Degree of resistance to, or protection from, harm
POPULARITY
Categories
Don Cox joins us this morning from the roastery. Securing coffee has continued to be a new challenge as small roasters navigate the global arena now shaped by tariffs. Coffee roasting is an art that demands focus, skill and selection of the best possible beans. Sadly we are entering into a time with the increasing influence if Ai and convenience that mastering a craft is increasingly rare. The gifts God gives us need to be nurtured, pushing ourselves higher and farther than we think we can go. Honoring God in all things. That is the root that is being destroyed in the emerging culture. Rhe question we must all ask..."What's in your cup?" #BardsFM_Morning #SeekingPerfection #GiftsAndTalents Bards Nation Health Store: www.bardsnationhealth.com EnviroKlenz Air Purification, promo code BARDS to save 10%:www.enviroklenz.com EMPShield protect your vehicles and home. Promo code BARDS: Click here MYPillow promo code: BARDS >> Go to https://www.mypillow.com/bards and use the promo code BARDS or... Call 1-800-975-2939. White Oak Pastures Grassfed Meats, Get $20 off any order $150 or more. Promo Code BARDS: www.whiteoakpastures.com/BARDS BardsFM CAP, Celebrating 50 Million Downloads: https://ambitiousfaith.net Morning Intro Music Provided by Brian Kahanek: www.briankahanek.com Windblown Media 20% Discount with promo code BARDS: windblownmedia.com Founders Bible 20% discount code: BARDS >>> TheFoundersBible.com Mission Darkness Faraday Bags and RF Shielding. Promo code BARDS: Click here EMF Solutions to keep your home safe: https://www.emfsol.com/?aff=bards Treadlite Broadforks...best garden tool EVER. Promo code BARDS: TreadliteBroadforks.com No Knot Today Natural Skin Products: NoKnotToday.com Health, Nutrition and Detox Consulting: HealthIsLocal.com Destination Real Food Book on Amazon: click here Images In Bloom Soaps and Things: ImagesInBloom.com Angeline Design: AngelineDesign.com DONATE: Click here Mailing Address: Xpedition Cafe, LLC Attn. Scott Kesterson 591 E Central Ave, #740 Sutherlin, OR 97479
Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com A quick review of malicious activity shows large-scale cyberattacks being run without any human intervention. That means traditional penetration testing, which occurs once a year, can be easily defeated by massive, systematic attacks. During the interview with Snehal Antani, CEO of Horizon Three, he highlights the importance of continuous autonomous penetration. He suggests that it may be the only response to a non-human automated attack. Horizon3 has recently collaborated with the NSA's Cybersecurity Collaboration Center to develop the Continuous Autonomous Penetration program. He details identifying critical vulnerabilities not only in federal systems, but also in the Defense Industrial Base.] Today's cyber threat landscape is rapidly evolving, with artificial intelligence fueling a new wave of increasingly sophisticated attacks. Malicious actors now leverage AI to automate and scale their operations, resulting in large-scale, highly coordinated cyberattacks requiring little to no human oversight. This surge in automation on the offensive side has exposed a significant gap in the traditional cybersecurity strategies of federal agencies, which still largely rely on manual or scheduled defense mechanisms such as annual penetration testing. These legacy approaches are woefully inadequate against relentless, continuously evolving threats executed by automated tools that probe for weaknesses around the clock. Federal leaders, traditionally cautious about deploying automated systems for cybersecurity, now face a crucial crossroads. The old paradigm—where automation in cyber defense was seen as risky—must be reconsidered in light of real-world evidence that manual processes cannot keep pace with automated adversaries. In a recent interview, Snehal Antani, CEO of Horizon3, emphasized the critical need for continuous, autonomous penetration testing. He argued that just as attackers use automation to identify and exploit vulnerabilities at scale, defenders must employ similar automation to uncover and remediate those weaknesses swiftly and continuously. To advance this approach, Horizon3 has partnered with the NSA's Cybersecurity Collaboration Center, launching the Continuous Autonomous Penetration program. This initiative aims to proactively identify critical vulnerabilities not just in federal government networks, but also across the Defense Industrial Base. By integrating automated, persistent penetration testing into daily operations, federal agencies can better defend against the nonstop, AI-driven threats now targeting every aspect of their infrastructure.
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Matt Duncan, Vice President of Security Operations and Intelligence at the North American Electric Reliability Corporation's E-ISAC, to explore the cyber threats targeting the North American power grid. Matt breaks down why the grid remains resilient despite increasing pressure from nation-states, cybercriminals, and hacktivists, how AI is lowering the barrier of entry for attackers, and why OT systems and interconnected devices present unique risks. He also highlights real success stories, the value of large-scale grid exercises, and how strong collaboration and a focus on foundational security practices help defenders keep power flowing safely and reliably. In this episode you'll learn: How severe weather events trigger heightened cyber-readiness across utilities What motivates hacktivist groups and how their tactics differ from other threat actors Why outdated equipment and legacy systems remain such attractive targets Some questions we ask: Are you seeing more educated and capable OT-focused adversaries now? How do you work with policymakers to help them understand these threats? If you could eliminate one misconception about securing the grid, what would it be? Resources: View Matt Duncan on LinkedIn View Sherrod DeGrippo on LinkedIn Learn more about E-ISAC Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Get the latest threat intelligence insights and guidance at Microsoft Security Insider The Microsoft Threat Intelligence Podcast is produced by Microsoft, Hangar Studios and distributed as part of N2K media network.
Anand Oswal, Executive Vice President at Palo Alto Networks, joins Johna Johnson and John Burke for a wide-ranging exploration of two emerging focal points of enterprise risk: cryptographically relevant quantum computing, and browser-mediated agentic AI. The looming arrival of quantum computers that can break legacy encryption has already created the threat of “harvest now, decrypt... Read more »
In this episode, Beth Steele, Chief Operating Officer at Owensboro Health, talks about two pressures shaping surgical services today: rising supply costs and recruiting and keeping the best talent. She shares how an AI partnership with AssistIQ helped by capturing supplies with 99 percent accuracy, cutting nearly half of monthly product waste and removing manual documentation for nurses. Beth also outlines the practices that made the rollout successful, including early staff involvement, clear workflows and close coordination with the vendor and internal teams.This episode is sponsored by AssistIQ.
