Podcasts about securing

Degree of resistance to, or protection from, harm

  • 5,129PODCASTS
  • 9,071EPISODES
  • 38mAVG DURATION
  • 2DAILY NEW EPISODES
  • Feb 27, 2026LATEST
securing

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about securing

Show all podcasts related to securing

Latest podcast episodes about securing

Your Brand Amplified©
Austin Bonderer on Securing Your Competitive Edge with Bulletproof Patents

Your Brand Amplified©

Play Episode Listen Later Feb 27, 2026 44:26


Austin Bonderer's two decades in patent law distill into one essential principle: inventions solve problems, and speed matters more than perfection. His childhood realization that wireless smoke detection was needed taught him that entrepreneurs typically fail by over-refining rather than under-launching. Most entrepreneurs miss that the U.S. grants a one-year grace period after disclosure while most countries destroy patent rights immediately upon disclosure, making the first to file system unforgiving. Austin's real value extends beyond legal mechanics to business philosophy. He integrates into clients' entire operations to identify opportunities they miss, rather than merely reacting to requests. He ruthlessly exposes common sabotage: public disclosures that destroy foreign patent rights, NDAs without consideration that provide zero enforceability, and invention promotion firms that exploit rather than serve inventors. What sets him apart is his insistence that IP protection isn't a luxury but a foundational business tool that determines whether your innovation creates your wealth or enriches faster-moving competitors. If you're building something worth protecting, Austin Bonderer's strategic approach transforms IP from a legal checkbox into competitive advantage. Visit his website to partner with someone who understands both the law and the entrepreneur's reality—someone who integrates into your business strategy to identify opportunities you'll miss alone and protect innovations before competitors do. Don't let your ideas become someone else's competitive advantage. For the accessible version of the podcast, go to our Ziotag gallery.We're happy you're here! Like the pod?Support the podcast and receive discounts from our sponsors: https://yourbrandamplified.codeadx.me/Leave a rating and review on your favorite platformFollow @yourbrandamplified on the socialsTalk to my digital avatar Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

The Data Exchange with Ben Lorica
Securing the "YOLO" Era of AI Agents

The Data Exchange with Ben Lorica

Play Episode Listen Later Feb 26, 2026 52:25


Jason Martin, Director of Adversarial Research at HiddenLayer, returns to discuss the security implications of OpenClaw, a viral open-source AI personal assistant that was entirely vibe-coded and has exploded to 180,000 GitHub stars. Subscribe to the Gradient Flow Newsletter

The Mike Hosking Breakfast
Alex Kendall: Wayve CEO on securing $1.5 billion to roll out their self-driving technology commercially

The Mike Hosking Breakfast

Play Episode Listen Later Feb 25, 2026 8:21 Transcription Available


Someday soon your Uber could arrive with no one in the driver's seat, and a Kiwi's tech is behind the shift. UK self-driving company Wayve, spearheaded by Alex Kendall, has secured $1.5 billion in capital to support to the commercial roll out of their ‘Robotaxis'. The funding round also includes backing from Mercedes, Nissan, Microsoft and Nvidia, while local VC Icehouse Ventures is contributing $12.5 million to the capital raise. Kendall told Mike Hosking there's a couple of different ways to commercialise self-driving technology – creating your own cars, running your own fleets, or licensing the technology. Wayve is using the third option, and he says the AI they've built is so flexible that it will be able to bring self-driving technology worldwide. LISTEN ABOVE See omnystudio.com/listener for privacy information.

Sponsorship Talk with Roberta Vigilance
Sponsorship Talk with John Kremer on Book Sponsorship and Securing Sponsors

Sponsorship Talk with Roberta Vigilance

Play Episode Listen Later Feb 24, 2026 44:12


John Kremer, author of 1001 Ways to Market Your Books, joins Sponsorship Talk to share his experience with book sponsorship and how he secured sponsors for his book.In this episode, we explore what book sponsorship looks like, what authors should understand before approaching sponsors, and how positioning plays a key role in success.Listen now.John Kremer, The Book Authority, is the author of 1001 Ways to Market Your Books, mentor to authors who have sold over a billion books, and founder of the Billion Book Initiative to help the next generation of book authors sell another billion books. Over the past 40 years, he has helped thousands of authors, both major celebrities and those just starting out, to sell more books! Lots more books! Watch and engage with John on YouTube here:https://www.youtube.com/watch?v=jyJgZNcOKSg

securing book authority market your book john kremer billion book initiative
America's Work Force Union Podcast
Building Worker Power: From Union Resurgence to Transportation Safety Reforms

America's Work Force Union Podcast

Play Episode Listen Later Feb 23, 2026 44:24


The labor movement is shifting from a defensive crouch to a bold offensive strategy. On today's episode of the America's Work Force Union Podcast, we welcome two major voices in the labor movement to discuss the data behind the union resurgence and the legislative fight for worker safety. Segment 1: The Resurgence of American Unions Dave Kamper, Senior Strategist for the Economic Policy Institute (EPI), joins the show to discuss his new book, Who's Got the Power? The Resurgence of American Unions. Kamper explains how the pandemic served as a catalyst for worker demands and why Gen Z is leading the charge in organizing. Key Topics: Why EPI research is critical for labor's moral and economic case, the rise of "Solidarity Standards," and how Central Labor Councils are coordinating resource-heavy wins. Segment 2: Securing the Skies and the Streets Greg Regan, President of the Transportation Trades Department (TTD) of the AFL-CIO, outlines a three-front legislative agenda focused on safety as infrastructure. Key Topics: The ROTOR Act and preventing aviation collisions, the RIDER Safety Act to combat rising assaults on transit workers, and the urgent need for federal safety standards for Autonomous Vehicles (AVs) to protect both public safety and American jobs. Go Behind the Scenes of the Labor Movement. Every victory at the bargaining table starts with workers standing together. From the shop floor to the statehouse, hear how activists are fighting for better wages, safer conditions, and a stronger future. Subscribe to the America's Work Force Union Podcast to get the latest interviews with the leaders and organizers building worker power across America.

Resilient Cyber
Securing the Future with Autonomous Defense

Resilient Cyber

Play Episode Listen Later Feb 23, 2026 40:58


Summary:In this conversation, Chris Hughes and Stanislav Fort discuss the transformative role of AI in cybersecurity, particularly in vulnerability management. Stanislav shares insights on how AI can discover zero-day vulnerabilities in widely used codebases, the challenges of balancing AI-driven discoveries with quality assurance, and the importance of proactive security measures. They also explore the economic sustainability of AI in cybersecurity, the burden on maintainers, and the ongoing arms race between defenders and attackers. The discussion emphasizes the potential for AI to significantly enhance software security and the aspiration towards achieving zero vulnerabilities in critical infrastructure.Takeaways:AI is revolutionizing vulnerability management in cybersecurity.The ability to find long-hidden vulnerabilities is unprecedented.AI can enhance both offensive and defensive security measures.Proactive security integration into development pipelines is essential.The quality of vulnerability reports is declining due to AI-generated noise.Maintainers face increasing burdens from rapid AI-driven discoveries.AI can help secure open source projects effectively.Sustainability in AI cybersecurity requires financial backing.The arms race between attackers and defenders is intensifying with AI.Achieving zero vulnerabilities is an aspirational yet achievable goal.Chapters00:00 Introduction to AI in Cybersecurity02:52 The Evolution of AI and Vulnerability Discovery05:45 AI's Impact on Software Development08:59 Discovering Zero-Day Vulnerabilities11:48 The Great Bifurcation in Security Research14:52 Balancing AI-Driven Discoveries and Quality17:59 Proactive Security Measures in Software Development20:53 The Role of AI in Securing Open Source Projects23:54 Sustainability of AI in Cybersecurity27:07 Addressing the Burden on Maintainers30:09 The Tension Between Autonomy and Security33:03 The Arms Race Between Defenders and Attackers36:12 Aiming for Zero Vulnerabilities38:58 Conclusion and Future Outlook

Saturday Magazine
Sat, 21st, Feb, 2026: Cameron Doig, Arnold, Thomas and Becker: Explaining the changes to legislation for Vicarious Liability in Victoria

Saturday Magazine

Play Episode Listen Later Feb 22, 2026 12:39


Macca is back in the hosting seat and Jack’s back behind the panel and our very special guest host is Fiona Patten. Our first guest for this week is Cameron Doig, from the Law Firm, Arnold, Thomas and Becker, dissecting the news on the vicarious liability laws in Victoria. Cameron is a skilled and tested solicitor who has secured over 60 settlements for survivors of child sexual abuse and recovered over $40 million in total damages for his clients. He has secured settlements in excess of $1 million in a number of individual cases. He regularly brings claims for survivors of child abuse against government, religious, charitable, and sporting institutions as well as public and private schools. He is a clear communicator who enjoys making the legal system easy to understand for clients, walking them through the process, and explaining what they can expect. He is a practical and proactive litigator whose familiarity with the court process helps him level the playing field between vulnerable survivors and powerful institutions. Cameron's experience includes: • Settling 12 claims against the Victorian Government's Department of Education for victims of abuse by teacher Peter Sutton, including one claim for over $1.4 million; • Securing a $550,000 settlement against two Catholic religious orders for abuse of a former school student; and • Securing a $500,000 settlement for a man abused in Bayswater Boys Home and Turana. He has appeared in print and TV media discussing his clients' cases and issues confronting abuse survivors. He has volunteered at the Refugee Legal Night Service since August 2023. “Vicarious liability is a legal doctrine holding a party (often an employer) responsible for the wrongful acts or omissions of another (usually an employee) committed during the course of employment, even if the superior is not directly at fault. It is a form of strict liability, commonly applied in workplace discrimination, harassment, or negligence cases” https://humanrights.gov.au/resource-hub/by-resource-type/publications/sex-and-gender-rights/vicarious-liability If this story has affected you in any way please go to the Joy Support page to find support: https://joy.org.au/support/ The post Sat, 21st, Feb, 2026: Cameron Doig, Arnold, Thomas and Becker: Explaining the changes to legislation for Vicarious Liability in Victoria appeared first on Saturday Magazine.

