses the events of 9/11, focusing particularly on the collapse of Building 7. He challenges the official narrative provided by NIST, presenting evidence that suggests controlled demolition rather than fire caused the building's collapse. Gage highlights eyewitness accounts of explosions, the role of thermite, and the destruction of evidence in the aftermath. He also explores the broader implications of 9/11, including motivations behind the attacks and their impact on global politics.takeaways9/11 was a pivotal event that shaped global politics.Building 7's collapse is often overlooked but crucial to understanding 9/11.The official narrative of the collapse is challenged by evidence of controlled demolition.Eyewitness accounts report explosions prior to the collapse of the buildings.Thermite may have been used in the demolition of the buildings.The destruction of evidence post-9/11 raises serious concerns about the investigation.Many architects and engineers demand a new investigation into 9/11.The motivations behind 9/11 include geopolitical and economic factors.The narrative of 9/11 has parallels with other global events, including COVID-19.Public awareness and critical thinking are essential in understanding historical events.titlesUnraveling 9/11: The Truth Behind Building 7The Collapse of Building 7: A Controlled Demolition?Sound Bites"The building came down at freefall.""Molten iron was found in the debris.""There was no plane that hit Building 7."Chapters00:00Introduction to 9/11 and Its Implications02:56The Collapse of Building 7: An Overview10:38Investigating the Official Narrative18:16Witness Accounts and Explosions30:40Thermite and the Evidence43:27Conclusion: Call for a New Investigation45:06Introduction to the Film Series on 9/1146:45Exploring the Mechanics of Building Collapse48:22Theories of Collapse: NIST vs. Controlled Demolition52:26Eyewitness Accounts of Explosions55:32Symmetry and Asymmetry in the Collapse01:01:28The Role of Concrete in the Collapse01:04:33Access and Preparation for Demolition01:10:47Destruction of Evidence and Its Implications01:14:32Motivations Behind 9/11: A Broader Perspective01:17:14Parallels Between 9/11 and COVID-1901:20:23YOUTUBE - OUTRO (NEW).mp4 Visit us at RichardGage911.orgSupport the show

RichardGage911:UNLEASHED!
Jimmy Dore Interviewed RG911 & AE911 — WTC Explosive Evidence on 9/11!

RichardGage911:UNLEASHED!

Play Episode Listen Later May 14, 2025 43:59


 Bringing Tens of Thousands of Newcomers to the 9/11 Truth | Watch Along with Them! — 45 Minutes  Jimmy Dore posted today our LIVE interview with him from the other day! He encouraged us to share all the evidence we could in our limited time with him, and we did!  I was joined by structural engineer Kamal Obeid from Architects & Engineers for 9/11 Truth who addressed key issues including the impossibility of the free-fall collapse of World Trade Center Building 7. We addressed as many key points as we possibly could in the 45 minutes that we had:The importance of the truth-telling that WI Senator Ron Johnson and former Congressman Curt Weldon are all about right now. Jimmy played excerpts of the Senator's WTC comments on The Benny Show including “molten metal…controlled demolition…Calling Out Bravo 7 documentary.” We are making sure that the Senator has the solid body of evidence that will back up his historic efforts to get a real 9/11 investigation. The more you help us, the more we can help the VIP's who have the courage to speak out!We addressed these questions among many others on Jimmy Dore:Why didn't the American Institute of Architects issue even one bulletin on the catastrophic unprecedented destruction of 47-story World Trade Center Building 7 — the third worst structural failure in history?Why didn't NIST (National Institute of Standards & Technology) include in their 2004 report on the Twin Towers the 156 first responders who saw, heard, and experienced explosions? And, many of them before the collapse of the towers?Why did NIST persist with their theory that the top section crushed the building section below while maintaining a near free-fall acceleration (when the top section was in fact destroyed in the first 3 seconds) — as if 90% of the steel gave no resistance whatsoever?What caused the hundreds of laterally-ejected freely-flying 4-ton structural steel sections, at 80mph, landing 600 feet in every direction impaling themselves in skyscrapers all around them?What cause the complete pulverization of 110 acre-sized concrete floors — 90,000 tons of concrete in each tower, and dispersed it from river to river across Lower Manhattan?What was crushing the lower section of each tower, if the above steel and concrete, which was 2/3 of their weight, was NOT even available to crush it?!The above questions were just the beginning of the 7-dozen key points of forensic, video, and eyewitness testimony we laid on Jimmy. Please let us know how you think we did. There's always room for improvement. Visit us at RichardGage911.orgSupport the show

Analytically Speaking
Ep. 36: A Day in the Life of a NIST Scientist

Analytically Speaking

Play Episode Listen Later May 14, 2025 49:43


In this episode, podcast co-hosts Dr. Dwight Stoll and Dr. James Grinias talk with Dr. Alix Rodowa, Research Chemist within the Organic Chemical Metrology Group at the National Institute of Standards & Technology (NIST) in Gaithersburg, Maryland. At NIST, she is the Environmental Sector Task Lead for the Organic Analysis Working Group for the Consultative Committee for Amount of Substance: Metrology in Chemistry and Biology (or CCQM). After discussing some of the events that sparked Dr. Rodowa's interest in science, and analytical chemistry in particular, we discuss her path to a career as a NIST scientist, including cold-emailing potential research advisors, and an experience as a National Research Council (NRC) postdoctoral fellow. We then discuss her work on polyfluoroalkyl substances (PFAS), including the development of the PFAS Interference List - affectionately known as the “PIL” - and the development of a Standard Reference Material (SRM) for that research area. We also touch on emerging uses of machine learning in workflows for analytical target and suspect screening. Finally, Alix provides some insight into a day in the life of a NIST scientist, why she enjoys working in a government laboratory, and how aspiring scientists can explore this environment as a potential career option.

The Gate 15 Podcast Channel
Weekly Security Sprint EP 111. Ransomware, Extremist reporting, plus the future of FEMA support, and geopolitical impacts