Stop wasting time with ineffective outreach and discover time-saving shortcuts to securing a ton of podcasts for your book. Industry veteran Jackie Lapin, leader of Conscious Media Relations' Radio/Podcast Tours, breaks down the exact steps and essential materials authors need to become an irresistible guest, helping nearly 400,000 authors grow their businesses and sell more books. She reveals the structure of a perfect, one-and-a-half-page pitch letter with an irresistible "hook," the critical components of a comprehensive Media Kit (including the essential "20 questions"), how to write compelling, spam-avoiding subject lines, and the three key promotional items—your book, a free gift, and an upsell—you need to maximize your interview success and stand out in the crowded podcast landscape.Love the show? Subscribe, rate, review, and share! https://superbrandpublishing.com/podcast/
Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com The good news is that federal security measures are preventing successful attacks; the bad news is that adversaries are examining every nook and cranny of a federal system and increasingly targeting the browser itself as an attack vector. During the interview, Scott "Monty" Montgomery gives a quick overview of Enterprise Browsers and Secure Enterprise Browsers. After all, browsers have been around since 1994. It may be the only application ubiquitous on home-based machines and in enterprise systems. They were not designed for security; they were intended to open the internet to the World Wide Web, full of images, links, and audio. Malicious actors did not have to focus on an app with limited use; by targeting a browser, they have almost unlimited targets to attack. Montgomery mentions the increase in browser-based attacks. In fact, they increased by 198% in the second half of 2023. Scott explains that phishing persists because people are curious or fearful, leading them to click on malicious links. A Secure Enterprise Browser can help prevent many common phishing exploits. Additionally, an SEB can support policies and controls. This means that an SEB fits completely with any current Zero Trust initiatives across all agencies. Beyond that, SEBs can be configured to manage legacy systems and even operate in low-bandwidth environments.
AI has become one of the most-used business technologies. But delve deeper into the biz tech data and there's another story to be told. In the latest CPA Australia Business Technology Report, 89 per cent of respondents said their organisation used AI in 2025, up from 69 per cent in 2024 and 55 per cent in 2023. Yet only 16 per cent report that AI is fully embedded across their operations. Most teams are still experimenting, often relying on free or basic tools rather than structured, strategic adoption. The gap between usage and true integration points to significant untapped potential. Many core finance and operational processes are still only lightly digitised, despite clear opportunities for efficiency, clarity and improved decision-making. This episode examines how finance and accounting teams can use AI to strengthen systems and create capacity where it matters most. Drawing on the survey's findings, you'll hear how top-performing businesses integrate AI across their workflows and why mindset, curiosity and practical governance underpin successful adoption. Gain a grounded view of how firms apply AI in everyday workflows, supported by data from CPA Australia's annual tech and business report. Listen now for practical steps to help your business integrate AI. Host: Gavan Ord, Business Investment and International Lead, Policy and Advocacy, CPA Australia Guest: Kyelie Baxter FCPA, Managing Director, IQ Accountants The CPA Australia Business Technology Report 2025 is a valuable resource for those who want the latest tech usage trends by business. Additionally, this YouTube webinar Securing the Future: AI, Cybersecurity & the Road to Tech-Driven Growth has related insights with industry experts and technology leaders discussing the latest trends, challenges and strategies in building tech-forward organisations. And for more on this episode's guest, head to IQ Accountants on LinkedIn. Loving this episode? Listen to more With Interest episodes and other CPA Australia podcasts on YouTube. CPA Australia publishes four podcasts, providing commentary and thought leadership across business, finance, and accounting: With Interest INTHEBLACK INTHEBLACK Out Loud Excel Tips Search for them in your podcast platform. Email the podcast team at podcasts@cpaaustralia.com.au
Rob Eldridge sat down with Ardon Anderson from Verkada to discuss all things retail security! From minimising shrinkage to actionable real time insights, this episode looks at multiple different angles on how data and intelligence from Verkada solutions are helping bolster security across the retail industry. Want to hear how the biggest names in the game are innovating in this space, tune in and listen now!
Employers around the metro are finding out that high school students can be capable members of their cyber security divisions. Des Moines Public Schools instructor Michael Tierney stops by the podcast to tell us how his cyber security class is working hand in hand with employers to prepare students for summer internships. Tierney is joined by his student Lincoln Kessel who talks about his experience interning for Casey's, and how he feels it has prepared him for the future.
Today, Dominic Bowen hosts Dr Tim Stevens on The International Risk Podcast to examine how hybrid threats, cyber operations and infrastructure vulnerabilities are reshaping Europe's security environment. They discuss how adversaries exploit the interdependence of digital, physical and informational systems, why hybrid activity sits deliberately below the threshold of open conflict, and how these pressures are redefining strategic risk for governments, businesses and critical-infrastructure operators across Europe. Together they explore how cyber intrusions, sabotage, supply-chain exposure and targeted information operations generate cumulative effects that undermine resilience, erode trust and complicate decision-making.Dr Tim Stevens is Reader in International Security at King's College London and co-director of its Cyber Security Research Group. His work analyses the politics of cybersecurity, hybrid threats, cyber risk and the global contest over technological infrastructures. He is the author of several leading publications in the field, including Research Handbook on Cyberwarfare (2024) and What Is Cybersecurity For? (2023). His research examines how cyber operations intersect with societal vulnerabilities, strategic signalling and governance capacity, offering perspectives that inform policymakers, security professionals and institutions responding to the rapidly evolving cyber-hybrid threat landscape.The International Risk Podcast brings you conversations with global experts, frontline practitioners, and senior decision-makers who are shaping how we understand and respond to international risk. From geopolitical volatility and organised crime to cybersecurity threats and hybrid warfare, each episode explores the forces transforming our world and what smart leaders must do to navigate them. Whether you're a board member, policymaker, or risk professional, The International Risk Podcast delivers actionable insights, sharp analysis, and real-world stories that matter.Dominic Bowen is the host of The International Risk Podcast and Europe's leading expert on international risk and crisis management. As Head of Strategic Advisory and Partner at one of Europe's leading risk management consulting firms, Dominic advises CEOs, boards, and senior executives across the continent on how to prepare for uncertainty and act with intent. He has spent decades working in war zones, advising multinational companies, and supporting Europe's business leaders. Dominic is the go-to business advisor for leaders navigating risk, crisis, and strategy; trusted for his clarity, calmness under pressure, and ability to turn volatility into competitive advantage. Dominic equips today's business leaders with the insight and confidence to lead through disruption and deliver sustained strategic advantage.The International Risk Podcast – Reducing risk by increasing knowledge.Follow us on LinkedIn and Subscribe for all our updates!Tell us what you liked!
In this episode of UC Today, host Kieran Devlin sits down with Amit Barave, Vice President of Product Management at Webex by Cisco, to explore how the collaboration giant is securing digital communication in an era of AI-powered threats, distributed teams, and rising compliance demands. From zero trust principles to vertical-specific safeguards, this discussion offers a deep dive into how Webex is redefining trust and usability for enterprises worldwide.How do you secure every click, call, and conversation—without killing collaboration? In this thought-provoking interview, Webex's Amit Barave shares how his team is building security directly into the DNA of the Webex Suite—while ensuring the user experience remains intuitive and frictionless.