The John Batchelor Show
S8 Ep489: Sir Max Hastings details the daring glider assault to capture the Orne River bridge, where Major John Howard's troops achieved total surprise, securing a vital link for British airborne and seaborne forces on D-Day itself. 9

The John Batchelor Show

Play Episode Listen Later Feb 21, 2026 9:05


Sir Max Hastings details the daring glider assault to capture the Orne River bridge, where Major John Howard'stroops achieved total surprise, securing a vital link for British airborne and seaborne forces on D-Day itself. 91944 SWORD BEACH

Wall Street Oasis
How Jaden Broke Into Investment Banking (Non-Target to Offer)

Wall Street Oasis

Play Episode Listen Later Feb 21, 2026 41:59


In this episode, Jaden shares his real journey breaking into investment banking — from navigating competitive recruiting to ultimately securing the offer. This conversation dives into the realities of IB recruiting, networking strategy, rejection, and the mindset required to succeed in high-performance finance roles. If you're targeting investment banking, consulting, private equity, or other competitive finance careers, this episode provides practical insights from someone who has recently gone through the process. 00:00 – Intro 00:45 – How Jaden Became Interested in Investment Banking 03:20 – Early Recruiting Mistakes 06:10 – Understanding How IB Recruiting Actually Works 09:45 – The Role of Networking in Breaking Into Finance 13:30 – Handling Rejection & Staying in the Process 17:50 – What Superdays Are Really Like 21:15 – What Finally Made the Difference 25:40 – Securing the Investment Banking Offer 28:10 – Advice for Students Recruiting Today 31:00 – Final Lessons on Breaking Into Investment Banking Subscribe for more mentor conversations focused on finance careers, recruiting strategy, and long-term professional growth.

Shift AI Podcast
Securing Agentic Automation in the Enterprise with UiPath CISO Scott Roberts

Shift AI Podcast

Play Episode Listen Later Feb 21, 2026 34:44


In this episode of the Shift AI Podcast, Scott Roberts, CISO at UiPath, joins host Boaz Ashkenazy for a deep dive into how agentic AI is reshaping enterprise security and automation—both for customers and inside UiPath itself.Scott shares his 25-year security journey spanning Microsoft's early Security Response Center days (including the era that produced Patch Tuesday and the Security Development Lifecycle), product security work across Windows and Xbox, time at AWS, and leadership roles at Google where he helped build the Android Security Assurance and Pixel Security teams and the Android Monthly Security Update process. He also discusses his work in security standards across IPsec, HTML5 encrypted media, GSMA device security, and most recently, contributions to emerging agentic AI security standards.The conversation then explores UiPath's evolution from traditional RPA into a unified platform that combines deterministic automation with agentic workflows. Scott walks through a real-world healthcare billing example where agentic automation increased deduplication accuracy dramatically by handling complex, variable inputs that classic RPA struggled with—while still keeping humans in the loop and feeding outcomes back into the system to improve over time.Boaz and Scott go deep on what's changed for CISOs in the post-LLM world: the need for guardrails, identity and entitlements for AI agents, and the challenge of end users copying sensitive information into consumer AI tools. Scott explains UiPath's approach: enable adoption while using nudges and policy controls to redirect sensitive workflows into enterprise-safe environments rather than relying solely on blocks.The episode closes with an eye-opening look at UiPath's internal “agentic threat analyst” system—an orchestration of 60+ agents that can investigate SIEM alerts end-to-end, generate structured incident writeups, and compress hours of analyst work into roughly a minute and a half. Scott's future-looking takeaway: as AI models evolve beyond “read-only” into potentially “read-write” systems that can update their foundational knowledge, the acceleration could be truly mind-blowing.This episode is essential listening for security leaders, enterprise operators, and automation teams trying to understand how agentic systems change not just productivity, but the entire security operating model.Chapters[00:01] Scott's Security Journey: Microsoft, Google, Coinbase, UiPath[01:33] Security Standards Work: From IPsec to Agentic AI Standards[04:08] What UiPath Does: Process Orchestration, RPA, and Enterprise Automation[06:28] RPA vs Agentic Automation: A Healthcare Billing Deduplication Example[09:17] The Agentic Stack: Canvas, Guardrails, and the AI Trust Layer[10:31] How LLMs Change Security: Data Controls, Access, and Governance[12:14] Internal Adoption at UiPath: AI Tooling by Persona (Legal, Finance, Engineering)[13:13] Code Velocity and Security: Agents Generating Code, Agents Verifying It[15:53] Two AI Security Worlds: Orchestration Platforms vs End-User Chat Interfaces[17:11] Securing End Users: Enterprise LLMs, Nudges, and Browser-Based Controls[19:07] Sovereign AI and Data Boundaries: Keeping Data in the Right Region[21:00] Over-Permissioning Meets Agents: Why AI Makes Old Problems Obvious Fast[22:21] The Next Wave: AI Transforming the Entire SDLC End-to-End[24:53] Security Pitfalls in Agentic SDLC: Misaligned Incentives and Permissions[26:02] UiPath's Agentic Threat Analyst: 60+ Agents, SIEM to Writeup Automation[30:07] What Changes for Humans: Faster “Time to Truth” and Higher-Leverage Work[32:09] Two-Word Future: “Mind Blowing” and Read/Write ModelsConnect with Scott RobertsLinkedIn: https://www.linkedin.com/in/scottroberts6/Connect with Boaz AshkenazyLinkedIn: https://www.linkedin.com/in/boazashkenazy/Email: info@shiftai.fm

Land & Livestock Report
Trump Signs Executive Order to Strengthen National Defense by Securing Elemental Phosphorus and Glyphosate Supply

Land & Livestock Report

Play Episode Listen Later Feb 20, 2026


Trump Signs Executive Order to Strengthen National Defense by Securing Elemental Phosphorus and Glyphosate Supply

Hacker Valley Studio
Securing the Workspace Attackers Already Live In with Rajan Kapoor

Hacker Valley Studio

Play Episode Listen Later Feb 19, 2026 38:29


Your email gateway isn't enough anymore, attackers are already inside the workspace through OAuth apps, browser extensions, and account takeover.  In this episode, Ron sits down with Rajan Kapoor, VP of Security at Material Security, to break down the real risks hiding inside Google Workspace and Microsoft 365. They cover how phishing has evolved into full-blown business email compromise, why malicious OAuth apps are the new favorite attack vector, and what security teams, especially lean ones, can do right now to lock down their cloud workspace. Rajan also drops practical advice on passkeys, document sharing hygiene, and why data lifecycle management is a problem no one is solving well enough. Impactful Moments 00:00 – Introduction 03:30 – The current state of phishing 05:30 – Outbound email compromise risk 09:30 – OAuth apps as attack vectors 15:00 – AI agents accessing your workspace 16:00 – Prompt injection is the new SQL injection 18:00 – Allow listing apps immediately 24:30 – Google Workspace vs Microsoft 365 security 27:30 – Custom detections require API expertise 28:00 – Why passkeys matter right now 32:00 – Data lifecycle management for shared docs Links Connect with our guest, Rajan Kapoor, on LinkedIn: https://www.linkedin.com/in/rajankkapoor/ Learn more about Material Security: https://material.security  ___ Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/ Check out our upcoming events: https://www.hackervalley.com/livestreams  Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com   

Cybercrime Magazine Podcast
Securing The Build. The State of Open Source Risk. Amit Chita, Mend.io.

Cybercrime Magazine Podcast

Play Episode Listen Later Feb 19, 2026 10:16


Amit Chita is the Field CTO at Mend.io. In this episode, he joins host Paul John Spaulding to discuss open source risk for organizations, which components matter from a business and security standpoint, and more. Securing The Build is brought to you by Mend.io, the leading application security solution, helping organizations reduce application risk efficiently. To learn more about our sponsor, visit https://mend.io.