The Gate 15 Podcast Channel

Play Episode Listen Later May 13, 2025 20:12


On this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:• ICYMI: REGISTER NOW! WaterISAC's 2025 H2OSecCon! (20 May) From cybersecurity to climate resilience, operational continuity to public trust, we must collaborate across sectors to build smarter, stronger, and more adaptive systems. That's why we're inviting leaders like you to join the WaterISAC's 2025 H2OSecCon. Connect with peers and leaders committed to enhancing the resilience of our nation's critical systems.Main Topics:Ransomware & Data Breaches: • Monday was Anti-Ransomware Day 2025! What a great time to invest in ransomware resilience! Contact Gate 15 today to get to work building your Cyber Incident Response Plan and ransomware procedures, to start planning your next ransomware workshop or tabletop exercise, to plan for post-incident analysis or to take advantage of our new very price-friendly ransomware exercise for executives – designed especially for small and medium businesses! • Explore the latest cyber risks and claims trends from Coalition. LockBit ransomware gang hacked, victim negotiations exposed• Reminder! Criminals lie and NEVER DELETE YOUR DATA! School boards hit with ransom demands linked to PowerSchool cyberattack• M&S 'had no plan' for cyber attacks, insider claims, with 'staff left sleeping in the office amid paranoia and chaos' • The Very Real Costs of Ransomware: IT warning after hackers close 160-year-old firm. Extremism:• Ohio Man Charged with Threatening State Public Officials • Texas Man Convicted of Making Threats to Kill Nashville District Attorney Glenn Funk • FBI has opened 250 investigations tied to violent online network '764' that preys on teens, top official says• Teenage Terrorists Are a Growing Threat to Europe's SecurityUSG Transitions• Trump's 2026 budget proposes $163 billion cut to non-defense spending, slashes CISA and FEMA funding• White House Proposes $500 Million Cut to CISA• Hegseth orders Pentagon to cut number of senior generals by 20%• Lawmakers question Noem over cuts to CISA, FEMA, TSA• Lawmakers grill Noem over CISA funding cuts, demand Trump cyber plan• NSA to cut up to 2,000 civilian roles as part of intel community downsizing• NIST loses key cyber experts in standards and researchIndia strikes Pakistan over tourist killings, Pakistan says it will retaliate• Kashmir crisis live: Pakistan PM authorises armed forces to undertake ‘corresponding action' after India strikes kill 26• Pakistan vows to respond after India launches strikes in wake of Kashmir massacre• Pakistan claims to have downed Indian warplanes, vows response to strikes• China urges restraint as India-Pakistan tensions escalate with military strikes• A Timeline of Tensions Between India and Pakistan Over Kashmir• India, Pakistan accuse each other of attacks as hostilities rise• AlQaeda Statement On Indian Strikes In PakistanQuick Hits:• Crypto millionaires targeted in brutal kidnappings across France and Europe; Attackers' modus operandi: cutting off victims' fingers to pressure payments. • The father of a cryptocurrency entrepreneur was kidnapped in Paris and found held captive with his finger severed. (article in French)• Assessing the U.S. Climate in April 2025Assessing the U.S. Climate in April 2025• FBI PSA - Cyber Criminal Proxy Services Exploiting End of Life Routers• FBI FLASH: Cyber Criminal Services Target End-of-Life Routers to Launch Attacks and Hide Their Activities (PDF)• Risky Bulletin: France says Russian influence operations are getting better, achieving results• Unsophisticated Cyber Actor(s) Targeting Operational Technology • Primary Mitigations to Reduce Cyber Threats to Operational Technology• US Warns of Hackers Targeting ICS/SCADA at Oil and Gas Organizations• Primary Mitigations to Reduce Cyber Threats to Operational Technology• UK NCSC: UK pioneering global move away from passwords• Classic Rock - Hunting A Botnet That Preys On The Old

Dvojka
Na cestách s Petrem Voldánem: Magickým Himálajem, ale i Bhútánem či Afghánistánem s fotografem a horolezcem Rudolfem Švaříčkem

Dvojka

Play Episode Listen Later May 12, 2025 28:51


S cestovatelem, fotografem, horolezcem - zkrátka extrémním dobrodruhem a světoběžníkem Rudolfem Švaříčkem se vydáme hlavně do Himálaje, ale také do rozporuplného Afghánistánu. Navíc se s mým hostem u mikrofonu pořadu “Na cestách s Petrem Voldánem” podrobněji podíváme i do jím velice oblíbeného - kdežto mnoha z nás zatím trochu neznámého - Bhútánu.

Hradec Králové
Na cestách s Petrem Voldánem: Magickým Himálajem, ale i Bhútánem či Afghánistánem s fotografem a horolezcem Rudolfem Švaříčkem

Hradec Králové

Play Episode Listen Later May 12, 2025 28:51


S cestovatelem, fotografem, horolezcem - zkrátka extrémním dobrodruhem a světoběžníkem Rudolfem Švaříčkem se vydáme hlavně do Himálaje, ale také do rozporuplného Afghánistánu. Navíc se s mým hostem u mikrofonu pořadu “Na cestách s Petrem Voldánem” podrobněji podíváme i do jím velice oblíbeného - kdežto mnoha z nás zatím trochu neznámého - Bhútánu.

Effective Altruism Forum Podcast
“Please Donate to CAIP (Post 1 of 3 on AI Governance)” by Jason Green-Lowe

Effective Altruism Forum Podcast

Play Episode Listen Later May 11, 2025 60:04


I am Jason Green-Lowe, the executive director of the Center for AI Policy (CAIP). Our mission is to directly convince Congress to pass strong AI safety legislation. As I explain in some detail in this post, I think our organization has been doing extremely important work, and that we've been doing well at it. Unfortunately, we have been unable to get funding from traditional donors to continue our operations. If we don't get more funding in the next 30 days, we will have to shut down, which will damage our relationships with Congress and make it harder for future advocates to get traction on AI governance. In this post, I explain what we've been doing, why I think it's valuable, and how your donations could help. This is the first post in what I expect will be a 3-part series. The first post focuses on CAIP's particular need [...] ---Outline:(01:33) OUR MISSION AND STRATEGY(02:59) Our Model Legislation(04:17) Direct Meetings with Congressional Staffers(05:20) Expert Panel Briefings(06:16) AI Policy Happy Hours(06:43) Op-Eds & Policy Papers(07:22) Grassroots & Grasstops Organizing(09:13) Whats Unique About CAIP?(10:26) OUR ACCOMPLISHMENTS(10:29) Quantifiable Outputs(11:21) Changing the Media Narrative(12:23) Proof of Concept(13:44) Outcomes -- Congressional Engagement(18:29) Context(19:54) OUR PROPOSED POLICIES(19:58) Mandatory Audits for Frontier AI(21:23) Liability Reform(22:32) Hardware Monitoring(24:11) Emergency Powers(25:31) Further Details(25:41) RESPONSES TO COMMON POLICY OBJECTIONS(25:46) 1. Why not push for a ban or pause on superintelligence research?(30:17) 2. Why not support bills that have a better chance of passing this year, like funding for NIST or NAIRR?(32:30) 3. If Congress is so slow to act, why should anyone be working with Congress at all? Why not focus on promoting state laws or voluntary standards?(35:09) 4. Why would you push the US to unilaterally disarm? Don't we instead need a global treaty regulating AI (or subsidies for US developers) to avoid handing control of the future to China?(37:24) 5. Why haven't you accomplished your mission yet? If your organization is effective, shouldn't you have passed some of your legislation by now, or at least found some powerful Congressional sponsors for it?(40:56) OUR TEAM(41:53) Executive Director(44:04) Government Relations Team(45:12) Policy Team(46:08) Communications Team(47:29) Operations Team(48:11) Personnel Changes(48:49) OUR PLAN IF FUNDED(51:58) OUR FUNDING SITUATION(52:02) Our Expenses & Runway(53:02) No Good Way to Cut Costs(55:22) Our Revenue(57:02) Surprise Budget Deficit(59:00) The Bottom Line--- First published: May 7th, 2025 Source: https://forum.effectivealtruism.org/posts/9uZHnEkhXZjWzia7F/please-donate-to-caip-post-1-of-3-on-ai-governance --- Narrated by TYPE III AUDIO.