AI agents are rapidly moving into production, creating a fundamentally new and complex attack surface for enterprises. While the promise of "digital teammates" is immense, the security risks they introduce, from prompt injection, hijacked tool use to multi-agent collusion, are unprecedented. How can security leaders move beyond traditional frameworks to govern, protect, and respond to these powerful, autonomous systems? Join this RSAC podcast with authors of the groundbreaking book, “Securing AI Agents – Foundations, Frameworks, and Real-World Deployment." who will cut through the hype to provide a practical, actionable guide for CISOs, security architects, and AI developers. Ken Huang, CEO, DistributedApps.ai Chris Hughes, Co-Founder & President, Aquai Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Director, Content, RSAC
Teaching : Peace & Divine Instruction Where there is no peace God's instruction becomes unclear or hard to do. Peace makes God's voice unmistakable. Peace is the spiritual stamina that holds us until our word becomes flesh !
8/8. Roosevelt's Landslide and the Realignment of American Politics — David Pietrusza — Contrary to the Literary Digest straw poll prediction of a close race, early returns confirmed Roosevelt's enormous landslide victory, securing 46 states and overwhelming electoral dominance. The victory produced 74 Democratic senators and 334 Democratic house members, establishing commanding majorities in both chambers. This comprehensive electoral sweep cemented the realignment of American politics, as Roosevelt carried 104 out of 106 major cities, solidifying the Democratic Party'sinstitutional strength in urban centers and establishing durable electoral coalitions. 1936 POLAND
00:00 The Rivalry: Virginia vs. Virginia Tech 11:53 Game Recap: A Dominant Performance 25:52 Reflections on the Season and Future Prospects 27:21 The Aftermath of the Game 29:38 Defensive Dominance 32:19 Player Highlights and Performances 36:10 Offensive Breakdown 37:41 Fan Reactions and Rivalry Dynamics 39:49 Looking Ahead: Future Prospects 43:24 Hypotheticals and Realities 46:15 Closing Thoughts and Gratitude Follow The Ball Hawk Show: Bleav Network, Apple Podcasts, Spotify, and other podcasts platforms Ahmad Hawkins Website: http://www.ahmadhawkins.com Follow on X: @IAmBallHawk Instagram: iamballhawk Facebook: Ahmad Hawkins Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
In this episode of The Digital Executive, host Brian Thomas welcomes Joshua Scott, Vice President of Security at Hydrolix and a veteran with nearly 30 years of experience turning complex security risks into clear business value. Josh shares how Hydrolix is redefining what's possible with massive-scale log data—processing everything from terabytes to petabytes and delivering insights in seconds.Josh breaks down why security leaders must speak the language of business, translating technical risk into financial and operational impact to earn executive alignment. He also unpacks the challenges of securing data at extreme velocity and scale, the growing need for automation, and why the next generation of security leaders will win by leveraging AI as an accelerator—not a replacement.Looking ahead, Josh discusses how AI-generated attacks, identity misuse, supply-chain compromises, and automated phishing will reshape security programs over the next three to five years. His message is clear: AI will empower defenders and attackers alike, and success will depend on how effectively teams adopt automation, prioritize intelligently, and stay ahead of rapidly evolving threats.A timely, insightful conversation for CISOs, security leaders, and technology executives navigating today's increasingly complex cyber landscape.If you liked what you heard today, please leave us a review - Apple or Spotify.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
00:00 The Rivalry: Virginia vs. Virginia Tech 11:53 Game Recap: A Dominant Performance 25:52 Reflections on the Season and Future Prospects 27:21 The Aftermath of the Game 29:38 Defensive Dominance 32:19 Player Highlights and Performances 36:10 Offensive Breakdown 37:41 Fan Reactions and Rivalry Dynamics 39:49 Looking Ahead: Future Prospects 43:24 Hypotheticals and Realities 46:15 Closing Thoughts and Gratitude Follow The Ball Hawk Show: Bleav Network, Apple Podcasts, Spotify, and other podcasts platforms Ahmad Hawkins Website: http://www.ahmadhawkins.com Follow on X: @IAmBallHawk Instagram: iamballhawk Facebook: Ahmad Hawkins Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Episode 81 of The Space Industry podcast by satsearch is a conversation with Hans Martin Steiner, VP Institutional Space Business at Terma, about scalability and expandability of cutting-edge ground stations with SDR technology.Terma's space business provides mission-critical electronics, software, and services for space applications.In the episode, Hans and satsearch COO Prasad Nagendra discuss:1.
Securing the perfect location for your dental practice isn't just about finding space... It's a strategic decision that can make or break your business.In this episode, Michael sits down with Max Burrows from Practice Real Estate Group to unravel the unique challenges dental tenants face on their path to establishing successful practices. Max, whose firm exclusively represents healthcare clients, arms listeners with clear guidance on navigating the sometimes overwhelming process of site selection, contrasting the approaches taken by first-time startup owners and multi-site groups. He reveals actionable insights that empower new practice owners to adopt the data-driven mindset typically reserved for seasoned groups, stressing that investing in an A+ location is non-negotiable, even if it means paying a little more in rent.Max and Michael also dig into the make-or-break details of co-tenancy and why your neighbors matter as much as your square footage. Learn why being adjacent to a grocery store could turn your practice into a local destination or how picking the wrong neighbor can create endless headaches. As the episode wraps, Max shares why engaging a tenant representation broker early is the secret weapon that costs clients nothing, yet can save them from costly pitfalls. He finishes with his hard-won advice on resilience, innovation, and managing the financial curveballs that come your way, making this episode a must-listen for anyone serious about launching their practice.What You'll Learn in This Episode:The essential differences between site selection for startups versus established practice groupsHow to think like a multi-location group when opening your first practiceWhy prime real estate locations are worth the investment for long-term growthThe impact of co-tenancy and what to look for in neighboring businessesStrategic tips to avoid common real estate pitfalls that plague dental startupsThe value of hiring a tenant representation broker (at no extra cost to you)Crucial lease terms that protect you from competitors and costly mistakesMax's proven strategies for managing working capital and unexpected expensesThe importance of consistent effort and creative problem-solving in businessHow to access Practice Real Estate Group's exclusive tools, like their startup cost calculatorReady to uncover the real estate strategies that set successful dental practices apart? Hit play and take your first step toward a smarter, more profitable practice location!Sponsors:Practice Real Estate Group: healthcare real estate experts with over a century of experience in medical real estate across hundreds of transactions. Visit their site and mention "The Dental Marketer" for a FREE demographic and competition study for your new location! https://practicerealestategroup.com/Guest: Max BurrowsBusiness Name: Practice Real Estate GroupCheck out Max's Media:Website: https://practicerealestategroup.com/Max's LinkedIn: https://www.linkedin.com/in/max-burrows-b086351a2/Practice Real Estate Group's LinkedIn: https://www.linkedin.com/company/thepracticecompanies/Host: Michael AriasJoin my newsletter: https://thedentalmarketer.lpages.co/newsletter/Join this podcast's Facebook Group: The Dental Marketer SocietyLove the Podcast? Let Us Know How We're Doing on Apple Podcasts!