HLTH Matters
Securing Healthcare's Passwordless Future with Imprivata

HLTH Matters

Play Episode Listen Later Feb 19, 2026 25:16


In this episode, host Sandy Vance chats with Dr. Sean Kelly, the Chief Medical Officer and the SVP of Customer Healthcare Strategy at Imprivata. Together, they unpack how healthcare organizations can strengthen cybersecurity without slowing clinicians down—exploring everything from mobile device security and passwordless authentication to adaptive authentication, risky user behaviors, and the very real implications for patient safety, workflow efficiency, and ROI for healthcare leaders.In this episode, they talk about:How cybersecurity can be improvedThe impact that Imprivata has on clinicians Why multi-factor authentication systems aren't more prevalent in the healthcare industryThe risky behaviors that open up organizations to security risksThe different things that Imprivata offers organizationsThe risks of patient harm in cybersecurity and privacyAdvice for CIOs or CFOs: workflow implications, security compliance, security and efficiency ROI, and financial valueAdaptive authentication at ImprivataA Little About Sean:Dr. Sean Kelly brings a uniquely well-rounded perspective to healthcare, shaped by a career that spans emergency medicine, healthcare leadership, technology, teaching, and entrepreneurship. An emergency physician at Beth Israel Lahey Health in Boston and an Assistant Clinical Professor of Emergency Medicine at Harvard Medical School, he is also the Chief Medical Officer and SVP of Customer Healthcare Strategy at Imprivata, where he helps guide product vision, go-to-market strategy, and customer experience after more than a decade with the company from startup through IPO and private equity ownership. He has led high-performing teams in both clinical and executive settings, contributed to care delivery improvements impacting millions of patients, published widely in emergency medicine and medical education, and earned multiple teaching awards. His background includes training at Harvard College, UMass Medical School, and Vanderbilt University, co-founding a concierge medical practice on Martha's Vineyard, international teaching and humanitarian work, and service in roles ranging from hospital administration to disaster relief—all grounded in a deep commitment to learning, mentorship, and collaboration.

The National Security Podcast
Modernising Australia's border security

The National Security Podcast

Play Episode Listen Later Feb 19, 2026 39:31


Why do Australia's borders require a fundamental rethink? How can Australian governments build on the vision of Australia's borders as a national strategic asset? How can new forms of border governance, such as the use of AI and advanced data analytics, be introduced without undermining public trust? What should the border look like for industry, travellers, the pubic, international partners and those interested in conducting trade with Australia? In this episode, Mike Outram joins Sally Bulkeley to discuss the need for Australia to reconceptualise its borders as strategic assets, the threats posed by transnational crime, and the economic benefits of modern border management.Sally Bulkeley is Deputy Head of the ANU National Security College (NSC).Mike Outram APM is a Distinguished Advisor at NSC. He was Commissioner of the Australian Border Force from 2018 to 2024. He has served as a law enforcement officer for over 30 years.TRANSCRIPTShow notes Securing our Future conference – Register nowNSC academic programs – find out more Beyond the checkpoint: managing Australia's border as a strategic economic and national security assetACIC CEO ‘opens the books' on serious and organised crime | National Security College We'd love to hear from you! Send in your questions, comments, and suggestions to NatSecPod@anu.edu.au. You can tweet us @NSC_ANU and be sure to subscribe so you don't miss out on future episodes. Hosted on Acast. See acast.com/privacy for more information.

To The Point - Cybersecurity
Cybersecurity in 2026: AI, Steganography, and Securing Legacy Systems with Jacob Anderson

To The Point - Cybersecurity

Play Episode Listen Later Feb 17, 2026 38:03


Welcome to this week's episode of the To the Point Cybersecurity Podcast, brought to you by Forcepoint. Join hosts Rachael Lyon and Jonathan Knepher as they dive into the fascinating world of cyber defense, covert channels, and the evolving role of AI with special guest Jacob Anderson, founder of Beyond Ordinary Software Solutions. With over 30 years of experience across industries like finance, defense, and entertainment, Jacob Anderson brings a unique perspective on everything from steganography in the age of AI, to the challenges of cryptanalysis, and the critical importance of securing legacy infrastructure. In this episode, you'll hear how today's cyber threats are changing—not just for governments or top-level spies, but for everyone. The conversation also explores the sometimes surprising ways AI is shaping both offensive and defensive tactics in cybersecurity, and why vigilance is more important than ever. Tune in as the team unpacks real-world examples, emerging industry trends, and practical advice for organizations juggling legacy and modern tech. Whether you're a cyber professional, a curious entrepreneur, or just trying to keep pace with the rapid evolution of technology, you won't want to miss the invaluable insights offered in today's show. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e372

Alexa's Input (AI)
Securing the Software Supply Chain with Justin Cappos

Alexa's Input (AI)

Play Episode Listen Later Feb 17, 2026 48:49


Modern software is built on layers and layers of code. So how do we know we can trust it?In this episode of Alexa's Input (AI), Alexa Griffith sits down with Justin Cappos, professor of computer science at NYU and a leading expert in software supply chain security, to unpack what trust really means in today's digital infrastructure.From package managers and dependency chains to large-scale outages and AI systems built on inherited code, Justin explains why many security failures aren't random accidents, they're predictable consequences of weak process, misaligned incentives, and insecure design.They discuss:Why security only becomes visible when something breaksThe difference between unavoidable failure and negligenceHow modern software supply chains amplify small mistakesThe role of leadership and culture in preventing breachesWhy verification systems like TUF and in-toto matter more than everAs AI accelerates development and increases system complexity, the need for verifiable trust only grows. This episode is a practical look at the invisible infrastructure that keeps modern software, and increasingly, modern AI, from collapsing under its own complexity.Podcast LinksWatch: ⁠⁠⁠⁠⁠⁠https://www.youtube.com/@alexa_griffith⁠⁠⁠⁠⁠⁠Read: ⁠⁠⁠⁠⁠⁠⁠⁠https://alexasinput.substack.com/⁠⁠⁠⁠⁠⁠⁠⁠Listen:⁠⁠⁠⁠ https://creators.spotify.com/pod/profile/alexagriffith/⁠⁠⁠⁠More: ⁠⁠⁠⁠⁠⁠https://linktr.ee/alexagriffith⁠⁠⁠⁠⁠⁠Website: ⁠⁠⁠⁠⁠⁠https://alexagriffith.com/⁠⁠⁠⁠⁠⁠LinkedIn: ⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/alexa-griffith/⁠⁠⁠⁠⁠Find out more about the guest at:Website: https://engineering.nyu.edu/faculty/justin-capposNYU page: https://ssl.engineering.nyu.edu/personalpages/jcappos/Wikipedia: https://en.wikipedia.org/wiki/Justin_CapposChapters00:00 Introduction to Justin Cappos and His Work01:17 The Importance of Security in Software Systems03:50 Understanding Security Breaches: Mistakes vs. System Design Problems06:34 Cultural Factors in Security Failures09:25 Justin's Journey in Software Security12:03 The Role of Academia in Enterprise Security14:10 Evaluating Enterprise Security Systems16:58 Foundational Projects in Software Security19:21 AI Security Concerns and Future Directions24:59 The Need for MCP 2.028:57 Security Challenges with LLMs32:33 Designing Secure AI Systems37:14 Ethical Dilemmas in AI Decision-Making40:17 The Role of AI in Open Source43:44 Trust and Mindset in AI Security

BigIDeas On The Go
Why AI Breaks Traditional Security Playbooks

BigIDeas On The Go

Play Episode Listen Later Feb 16, 2026 29:04


AI has quietly embedded itself across the enterprise but many security teams are still guarding it like a single tool, not the shared risk it's become.On this episode of Ctrl + Alt + AI, host Dimitri Sirota sits down with Aqsa Taylor, Chief Research Officer at Software Analyst Cyber Research, to break down how AI is changing the speed, scale, and structure of modern cyber threats. Drawing from direct conversations with CISOs, Aqsa explains why AI shortens attack timelines, lowers the barrier for sophisticated threats, and forces security teams to rethink response and recovery.The conversation focuses on what security leaders are missing as AI spreads across employees and third-party platforms. Aqsa outlines why securing AI requires treating it as an ongoing lifecycle tied to core security fundamentals rather than a one-time deployment.In this episode, you'll learn:Why AI-driven attacks demand faster containment, not more alertsHow overprivileged AI access quietly expands security riskWhy cleaning data before it reaches AI should be the top of mindThings to listen for: (00:00) Meet Aqsa Taylor(00:22) Why AI risk connects directly to data security(01:15) What CISOs are focused on right now(02:23) AI use is unavoidable inside organizations(03:51) Securing models and the data behind them(04:27) How AI speeds up attacks and response pressure(06:10) Data filtering, privileges, and prompt risk(07:15) LLMs, copilots, and agents create different risks(09:31) Cleaning data before it reaches AI(11:19) Why humans should stay in the loop(14:21) AI-driven phishing and malware scale faster(18:01) Testing AI SOC tools against real incidents(21:15) Governance helps but fundamentals matter more(24:31) Managing third-party AI access and visibility(26:49) Fix fundamentals before chasing AI threats

Dog Grooming Business Help & Support
Money Matters for Groomers: Protecting Your Income & Securing Your Future

Dog Grooming Business Help & Support

Play Episode Listen Later Feb 13, 2026 53:31 Transcription Available


As a pet groomer, you're brilliant at looking after dogs. But are you looking after your own finances just as well?In this episode, Bill sits down with Romany Youell – also known as The Finance Woman – to talk about something many grooming business owners avoid… money.If you're self-employed or running a salon, your income depends on you. So what would happen if you couldn't work? Would your business survive? Would you?Romany shares clear, practical advice on:Why financial literacy matters for pet professionalsWhat income protection actually is (and why most groomers misunderstand it)The difference between being busy and being financially secureWhy pensions and investments shouldn't be “something to sort later”The types of insurance business owners should genuinely considerOne of the biggest takeaways? Many groomers prioritise their clients, staff and salon expenses – but forget to protect themselves.This episode isn't about complicated financial jargon. It's about helping you feel more confident, more informed and more in control of your future.If you work for yourself, this conversation could genuinely change how you think about money in your grooming business.As always, I'd like to thank the podcast sponsor, Lopay, the low-cost payment platform that helps you keep more of the money you earn.You can find out more and sign up for Lopay here:https://merchant.lopay.app/ref/PETPASSION2500Listeners of this podcast get £2500 of fee-free transactions.And of course, if you feel like you could benefit from Bill's business programmes for the Pet Grooming industry, visit:https://petpassiontoprofit.com/If you found this episode helpful, make sure you subscribe, leave a review and share it with another groomer who needs to hear it.