web3 with a16z
Quantum Computing: What, When, Where, How

web3 with a16z

Play Episode Listen Later May 8, 2025 75:13


with @danboneh @succinctJT @smc90This episode is all about quantum computing -- explaining what it is, how it works, what's hype vs. reality, and how to prepare for it/ what builders should do. Specifically, we cover: What quantum computing is and isn't, and what people are really talking about when they worry about a quantum computer that can break classic computing-based cryptography systems -- a cryptographically relevant post-quantum computer.When is it happening/ what are the "timelines" for quantum computing becoming a reality -- how many years away are we? -- and when are the U.S. government's deadlines/ NIST standards for post-quantum cryptography?How will different types of cryptography be affected, or not? What are different approaches and tradeoffs?Where does quantum computing and post-quantum crypto apply to blockchains -- which are not only more easily upgradable, but also by and large rely on signatures, not encryption, so may be more quantum-resistant in many ways (and not in others).As always, we tease apart the signal vs. the noise in recent "science-by-press release" corporate quantum-computing milestone announcements. We also help answer questions on when do builders need to plan their switch to a post-quantum crypto world, what pitfalls to avoid there (hint: bugs! software upgrades!). Finally, we briefly cover different approaches to post-quantum crypto; and also dig deeper on zero-knowledge/ succinct-proof systems and how they relate to post-quantum crypto. Our expert guests are: Dan Boneh, Stanford University professor and applied cryptography expert and pioneer; also Senior Research Advisor to a16z crypto;Justin Thaler, research partner at a16z, professor at Georgetown, and longtime expert and pioneer in interactive and ZK proof systems.SEE ALSO: Post-quantum blockchains by Valeria Nikolaenkomore resources + papers on topics mentioned:A Graduate Course in Applied Cryptography by Dan Boneh and Victor Shoup [see also]Proofs, Arguments, and Zero-Knowledge by Justin ThalerLatticeFold+: Faster, Simpler, Shorter Lattice-Based Folding for Succinct Proof Systems by Dan Boneh and Binyi ChenNeo: Lattice-based folding scheme for CCS over small fields and pay-per-bit commitments by Wilson Nguyen and Srinath Setty"Q-Day Clock" from Project Eleven -- public dashboard to visually track timeline for quantum computing to reach cryptographically relevant capabilities and break widely used encryption algorithmson hard forks for quantum emergenciesQuantum analysis of AES, Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Gyeongju Song, Hwajeong Seo, Anupam ChattopadhyayThe Google Willow Thing by Scott AaronsonFAQs on Microsoft's topological qubit thing by Scott AaronsonMicrosoft's claim of a topological qubit faces tough questions, American Physical SocietyAs a reminder, none of this is investment, business, legal, or tax advice; please see a16z.com/disclosures for more important information including a link to our investments.

Afternoon Drive with John Maytham
Factory reset fallacy: Why your data's is still at risk

Afternoon Drive with John Maytham

Play Episode Listen Later May 7, 2025 7:55


John Maytham is joined by Tech Journalist and Editor and Publisher of Stuff, Toby Shapshak, to unpack the hidden risks of discarding or selling old electronic devices. Despite factory resets, studies show that personal data — including passports, medical records, and passwords — often remains recoverable on second-hand electronics. Follow us on:CapeTalk on Facebook: www.facebook.com/CapeTalkCapeTalk on TikTok: www.tiktok.com/@capetalkCapeTalk on Instagram: www.instagram.com/capetalkzaCapeTalk on YouTube: www.youtube.com/@CapeTalk567CapeTalk on X: www.x.com/CapeTalkSee omnystudio.com/listener for privacy information.

ChinaTalk
America's R&D Reckoning

ChinaTalk

Play Episode Listen Later May 6, 2025 71:52


What has happened in the past 100 days to America's science and technology ecosystem? What are China's ambitions and how is the government trying to take advantage of American uncertainty? And what can we learn from China's war mobilization exercises? To explore these questions, we're joined by Divyansh Kaushik and Alex Rubin, who both work at Beacon Global Strategies. Divyansh holds an AI PhD from Carnegie Mellon, and Alex spent the past decade at the CIA focusing on China and emerging technologies. We discuss… The Historical origins of the US R&D model, and the division of labor between universities, government, and industry, How budget cuts will impact the NSF, NIH, NIST, and DoD basic research, Why and how China attempts to emulate US research institutions, What a leaked wargame exercise from Guangdong province can tell us about China's grand strategy, How institutions like ChinaTalk can complement the IC with fresh, independent research. Outro music: The Elements - Tom Lehrer (YouTube Link) Learn more about your ad choices. Visit megaphone.fm/adchoices

ChinaEconTalk
EMERGENCY POD: America's R&D Edge in the Balance

ChinaEconTalk

Play Episode Listen Later May 2, 2025 71:52


What has happened in the past 100 days to America's science and technology ecosystem? What are China's ambitions and how is the government trying to take advantage of American uncertainty? And what can we learn from China's war mobilization exercises? To explore these questions, we're joined by Divyansh Kaushik and Alex Rubin, who both work at Beacon Global Strategies. Divyansh holds an AI PhD from Carnegie Mellon, and Alex spent the past decade at the CIA focusing on China and emerging technologies. We discuss… The Historical origins of the US R&D model, and the division of labor between universities, government, and industry, How budget cuts will impact the NSF, NIH, NIST, and DoD basic research, Why and how China attempts to emulate US research institutions, What a leaked wargame exercise from Guangdong province can tell us about China's grand strategy, How institutions like ChinaTalk can complement the IC with fresh, independent research. Outro music: The Elements - Tom Lehrer (YouTube Link) Learn more about your ad choices. Visit megaphone.fm/adchoices

Joey Pinz Discipline Conversations
#606 Josh Hoffman:

Joey Pinz Discipline Conversations

Play Episode Listen Later Apr 30, 2025 71:53 Transcription Available


Send us a text⚾ In this engaging episode of Joey Pinz Conversations, we dive deep into the timeless debates of baseball and business with guest Josh Hoffman. From the designated hitter controversy to modern rule changes, Joey and Josh reminisce about iconic players like Yaz, Otani, and Thurman Munson while exploring how baseball's evolution mirrors today's shifting business landscape.But the conversation doesn't stop at the ballpark!

Zero Knowledge
Lattice-based ZK Systems with Vadim Lyubashevsky

Zero Knowledge

Play Episode Listen Later Apr 30, 2025 65:14


In this episode, Anna and Nico speak with Vadim Lyubashevsky, research scientist at IBM Research, about the evolving field of lattice-based cryptography and its role in zero-knowledge systems. Vadim shares the history and mathematical foundations of lattices, and explains how they might be used to build post-quantum secure ZK proofs and SNARKs. The conversation covers the unique challenges of adapting lattice techniques to zero-knowledge, explores the tradeoffs relative to hash-based constructions, and highlights the importance of developing quantum-safe standards for the future of cryptography. Related links: Episode 345: Latest ZK Research with Dan Boneh Episode 288: Quantum Cryptography with Or Sattath LaBRADOR: Compact Proofs for R1CS from Module-SIS⋆ IBM's post-quantum NIST published standards Project11 Minkowski's Geometry of Numbers LLL reduction Shortest vector problem Basic Lattice Cryptography: The concepts behind Kyber (ML-KEM) and Dilithium (ML-DSA) by Vadim Lyubashevsky Spots for zkSummit13 are limited - grab your ticket at www.zksummit.com! Missing Link are a talent team built for the Web3 era, helping projects across the ecosystem connect with the right candidates at the right time. Whether you're an established project or a startup searching for specialized talent, Missing Link can help. Visit their website at missing-link.io.  **If you like what we do:** * Find all our links here!

Metrology Today Podcast
Metrology Today Podcast S4E3: Rob Knake, NIST

Metrology Today Podcast

Play Episode Listen Later Apr 30, 2025 74:08


Rob Knake is a professional specializing in quality systems, metrology, and standards development. He is actively employed with the National Institute of Standards and Technology (NIST) and involved with NCSL International, where he contributes to training, technical exchanges, and the advancement of measurement science. With expertise in ISO/IEC 17025, measurement traceability, and laboratory accreditation, Rob frequently leads seminars and workshops aimed at enhancing metrology practices. His roles encompass coaching, public speaking, and organizational leadership, focusing on improving quality systems and fostering collaboration within the metrology community. Rob's professional endeavors are highlighted through his active participation in events like the NCSL International Technical Exchange and the MSC Annual Training Symposium. His contributions have been recognized in various capacities, including hosting sessions and delivering presentations on metrology and digitalization topics. For more detailed information about Rob Knake's professional background and contributions, you can visit his LinkedIn profile.

