POPULARITY
Categories
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Automatic Script Execution In Visual Studio Code Visual Studio Code will read configuration files within the source code that may lead to code execution. https://isc.sans.edu/diary/Automatic%20Script%20Execution%20In%20Visual%20Studio%20Code/32644 Cisco Unified Communications Products Remote Code Execution Vulnerability A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b Zoom Vulnerability A Command Injection vulnerability in Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0 may allow a meeting participant to execute remote code on the MMR via network access. https://www.zoom.com/en/trust/security-bulletin/zsb-26001/ Possible new SSO Exploit (CVE-2025-59718) on 7.4.9 https://www.reddit.com/r/fortinet/comments/1qibdcb/possible_new_sso_exploit_cve202559718_on_749/ SANS SOC Survey The 2026 SOC Survey is open, and we need your input to create a meaningful report. Please share your experience so we can advocate for what actually works in the trenches. https://survey.sans.org/jfe/form/SV_3ViqWZgWnfQAzkO?is=socsurveystormcenter
Send us a textIn this high-energy and entertaining episode, Joey Pinz sits down with cybersecurity founder and unabashed Italian-American storyteller Tony Pietrocola. From stomping grapes as a child to running an AI-driven security operations platform, Tony brings a rare blend of toughness, humor, and entrepreneurial clarity.They jump from wine, cooking, and massive NFL bodies to college football, concussions, and how elite athletes are built differently. Tony shares what makes college football the real American spectacle—and why private equity is about to reshape the sport.On the cybersecurity front, Tony breaks down the challenges MSPs face, why most still struggle with security, and how AgileBlue helps them build profitable, white-label practices without the overhead of running a SOC. He explains the three questions every MSP should ask a vendor, the rise of AI-assisted attacks, and why consolidation and greenfield opportunities are the biggest missed revenue streams.The conversation ends with health, habit, and personal transformation—discussing Joey's 130-lb weight loss, Tony's daily 5 a.m. workouts, and the childhood structure that forged their work ethic.
Okay. This show today is part of our Relentless Health Value "The Inches Are All Around Us" series. This Inches Talk is a metaphor for finding all those little places where there is healthcare waste as a first step in an effort to excise all these little pockets of waste. For a full transcript of this episode, click here. If you enjoy this podcast, be sure to subscribe to the free weekly newsletter to be a member of the Relentless Tribe. Shane Cerone said this phrase during episode 492, and I loved it because there are inches all around us for sure. And the thing with all these inches that we're gonna talk about today and last week and next week and the week after that, yeah, these are inches that actually you could cut them. And there are millions and billions of dollars, and you actually improve patient care. You improve clinical team experience. Also, you're cutting out friction and making it easier to do the right thing to care for patients. These are no-brainer kinds of stuff if your North Star is better and more affordable patient care, but they are also somebody else's bread and butter in a "one person's cost is another person's revenue" kind of way. So, yeah … what makes perfect common sense might not be as easy as it might look on paper, as we all know so well. So, last week we dug into all of the inches of expensive friction that develop when stakeholders interact—like, a clinical organization and a payer and a plan sponsor, self-insured employer. They try to get paid or pay. They try to direct contract because what will be found fast enough is that the data is not the data is not the data, as Mark Newman talked about last week (EP496); and a dollar is not a dollar is not a dollar. Again, you'll find this out fast enough. All of you know when you talk to entities up and down the patient journey or across the life of a claim, otherwise known as a healthcare transaction. It's mayhem to get a claim paid often enough. Each stakeholder comes in with their own priorities and views and accounting methods and various rollups. I like how Stephanie Hartline put it. She wrote, "Healthcare … moves through many hands without a rail that preserves truth along the way. Attribution breaks, and truth gets reassembled later. The difference isn't capability—it's infrastructure. Line-item billing ≠ line-item settlement." Or I also like how Chris Erwin put it. He wrote, "When the blueprint isn't standardized, you aren't scaling. You're just compounding chaos." And yeah, then all of a sudden when there's no through line, there's no rail that connects all the data to the data to the data, or all the dollars to the dollars to the dollars. Suddenly 30% of any given healthcare transaction goes to trying to straighten it all back out again—to reassemble it, as Stephanie said. It's like unleashing 100 chaos monkeys and then having to pay to recapture them all. Listen to the