Cybercrime Magazine Podcast
Securing The Build. The Future of AI AppSec Tooling. Amit Chita, Mend.io.

Cybercrime Magazine Podcast

Play Episode Listen Later Feb 12, 2026 14:10


Amit Chita is the Field CTO at Mend.io. In this episode, he joins host Paul John Spaulding to discuss the future of AI appsec tooling, including how AI should be used as a force multiplier, not a replacement, new risks, and more. Securing The Build is brought to you by Mend.io, the leading application security solution, helping organizations reduce application risk efficiently. To learn more about our sponsor, visit https://mend.io.

Holtecast - An Aston Villa Podcast
UNDER THE LIGHTS | Tyrone Mings' late deflected header ensures Aston Villa get back to winning ways

Holtecast - An Aston Villa Podcast

Play Episode Listen Later Feb 12, 2026 29:08


Well, it certainly wasn't pretty, but a win's a win! Listen in as Cole and Tom return to discuss a vital win at Villa Park and look ahead to an intriguing FA Cup tie against Newcastle United at Villa Park on Saturday.You can listen for FREE on Acast, Apple Podcasts, and Spotify - dig in!WHAT DO WE DISCUSS?Securing all three points at Villa Park against Brighton is all that matters, isn't it?Were Villa playing with a certain degree of caution?The Onana/Luiz midfield partnership.What can we make of Alysson's debut?FA Cup expectations and Newcastle's priorities heading into Saturday.STAY CONNECTED:Email: holtecast@gmail.comX: @HoltecastPodThreads: HoltecastBluesky: @holtecastpod.bsky.socialCole Pettem: @TalkAstonVillaTom Nightingale: @tdnightingaleEPISODE NOTES:Thank you to our charity partner, Acorns Children's Hopsice.Donate today to support a fantastic charity: https://www.acorns.org.uk/get-involved/donate/ Hosted on Acast. See acast.com/privacy for more information.

ISACA Podcast
Securing Data in the Age of AI with DSPM: Lessons from a High-Impact ISACA Webinar

ISACA Podcast

Play Episode Listen Later Feb 12, 2026 25:53


In this ISACA Podcast episode, host Safia Kazi, Principal Research Analyst – Privacy, is joined by Dirk Schrader, VP of Security Research at Netwrix, to discuss how generative AI is revealing long-standing gaps in enterprise data security and governance. This episode builds on insights from a recent ISACA webinar that explored how generative AI is exposing weaknesses in enterprise data security and governance. The discussion examines why many organizations lack visibility into where sensitive data resides and who can access it, particularly across hybrid and cloud environments. The conversation also addresses emerging risks introduced by AI tools, including non-human access and overexposed data. Listeners will gain practical, governance-focused guidance on how DSPM helps organizations assess risk, support compliance, and prepare data responsibly for AI initiatives. Related Resources: Watch the ISACA Webinar from the ISACA Virtual Summit 2025: “Securing Data in the Age of AI with DSPM” https://www.isaca.org/training-and-events/online-training/virtual-summits/ai-governance-strategies Learn more from Netwrix: https://netwrix.com/en/resources/ Explore more ISACA Podcasts: https://www.isaca.org/resources/news-and-trends/isaca-podcast-library ISACA on YouTube: https://www.youtube.com/@IsacaHq

Cracking Cyber Security Podcast from TEISS
teissTalk: Securing applications and infrastructure in the AI era

Cracking Cyber Security Podcast from TEISS

Play Episode Listen Later Feb 12, 2026 45:36


Aligning application and API security with the demands of the modern AI eraEnabling secure, high-performance infrastructure for AI and LLM environmentsSecuring APIs and your network without overspending on securityThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Tiago Rosado, Chief Information Security Office, Asitehttps://www.linkedin.com/in/tiagorosado/Jamison Utter, Field CISO, A10 Networkslinkedin.com/in/jamisonutter/

RunAs Radio
Securing Active Directory Certificate Services with Ron Arestia

RunAs Radio

Play Episode Listen Later Feb 11, 2026 44:27


You're using Active Directory Certificate Services - but is it configured securely? Richard talks to Ron Arestia about his work with organizations implementing their own Public Key Infrastructure (PKI) with ADCS. Ron explains how poorly configured ADCS enables lateral attacks within an organization once an initial breach occurs, allowing black hats to move throughout your network. A well-designed PKI system has tiers of protection, with the top level completely disconnected from the network. Or do you really need your own PKI system? The conversation digs into the various scenarios, including third-party options. Certificates are the top level of security for your organization - you need to get it right!LinksActive Directory Certificate ServicesWindows Hello for BusinessCertified Pre-OwnedMicrosoft Defender for IdentitySecure Privileged AccessPass the HashMicrosoft Cloud PKI for Microsoft IntuneMicrosoft Entra Conditional AccessMicrosoft AutopilotRon's BlogRecorded February 6, 2026

Order of Man
IAN WENDT | Securing Your Sovereignty

Order of Man

Play Episode Listen Later Feb 10, 2026 138:21


In a world that constantly pressures men to outsource responsibility, comfort has become a substitute for competence and dependence is sold as safety. But sovereignty isn't something given to you by institutions, culture, or circumstance. It's secured through discipline, ownership, and a commitment to lead yourself first. In this episode, we're talking about what it really means to secure your sovereignty—mentally, physically, financially, and morally—so no one else gets to dictate the terms of your life. My guest today, Ian Wendt, joins me for a powerful conversation on reclaiming authority over your decisions, your time, and your future. We dig into the hidden trade-offs men make when they surrender control, the systems that quietly erode independence, and the practical steps required to stand firm as a self-governed man in an increasingly unstable world. This isn't about rebellion, it's about responsibility. If you're serious about protecting what you've built and leading with clarity and conviction, this is a conversation you need to hear. SHOW HIGHLIGHTS 00:00:00 - The Evolution of Podcasting 00:13:36 - Ryan's Origin Story and Order of Man 00:29:03 - The State of Masculinity Today 00:44:18 - Leadership, Standards, and Responsibility 00:59:03 - Marriage, Fatherhood, and Presence 01:14:32 - Building Brotherhood and Community 01:29:01 - Discipline, Business, and Personal Code 01:44:07 - Final Advice for Men Who Want More 01:58:34 - Closing Thoughts Battle Planners: Pick yours up today! Order Ryan's new book, The Masculinity Manifesto. For more information on the Iron Council brotherhood. Want maximum health, wealth, relationships, and abundance in your life? Sign up for our free course, 30 Days to Battle Ready  

Crosstalk America from VCY America
Securing Our Nation

Crosstalk America from VCY America

Play Episode Listen Later Feb 10, 2026 53:28


Mark Krikorian is a nationally recognized expert on immigration issues serving as the Executive Director of Center for Immigration Studies. When it comes to our nation's borders, the last 12 months have been quite remarkable. The last administration repeatedly told us that Congress would have to act to reform our immigration policies and laws before the borders could be secured. That turned out to be a falsehood because under Trump 2.0, the U.S. borders are more secure than ever, and with that aspect of immigration taken care of, his administration has moved on to purge what they term, "The worst of the worst." In the meantime, as we've seen in Minnesota, there are those who don't like what's taking place. They're responding by causing extreme chaos, disruption, violence, vandalism, as well as assaults. So don't miss this program as Jim interviewed Mark to have him comment on the following points related to our nation's immigration and border security: In a major legal win, the Fifth Circuit Court of Appeals ruled that the Trump administration does, in fact, have the authority and requirement to detain all illegal entrants to the U.S., even if they're caught inside the country. Yesterday, the Ninth Circuit Court gave a win to the Trump administration regarding temporary protected status to nations like Nepal, Honduras and Nicaragua. According to the Department of Homeland Security, January numbers (of border encounters) ranked 93% below the historic average, the lowest number of encounters ever for the month of January. 9 straight months of zero releases. Record drug seizures.