Federal Drive with Tom Temin
The Federal Drive with Tom Temin -- Wednesday, April 30, 2025

Federal Drive with Tom Temin

Play Episode Listen Later Apr 30, 2025 86:07


Today on the Federal Drive with Tom Temin -- Wednesday, April 30, 2025 NIST looks to improve security of a foundation pillar of the internetService members children have special needs, too A new wrinkle on the notion of postponing your federal retirement A behind the scenes look as Tom retires from "The Federal Drive"See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

nist federal drive tom temin
Federal Drive with Tom Temin
NIST looks to improve security of a foundation pillar of the internet

Federal Drive with Tom Temin

Play Episode Listen Later Apr 30, 2025 9:58


Without a secure domain name system, the interview doesn't really have any security at all. Now the National Institute of Standards and Technology has revised its Secure DNS deployment guide, and seeks public comments. For more on the importance of the DNS and what's in special publication 800-81 revision 3, we turn to one of its principal authors, Cricket Liu.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Vanderpump Robs
Next Level Rage Texts (Vanderpump Rules S8E3) with Theresa Nist

Vanderpump Robs

Play Episode Listen Later Apr 24, 2025 34:58


Stassi throws a book party at TomTom but excludes Tom Sandoval from the planning; Sandoval rage texts her... Support Vanderpump Robs https://patreon.com/vanderpumprobs Brought to you By: The Sonar Network https://thesonarnetwork.com/

KGNU - How On Earth
De-funding NIST’s Atomic Spectroscopy Group

KGNU - How On Earth

Play Episode Listen Later Apr 22, 2025 26:57


Federal cutbacks have led the National Institute of Standards and Technology to shut down a long-running, highly prized information center used by scientists around the world, for projects ranging from searching for exoplanets, to making better microchips, to detecting atomic missiles.   Atomic Spectroscopy Database Manager Alexander Kramida explains the purpose of the Atomic Spectroscopy … Continue reading "De-funding NIST's Atomic Spectroscopy Group"

Chattinn Cyber
The Currency of Trust: Navigating CMMC with Mark Jackolski

Chattinn Cyber

Play Episode Listen Later Apr 22, 2025 9:09


Summary In this episode of Chattinn Cyber, cybersecurity expert Mark Jackolski, Director of Risk and Compliance at Show Proof, shares his journey from Long Island technician to national leader in cyber compliance. With a foundation in information systems from Stony Brook University, Mark discusses how his passion for technology evolved into a career focused on helping organizations meet rising cybersecurity standards. The heart of the conversation is the Cybersecurity Maturity Model Certification (CMMC), a framework initiated by the Department of Defense to ensure that contractors protect controlled unclassified information. Mark explains that while compliance with NIST 800-171 has been required since 2017, CMMC introduces verification—organizations must now demonstrate their cybersecurity posture through third-party assessments to remain eligible for federal contracts. Beyond meeting DoD requirements, Mark describes how CMMC builds reputational credibility, calling it “the currency of trust.” He emphasizes the strategic advantage of showing compliance through a recognized badge rather than repeated explanations, which streamlines the contracting process and establishes confidence with partners and clients. When asked how organizations should begin preparing, Mark advises starting with people: appointing a program leader, engaging executive buy-in, and mapping where sensitive data flows. He warns against relying on underqualified partners and stresses the importance of assessing technical, administrative, and physical requirements early. Missteps—like poor documentation or unclear scoping—can lead to wasted time and resources. Finally, Mark highlights the growing relevance of CMMC beyond the DoD. New regulations aim to standardize data protection across all federal agencies, meaning businesses even tangentially involved in government work may soon fall under its scope. As CMMC requirements become embedded in contracts by summer 2025, organizations that prepare now will gain a competitive edge in the expanding defense and government market. 5 Key Points CMMC Explained: The Cybersecurity Maturity Model Certification verifies that organizations working with the Department of Defense meet NIST 800-171 cybersecurity standards. Strategic Advantage: Earning CMMC builds trust and provides a significant edge in securing government contracts by signaling a strong cybersecurity posture. Preparation Starts with People: A successful CMMC journey begins by appointing accountable personnel, securing executive alignment, and clearly mapping the flow of controlled unclassified information (CUI). Pitfalls and Guidance: Common mistakes include working with unqualified providers and underestimating documentation requirements. Mark recommends finding certified experts through the Cyber AB marketplace. Growing Scope: CMMC will expand beyond the DoD to other government agencies, making early adoption a strategic move even for subcontractors or non-defense contractors. 5 Key Quotes “It's the currency of trust.” – Mark on how CMMC serves as a reputation badge in the defense industry. “Start by appointing somebody to oversee the entire process.” – On the critical role of leadership in compliance efforts. “Documentation is key—not just technical controls, but the processes and people behind them.” “If you're going to develop a policy or some other procedure, there has to be buy-in from the organization.” “CMMC started with the DoD, but it's going to expand to other government agencies. This is just the beginning.” About Our Guest Mark Jackolski is a creative and team-oriented cybersecurity professional with a deep-seated passion for technology. He specializes in assisting small to medium-sized businesses in enhancing their security posture and achieving compliance with industry standards. With a persistent drive to deliver exceptional results, Mark offers strategic virtual Chief Information...

@BEERISAC: CPS/ICS Security Podcast Playlist
Simplifying OT Cybersecurity: Tools and Strategies for Non-Experts in Critical Infrastructure with Steve Kiss

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Apr 22, 2025 61:41


Podcast: PrOTect It All (LS 25 · TOP 10% what is this?)Episode: Simplifying OT Cybersecurity: Tools and Strategies for Non-Experts in Critical Infrastructure with Steve KissPub date: 2025-04-21Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of Protect It All, host Aaron Crow sits down with Steve Kiss, founder and CEO of IPMeter, for an eye-opening discussion on the future of OT (Operational Technology) and IT cybersecurity. With over 25 years of hands-on experience, Steve shares his journey from network engineering to designing practical cybersecurity tools for real-world OT environments. They dive into the unique challenges faced by operators in sectors like wastewater treatment, building management, and power utilities—where frontline professionals often shoulder critical cybersecurity responsibilities without formal training or extensive resources. Steve and Aaron emphasize the urgent need for simple, scalable, and reliable tools that empower these “full stack” operators to secure critical infrastructure effectively. From bridging the IT-OT divide to managing legacy system risks and improving procurement practices, this conversation offers actionable insights for municipalities, utilities, and smaller organizations aiming to take greater ownership of their cyber defenses. Packed with real-world examples, strategic advice, and a touch of industry humor, this episode is essential listening for anyone focused on protecting essential services and strengthening community resilience. Key Moments:  10:40 Understanding Factory Acceptance Test (FAT) 16:41 Transitioning to Local Water Management 19:52 Compliance and Cybersecurity Standards 25:03 "Digital Spins on Security Concepts" 32:30 Standardizing Power Systems Configurations 35:00 Basic Security Steps for Operators 40:28 Balancing IoT Features and Control 45:01 Durability and Setup for Rail Tech 48:58 "Basic Network Foundations Needed" 54:35 Wastewater's Overlooked Importance About the guest:    Steve Kiss is a seasoned cybersecurity leader with over two decades of experience in engineering, infrastructure security, and strategic leadership. As the inventor of IPMeter™ and a contributor to the NIST 800-53 SP2 standards, he has played a pivotal role in advancing vulnerability management practices. Throughout his career, Steve has been deeply involved in the design, construction, and security of critical infrastructure across sectors such as aviation, defense, data centers, and utilities.  His expertise uniquely bridges the worlds of operational technology (OT) and information technology (IT), addressing the evolving challenges of modern network environments. In addition to founding multiple companies focused on infrastructure security, Steve regularly shares his insights at industry events, including the IMRON Security & Safety Summit at SoFi Stadium.  He also publishes a weekly newsletter, HOTw (Hack of the Week), spotlighting trends and incidents in OT cybersecurity. Through his latest venture, IPMeter, Steve continues to drive innovation in cybersecurity testing and resilience.   How to connect Steve :    Website for IPMeter www.ipmeter.net   LinkedIn https://www.linkedin.com/in/stevekiss/   Blog (once to twice a month- includes HOTw (IoT hack of the week) https://www.ipmeter.net/blog   Contact for IPMeter demos sales@ipmeter.net   Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast    To be a guest or suggest a guest/episode, please email us at info@protectitall.co   Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

KuppingerCole Analysts
Analyst Chat #250: Introducing the KuppingerCole Cybersecurity Fabric

KuppingerCole Analysts

Play Episode Listen Later Apr 22, 2025 15:15


One does not simply secure an enterprise without integration. In this episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth sits down with cybersecurity expert Jonathan Care to explore the Cybersecurity Fabric — an emerging architectural concept designed to unify existing security tools, improve visibility, and enable automation and orchestration across your entire IT environment. Discover how this approach complements frameworks like Zero Trust and NIST, what benefits it brings to your organization, and how it can evolve alongside your security maturity.