In this episode, The Annuity Man discussed: Distinguishing annuity types Applying the PILL strategy Interpreting annuity yields Securing contractual understanding Key Takeaways: Understanding the purpose of different annuities is crucial: MYGAs provide guaranteed interest on principal like a CD, while SPIAs deliver a lifetime income stream tailored to longevity. Each serves a distinct financial goal. The "PILL" framework—Principal protection, Income for life, Legacy, Long-term care—helps determine whether an annuity aligns with your needs and long-term planning priorities. Evaluating yields requires nuance: MYGA interest compounds tax-deferred without reducing principal, whereas SPIA "rates" reflect life expectancy and combine principal with interest, making direct comparisons misleading. Before purchasing, ensure you fully understand an annuity's contractual guarantees, avoid relying on hypothetical rates, and seek reliable sources for accurate information to make informed decisions. "We're looking at a principal-protected product and an income product. Now right there. You should say, I'm not sure we can compare those two… because [they're] two different categories." — Stan The Annuity Man Connect with The Annuity Man: Website: http://theannuityman.com/ Email: Stan@TheAnnuityMan.com Book: Owner's Manuals: https://www.stantheannuityman.com/how-do-annuities-work YouTube: https://www.youtube.com/channel/UCCXKKxvVslbeGAlEc5sra2g Get a Quote Today: https://www.stantheannuityman.com/annuity-calculator!
Curiosity about who your earliest campaign leaders could be often sparks surprising discoveries and opens paths to support you may not have recognized.In this episode of All About Capital Campaigns, hosts Amy Eisenstein and Andrea Kihlstedt explore how organizations can identify and engage the select group of donors who provide the earliest and most significant gifts in a campaign. Their conversation offers clear, practical guidance for anyone preparing to launch a major fundraising effort or reassessing their current prospect pool.Amy and Andrea begin by breaking down a truth that catches many organizations off guard: more than half of your campaign goal will come from twenty or fewer donors. They explain why this pattern is consistent across campaigns of all sizes and why even small or midsize organizations should expect the same dynamic. What often surprises leaders is realizing they may already know several people who could step into those roles once the right project is presented to them.From there, the discussion turns to understanding donor potential. Many donors give modest amounts simply because they've never been invited to support a bold vision. That makes your largest annual donors (whether they give $5,000, $10,000, or $25,000) the most likely candidates to consider a six- or seven-figure gift when a compelling campaign arises. Amy and Andrea outline how to recognize early signals of capacity by observing patterns in a donor's giving history across your organization and the wider community.The episode then walks through a practical approach to assembling a strong list of leadership-level prospects. This includes reviewing your current donor data, speaking with board members, and using wealth insights to form an initial group of ten or more people who could consider gifts of $1 million or higher. Amy and Andrea also emphasize the importance of looking beyond your files to the broader philanthropic landscape around you. In many communities, a small group of generous individuals consistently support major projects across several institutions. Seeing those patterns helps you understand who might step forward for your campaign.To support that effort, the hosts offer a simple field exercise: visit donor walls at nearby hospitals, theaters, libraries, and museums to observe which names appear repeatedly. Noticing these patterns sharpens your understanding of who cares deeply about your community and may be open to learning about your plans. The conversation also addresses the preparation needed before a feasibility study. Amy explains how assembling a list of twenty to forty individuals capable of contributing gifts of $100,000 or more strengthens the study and improves the accuracy of your early projections. She offers guidance on how long list-building can take and why these early steps are key to an effective quiet phase later on.A recurring theme throughout the episode is the value of curiosity. Andrea highlights the power of asking, “Who else should I be talking to?” This single question encourages donors, board members, and community leaders to open doors, make introductions, and broaden your audience. It also provides an easy way to circle back to earlier conversations and express genuine appreciation.The episode closes with a welcome reminder: campaign fundraising is energizing when it is rooted in mission and authentic relationships. Following curiosity, learning about people, and building meaningful connections brings a sense of purpose to the work. That spirit is what leads to transformational support and lasting community impact.To ensure your campaign ends in a celebration, download our free Capital Campaign Step-by-Step Guide & Checklist. This intuitive guide breaks down each step of your campaign, and the timeline allows you to visualize your whole campaign, from start to finish!
In this episode, Dr. Ludy Green interviews the incredible Lauren C. Anderson. Lauren is a national and global security expert, with decades of experience in combating terrorism, confronting political violence, and securing international safety. As a former FBI Executive and the first US Mission Geneva-sponsored Executive at the Geneva Center for Security Policy, Lauren is truly a trailblazer for women pursuing a career in international security. In addition to her accomplished career, she also works to support women caught in conflict zones all across the world. Join us for this inspiring and engaging conversation!#Podcast #NCADV #NNEDV #SupportSurvivors #BelieveSurvivors #EndDomesticAbuse #violenceprevention #domesticabuseawareness #domesticabuse #womensupportingwomen #womenempowerment #womeninspiringwomen #empoweringwomen #WomenWhoLead #womeninleadership #womenleaders #changemakers #domesticabuse #globalwomen #WomensforumNY #iwfglobal #womensforumofny #internationalwomensforum #UN #unitednations #USCongress #statedepartment #GlobalSecurity #international
Securing a place in the WNBF Bodybuilding World Championship in Los Angeles is a “dream come true” for former Killaloe minor hurler Dylan Nolan. Sligo-based Dylan Nolan earned his place among the world's best after winning his category at the World Natural Bodybuilding Championships (WNBF) Ireland national competition. Alan Morrissey spoke to Dylan to find out how he got on. Photo (c) WNBF Ireland Facebook
I. Executive Summary: Securing Value and Certainty in the AI Supply ChainA. Overview of the Productisation Imperative (PI)The Productisation Imperative is an explicit, urgent call for every professional and organization to own, protect, and amplify their Experience, Expertise, Authoritativeness, and Trustworthiness (EEAT). This EEAT is defined as the most valuable data asset in the AI era. The PI mandates a critical pivot: value is no longer derived from the standardized output that AI can easily replicate, but from the structured source material—the Productised IQ.Productised IQ constitutes verified, compensated intelligence structured specifically to serve as high-quality source material for advanced AI systems. The implementation strategy involves transforming amorphous human expertise into clearly attributed, discoverable knowledge assets with robust compensation mechanisms. The ultimate impact of this transformation is the elimination of the systemic "zero-trust attribute" inherent in unverified AI outputs, allowing organizations to command premium pricing for Engineered Certainty.B. PIBM as the Strategic RoadmapThe strategic necessity of the PI is framed by a shrinking window of opportunity. As intelligent systems increasingly rely on strong EEAT signals for discoverability and recognition, intelligence that remains unstructured, uncompensated, or undiscoverable will effectively cease to exist in AI-mediated search and recommendation systems. The organizations that secure their survival over the next two years are predicted to be those that productise their intelligence before AI fully commoditizes their outputs.The PIBM framework serves both a diagnostic and a prescriptive function. Initially, the PIBM Case Study (November 2025) diagnosed the core failure pattern of the AI industry: the pervasive inability of AI companies to achieve profitability.