Crosstalk America
Securing Our Nation

Crosstalk America

Play Episode Listen Later Feb 10, 2026 53:28


Mark Krikorian is a nationally recognized expert on immigration issues serving as the Executive Director of Center for Immigration Studies. When it comes to our nation's borders, the last 12 months have been quite remarkable. The last administration repeatedly told us that Congress would have to act to reform our immigration policies and laws before the borders could be secured. That turned out to be a falsehood because under Trump 2.0, the U.S. borders are more secure than ever, and with that aspect of immigration taken care of, his administration has moved on to purge what they term, "The worst of the worst." In the meantime, as we've seen in Minnesota, there are those who don't like what's taking place. They're responding by causing extreme chaos, disruption, violence, vandalism, as well as assaults. So don't miss this program as Jim interviewed Mark to have him comment on the following points related to our nation's immigration and border security: In a major legal win, the Fifth Circuit Court of Appeals ruled that the Trump administration does, in fact, have the authority and requirement to detain all illegal entrants to the U.S., even if they're caught inside the country. Yesterday, the Ninth Circuit Court gave a win to the Trump administration regarding temporary protected status to nations like Nepal, Honduras and Nicaragua. According to the Department of Homeland Security, January numbers (of border encounters) ranked 93% below the historic average, the lowest number of encounters ever for the month of January. 9 straight months of zero releases. Record drug seizures.

The Clement Manyathela Show
World of Work - The challenge of securing jobs without experience

The Clement Manyathela Show

Play Episode Listen Later Feb 10, 2026 22:20 Transcription Available


Clement Manyathela speaks to Nqaba Mabece, who is the Executive for Institutional Advancement and Internationalisation at Rosebank College to understand how young people can get over the challenge of securing employment without experiences. The Clement Manyathela Show is broadcast on 702, a Johannesburg based talk radio station, weekdays from 09:00 to 12:00 (SA Time). Clement Manyathela starts his show each weekday on 702 at 9 am taking your calls and voice notes on his Open Line. In the second hour of his show, he unpacks, explains, and makes sense of the news of the day. Clement has several features in his third hour from 11 am that provide you with information to help and guide you through your daily life. As your morning friend, he tackles the serious as well as the light-hearted, on your behalf. Thank you for listening to a podcast from The Clement Manyathela Show. Listen live on Primedia+ weekdays from 09:00 and 12:00 (SA Time) to The Clement Manyathela Show broadcast on 702 https://buff.ly/gk3y0Kj For more from the show go to https://buff.ly/XijPLtJ or find all the catch-up podcasts here https://buff.ly/p0gWuPE Subscribe to the 702 Daily and Weekly Newsletters https://buff.ly/v5mfetc Follow us on social media: 702 on Facebook https://www.facebook.com/TalkRadio702 702 on TikTok https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/Radio702 702 on YouTube: https://www.youtube.com/@radio702 See omnystudio.com/listener for privacy information.

Cypress Bible Church
Securing the City of God _ Nehemiah8_1-8

Cypress Bible Church

Play Episode Listen Later Feb 9, 2026 44:22


Securing the City of God _ Nehemiah8_1-8 by Cypress Bible Church

John Solomon Reports
Securing Elections and Combating Disinformation: A Deep Dive with Senator Marsha Blackburn

John Solomon Reports

Play Episode Listen Later Feb 6, 2026 34:27


In this episode of John Solomon Reports, we dive into the pressing issues shaping our nation, starting with an insightful conversation with Senator Marsha Blackburn of Tennessee. As a key voice on the Senate Judiciary Committee, Senator Blackburn discusses the SAVE Act and its critical combination with voter ID requirements, aimed at enhancing the security of elections in America. She also addresses the alarming rise in violence against ICE agents, highlighting 180 instances of vehicles being used as weapons against Homeland Security personnel.Next, Dr. Peter McCullough joins the show to share groundbreaking developments in telemedicine and personal health. Known for his accurate insights during the COVID-19 pandemic, Dr. McCullough introduces innovative medical solutions that are transforming patient care, including new weight loss treatments and emergency medical kits delivered directly to homes.In the third segment, John welcomes Dr. Darrell Williams, a leader in the Pentagon's artificial intelligence initiatives. Dr. Williams discusses his mission to leverage AI in discerning truth from misinformation in the digital realm, revealing startling statistics about the prevalence of false information online. His pioneering work aims to enhance the capabilities of our military and intelligence agencies in navigating the complexities of the information age.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Gene Valentino's GrassRoots TruthCast
Gene's position when he ran for US Congress

Gene Valentino's GrassRoots TruthCast

Play Episode Listen Later Feb 6, 2026 18:29


Gene Valentino joins The Wake Up Call for a no-holds-barred conversation on America's biggest crises—from the open border and runaway federal spending to Florida's insurance collapse and the national debt.A former county commissioner and longtime businessman, Valentino explains why he answered the “calling” to run for Congress, why he fully supports President Donald Trump and the MAGA agenda, and why he believes Washington needs fighters—not career politicians.Topics covered in this interview include:Securing the border and mass deportationsCutting federal spending by returning to 2019 budget levelsFixing Social Security and stopping government raidsEnding unchecked funding to UkraineFlorida's insurance crisis and federal interventionVeterans care, VA reform, and government accountabilityTerm limits and cleaning out Washington bureaucracyGene Valentino makes it clear: America First isn't a slogan—it's a mandate.➡️ Join the Conversation: https://GeneValentino.com➡️ WMXI Facebook Page: https://www.facebook.com/NewsRadio981➡️ More WMXI Interviews: https://genevalentino.com/wmxi-interviews/➡️ More GrassRoots TruthCast Episodes: https://genevalentino.com/grassroots-truthcast-with-gene-valentino/➡️ More Broadcasts with Gene as the Guest: https://genevalentino.com/america-beyond-the-noise/ ➡️ More About Gene Valentino: https://genevalentino.com/about-gene-valentino/

Kite Consulting
Securing the Future of Our Food: Attracting Young People to UK Agriculture

Kite Consulting

Play Episode Listen Later Feb 6, 2026 43:57


In episode 285 of the Kite Podcast, Will Evans and Ben Eagle are joined by Arla Foods UK Managing Director Baz Padberg, Kite Consultant Becca Oakley, and producer Becki Reay as they delve into a new cross‑industry initiative created by Arla alongside partners from universities, further education, retail, policy and food producers. They discuss why young people often overlook the huge opportunities available in UK agriculture, reflect on the industry's current demographics, explore the initiative's three key recommendations, and consider what needs to change to attract, develop and retain the next generation of talent. The discussion brings fresh insight into the people and career pathways that will drive the future of UK agriculture. Dairy market analyst Chris Walkland is also on hand, opening the episode with his usual milk market report. Please note: The information provided during this podcast has been prepared for general informational purposes only and does not constitute advice. The information must not be relied upon for any purpose and no representation or warranty is given as to its accuracy, completeness or otherwise. Any reference to other organisations, businesses or products during the podcast are not endorsements or recommendations of Dairy Consulting Ltd or its affiliated companies. The views of the presenter are personal and may not be the views of Dairy Consulting Ltd. The contents of this podcast are the copyright of Dairy Consulting Ltd.

Pharma and BioTech Daily
Biotech Breakthroughs: Lupus Therapy and GLP-1 Rivalry

Pharma and BioTech Daily

Play Episode Listen Later Feb 5, 2026 5:15


Good morning from Pharma Daily: the podcast that brings you the most important developments in the pharmaceutical and biotech world. Today, we delve into the transformative landscape of the industry, where scientific advancements, strategic corporate maneuvers, and regulatory shifts are paving new paths for drug development and patient care.Starting with Amgen's recent progress, the company has achieved a significant milestone with its phase 2 trial of daxdilimab for discoid lupus erythematosus. This breakthrough could mark a turning point in lupus treatment, a notoriously challenging area due to the disease's complexity and variability. The success of daxdilimab may lead to more targeted biologic therapies that improve outcomes for patients with limited options. Additionally, Amgen's decision to resist the FDA's request to withdraw Tavneos underscores the intricate dynamics of regulatory negotiations, especially for treatments addressing niche conditions with critical patient needs. This scenario exemplifies the challenges in balancing regulatory scrutiny with clinical efficacy and patient needs.Novo Nordisk continues to assert its position in the competitive landscape of metabolic disorder treatments. Despite Pfizer's acquisition of Metsera, Novo is steadfast in advancing GLP-1 therapies, particularly focusing on innovative formulations that enhance patient compliance and efficacy. Novo Nordisk is also focusing on its oral version of Wegovy amid market pressures. Despite analyst concerns about this strategy's sufficiency, Novo remains confident in stabilizing its market position. The oral formulation represents an important innovation in drug delivery systems, potentially enhancing patient compliance and expanding therapeutic reach. This determination reflects Novo's long-term strategy to lead in obesity treatments, an area where GLP-1 receptor agonists have shown substantial promise.In another significant development, Eli Lilly has reported remarkable financial performance driven by its GLP-1 receptor agonists Mounjaro and Zepbound. These drugs have propelled revenues to $11.7 billion in the fourth quarter, surpassing analyst expectations and highlighting the growing demand for GLP-1 therapies crucial in managing diabetes and obesity.In a push for innovation, the U.S. Department of Health and Human Services has launched a $100 million prize for developing broad-spectrum antiviral therapies. This initiative comes at a crucial time when global health challenges demand versatile therapeutic solutions capable of addressing various viral threats. The competition encourages novel approaches in antiviral drug development, potentially leading to breakthroughs that could revolutionize infectious disease management.GSK's new CEO, Luke Miels, is setting a strategic course by identifying mergers and acquisitions valued between $2 billion and $4 billion as "hidden in plain sight" opportunities. This strategy mirrors a broader industry trend where companies bolster their pipelines through acquisitions that complement existing portfolios and expedite market entry for innovative therapies.The National Institutes of Health faces its own set of challenges amidst public scrutiny. Director Jayanta Bhattacharya's public dismissal of any link between vaccines and autism represents a crucial step toward reaffirming public trust in vaccination programs. This statement is vital in dismantling pervasive myths contributing to vaccine hesitancy and reinforcing the scientific consensus on vaccine safety.PrimeGen's pursuit of a SPAC route to Nasdaq highlights evolving capital-raising strategies within biotech, especially as stem cell therapies emerge as promising treatments for various conditions. Securing adequate funding through innovative financial instruments is critical for advancing research from preclinical stages to clinical applications.BioNTech's multi-modality platformSupport the show