Cybercrime Magazine Podcast
Quantum Minute. Post-Quantum Encryption: NIST Picks HQC. Sponsored by Applied Quantum.

Cybercrime Magazine Podcast

Play Episode Listen Later Apr 17, 2025 1:57


The U.S. National Institute of Standards and Technology (NIST) has selected the Hamming Quasi-Cyclic (HQC) algorithm as a backup post-quantum encryption standard, adding a fifth quantum-resistant tool to its lineup of post quantum cryptography (PQC) standards. Unlike the primary standard ML-KEM – which is based on a complex type of multi-dimensional modelling called lattice mathematics – HQC uses code-based cryptography, offering an alternative defense in case future quantum breakthroughs threaten the integrity of lattice-based systems. HQC emerged from NIST's fourth round of evaluation, where it outperformed similar candidates like BIKE and Classic McEliece due to its strong security and practical performance. You can listen to all of the Quantum Minute episodes at QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.

Security Visionaries
Grappling with Global Regulations in the Defence Industry

Security Visionaries

Play Episode Listen Later Apr 15, 2025 20:16


In this episode of the Security Visionaries podcast, host Bailey Harmon interviews Dan Whittingham, Enterprise Security Architect for Cyber Tooling at Rolls-Royce. Dan shares his extensive experience navigating the complex landscape of global compliance standards in the defense and aerospace industry. They discuss key regulations like Cyber Essentials Plus, NIST 2, ERSA, and CMMC, the challenges of balancing compliance with business needs, and Dan's advice for other security leaders. Tune in to hear insights on managing regulations, communicating with leadership, and the future of security in the age of AI.

Dell Technologies Power2Protect Podcast
Episode 109: Building an Unbreakable Cyber Resilience Posture

Dell Technologies Power2Protect Podcast

Play Episode Listen Later Apr 15, 2025 40:34


Explore actionable strategies for building a robust cyber resilience posture in this insightful episode. From strengthening defenses to improving recovery agility and anticipating future cybersecurity trends, this conversation delivers practical insights to help you stay a step ahead in protecting your digital landscape.

Storm⚡️Watch by GreyNoise Intelligence
2025 Cyber Breakdown: CrushFTP Chaos, NVD Crisis & North Korean Threats

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Apr 8, 2025 62:12


Forecast: Patchy with a 32% backlog surge, CVE squalls causing auth bypass showers, and Lazarus fronts looming—keep your threat umbrellas handy!"

Packet Pushers - Full Podcast Feed
NB521: Optics Advances in the Data Center; Google Extends Gmail's End-to-End Encryption

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Apr 7, 2025 42:55


Take a Network Break! We check in on a serious Firefox vulnerability, explore NIST’s latest post-quantum encryption algorithm, and discuss a broken auto-update functionality in VMware Workstation. NetBox adds config drift detection to its network automation software, the startup Lightmatter tackles co-packaged optics, and Corning launches Glassworks AI in a bid to replace copper cabling... Read more »

Packet Pushers - Network Break
NB521: Optics Advances in the Data Center; Google Extends Gmail's End-to-End Encryption

Packet Pushers - Network Break

Play Episode Listen Later Apr 7, 2025 42:55


Take a Network Break! We check in on a serious Firefox vulnerability, explore NIST’s latest post-quantum encryption algorithm, and discuss a broken auto-update functionality in VMware Workstation. NetBox adds config drift detection to its network automation software, the startup Lightmatter tackles co-packaged optics, and Corning launches Glassworks AI in a bid to replace copper cabling... Read more »

Packet Pushers - Fat Pipe
NB521: Optics Advances in the Data Center; Google Extends Gmail's End-to-End Encryption

Packet Pushers - Fat Pipe

Play Episode Listen Later Apr 7, 2025 42:55


Take a Network Break! We check in on a serious Firefox vulnerability, explore NIST’s latest post-quantum encryption algorithm, and discuss a broken auto-update functionality in VMware Workstation. NetBox adds config drift detection to its network automation software, the startup Lightmatter tackles co-packaged optics, and Corning launches Glassworks AI in a bid to replace copper cabling... Read more »

Deep State Radio
Siliconsciousness: The AI Competition: Public Policy Strategies: Part 2

Deep State Radio

Play Episode Listen Later Apr 4, 2025 36:33


Welcome to part 2 of our special event, “The AI Competition: Public Policy Strategies”. The event, co-hosted by MIT Technology Review, brings together some of the leading voices in AI policy from the public and private sectors to role-play these complex issues. These AI leaders play roles in the US, China, and The EU, and enact policies that best align with their roles interests in the AI space. This episode contains the second and final phase of the game. We hope you enjoy this insightful episode.  Our Players: US Government Players White House (NSA, AI & Crypto Czar, Assistant to Pres. For S&T) - Doug Calidas, Senior Vice President of Government Affairs for Americans for Responsible Innovation (ARI) Government research institutions (funding) - Stephen Ezell Standards and governance (NIST, DOS, etc.) - Vivek Wadhwa, Adjunct Professor at Carnegie Mellon's School of Engineering at Silicon Valley Regulatory and trade (DOS, Treasury, etc.) - Susan Ariel Aaronson, American author, public speaker, and GWU professor Department of Defense- Daniel Castro, vice president at the Information Technology and Innovation Foundation (ITIF) Commerce Department - Anupam Chander, Scott K Ginsburg Professor of Law at Georgetown University Law Center Intel Community and Cyber Defense - David Mussington, professor of the practice the University of Maryland School of Public Policy, and currently serves as the CISA Executive Assistant Director Congress/State Department -  Cameron Kelly,  Distinguished Visiting Fellow, Brookings Institutution China players Central Military Committee representatives - Rohit Talwar, founder of FastFuture Intelligence and cyber - Daniel Richardson, President of Indepth Global AI  Public/Private Industry - Sarah Myers West, co-director at AI Now Ministry of Science and Technology (MOST)/Ministry of Industry and Information technology (MIIT) - David Lin, Senior Director for Future Technology Platforms at the Special Competitive Studies Project (SCSP) European Union Governance- Courtney Radsch, Director, Center for Journalism and Liberty at Open Markets Institute Military/Security - Gordon LaForge, senior policy analyst at New America Regulatory - Michelle Nie, EU Tech Policy Fellow at the Open Markets Institute Industrial and research policy - David Goldston, director of government affairs at the Natural Resources Defense Council Intelligence Agencies - Rumman Chowdhury, scientist, entrepreneur, and former responsible artificial intelligence lead at Accenture Civil Society  Large players (ChatGPT, META, Amazon, Microsoft) - Cody Buntain, Assistant Professor; Affiliate Fellow, UMD Honors College – Artificial Intelligence Cluster Medium players - Ramayya Krishnan, Dean, Heinz College Of Information Systems And Public Policy at Carnegie Mellon University Open-source communities - Jay Lee, Clark Distinguished Chair Professor and Director of Industrial AI Center in the Mechanical Engineering Dept. of the Univ. of Maryland College Park Advocacy Organizations - David Goldston, director of government affairs at the Natural Resources Defense Council  Legal Community - Kahaan Mehta, Research Fellow at the Vidhi Centre for Legal Policy  Universities and academia Large universities - Nita Farahany, Robinson O. Everett Distinguished Professor of Law at Duke Law Smaller schools - Anand Patwardhan, professor in the School of Public Policy at the University of Maryland Medium Universities - Elizabeth Bramson-Boudreau, CEO and Publisher at MIT Technology Review Government laboratories (Defense, DOE, etc.) - Emily M. Bender, University of Washington Professor This material is distributed by TRG Advisory Services, LLC on behalf of the Embassy of the United Arab Emirates in the U.S.. Additional information is available at the Department of Justice, Washington, DC. Learn more about your ad choices. Visit megaphone.fm/adchoices