show with David Scheinker, PhD (EP363) from last year about "Hey, how about we all just use the same template and avoid a lot of this." Or read Zeke Emanuel's book about how the USA should potentially consider copying the Netherlands model because they have private insurance. But they cut admin costs 75% or something like that. Oh, right … through standardization. Jesse Hendon summarized this the other day. He wrote, "Providers don't need armies of coders to fight 50 different insurance rule books [when you have some standardization here]." I say all this to say after recording the episode with Mark Newman from last week, I have become intently fascinated by what goes on in this non-standardized or otherwise friction points between stakeholders. There are a lot of inches in this gray area land of confusion. This show today digs into one of them, which is what does it take to process a claim? Just technically. What are the pipes involved to submit a claim and, again, get paid for it, which is a healthcare transaction—just simply the technology moving the data around—even if everything in the pipes is a non-standardized hot mess. Because just fixing up the processing and the pipes here—again, while this doesn't solve the entire data isn't a data isn't a data or a dollar isn't a dollar isn't a dollar problem—if we can just cut out some of the processing and the moving the data around costs, just this all by itself is $6 billion a year worth of inches. Plus, as an added bonus, fix up the pipes for better data flow and now patient care can be faster if, for example, the prior auth or etc. processes transpire faster. And clearinghouses have entered the chat. But you know, when clearinghouses come up, at least in my world, when the clearinghouse word gets dropped, it's usually accompanied by like a puff of smoke because no one is quite sure what those guys do all day. So, we all sort of look at each other in the conversation and move on. Lucky for me and possibly you if I've managed to suck you into my web of intrigue, I ran into Zack Kanter from Stedi, a new clearinghouse, who agreed to come on the pod here and aid my exploration into this demarcation zone between stakeholders. So, let's start here. What is a clearinghouse? Well, a clearinghouse is the same thing as a switch when we're talking about pharmacy data transfers, if you're familiar with that terminology and that's helpful. But either way, in the conversation with Zack Kanter that follows, Zack will explain this better; but clearinghouses are like a hub, maybe, that connects all the payers with all the providers. So, if you want an eligibility check or you wanna submit a claim or do a prior auth of the payer, whatever you're trying to do, get paid, you as an EHR system or a doctor's office or an RCM (revenue cycle management) company, you don't have to set up your own personal data connection with every single payer out there. You don't have to go through all the authentications and the BAAs (Business Associate Agreements) and map all the fields and set up the 100 SOC 2–compliant APIs (application programming interfaces). Instead, you can hook up to one clearinghouse, and then that clearinghouse connects with everybody else. So, most medical claims transactions have a clearinghouse in the middle, like an old-timey telephone operator routing your claim or denial or approval of that claim or eligibility check or whatever to the right place. And unfortunately, old-timey telephone operator is a pretty apt metaphor, depending on which clearinghouse you're using. Anyway, Zack Kanter told me that the price to just send and receive an electronic little piece of data in healthcare through a clearinghouse costs about 1,000 times more than any other industry would pay. Like, if you do an eligibility check, that's gonna cost 10 to 15 cents per. The trucking industry pays that much for 1,000 such data transfers. They would riot if someone asked them to spend a dollar for 10 data transfers. That'd be ridiculous in their eyes. But in healthcare, all these dimes add up to, again, $6 billion a year—them's some inches there—which also equal delays in payment and patient care. Now you might be thinking, "Oh, well, maybe it costs this much because healthcare is so much more complicated than trucking or whatever." Well, turns out the opposite is true: Because of HIPAA, ironically enough, healthcare is, in fact, much more standardized (we were talking about standardization before); but healthcare is actually much more standardized than many other industries due to HIPAA's administrative simplification rules, which mandate a universal language for transactions—the pipes I'm talking about now. So, actually, for as much as I was just kvetching about chaos monkeys, compared to other industries, the baseline construct here is actually much more orderly than, for example, the trucking industry or whatever, like Amazon or Walmart has to deal with with their millions of vendors. Now—and here's a really big point, especially for self-insured employers—you know who the main customer is for a lot of the more programmatic, the newer kinds of clearinghouses? I'll tell you: newer digital