Federal Drive with Tom Temin
Partial shutdown ended, as Trump signs package securing back pay for furloughed feds

Federal Drive with Tom Temin

Play Episode Listen Later Feb 4, 2026 6:52


A short-term partial government shutdown is over after House lawmakers have reached a deal to fund much of the federal government. A majority of agencies now have funding through the end of the fiscal year. That's except for the Department of Homeland Security. It's under a two-week stopgap spending bill, buying lawmakers more time to negotiate additional guardrails on federal immigration operations. Federal News Network's Jory Heckman has more. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

“Fun with Annuities” The Annuity Man Podcast
How Will AI Affect Annuities?: Fun With Annuities

“Fun with Annuities” The Annuity Man Podcast

Play Episode Listen Later Feb 3, 2026 9:38


In this episode, The Annuity Man discussed:  Anticipating AI-driven longevity shifts Understanding how annuities are truly priced Locking in today's assumptions before they change Choosing guarantees and carriers with intention   Key Takeaways:  Advances in artificial intelligence are expected to significantly extend life expectancy, especially through medical breakthroughs. Longer projected lifespans will materially affect how lifetime income products are priced in the future. Lifetime income annuities are driven primarily by life expectancy tables, not just interest rates. Longer expected lifespans mean more payments and lower annual income for new buyers over time. Current annuity pricing does not yet reflect potential AI-driven longevity gains. Securing income under today's tables may result in higher lifetime payouts than those available later. Lifetime income annuities function as risk-transfer products, not return-on-investment vehicles. Selecting A-rated or better carriers is critical to ensure guarantees remain intact as longevity assumptions evolve.   "Lifetime income is all about that income floor, the income coming in, or the income you're planning for your spouse or your kids." —  Stan The Annuity Man   Connect with The Annuity Man:  Website: http://theannuityman.com/  Email: Stan@TheAnnuityMan.com  Book: Owner's Manuals: https://www.stantheannuityman.com/how-do-annuities-work YouTube: https://www.youtube.com/channel/UCCXKKxvVslbeGAlEc5sra2g  Get a Quote Today: https://www.stantheannuityman.com/annuity-calculator!

Built Right
Beware of Double Agents: Charlie Bell, Microsoft's Security EVP on Securing AI

Built Right

Play Episode Listen Later Feb 3, 2026 42:57 Transcription Available


In this episode, Matt is joined by Charlie Bell, Microsoft's EVP of Security, Compliance, Identity, and Management, to discuss the future of AI and its implications on cybersecurity.The conversation revolves around IDC's prediction of 1.3 billion AI agents by 2028, Charlie's insights from his recent writings 'Beware of Double Agents', and the crucial aspects of agentic Zero Trust.They explore the benefits and risks associated with AI agents, the importance of security culture, and strategies to mitigate potential threats.Charlie also shares his experiences working with Satya Nadella and the importance of collaboration and curiosity in leadership.--Key Moments:02:08 The Exponential Growth and Impact of AI Agents03:47 AI Agents: Beyond Conversational Interfaces05:48 Security Challenges in the Age of AI Agents06:57 Parallels Between Cloud Adoption and AI Agent Era09:19 Democratization of AI: From Developers to Everyone13:57 The Concept of Double Agents in AI16:07 New Attack Vectors and Security Concerns21:43 Combating Security Challenges in AI22:07 The Importance of Identity and Containment23:50 Alignment and Intent in AI Systems27:08 Observability and Accountability of AI Agents30:00 AI in Security and Assumed Breach33:17 Fostering a Culture of Security38:45 Leadership Insights from Satya Nadella--Key Links:MicrosoftConnect with Charlie on LinkedInMentioned in this episode:Free report from HatchWorks AI — State of AI 2026What's real in AI this year, what's hype, and what leaders should prioritize — including production lessons, designing for agents, and governance. https://hatchworks.com/state-of-ai-2026/AI Opportunity FinderFeeling overwhelmed by all the AI noise out there? The AI Opportunity Finder from HatchWorks cuts through the hype and gives you a clear starting point. In less than 5 minutes, you'll get tailored, high-impact AI use cases specific to your business—scored by ROI so you know exactly where to start. Whether you're looking to cut costs, automate tasks, or grow faster, this free tool gives you a personalized roadmap built for action.

AgCredit Said It
Ep. 101 Securing the Future of Farming with the Ohio Farm Transition Network

AgCredit Said It

Play Episode Listen Later Feb 2, 2026 28:01


  Show Notes: Ep. 101 Securing the Future Of Farming with the Ohio Farm Transition Network | AgCredit Learn more about the programs below at: farmoffice.osu.edu/farm-transition   Planning for the Future of Your Farm Workshops Webinars: March 2, 9, 16, and 23, 2026 from 6:00-8:00pm In-Person: February 9 & 16, Muskingum County (6:00-9:00pm) March 3 & 17, Washington County (6:00-9:00pm) March 18 & 26, Morrow County (6:00-9:00pm) December 1 & 8, Madison County (6:00-9:00pm)  

The John Batchelor Show
S8 Ep394: Everitt and Ashworth chronicle Agrippina's successful campaign to marry her uncle Emperor Claudius, securing Nero's succession over Britannicus by hiring Seneca as tutor before poisoning Claudius with mushrooms in 54 AD.

The John Batchelor Show

Play Episode Listen Later Jan 31, 2026 12:14


Everitt and Ashworth chronicle Agrippina's successful campaign to marry her uncle Emperor Claudius, securing Nero's succession over Britannicus by hiring Seneca as tutor before poisoning Claudius with mushrooms in 54 AD.1561 PALATINE HILL

The John Batchelor Show
S8 Ep391: Cliff May of the Foundation for Defense of Democracies analyzes the strategic necessity of securing Greenland against Russian and Chinese threats, advocating for a NATO-led solution and increased defense spending.

The John Batchelor Show

Play Episode Listen Later Jan 31, 2026 9:15


Cliff May of the Foundation for Defense of Democracies analyzes the strategic necessity of securing Greenlandagainst Russian and Chinese threats, advocating for a NATO-led solution and increased defense spending.1890 greenland

The Green Insider Powered by eRENEWABLE
Breaking Down OT Cybersecurity: Highlights from UTSI's Six‑Part Series

The Green Insider Powered by eRENEWABLE

Play Episode Listen Later Jan 30, 2026 14:58


This Follower Friday on The Green Insider spotlights the powerhouse UTSI podcast series and the cutting‑edge conversations shaping the future of OT. Mike Nemer and Shaun Six break down the latest in OT innovation, AI, security, and energy efficiency, while showcasing standout partners like Sequre Quantum, Siemens, BlastWave, and EdgeRealm. It's a dynamic deep dive into why OT cybersecurity is becoming mission‑critical for today's infrastructure leaders — and how collaboration, education, and next‑gen technology are driving the industry forward. UTSI Podcast Series Conclusion Final episode of a six‑part podcast series sponsored by UTSI International. Features reflections from Mike Nemer and Shaun Six (CEO, UTSI International) on relationships built during the series. Emphasis on OT cybersecurity as a core theme. Emergent insight: AI's environmental impact surfaced as an unintended but compelling storyline. Episode structure includes a brief series recap, a short CEO segment (8–10 minutes), and post‑production editing support. Critical Infrastructure Security Challenges UTSI's 40‑year history supporting critical infrastructure is underscored. Industry challenges highlighted: Talent shortage (≈5 engineers leaving for every 1 entering). Rapid increase in connectivity of critical infrastructure devices. AI positioned as a force multiplier for operators—but also a potential attack vector if data is exposed. Partnerships discussed: Sequre Quantum – quantum random number generators. BlastWave – insights into AI's dual role as defender and risk. Focus on showcasing technologies that secure operations and protect infrastructure from emerging threats. AI Data Center Energy Solutions Collaboration with Siemens (via Alyssa) on AI's impact on data centers. Key concerns: rising energy and water consumption driven by AI workloads. Edge Realm highlighted for improving energy density at the edge to reduce strain. Introduction of LeakGeek, a rapid leak detection and response tool. Work with EdgeRealm also addresses illegal hot tapping and oil theft, noted as more common than publicly acknowledged. OT Cybersecurity: Collaboration and Education Strong focus on securing operational technology (OT) and industrial control systems. Call for improved private–public collaboration and information sharing. Many cyberattacks go unreported to avoid reputational damage. Attack vectors increasingly include everyday devices (e.g., printers, fax machines). Ransomware incidents can cost organizations millions of dollars per day. Emphasis on educating boards and investors about OT cybersecurity risks and value. UTSI OT Cybersecurity Partnership UTSI's approach includes: Cloaking OT systems. Securing remote access. Improving visibility and auditability of networks. Recognition of sponsorship and education value of a six‑part cybersecurity series. Closing remarks focused on partnership, knowledge sharing, and raising cybersecurity awareness. A special shout out the guest in this UTSI podcast series, Paulina Assmann, Alissa Nixon, Tom Sego, Frank Stepic, and Robert Hilliker. To be an Insider Please subscribe to The Green Insider powered by ERENEWABLE wherever you get your podcast from and remember to leave us a five-star rating. This podcast is sponsored by UTSI International. To learn more about our sponsor or ask about being a sponsor, contact ERENEWABLE and the Green Insider Podcast. The post Breaking Down OT Cybersecurity: Highlights from UTSI's Six‑Part Series appeared first on eRENEWABLE.