Deep State Radio
Siliconsciousness: The AI Competition: Public Policy Strategies: Part 2

Deep State Radio

Play Episode Listen Later Apr 4, 2025 36:33


Welcome to part 2 of our special event, “The AI Competition: Public Policy Strategies”. The event, co-hosted by MIT Technology Review, brings together some of the leading voices in AI policy from the public and private sectors to role-play these complex issues. These AI leaders play roles in the US, China, and The EU, and enact policies that best align with their roles interests in the AI space. This episode contains the second and final phase of the game. We hope you enjoy this insightful episode.  Our Players: US Government Players White House (NSA, AI & Crypto Czar, Assistant to Pres. For S&T) - Doug Calidas, Senior Vice President of Government Affairs for Americans for Responsible Innovation (ARI) Government research institutions (funding) - Stephen Ezell Standards and governance (NIST, DOS, etc.) - Vivek Wadhwa, Adjunct Professor at Carnegie Mellon's School of Engineering at Silicon Valley Regulatory and trade (DOS, Treasury, etc.) - Susan Ariel Aaronson, American author, public speaker, and GWU professor Department of Defense- Daniel Castro, vice president at the Information Technology and Innovation Foundation (ITIF) Commerce Department - Anupam Chander, Scott K Ginsburg Professor of Law at Georgetown University Law Center Intel Community and Cyber Defense - David Mussington, professor of the practice the University of Maryland School of Public Policy, and currently serves as the CISA Executive Assistant Director Congress/State Department -  Cameron Kelly,  Distinguished Visiting Fellow, Brookings Institutution China players Central Military Committee representatives - Rohit Talwar, founder of FastFuture Intelligence and cyber - Daniel Richardson, President of Indepth Global AI  Public/Private Industry - Sarah Myers West, co-director at AI Now Ministry of Science and Technology (MOST)/Ministry of Industry and Information technology (MIIT) - David Lin, Senior Director for Future Technology Platforms at the Special Competitive Studies Project (SCSP) European Union Governance- Courtney Radsch, Director, Center for Journalism and Liberty at Open Markets Institute Military/Security - Gordon LaForge, senior policy analyst at New America Regulatory - Michelle Nie, EU Tech Policy Fellow at the Open Markets Institute Industrial and research policy - David Goldston, director of government affairs at the Natural Resources Defense Council Intelligence Agencies - Rumman Chowdhury, scientist, entrepreneur, and former responsible artificial intelligence lead at Accenture Civil Society  Large players (ChatGPT, META, Amazon, Microsoft) - Cody Buntain, Assistant Professor; Affiliate Fellow, UMD Honors College – Artificial Intelligence Cluster Medium players - Ramayya Krishnan, Dean, Heinz College Of Information Systems And Public Policy at Carnegie Mellon University Open-source communities - Jay Lee, Clark Distinguished Chair Professor and Director of Industrial AI Center in the Mechanical Engineering Dept. of the Univ. of Maryland College Park Advocacy Organizations - David Goldston, director of government affairs at the Natural Resources Defense Council  Legal Community - Kahaan Mehta, Research Fellow at the Vidhi Centre for Legal Policy  Universities and academia Large universities - Nita Farahany, Robinson O. Everett Distinguished Professor of Law at Duke Law Smaller schools - Anand Patwardhan, professor in the School of Public Policy at the University of Maryland Medium Universities - Elizabeth Bramson-Boudreau, CEO and Publisher at MIT Technology Review Government laboratories (Defense, DOE, etc.) - Emily M. Bender, University of Washington Professor This material is distributed by TRG Advisory Services, LLC on behalf of the Embassy of the United Arab Emirates in the U.S.. Additional information is available at the Department of Justice, Washington, DC. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Daily Scoop Podcast
DOD's deferred resignation to be offered April 7-14; Cyber leaders call for Congress to renew billion-dollar cyber grant program

The Daily Scoop Podcast

Play Episode Listen Later Apr 2, 2025 4:08


More details have emerged on the Department of Defense's Deferred Resignation Program. According to a new memo, the DOD will offer the program to eligible DOD civilian employees for a week between April 7 and 14. Voluntary early retirement authority will also be offered. The initiatives, ordered by Defense Secretary Pete Hegseth, come as the Pentagon is looking to reduce its reduce civilian workforce and implement the Trump administration's Department of Government Efficiency (DOGE) efforts. Jules Hurst III, acting undersecretary of defense for personnel and readiness, wrote in an April 1 memo that the DRP provides a “generous opportunity for employees to enter a paid leave status for several months, prior to resigning or retiring,” adding that employees pending approval or approved for the program will not be subject to return to in-person work requirements. A bipartisan bill that would establish a nonprofit foundation aimed at boosting private-sector partnerships at the National Institute of Standards and Technology was reintroduced in the House and the Senate on Tuesday. The Expanding Partnerships for Innovation and Competitiveness (EPIC) Act would create a Foundation for Standards and Metrology at the Department of Commerce, which would be focused on fostering collaborations with academia, industry, and other organizations. That new foundation would ultimately help supplement NIST's funding and — according to a release shared with FedScoop in advance of the Wednesday announcement — make the path to commercializing technologies developed by the agency easier. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast  on Apple Podcasts, Soundcloud, Spotify and YouTube.

Mystery AI Hype Theater 3000
Linguists Versus 'AI' Speech Analysis (with Nicole Holliday), 2025.03.17

Mystery AI Hype Theater 3000

Play Episode Listen Later Apr 2, 2025 60:28 Transcription Available


Measuring your talk time? Counting your filler words? What about "analyzing" your "emotions"? Companies that push LLM technology to surveil and summarize video meetings are increasingly offering to (purportedly) analyze your participation and assign your speech some metrics, all in the name of "productivity". Sociolinguist Nicole Holliday joins Alex and Emily to take apart claims about these "AI" meeting feedback tools, and reveal them to be just sparkling bossware, with little insight into how we talk.Nicole Holliday is Acting Associate Professor of Linguistics at the University of California-Berkeley.Quick note: Our guest for this episode had some sound equipment issues, which unfortunately affected her audio quality.Main course:Read AI Review: This AI Reads Emotions During Video CallsMarketing video for Read AIZoom rebrands existing and introduces new generative AI featuresMarketing video for Zoom Revenue AcceleratorSpeech analysis startup releases AI tool that simulates difficult job interview conversationFresh AI Hell:Amazon Echo will send all recordings to Amazon beginning March 28Trump's NIST no longer concerned with “safety” or “fairness”Reporter Kevin Roose is feeling the bullshitUW's eScience institute pushing “AI” for information accessOpenAI whines about data being too expensive, with a side of SinophobiaCheck out future streams at on Twitch, Meanwhile, send us any AI Hell you see.Our book, 'The AI Con,' comes out in May! Pre-order now.Subscribe to our newsletter via Buttondown. Follow us!Emily Bluesky: emilymbender.bsky.social Mastodon: dair-community.social/@EmilyMBender Alex Bluesky: alexhanna.bsky.social Mastodon: dair-community.social/@alex Twitter: @alexhanna Music by Toby Menon.Artwork by Naomi Pleasure-Park. Production by Christie Taylor.