Teague Egan faced every founder's nightmare: payroll was due, and a massive investment deal with General Motors was stalled. With his back against the wall, Teague sold his house for $2 million and wired the cash to his company just to stay alive. That "all-in" gamble paid off, securing the partnership and positioning EnergyX to revolutionize the global energy transition.It all started on a Bolivian salt flat, where a chance comment sparked an obsession with lithium. In this interview, Teague sits down with Ryan Atkinson to reveal how he went from a tourist to a founder partnering with industry titans. He breaks down the crucial pivot EnergyX made when their initial licensing model hit a wall, proving that agility is just as important as innovation.You'll learn the grit required to survive the "valley of death" in startup funding and how to execute cold outreach strategies that land billion-dollar partners. We also dive into high-stakes risk management and the mindset needed for enterperenurs to set bold visions. Whether you are raising capital or scaling a business, Teague's story offers a masterclass in resilience.Takeaways:- Teague sold his own house for $2 million and wired the funds to the company to cover payroll and bridge the gap while waiting for the General Motors investment to close.- Great business ideas often come from stepping outside your bubble, as Teague's "aha moment" happened while traveling on a salt flat tour in Bolivia, not in a boardroom.- You do not need prior industry experience to start; Teague entered the lithium space with zero knowledge but bridged the gap through obsessive reading and research.- Networking is often a chain reaction where one contact leads to another, so you must be willing to send cold emails and attend conferences just to meet a single person.- Entrepreneurs must be agile enough to pivot their entire business model if the market resists, just as EnergyX switched from licensing technology to vertical integration when resource owners were too slow to adopt their tech.- The stress of entrepreneurship remains constant regardless of the dollar amount; whether the risk is $50,000 or $50 million, the only way to manage the anxiety is to focus on the daily work you can control.- Securing strategic partnerships with established giants like General Motors provides not only capital but also the institutional credibility needed to scale industrial technology.- Founders should set "unrealistic" and massive visions because bold goals are more effective at rallying employees and investors than modest, safe targets.- Timing can dictate your business model; if your technology is too early for the market to trust, you may have to build the infrastructure yourself to prove it works.- You must be the most confident person in the room regarding your execution, as investors and partners rely entirely on your belief to validate their own risk.Tags: Startup, Entrepreneurship, Business Strategy, EnergyX, Teague Egan, Sustainable Energy, Business ScalingResources:Grow your business today: https://links.upflip.com/the-business-startup-and-growth-blueprint-podcast Connect with Teague: https://www.instagram.com/teagueegan/?hl=en
What happens when AI generates photorealistic content in seconds… and quantum computers can break encryption just as fast?Roman Cyganov (Founder/CEO of Antix) has spent a decade building digital twin technology, creating content for HBO, Warner Brothers, and AAA games. His platform now generates digital twins instantly, with AI agents that manage social media, track trends, and conduct tasks autonomously.Nauman (Founder of BeQuantum.ai) is addressing the quantum security threat. With quantum computers demonstrating computational supremacy, he's implementing post-quantum cryptography to protect digital identities and blockchain systems.Together, they're building a verified marketplace where creators monetize AI twins through blockchain verification and quantum-grade security.Key Topics:Digital twins: from year-long projects to instant creationQuantum threats to current encryptionAI agents for autonomous content creationBlockchain verification for deepfake detectionMonetizing digital identityPartnerships exclusiveExplore AIGE with Antix at https://linktr.ee/aige.inLearn more about Quantum Security at Bequantum.aiSubscribe, share, and join the conversations on Facebook, Twitter, LinkedIn and Discord!To contact us, you can email us directly at bandoftraderspodcast@gmail.com Check out our directory for other amazing interviews we've done in the past!If you like our show, please let us know by rating and subscribing on your platform of choice!If you like our show and hate social media, then please tell all your friends!If you have no friends and hate social media and you just want to give us money for advertising to help you find more friends, then you can donate to support the show here!Roman:Roman Cyganov is the founder and CEO of Antix, an AI platform for digital twins and autonomous agents. He's built products for HBO, Warner Brothers, Tencent, and AAA titles like Game of Thrones, FIFA, and PUBG. An internationally recognized artist whose work appeared on Times Square, Roman pioneered digital twin technology in 2013. Based in Dubai and advised by Aether co-founder Mark Rydon, he's building infrastructure for creators to monetize verified digital identities.Learn More Here: https://linktr.ee/aige.inConnect with Roman on LinkedInNauman:Nauman Arshad, founder of BeQuantum.ai, is protecting digital assets in the post-quantum era. With decades in cryptography, embedded systems, and cybersecurity since the 1990s internet boom, he implements quantum random number generators and post-quantum cryptography following NIST and NSA standards. Based in Dubai, he's future-proofing security infrastructure as quantum computers threaten traditional encryption, ensuring AI platforms are built on unbreakable foundations.Learn More Here: BeQuantum.AIConnect with Nauman on LinkedInAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
Securing Healthcare's Identity Crisis: Why Non-Human Identities Are Your Biggest Cybersecurity Threat Join us for a critical discussion on healthcare's most pressing cybersecurity challenge with Nikki Bennett, Healthcare Advisory Identity Strategist at SailPoint. Drawing from five years of frontline IAM experience at ECU Health, Nikki reveals how to transform identity vulnerabilities into strategic advantages, tackling everything from non-human identities and AI agents to cloud migration strategies. She shares breakthrough announcements from SailPoint's Navigate event and delivers actionable insights on why intelligent identity frameworks are becoming the cornerstone of healthcare's cybersecurity future. Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen/
While the role of a chief data officers (CDOs) was traditionally focused on regulatory compliance, it has now expanded to empowering the consistent and effective use of data across organizations to improve business outcomes. One of the most effective ways for CDOs to demonstrate their value is by developing a data strategy that is closely aligned with business goals, processes, and outcomes. In the latest episode of Tech Transformed, host Kevin Petrie, VP of Research at BARC, speaks with Brett Roscoe, Senior Vice President and GM of Cloud Data Governance and Cloud Ops at Informatica, about the evolving role of CDOs. Their conversation explores how CDOs are transitioning from data stewards to strategic leaders, the importance of data governance, and the challenges of managing unstructured data.The Role of the CDO in the Agentic EraAs Roscoe notes, “CDOs are now pivotal in AI strategy,” reflecting how the role has grown from compliance oversight to guiding enterprise initiatives that directly support organizational goals.In this day and age, CDOs are tasked with ensuring that data is both accessible and reliable, providing a foundation for informed decision-making across business units. This includes establishing policies for data quality, access, and governance, which Roscoe highlights as essential: “data governance is foundational for AI.” At the same time, unstructured data ranging from documents and emails to multimedia adds complexity that requires careful management to make it useful while minimizing risk. “Unstructured data presents challenges,” he adds, emphasizing the need for structured oversight to fully leverage these assets.AI StrategyAlthough technology and analytics are evolving rapidly, the CDO's role in aligning data with strategic initiatives is critical. By connecting data assets to business processes, CDOs help ensure that initiatives are informed by reliable, well-governed information and can deliver measurable results.For anyone looking to understand the evolving responsibilities of CDOs, the importance of governance, and strategies for handling unstructured data, this episode of Tech Transformed provides a detailed and practical discussion.For more insights, follow Informatica:X: @informaticaInstagram: @informaticacorpFacebook: https://www.facebook.com/InformaticaLLC/LinkedIn: https://www.linkedin.com/company/informatica/TakeawaysCDOs are now central to shaping AI strategies and driving business growth.Robust data governance is crucial for the successful deployment of AI technologies.Unstructured data presents unique challenges and opportunities for AI development.A balance between centralized governance and federated operations is essential.Securing executive...