Cooking Is the New Healthy
Creative Vitamins: Somatic Tools for Authentic Alignment in a Chaotic World with MEgan Moseley

Cooking Is the New Healthy

Play Episode Listen Later Jan 30, 2026 19:29


“Authentic alignment is the place where your intuition, your heart, and your voice all come together.” — Megan MosleyThis episode is your invitation to explore how creativity doesn't have to be confined to work, it can flow through conversations, routines, parenting, and the ways we show up for others. I'm joined by Sally Ekus, cookbook literary agent, Substack writer, mother, and improv performer who leads who heart, humor, and honesty.Sally reminds us that creativity can come in many forms: Securing publishing deals for authors she works with, answering questions mid-walk during her “Huff and Puffs,” or performing on the improv stage. She speaks candidly about honoring boundaries, navigating grief, and the gift of community support.We talk about the emotional intensity of writing a book, the importance of doing your homework, and what it means to be in service to both your clients and your own creations. Sally opens up about the tension between consistency and capacity especially, when it comes to writing her Substack, Not So Secret Agent.Whether you're writing a cookbook, considering a Substack, or curious about publishing, this episode offers insight, encouragement, and a peek behind the scenes of the literary world. Bonus: If you've ever thought no one cares about your work, let Sally gently prove otherwise.Listen to the episode on Apple Podcasts and Spotify, or on your favorite podcast platform while you cook, clean, or create. Get the full show notes & transcript here. Leave a comment on Substack or connect with us on Instagram @chefcarlacontreras & @bodywisejourney to share your takeaway from the episode.xo CarlaPS: Upgrade to Nourished Creator Studio on Substack for quick-hit micro workshops, BTS Podcast, and simple tools to help you work on your creative dreams now, not someday.Disclaimer: Always seek the counsel of a qualified medical practitioner or other healthcare provider for an individual consultation before making any significant changes to your health, lifestyle, or to answer questions about specific medical conditions. If you are driving or doing an activity that needs your attention, save the meditation practice for later. This podcast is for entertainment and information purposes only. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit chefcarla.substack.com/subscribe

The Bitcoin.com Podcast
Never Sell Your Bitcoin: Sats Terminal Founders on Securing Coinbase & Binance Backing, Bitcoin Loans and More

The Bitcoin.com Podcast

Play Episode Listen Later Jan 30, 2026 36:05


Sats Terminal is the first native Bitcoin super app, bringing together Bitcoin loans, yield, and trading in a single interface and developer SDK. Sats Terminal is backed by YZi Labs (formerly Binance Labs), Coinbase Ventures, and Draper Associates.The founders of Sats Terminal recently joined the Bitcoin.com News Podcast to talk about the technology.Stan Havryliuk (CEO and Co-Founder) and Rishabh Java (CTO and Co-Founder) of Sats Terminal shared their journey, starting with their backgrounds in crypto and fintech. Stan had previous experience with Bitcoin.com and running a large Eastern European exchange, while Java had built and sold a fintech company, finding crypto to be a more open building environment. The inspiration for Sats Terminal stemmed from a highly problematic user experience Stan encountered while trading BRC20s, which resulted in him overpaying significantly for a single token. This incident highlighted a clear need for good, user-friendly interfaces in the growing Bitcoin DeFi market to encourage wider adoption. The two founders met online while working on a previous project and formalized their partnership after meeting in person in Buenos Aires.The company secured notable financial backing from major investors. Java's connection to Coinbase Ventures was established after winning an AI agent hackathon at their San Francisco office, which led to a successful pitch. Stan described how they were quickly accepted into the YZi Labs (aka Binance Labs) accelerator program after applying shortly before the deadline on a friend's recommendation, benefiting from a good product growth trajectory at the time. They also received early backing from the Draper family of VCs, including Draper Associates, Draper Dragon, and Boost VC. Stan's key advice for aspiring startups seeking funding is to "just keep building" and iterating fast, emphasizing that consistency compounds into success, alongside networking and participating in hackathons.Java elaborated on the evolution of native Bitcoin assets, moving from Ordinals to BRC20s and then to the improved Runes standard. He reported that Sats Terminal has already captured approximately 70% of the market share for trading Runes, showcasing their success in the ecosystem. They also acknowledged that the Bitcoin ecosystem's complexity, due to the lack of a central authority, means the market will ultimately decide which token standard becomes the long-term winner.The core of Sats Terminal's vision is encapsulated in their motto: "never sell your Bitcoin," but instead to make it work through products like trading, earning, and borrowing. Stan highlighted their belief that Bitcoin is the "only pristine collateral for loans," and their products are laying the groundwork for Bitcoin's transition from "digital gold" to a "productive asset." Java detailed their Borrow product as a self-custody, trust-minimized cross-chain loan solution where users can collateralize their Bitcoin for a loan without KYC. Stan announced that the first version of the Earn product, designed to simplify DeFi complexity for end-users, is being finalized and expected to go live in the next few weeks.Stan Havryliuk, CEO and Co-Founder of Sats Terminal, early Bitcoin investor and Web3 veteran with over eight years of experience scaling crypto businesses worldwide. Ex-Bitcoin.com and zondacrypto.com (BitBay.com).Rishabh Java, CTO and Co-Founder of Sats Terminal, serial entrepreneur, inventor, and Bitcoin builder with a proven track record of creating great technologies. Winner of 50 international hackathons, awarded by Steve Wozniak at 15 for BCI tech and exited Web2 startup at 21.To learn more about the project visit the website, and follow the team on X.

The Data Exchange with Ben Lorica
The Rise of the Machine Identity: Securing the AI Workforce and AI Agents

The Data Exchange with Ben Lorica

Play Episode Listen Later Jan 29, 2026 42:49


Ben Lorica talks with Jason Martin (co-founder of Permiso Security) about what it means to secure AI agents as they proliferate across enterprises. Subscribe to the Gradient Flow Newsletter

Just Shoot It: A Podcast about Filmmaking, Screenwriting and Directing
Sundance, Securing Money, and Scheduling w/Matt & Oren - Just Shoot It 512

Just Shoot It: A Podcast about Filmmaking, Screenwriting and Directing

Play Episode Listen Later Jan 29, 2026 54:46


How important is Sundance to your career as a commercial director? Matt and Oren talk about their experiences in Park City before the festival wraps up its last year in Utah. With Matt working to raise money for his latest film, “Bad Feeling”, there's a lively discussion about whether making narrative films can advance your career as a commercial director. And the answer is, for some directors, it can make you stand out. But for others, there's a better way.Then Oren talks about his latest experience shooting outside Los Angeles. And Matt and Oren talk about how to handle the shoot schedule your AD creates. And they raise some good points about what to watch for when shooting out of order. Especially when working with athletes.For example, in LA, actors and crews will help you manage issues related to continuity that have more to do with than just “was this there in the last scene”. It's Oscar time, Sundance season, and the festival circuit is just kicking off! And if you're looking to stay present in your work and while forging your career path forward, this is a great episode to help keep you grounded as the year gets rolling!Help Matts' film: wefunder.com/badfeeling---Help our Patreon! https://www.patreon.com/JustShootItPodMatt's Endorsement: The films "Marty Supreme" and "Hamnet". And also Jacobi Jupe's performance in the title role, Hamnet.Oren's Endorsement: The show "Wonder Man" on Disney+. Hosted on Acast. See acast.com/privacy for more information.