To The Point - Cybersecurity
Cyber Experience Matters: Tackling Industry Challenges with Saaim Khan

To The Point - Cybersecurity

Play Episode Listen Later Apr 1, 2025 32:45


Welcome back to the Forcepoint podcast, where we bring you the latest in global cybersecurity. Today, we're diving into part one of our two-part series with Saaim Khan, founder and principal advisor at Cyber Matters. Saaim is redefining cyber consulting with an "unconsult" approach. In this episode, hosts Rachael Lyon and Jonathan Knepper engage Saaim in a conversation about the apparent cybersecurity talent shortage that NIST predicts will influence significant incidents by this year. Is it a lack of talent, or perhaps a shortage of experience? As Saaim suggests, it's all about the right attitude and the importance of nurturing humility and the ability to extrapolate in the next generation. Tune in as we explore the nuances of cybersecurity talent, the potential impacts of AI on the industry, and the role of true mentorship. It's a discussion packed with insight and real-world anecdotes that any cybersecurity professional or enthusiast can't afford to miss. So grab your headphones and let's get to the point! For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e326

Afternoon Drive with John Maytham
Entangled Signals: Microsoft, Majorana and the quantum computing hype

Afternoon Drive with John Maytham

Play Episode Listen Later Apr 1, 2025 9:36


John Maytham speaks to Steven Boykey Sidley, Professor of practice at JBS at the University of Johannesburg, Daily Maverick columnist, and author of It’s Mine: How the Crypto Industry Is Redefining Ownership, about the buzz surrounding Microsoft’s recent announcement of a new quantum computing chip dubbed Majorana.See omnystudio.com/listener for privacy information.

Deep State Radio
Siliconsciousness: The AI Competition: Public Policy Strategies: Part 1

Deep State Radio

Play Episode Listen Later Mar 28, 2025 40:52


Welcome to a very different episode of Siliconsciousness. Today, we are taking a creative new approach to discussing the future of AI. This episode comprises the first part of our special event, “The AI Competition: Public Policy Strategies”. The event, co-hosted by MIT Technology Review, brings together some of the leading voices in AI policy from the public and private sectors to role-play these complex issues. These AI leaders play roles in the US, China, and The EU, and enact policies that best align with their roles interests in the AI space. This first episode contains the first phase of the game, as well as introductions from the editor in chief of MIT Technology Review Mat Honan as well as game controller Ed McGrady. We hope you enjoy. Our Players: US Government Players White House (NSA, AI & Crypto Czar, Assistant to Pres. For S&T) - Doug Calidas, Senior Vice President of Government Affairs for Americans for Responsible Innovation (ARI) Government research institutions (funding) - Stephen Ezell Standards and governance (NIST, DOS, etc.) - Vivek Wadhwa, Adjunct Professor at Carnegie Mellon's School of Engineering at Silicon Valley Regulatory and trade (DOS, Treasury, etc.) - Susan Ariel Aaronson, American author, public speaker, and GWU professor Department of Defense- Daniel Castro, vice president at the Information Technology and Innovation Foundation (ITIF) Commerce Department - Anupam Chander, Scott K Ginsburg Professor of Law at Georgetown University Law Center Intel Community and Cyber Defense - David Mussington, professor of the practice the University of Maryland School of Public Policy, and currently serves as the CISA Executive Assistant Director Congress/State Department -  Cameron Kelly,  Distinguished Visiting Fellow, Brookings Institutution China players Central Military Committee representatives - Rohit Talwar, founder of FastFuture Intelligence and cyber - Daniel Richardson, President of Indepth Global AI  Public/Private Industry - Sarah Myers West, co-director at AI Now Ministry of Science and Technology (MOST)/Ministry of Industry and Information technology (MIIT) - David Lin, Senior Director for Future Technology Platforms at the Special Competitive Studies Project (SCSP) European Union Governance- Courtney Radsch, Director, Center for Journalism and Liberty at Open Markets Institute Military/Security - Gordon LaForge, senior policy analyst at New America Regulatory - Michelle Nie, EU Tech Policy Fellow at the Open Markets Institute Industrial and research policy - David Goldston, director of government affairs at the Natural Resources Defense Council Intelligence Agencies - Rumman Chowdhury, scientist, entrepreneur, and former responsible artificial intelligence lead at Accenture Civil Society  Large players (ChatGPT, META, Amazon, Microsoft) - Cody Buntain, Assistant Professor; Affiliate Fellow, UMD Honors College – Artificial Intelligence Cluster Medium players - Ramayya Krishnan, Dean, Heinz College Of Information Systems And Public Policy at Carnegie Mellon University Open-source communities - Jay Lee, Clark Distinguished Chair Professor and Director of Industrial AI Center in the Mechanical Engineering Dept. of the Univ. of Maryland College Park Advocacy Organizations - David Goldston, director of government affairs at the Natural Resources Defense Council  Legal Community - Kahaan Mehta, Research Fellow at the Vidhi Centre for Legal Policy  Universities and academia Large universities - Nita Farahany, Robinson O. Everett Distinguished Professor of Law at Duke Law Smaller schools - Anand Patwardhan, professor in the School of Public Policy at the University of Maryland Medium Universities - Elizabeth Bramson-Boudreau, CEO and Publisher at MIT Technology Review Government laboratories (Defense, DOE, etc.) - Emily M. Bender, University of Washington Professor Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber Security Headlines
Week in Review: Microsoft Trust abuse, 23andMe bankruptcy risks, NIST's growing backlog

Cyber Security Headlines

Play Episode Listen Later Mar 28, 2025 23:50


Link to episode page This week's Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Jonathan Waldrop, CISO, The Weather Company Jonathan will be speaking at The CrowdStrike Crowd Tour, on Tuesday, April 15, 2025 in Atlanta – details here. He will also be speaking at the C Vision International Think Tank on April 24, 2025, also in Atlanta – details here. Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com. All links and the video of this episode can be found on CISO Series.com

GovCast
CyberCast: Inside the Latest Version of NIST's Cybersecurity Framework

GovCast

Play Episode Listen Later Mar 25, 2025 9:03


The latest iteration of the National Institutes of Standards and Technology's (NIST) Cybersecurity Framework (CSF) helps organizations strengthen their security posture and align their cybersecurity efforts with enterprise-wide risk management. NIST's Steven Quinn, the project lead for the Cybersecurity Framework, provides a comprehensive overview of the key updates and transformative features in the 2.0 version. At the center of the new framework is the introduction of the "govern" function, which empowers executives and risk management professionals to seamlessly integrate cybersecurity risk into their existing enterprise-level decision-making processes. By bridging the gap between technical security controls and business objectives, the framework enables organizations to make more informed, strategic investments in their cybersecurity programs. Additionally, the framework has been enhanced to address emerging technologies, such as quantum computing and artificial intelligence, ensuring an organization is prepared to navigate the evolving threat landscape.