In this episode of American Potential, host David From sits down with Montana State Representative Gary Perry, Chair of the House Energy & Technology Committee, to discuss how Montana can remain a leader in energy production while preparing for the future. Perry outlines his vision for expanding coal and small modular nuclear reactors (SMRs), strengthening transmission infrastructure, and ensuring Montana stays a net energy exporter in the West. He also shares how reliable, affordable energy supports local jobs and keeps Montana's rural communities strong, while explaining the importance of regional cooperation with neighboring states and Canada to stabilize the grid. From Colstrip's legacy to next-generation nuclear, Perry lays out a clear, common-sense path to energy abundance and economic growth for Big Sky Country.
Crew Dragon and Commercial Human Spaceflight. Eric Berger discusses NASA's Commercial Crew Program, initiated after the Space Shuttle retired. Boeing's entry legitimized the program, securing crucial congressional funding for competitors like SpaceX. SpaceX adapted the Dragon design for crew, involving extensive parachute testing by the "Shoot Show" team in the desert and ultimately agreeing to water landings for astronaut safety. Crew Dragon launched atop the Falcon 9 Block 5, the modern rocket iteration optimized for rapid reuse, emphasizing that reusability remained the central focus, even for human spaceflight. Guest: Eric Berger.
From November 10 to 21, 2025, the UN Climate Change Conference, commonly referred to as COP30, is taking place in Belém, the city called the "gateway" to the Amazon Rainforest. In this interview we hear from Bryan Bixcul (Maya-Tz'utujil), global coordinator of the Securing Indigenous Peoples' Rights in the Green Economy (SIRGE) coalition. Produced by Dev Kumar Sunuwar (Sunuwar) Music: 'Libres y Vivas', by Mare Advertencia, used with permission. 'Burn your village to the ground', by The Haluci Nation, used with permission.
Donald Trump has spent this year trying to negotiate a deal to end the war in Ukraine. So far, Vladimir Putin doesn't seem interested in the US's proposals. One man who has successfully negotiated with Russia – and with many of America's adversaries – is Roger Carstens, former Special Presidential Envoy for Hostage Affairs. From 2020 to 2025 he worked to free dozens of US citizens taken hostage and wrongfully detained around the world, including in Russia. Securing their release often required complex deals that took years to put together. What does it take to successfully negotiate with Putin's Russia?With Asma Khalid in DC, Tristan Redman in London, and the backing of the BBC's international newsroom, The Global Story brings clarity to politics, business and foreign policy in a time of connection and disruption. For more episodes, just search 'The Global Story' wherever you get your BBC Podcasts.Producer: Lucy Pawle Executive producer: James Shield Senior news editor: China Collins Mix: Travis Evans Photo: Roger Carstens. Credit: BBC
Rare Earths Monopoly and US Strategy. General Blaine Holt discusses China's challenge to the US and its allies regarding rare earths, noting that China previously threatened to cut off supply. The US is securing deals with partners like Australia and is on track to replace China entirely, despite initial processing reliance on Chinese predatory practices. Holt suggests a two-year recovery is conservative, as technology for domestic processing exists. He also notes China's leadership is in turmoil, trying to buy time through trade deals. 1942
We explore how poker shaped Andrew Macleod's thinking and how those mental models helped him build Emilia's Crafted Pasta into a debt-free, multi-site brand. From scouting Italy to opening under budget and growing slow, we show how to balance soul with margins.• Poker as a mirror of risk and behaviour• Bootstrapping events and earning trust without capital• Finding the pasta gap and validating with travel and craft• Raising seed from relationships built on delivery and discipline• Securing a first site through persistence and landlord alignment• Opening lean, surviving the quiet months, building word of mouth• Frameworks for skill acquisition and early career risk-taking• Balancing hospitality warmth with unit economics• Cross-functional accountability and consequence visibility• Choosing independence, optionality, and long-term brand depthPlease like and subscribeAnd post a review, we'd really appreciate itIf you want to know more about starting a food business, head to www.jaygreenwood.co.ukSupport the show
Donald Trump has spent this year trying to negotiate a deal to end the war in Ukraine. So far, Vladimir Putin doesn't seem interested in the US's proposals. One man who has successfully negotiated with Russia – and with many of America's adversaries – is Roger Carstens, former Special Presidential Envoy for Hostage Affairs. From 2020 to 2025 he worked to free dozens of US citizens taken hostage and wrongfully detained around the world, including in Russia. Securing their release often required complex deals that took years to put together. What does it take to successfully negotiate with Putin's Russia? Producer: Lucy Pawle Executive producer: James Shield Senior news editor: China Collins Mix: Travis Evans Photo: Roger Carstens. Credit: BBC
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions at Airia, joins Business Security Weekly to discuss the challenges of MCP and how to secure this new protocol. Rahul will cover how Aria's solutions help you secure your AI development by: Centralizing Access Control Enforcing Security Policies Maintaining Compliance Enabling Rapid Response This segment is sponsored by Airia. Visit https://securityweekly.com/airia to learn more about them! In the leadership and communications segment, CISO Burnout – Epidemic, Endemic, or Simply Inevitable?, If Trust Is So Important, Why Aren't We Measuring It?, Over one-third of companies plan to replace entry roles with AI, survey says, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-421
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions at Airia, joins Business Security Weekly to discuss the challenges of MCP and how to secure this new protocol. Rahul will cover how Aria's solutions help you secure your AI development by: Centralizing Access Control Enforcing Security Policies Maintaining Compliance Enabling Rapid Response This segment is sponsored by Airia. Visit https://securityweekly.com/airia to learn more about them! In the leadership and communications segment, CISO Burnout – Epidemic, Endemic, or Simply Inevitable?, If Trust Is So Important, Why Aren't We Measuring It?, Over one-third of companies plan to replace entry roles with AI, survey says, and more! Show Notes: https://securityweekly.com/bsw-421
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions at Airia, joins Business Security Weekly to discuss the challenges of MCP and how to secure this new protocol. Rahul will cover how Aria's solutions help you secure your AI development by: Centralizing Access Control Enforcing Security Policies Maintaining Compliance Enabling Rapid Response This segment is sponsored by Airia. Visit https://securityweekly.com/airia to learn more about them! In the leadership and communications segment, CISO Burnout – Epidemic, Endemic, or Simply Inevitable?, If Trust Is So Important, Why Aren't We Measuring It?, Over one-third of companies plan to replace entry roles with AI, survey says, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-421
Returning for episode #204 is Trey McGranahan! He is the driver of the Tyler Sturgeon Racing | Engine Ice #77s non-winged sprint car. Racing out of Avon, Indiana. He rejoins us for round 2, previously he was on in April of 2024 for episode #136. We have some catching up to do!