entities who do RCM (revenue cycle management) for provider organizations, and that can be great if you're a practice just trying to keep up with payer denials and expedite patient care. But look, all you plan sponsors and self-assured employers and maybe unions out there, the more RCM purveyors start working with programmatic clearinghouses, the more you not doing programmatic prepayment integrity programs with unconflicted third-party prepayment integrity vendors who are as hooked into the data streams and the clearinghouses as the RCM vendors are, the more, as I said last week, increasingly you're bringing an ever more rusty knife to a gunfight. So, that is certainly something to consider. There's a whole episode next week about this with Mark Noel from ClaimInsight. Or if you just can't wait, go back and listen to the show with Kimberly Carleson (EP480) just for the gist of it, or the one with Dawn Cornelis (EP285) from a few years ago. They're talking post-payment integrity programs, but a lot of the same rules apply. The show today is sponsored by Aventria Health Group, as usual. But I do want to say that we got some very appreciated financial support from Stedi, the only programmable healthcare clearinghouse. And here is my conversation about all of the inches that are all around us, specifically in the healthcare data pipes, with Zack Kanter, who is the CEO and founder over at Stedi. Also mentioned in this episode are Stedi; Shane Cerone; Mark Newman; Stephanie Hartline; Chris Erwin; David Scheinker, PhD; Zeke Emanuel, MD, PhD; Jesse Hendon; Mark Noel; ClaimInsight; Kimberly Carleson; Dawn Cornelis; Aventria Health Group; Preston Alexander; Eric Bricker, MD; and Kada Health. For a list of healthcare industry acronyms and terms that may be unfamiliar to you, click here. You can learn more at stedi.com. You can also follow Zack and Stedi on LinkedIn. Zack Kanter is the founder and CEO of Stedi, the only programmable healthcare clearinghouse. Stedi has raised $92 million from Stripe, Addition, First Round, USV, Bloomberg Beta, and other top investors. He has previously appeared on podcasts, including In Depth by First Round Capital, Invest Like the Best, Village Global, and Rule Breaker Investing. 09:47 What things are being paid for that we might not be aware we're paying for in healthcare? 12:09 Why HIPAA actually makes healthcare more standardized than other industries. 15:35 How healthcare is ahead in some ways and behind in others. 18:03 Where do the 4 to 5 days come from in healthcare transaction processing? 20:39 Why these transaction delays affect care delay. 23:14 EP482 with Preston Alexander. 23:18 EP472 with Eric Bricker, MD. 27:10 How should the process work from the time a provider clicks "validate"? 30:19 Why is the clearinghouse the right place to solve all these issues? 31:41 Why are we where we are in terms of these issues? 35:28 Why people should be looking at their clearinghouse costs. 36:59 What to know about Stedi. You can learn more at stedi.com. You can also follow Zack and Stedi on LinkedIn. @zackkanter discusses #healthcaretransactions and #clearinghouses on our #healthcarepodcast. #healthcare #podcast #financialhealth #patientoutcomes #primarycare #digitalhealth #healthcareleadership #healthcaretransformation #healthcareinnovation Recent past interviews: Click a guest's name for their latest RHV episode! Mark Newman, Stacey Richter (INBW45), Stacey Richter (INBW44), Marilyn Bartlett (Encore! EP450), Dr Mick Connors, Sarah Emond (EP494), Sarah Emond (Bonus Episode), Stacey Richter (INBW43), Olivia Ross (Take Two: EP240)
Skype of Cthulhu presents a Call of Cthulhu scenario. Burn the Gaspee, from Flames of Freedom. June 09, 1772 Providence, Rhode Island HMS Gaspee has run aground, and a group of disgruntled colonists rush to burn her to ashes. Dramatis Persone: Steve as the Keeper of Arcane Lore Max as Gerard Hartman, Whaler Gary as Keturah Wallis, Smuggler Randall as Prudence Collinsworth, Smuggler Jim as Modest Lynch, Mariner Rachael as Ansel Mallory, Boatswain Download Subcription Options Podcast statistics
Send us a textIn this inspiring conversation, Joey Pinz speaks with cybersecurity advocate Brianna Steele, who brings a refreshing and deeply human perspective to one of the world's most technical professions. With a background in psychology and a passion for understanding human behavior, Brianna explains why attacker motivations, intentions, and emotional drivers are just as important as the tools they use.Brianna shares her journey from Arizona to the Washington, D.C. area, her involvement with Women in CyberSecurity (WiCyS), and why representation and mentorship are pivotal for bringing more women into the field. She breaks down how behavioral analysis shapes her interest in SOC work and why understanding “why people hack” matters as much as how they do it.The conversation expands into AI as a study companion, fasting and lifestyle discipline, motivation rooted in love, and the importance of self-awareness when entering a high-pressure industry. Brianna's warmth and clarity make this an energizing episode for anyone exploring cybersecurity, career transition, or personal growth.