This Week in Google (MP3)
IM 811: Flippin' the Bird - Anthony Aguirre, AI Safety, Hollywood vs. AI

This Week in Google (MP3)

Play Episode Listen Later Mar 20, 2025 178:35


Interview with Anthony Aguirre The NIST's new directive to AI Safety Institute partners scrubs mentions of "AI safety" and "AI fairness" and prioritizes "reducing ideological bias" in models Jensen Huang GTC Keynote in 16 minutes Nvidia and Yum! Brands team up to expand AI ordering Google Is Officially Replacing Assistant With Gemini - Slashdot Google's Gemini AI is really good at watermark removal Hollywood warns about AI industry's push to change copyright law Hear what Horizon Zero Dawn actor Ashly Burch thinks about AI taking her job Guardian agrees with Leo The Daily Wire announces new advertising partnership with Perplexity and The Ben Shapiro Show Elon Musk's Grok to merge with Perplexity AI? Perplexity dunks on Google's 'glue on pizza' AI fail in new ad Google announces new health-care AI updates for Search Google plans to release new 'open' AI models for drug discovery EFF: California's A.B. 412: A Bill That Could Crush Startups and Cement A Big Tech AI Monopoly Italian newspaper says it has published world's first AI-generated edition AI ring tracks spelled words in American Sign Language Kevin Roose joins the AGI cult: Why I'm Feeling the A.G.I. I Hitched a Ride in San Francisco's Newest Robotaxi Elon Musk's X obtains $44bn valuation in sharp turnaround The 560-pound Twitter logo from its San Francisco headquarters is up for auction Andreessen wants to shut down all higher education in America FSF's Memorabilia Silent Auction Begins Today - Slashdot Bluesky made more money selling T-shirts mocking Zuckerberg than custom domains Google acquires cybersecurity firm Wiz for $32 billion Alphabet spins off Starlink competitor Taara Oh Mary! TechCrunch Founder-Turned-Crypto Investor Pays $60 Million for Miami Beach Home Hosts: Leo Laporte, Jeff Jarvis, and Paris Martineau Guest: Anthony Aguirre Download or subscribe to Intelligent Machines at https://twit.tv/shows/intelligent-machines. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: uscloud.com zscaler.com/security

All TWiT.tv Shows (MP3)
Intelligent Machines 811: Flippin' the Bird

All TWiT.tv Shows (MP3)

Play Episode Listen Later Mar 20, 2025 178:35


Interview with Anthony Aguirre The NIST's new directive to AI Safety Institute partners scrubs mentions of "AI safety" and "AI fairness" and prioritizes "reducing ideological bias" in models Jensen Huang GTC Keynote in 16 minutes Nvidia and Yum! Brands team up to expand AI ordering Google Is Officially Replacing Assistant With Gemini - Slashdot Google's Gemini AI is really good at watermark removal Hollywood warns about AI industry's push to change copyright law Hear what Horizon Zero Dawn actor Ashly Burch thinks about AI taking her job Guardian agrees with Leo The Daily Wire announces new advertising partnership with Perplexity and The Ben Shapiro Show Elon Musk's Grok to merge with Perplexity AI? Perplexity dunks on Google's 'glue on pizza' AI fail in new ad Google announces new health-care AI updates for Search Google plans to release new 'open' AI models for drug discovery EFF: California's A.B. 412: A Bill That Could Crush Startups and Cement A Big Tech AI Monopoly Italian newspaper says it has published world's first AI-generated edition AI ring tracks spelled words in American Sign Language Kevin Roose joins the AGI cult: Why I'm Feeling the A.G.I. I Hitched a Ride in San Francisco's Newest Robotaxi Elon Musk's X obtains $44bn valuation in sharp turnaround The 560-pound Twitter logo from its San Francisco headquarters is up for auction Andreessen wants to shut down all higher education in America FSF's Memorabilia Silent Auction Begins Today - Slashdot Bluesky made more money selling T-shirts mocking Zuckerberg than custom domains Google acquires cybersecurity firm Wiz for $32 billion Alphabet spins off Starlink competitor Taara Oh Mary! TechCrunch Founder-Turned-Crypto Investor Pays $60 Million for Miami Beach Home Hosts: Leo Laporte, Jeff Jarvis, and Paris Martineau Guest: Anthony Aguirre Download or subscribe to Intelligent Machines at https://twit.tv/shows/intelligent-machines. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: uscloud.com zscaler.com/security

Radio Leo (Audio)
Intelligent Machines 811: Flippin' the Bird

Radio Leo (Audio)

Play Episode Listen Later Mar 20, 2025 178:35


Interview with Anthony Aguirre The NIST's new directive to AI Safety Institute partners scrubs mentions of "AI safety" and "AI fairness" and prioritizes "reducing ideological bias" in models Jensen Huang GTC Keynote in 16 minutes Nvidia and Yum! Brands team up to expand AI ordering Google Is Officially Replacing Assistant With Gemini - Slashdot Google's Gemini AI is really good at watermark removal Hollywood warns about AI industry's push to change copyright law Hear what Horizon Zero Dawn actor Ashly Burch thinks about AI taking her job Guardian agrees with Leo The Daily Wire announces new advertising partnership with Perplexity and The Ben Shapiro Show Elon Musk's Grok to merge with Perplexity AI? Perplexity dunks on Google's 'glue on pizza' AI fail in new ad Google announces new health-care AI updates for Search Google plans to release new 'open' AI models for drug discovery EFF: California's A.B. 412: A Bill That Could Crush Startups and Cement A Big Tech AI Monopoly Italian newspaper says it has published world's first AI-generated edition AI ring tracks spelled words in American Sign Language Kevin Roose joins the AGI cult: Why I'm Feeling the A.G.I. I Hitched a Ride in San Francisco's Newest Robotaxi Elon Musk's X obtains $44bn valuation in sharp turnaround The 560-pound Twitter logo from its San Francisco headquarters is up for auction Andreessen wants to shut down all higher education in America FSF's Memorabilia Silent Auction Begins Today - Slashdot Bluesky made more money selling T-shirts mocking Zuckerberg than custom domains Google acquires cybersecurity firm Wiz for $32 billion Alphabet spins off Starlink competitor Taara Oh Mary! TechCrunch Founder-Turned-Crypto Investor Pays $60 Million for Miami Beach Home Hosts: Leo Laporte, Jeff Jarvis, and Paris Martineau Guest: Anthony Aguirre Download or subscribe to Intelligent Machines at https://twit.tv/shows/intelligent-machines. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: uscloud.com zscaler.com/security

This Week in Google (Video HI)
IM 811: Flippin' the Bird - Anthony Aguirre, AI Safety, Hollywood vs. AI

This Week in Google (Video HI)

Play Episode Listen Later Mar 20, 2025 178:35


Interview with Anthony Aguirre The NIST's new directive to AI Safety Institute partners scrubs mentions of "AI safety" and "AI fairness" and prioritizes "reducing ideological bias" in models Jensen Huang GTC Keynote in 16 minutes Nvidia and Yum! Brands team up to expand AI ordering Google Is Officially Replacing Assistant With Gemini - Slashdot Google's Gemini AI is really good at watermark removal Hollywood warns about AI industry's push to change copyright law Hear what Horizon Zero Dawn actor Ashly Burch thinks about AI taking her job Guardian agrees with Leo The Daily Wire announces new advertising partnership with Perplexity and The Ben Shapiro Show Elon Musk's Grok to merge with Perplexity AI? Perplexity dunks on Google's 'glue on pizza' AI fail in new ad Google announces new health-care AI updates for Search Google plans to release new 'open' AI models for drug discovery EFF: California's A.B. 412: A Bill That Could Crush Startups and Cement A Big Tech AI Monopoly Italian newspaper says it has published world's first AI-generated edition AI ring tracks spelled words in American Sign Language Kevin Roose joins the AGI cult: Why I'm Feeling the A.G.I. I Hitched a Ride in San Francisco's Newest Robotaxi Elon Musk's X obtains $44bn valuation in sharp turnaround The 560-pound Twitter logo from its San Francisco headquarters is up for auction Andreessen wants to shut down all higher education in America FSF's Memorabilia Silent Auction Begins Today - Slashdot Bluesky made more money selling T-shirts mocking Zuckerberg than custom domains Google acquires cybersecurity firm Wiz for $32 billion Alphabet spins off Starlink competitor Taara Oh Mary! TechCrunch Founder-Turned-Crypto Investor Pays $60 Million for Miami Beach Home Hosts: Leo Laporte, Jeff Jarvis, and Paris Martineau Guest: Anthony Aguirre Download or subscribe to Intelligent Machines at https://twit.tv/shows/intelligent-machines. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: uscloud.com zscaler.com/security