The Changelog
Securing npm is table stakes (Interview)

The Changelog

Play Episode Listen Later Jan 29, 2026 81:11


As the creator and long-time maintainer of ESLint, Nicholas Zakas is well-positioned to criticize GitHub's recent response to npm's insecurity. He found the response insufficient, and has other ideas on how GitHub could secure npm better. On this episode, Nicholas details these ideas, paints a bleak picture of npm alternatives like JSR, and shares our frustration that such a critical piece of internet infrastructure feels neglected.

table securing github stakes jsr eslint adam stacoviak jerod santo nicholas zakas
Global Investors: Foreign Investing In US Real Estate with Charles Carillo
GI344: Creating Massive Value Through Land Entitlements with Brandon Cobb

Global Investors: Foreign Investing In US Real Estate with Charles Carillo

Play Episode Listen Later Jan 29, 2026 40:17 Transcription Available


In this episode of the Global Investors Podcast, host Charles Carillo sits down with Brandon Cobb, founder of HBG Capital, to break down how land entitlements unlock value long before a shovel hits the ground. Brandon explains how developers profit by: Securing zoning and density approvals Entitling land for residential development Selling ready-to-build land to national home builders Reducing risk by lining up buyers before purchasing land You'll also learn why publicly traded home builders are willing to pay a premium for entitled land, how developers mitigate entitlement risk, and the most common mistakes investors make when entering land development. This episode is a must-watch for investors interested in land development, entitlements, real estate investing, and value creation without construction risk.   Learn More About Brandon Here: HBG Capital - https://www.hbgcapital.net/ Learn Land Development - https://learnlanddevelopment.com/ Connect with the Global Investors Show, Charles Carillo and Harborside Partners: ◾ Setup a FREE 30 Minute Strategy Call with Charles: http://ScheduleCharles.com ◾ Learn How To Invest In Real Estate: https://www.SyndicationSuperstars.com/  ◾ FREE Passive Investing Guide: http://www.HSPguide.com ◾ Join Our Weekly Email Newsletter: http://www.HSPsignup.com ◾ Passively Invest in Real Estate: http://www.InvestHSP.com ◾ Global Investors Web Page: http://GlobalInvestorsPodcast.com/  

Paul's Security Weekly
The future of data control, why detection fails, and the weekly news - Thyaga Vasudevan - ESW #443

Paul's Security Weekly

Play Episode Listen Later Jan 26, 2026 95:59


Segment 1: Interview with Thyaga Vasudevan Hybrid by Design: Zero Trust, AI, and the Future of Data Control AI is reshaping how work gets done, accelerating decision-making and introducing new ways for data to be created, accessed, and shared. As a result, organizations must evolve Zero Trust beyond an access-only model into an inline data governance approach that continuously protects sensitive information wherever it moves. Securing access alone is no longer enough in an AI-driven world. In this episode, we'll unpack why real-time visibility and control over data usage are now essential for safe AI adoption, accurate outcomes, and regulatory compliance. From preventing data leakage to governing how data is used by AI systems, security teams need controls that operate in the moment - across cloud, browser, SaaS, and on-prem environments - without slowing the business. We'll also explore how growing data sovereignty and regulatory pressures are driving renewed interest in hybrid architectures. By combining cloud agility with local control, organizations can keep sensitive data protected, governed, and compliant, regardless of where it resides or how AI is applied. This segment is sponsored by Skyhigh Security. Visit https://securityweekly.com/skyhighsecurity to learn more about them! Segment 2: Why detection fails Caleb Sima put together a nice roundup of the issues around detection engineering struggles that I thought worth discussing. Amélie Koran also shared some interesting thoughts and experiences. Segment 3: Weekly Enterprise News Finally, in the enterprise security news, Fundings and acquisitions are going strong can cyber insurance be profitable? some new free tools shared by the community RSAC gets a new CEO Large-scale enterprise AI initiatives aren't going well LLM impacts on exploit development AI vulnerabilities global risk reports floppies are still used daily, but not for long? All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-443

Enterprise Security Weekly (Audio)
The future of data control, why detection fails, and the weekly news - Thyaga Vasudevan - ESW #443

Enterprise Security Weekly (Audio)

Play Episode Listen Later Jan 26, 2026 95:59


Segment 1: Interview with Thyaga Vasudevan Hybrid by Design: Zero Trust, AI, and the Future of Data Control AI is reshaping how work gets done, accelerating decision-making and introducing new ways for data to be created, accessed, and shared. As a result, organizations must evolve Zero Trust beyond an access-only model into an inline data governance approach that continuously protects sensitive information wherever it moves. Securing access alone is no longer enough in an AI-driven world. In this episode, we'll unpack why real-time visibility and control over data usage are now essential for safe AI adoption, accurate outcomes, and regulatory compliance. From preventing data leakage to governing how data is used by AI systems, security teams need controls that operate in the moment - across cloud, browser, SaaS, and on-prem environments - without slowing the business. We'll also explore how growing data sovereignty and regulatory pressures are driving renewed interest in hybrid architectures. By combining cloud agility with local control, organizations can keep sensitive data protected, governed, and compliant, regardless of where it resides or how AI is applied. This segment is sponsored by Skyhigh Security. Visit https://securityweekly.com/skyhighsecurity to learn more about them! Segment 2: Why detection fails Caleb Sima put together a nice roundup of the issues around detection engineering struggles that I thought worth discussing. Amélie Koran also shared some interesting thoughts and experiences. Segment 3: Weekly Enterprise News Finally, in the enterprise security news, Fundings and acquisitions are going strong can cyber insurance be profitable? some new free tools shared by the community RSAC gets a new CEO Large-scale enterprise AI initiatives aren't going well LLM impacts on exploit development AI vulnerabilities global risk reports floppies are still used daily, but not for long? All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-443

Decoding the Gurus
Supplementary Material 43: Red-Blooded Americans, Real Life Alan Partridge, and Rationalist Eulogies

Decoding the Gurus

Play Episode Listen Later Jan 24, 2026 21:43


We crawl around the dark crevices of the internet so you don't have to. And what wonders we have to show you...The full episode is available to Patreon subscribers (1 hour, 34 minutes).Join us at: https://www.patreon.com/DecodingTheGurusSupplementary Material 4300:00 Introduction and Banter Allotment01:23 The Hypocrisy of the Defenders of Western Civilisation10:07 An Optimistic Take?17:02 Scott Adams' Controversial Legacy18:43 Scott Alexander's Rationalist Eulogy for Scott Adams32:31 A Final Tribute to Scott Adams33:43 Andrew Gold's Interview with a Racist39:02 Fair Play for being a Racist41:17 Comparing Follower Counts and Audience Makeup44:40 Racism and Xenophobia Discussion49:07 Securing the Future of Our People...01:00:01 LawTubers and Grifting01:00:48 Legal Mindset01:06:02 Antifa Woke Women are Hunting Legal Mindset01:07:41 A man of Christ01:09:16 A Red-Blooded American01:12:35 Woke White Women and Antifa Paranoia01:13:55 Electro Gym Work and Pygmy Hippo Love01:18:47 Antifa Paranoia01:26:36 The True Masculine Renegade YouTuber01:32:32 Concluding Thoughts and FarewellLinksPeter Boghossian complaining about public attention to the Greenland situationMike Cernovich's tribute: “Scott is loved because he's devoted his life to service to humanity”In full: Canadian Prime Minister Mark Carney's speech at the World Economic Forum (Davos)Scott Alexander's eulogy to Scott AdamsColeman Hughes on Scott Adams at The Free PressAndrew Gold – Heretics: “I Confront Britain's Biggest Racist”Liam Tufts: “Would You Let Your Kid Date a Black Person?” | Steve Laws sparks a heated debateLegal Mindset: “Free Kaya, Punish Hasan” (Fast Facts)Rob's Media: Idiot Influencers – Legal Mindset (Go East channel background)

Everyday AI Podcast – An AI and ChatGPT Podcast
Do AI Agents need Identities like humans?

Everyday AI Podcast – An AI and ChatGPT Podcast

Play Episode Listen Later Jan 22, 2026 31:34


If AI Agents have capabilities just like humans, should we treat them like humans? If something goes wrong in an agentic workflow, who takes the blame if they're all just nameless, faceless bots? Join us as we talk about it. Do AI Agents need Identities like humans? An Everyday AI Chat with Jordan Wilson and Okta's Eric KelleherNewsletter: Sign up for our free daily newsletterMore on this Episode: Episode PageJoin the discussion on LinkedIn: Thoughts on this? Join the convo on LinkedIn and connect with other AI leaders.Upcoming Episodes: Check out the upcoming Everyday AI Livestream lineupWebsite: YourEverydayAI.comEmail The Show: info@youreverydayai.comConnect with Jordan on LinkedInTopics Covered in This Episode:AI Agents in Enterprise: Opportunities and RisksAgentic AI: Human vs. Agent ResponsibilitySecuring AI Agent Identities: Okta's ApproachEvolution of Identity Management for AI AgentsIdentity Governance and Auditability for AgentsAgent Impersonation and Cybersecurity ThreatsRogue AI Agent Behaviors and Case StudiesZero Trust Security: Agentic Age ChallengesOpen Standards: Cross App Access ProtocolBenefits of Identifying AI Agents Like HumansResponsible AI Adoption and Ethical ConcernsPractical Steps to Secure Agentic IdentityTimestamps:00:00 "AI Agents: Power and Pitfalls"05:38 "Automating Identity and Access Governance"06:49 Balancing Innovation and AI Security11:57 "Addressing Rogue AI Threats"17:17 "Securing Real AI Agents"19:56 "Balancing AI Innovation and Security"24:13 "Standards for Identifying Nonhuman Agents"27:24 "AI Agents: 24/7 Security"29:48 Securing and Managing Agent IdentitiesKeywords: AI agents, agentic AI, AI agent identity, securing AI agents, agentic identities, AI identity management, nonhuman identity, machine identity, multi agent orchestration, agent impersonation, agent governance, securing agents, compromised identity, cyber attacks, threat actors, state actors, privileged access management, identity governance, identity directory, auditability, credential vaulting, agent provisioning, agent deprovisioning, automation, zero trust, AI authorization, AI authentication, cross app access, model context protocol, identity security posture management, rogue agent behavior, agent discovery, business logic, anomaly detection, technology guardrails, responsible AI, ethical AI,Send Everyday AI and Jordan a text message. (We can't reply back unless you leave contact info) Ready for ROI on GenAI? Go to youreverydayai.com/partner