Show Notes: Eugene Kim shares his post-graduation journey staying in Boston to finish research at the Dana-Farber Cancer Institute which was part of his thesis and also laid down the groundwork for his own cancer research which he has conducted over the years. He credits his understanding of science to his time at Harvard. He also worked at the now-closed Love the Border Cafe. Eugene reflects on the valuable lessons learned from working at the cafe and describes the unique subculture of the cafe's staff, including the Brazilian kitchen staff and the diverse backgrounds of the waiters and waitresses. Securing a Position in Research Eugene talks about his major in biochemical sciences and his interest in molecular biology. He describes how he got involved in research at the Dana-Farber Cancer Institute, working with a researcher named Sam Speck. Eugene details the hands-on experience he gained, including growing bacteria, running gels, and learning the importance of meticulous work, and shares memorable experiences of working there, including biking through snow to continue his research during a Thanksgiving blizzard. Enrolling in Columbia Medical School Eugene discusses his decision to attend Columbia Medical School in New York City, influenced by his desire to learn in a bustling city and study at a school that was his top choice. Eugene talks about his four years in medical school, his general surgical training, and working in a cancer research laboratory and developing an interest in pediatric cancer. Eugene recounts his experience during 9/11, including the hospital's response and his involvement in helping first responders at Ground Zero. He reflects on the impact of 9/11 on the New York City community and the long-term health effects on residents. A Focus on Pediatric Surgery Eugene explains his transition from adult surgery to pediatric surgery, driven by his desire to help children. He describes his training at Cincinnati Children's Hospital and the competitive nature of obtaining a spot in pediatric surgery training. Eugene shares his experience in Houston, Texas, and the importance of mentorship in his career. He discusses the challenges and rewards of being a pediatric surgeon, including the need to specialize in various areas of surgery. Eugene emphasizes the importance of mentorship in his career and his efforts to mentor young surgeons and researchers. He describes the physical and mental demands of long surgeries and the importance of staying physically fit. Eugene discusses the impact of new technologies on pediatric surgery, such as robotic surgery and advanced imaging techniques. He reflects on the importance of remaining open-minded to new technologies and incorporating them into his practice. Harvard Reflections Eugene reflects on his time at Harvard, including his interest in art history and Japanese art and history taught by John Rosenfield. He shares his appreciation for the seminar course with Mark Ptashne, which deepened his interest in molecular biology. He also mentions an Introduction to Architecture course with James Ackerman. Eugene discusses the importance of taking courses outside of his major and the impact of these courses on his career. He reflects on the value of the requirements at Harvard and how they broadened his perspective and knowledge. A Journey into Wine Eugene shares his interest in wine, including his extensive collection and the impact of the Palisades fire on his collection. He describes his journey into wine, including learning about different regions and types of wine. Eugene recounts a memorable experience of tasting rare wines with the head red wine maker from Penfolds in Australia. He reflects on the importance of balancing professional and personal interests and the joy of sharing his passion for wine with others. Timestamps: 04:44: Early Research Experience at Harvard 08:13: Medical School and Early Career 18:46: Transition to Pediatric Surgery 40:09: Mentorship and Professional Development 44:03: Personal Interests and Hobbies 51:03: Reflections on Harvard and Beyond Links: Hospital website: https://researchers.cedars-sinai.edu/Eugene.KimX/about Twitter / X: https://x.com/dreskim LinkedIn: https://www.linkedin.com/in/eugenekim3/
Out of the blue, Plains All American has scooped up 100% of the EPIC Crude Pipeline. Plains had previously announced an agreement to buy a 55% stake in the Permian-to-Corpus-Christi pipeline from Diamondback Energy and Kinetik Holdings, and on November 5, it said it had closed on a deal to buy the other 45% from Ares Management. In today's RBN blog, we'll discuss what the acquisition means for Plains, as well as a possible expansion of EPIC and the planned rebranding of the pipe.
In this episode of YAS Podcast, host Daisy Ducati converses with Michael McGrady Jr., contributing legal editor for AVN magazine, discussing recent legislative efforts aimed at regulating sex work and queer identities. They delve into various initiatives, including Michigan's proposed Anti-Corruption of Public Morals Act and the implications of age verification laws on the adult entertainment industry. McGrady provides insights on how such laws could jeopardize freedoms and privacy, emphasizing the need for continued advocacy and resilience within the sex work and queer communities. The episode highlights the importance of voting and staying informed to safeguard rights amidst increasing political and cultural challenges.00:00 Introduction and Overview of the Anti-Corruption of Public Morals Act00:42 Welcome to YAS Podcast01:31 Meet Michael McGrady Jr.04:21 Michael's Journey into Journalism09:01 The Age Verification Debate13:18 Concerns Over Data Privacy and Security18:37 Impact on LGBTQ+ Community21:51 The Role of VPNs and Data Security24:52 Challenges Faced by Legitimate Porn Sites27:11 FTC Settlement Concerns28:45 Regulatory Challenges in the UK31:02 Global Impact on Content Creation34:58 Michigan's Anti-Pornography Bill37:21 Defining Prohibited Materials39:25 Conflation of Queer Identity and Porn45:18 Fighting for Rights and Acceptance48:16 Closing Remarks and Call to ActionLinks: Michael McGrady AVN ProfileHouse Bill No. 4938 ( Anti-Corruption of Public Morals Act.)Daisy InstagramYASStore.ShopDonate to our work YAS Work InstagramYAS Work BlueSkyYAS Work TwitterYAS Work Youtube
What was it like to be inside Softimage during the Microsoft acquisition? How did Bill Gates' "big pivot" to the internet change everything overnight? Industry veteran David Morin joins Chris to share his fascinating origin story, from programming with punch cards and an 8-year art detour to working with ILM on Jurassic Park and navigating the seismic shifts at Softimage, Microsoft, Avid, and Autodesk. Today, David leads the Academy Software Foundation (ASWF), and he details its crucial mission: providing a permanent, secure home for the industry's most vital open-source software. He discusses the importance of the foundation's "stamp of approval," the massive recent addition of ACES, and how open source works with commercial tools to democratize filmmaking, enabling independent, Oscar-winning animated films like Float to be created with tools like Blender. Academy Software Foundation > Join the ASWF > David Morin on LinkedIn > History of Softimage > This episode is sponsored by: Center Grid Virtual Studio
ON THIS EPISODE ➤ Why 75% of employees are using unapproved AI tools right now ➤ How to consolidate AI usage onto one secure, compliant platform ➤ Live demonstration of no-code agent building for HR, sales, and operations ➤ Real enterprise security: SOC2, ISO 27001, and GDPR compliance explained ➤ Managing AI chat logs and...
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical AI Browser Agent Security Gap 1Password Now Available in Comet - the AI Browser by Perplexity This segment is sponsored by 1Password. Visit https://securityweekly.com/1password to learn more! Segment 2: Enterprise News In this week's enterprise security news, one big acquisition, two small fundings not all AI is bad deepfakes are getting crazy good make sure you log what your AI agents do Copilot prompt injection NordVPN tries to pull a jedi mind trick on us failure rate in AI adoption is a feature not a bug? using facial recognition to find Tinder profiles a predictable squirrel story All that and more, on this episode of Enterprise Security Weekly. Segment 3: Two interviews from Oktane 2025 Interview with Connor Mulherin of TechSoup The cybersecurity landscape in the nonprofit sector is evolving quickly, with organizations facing unique challenges due to limited resources, sensitive mission-driven work, and developing policies and training programs. Connor Mulherin, Director and GM of Validation Services at TechSoup, will discuss the industry's need for accessible and collaborative solutions to provide affordable technology leadership and security guidance. It will highlight how nonprofit organizations can build long-term digital resilience and combat these growing challenges. Segment Resources: www.techsoup.org Tech Impact Launch CTO Program For Small NPOs Virtual Chief Technology Officer Program for the Nonprofit Sector Interview with Mike Poole, Director of Cyber Security at Werner Enterprises In today's digital landscape, cybersecurity is not just a technical issue—it's a business imperative. Organizations that prioritize cybersecurity culture see fewer incidents and stronger resilience against evolving threats. But how do you foster a security-first mindset across an organization? This session will explore the critical components of building and maintaining a robust cybersecurity culture, starting with executive leadership buy-in—a fundamental step in securing resources and driving organizational change. We'll then dive into the power of monthly phishing exercises, which reinforce awareness and preparedness. Attendees will also learn how to develop effective training programs that engage employees at all levels and create lasting behavioral change. Finally, we'll discuss the role of cybersecurity-themed events, particularly during Cybersecurity Awareness Month, as a powerful tool to capture attention and reinforce key security principles. This segment is sponsored by Oktane by Okta. Visit https://securityweekly.com/oktane to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-430
Steve Yates Discusses Australia-US Alliance Strength and Political Turmoil Affecting APEC Summit Steve Yates with John Batchelor Steve Yates confirmed the Trump-Albanese meeting was a net positive, accelerating AUKUS and securing a rare earth deal that addresses supply access. He noted the political turmoil in Beijing, highlighted by uncertainty over Xi Jinping's APEC attendance. This instability is abnormal and reinforces China's unstable political foundation. Yates suggested this instability should push allies to rely more on the first island chain as a reliable balance. 1687
Can you believe it's already Week 8? We forge ahead with our big preview of Week 8 games with the appropriate audio treatment for an enormous Holy War between Utah and BYU in Provo. Plus, we unpack significance of Georgia Tech vs Duke as an ACC title tiebreaker, the road danger for Oklahoma and LSU -- two SEC teams that cannot run the ball -- traveling to South Carolina and Vandy, the underrated aspects of Texas Tech's quick rise, and the debate over whether Auburn can finally get a big win. And finally, some rapid fire picks, under the radar games, your Window of Opportunity and ideal quadboxes, and a Pat League Lightning Round for the ages as Lafayette might have a shot to upset an FBS opponent. Timecodes:0:00 - Intro & Saturday Nickname8:07 - The Holy War (Utah vs BYU)17:35 - Georgia Tech vs Duke23:32 - LSU vs Vandy31:13 - Oklahoma vs South Carolina36:31 - Texas Tech vs Arizona State43:18 - Rapid Fire Picks59:50 - Under The Radar Games1:17:05 - Window of Opportunity & Quads1:19:56 - Pat League Lightning Round Support the show and get perks like ad-free episodes, early releases, bonus content, Discord access and much more: https://www.verballers.com _____ A fan of our college football podcast? Leave us a rating and review, and don't forget to subscribe or follow so you don't miss any of our podcast episodes: Apple Podcasts: https://play.solidverbal.com/apple-podcasts Spotify: https://play.solidverbal.com/spotify Amazon Music: https://play.solidverbal.com/amazon-music Overcast: https://play.solidverbal.com/overcast Pocket Casts: https://play.solidverbal.com/pocketcasts Podcast Addict: https://play.solidverbal.com/podcast-addict CastBox: https://play.solidverbal.com/castbox Our college football show is also available on YouTube. Subscribe to the channel at: https://www.youtube.com/@solidverbal Learn more about the show on our website: https://www.solidverbal.com/about Want to get in touch? Give us a holler on Twitter: @solidverbal, @tyhildenbrandt, @danrubenstein, on Instagram, or on Facebook. You can also find our college football podcast out on TikTok and Threads. Stay up to date with our free weekly college football newsletter: https://quickslants.solidverbal.com/subscribe. College football has been our passion since we started The Solid Verbal College Football Podcast back in 2008. We don't just love college football, we live it!Support the show!: https://www.patreon.com/solidverbalSee omnystudio.com/listener for privacy information.
PREVIEW HEADLINE: Venezuela's Post-Maduro Challenge: Securing Military Loyalty in a Brief Transition Window GUEST: Evan Ellis, Professor, US Army War College 100-WORD SUMMARY: John Batchelor hosts Professor Evan Ellis to discuss the challenges facing Venezuela following the presumptive departure of Maduro, who heads the illegitimate Caracas regime and is named as the head of a drug cartel. The conversation focuses on the elected president, Edmundo González, and Nobel Peace Prize winner María Corina Machado. Machado and González insist they are the elected government and their transition is not a regime change. Professor Ellis emphasizes that the timeline is critical. Since the US likely "won't necessarily be sticking around" to establish the transition to a democratic order, González and Machado will face a "very brief window and a very difficult task." Key challenges include establishing order and securing the loyalty of military personnel whose prior bosses were aligned with Maduro. 1900 CARACAS Retry