Skype of Cthulhu presents a Call of Cthulhu scenario. This is Our Home by Jim Phillips. September 27, 1976 Staten Island, New York City, New York Some residents continue to play with magic but others discover its horrible power. Dramatis Persone: Jim as the Keeper of Arcane Lore Randall as Frank Romero, Electrical Engineer Meredith as Marsha Janelle, Waitress Steve as Trae Grier, Gas Station Attendant Edwin as Kevin Mazer, Chemistry Teacher Gary as Peter Michale, Ex Pro Quarterback Sean as Kirk Griffin, Actor Download Subcription Options Podcast statistics
Got a question or comment? Message us here!Kick off 2026 by hitting reset on your SOC
In this Brand Highlight, Ivan Milenkovic, Vice President, Cyber Risk Technology at Qualys, joins host Sean Martin to discuss how security leaders can break free from the whack-a-mole cycle of vulnerability management.With more than 48,000 vulnerabilities disclosed in 2025 alone and the average enterprise juggling 76 different security consoles, Milenkovic argues that the old methods of counting patches and chasing alerts are no longer sustainable. Instead, Qualys helps organizations prioritize threats based on business context through what the company calls TruRisk.Milenkovic describes a fundamental shift he sees taking place in boardroom conversations: moving from risk appetite to risk tolerance. Boards and executives now want to know what specific losses mean to the business rather than simply asking whether the organization is secure.For CISOs, this means evolving from the department of "No" to the department of "Know," where security leaders understand where problems exist, how to fix them, and what architecture supports business objectives. The key is demonstrating return on investment through resilience metrics rather than vulnerability counts.Qualys addresses this challenge through its Enterprise TruRisk Management platform, which facilitates what Milenkovic calls the Risk Operations Center. Unlike a traditional SOC that focuses on incidents that have already occurred, the ROC takes a proactive stance, helping organizations prevent threats and optimize security spending before damage occurs.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTIvan Milenkovic, Vice President, Cyber Risk Technology, QualysOn LinkedIn | https://www.linkedin.com/in/ivanmilenkovic/RESOURCESLearn more about Qualys | https://www.qualys.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSIvan Milenkovic, Qualys, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, Enterprise TruRisk Management, Risk Operations Center, ROC, vulnerability management, CISO, cyber risk, risk tolerance, security leadership, proactive security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Skype of Cthulhu presents a Call of Cthulhu scenario. This is Our Home by Jim Phillips. September 26, 1976 Staten Island, New York City, New York The residents attend a memorial service and one of the group encounters a monster of their own making. Dramatis Persone: Jim as the Keeper of Arcane Lore Randall as Frank Romero, Electrical Engineer Meredith as Marsha Janelle, Waitress Steve as Trae Grier, Gas Station Attendant Edwin as Kevin Mazer, Chemistry Teacher Gary as Peter Michale, Ex Pro Quarterback Sean as Kirk Griffin, Actor Download Subcription Options Podcast statistics
Skype of Cthulhu presents a Call of Cthulhu scenario. Curse of Nineveh by Mike Mason, Mark Latham, Scott Dorward, Paul Fricker, and Andrew Kenrick Switchboard. October, 1925 London The investigators barely have time to catch their breaths before they are drawn towards the plight of another victim of the curse. Dramatis Persone: Sean as the Keeper Edwin as Dame Agatha, Authoress Jonathan as Katherine "Kitty" Hall, Dilettante Steve as Connor Shaw, Archivist Max as Oswald Nickels, Big Game Hunter Gary as Heathcliff Hamilton, Military Officer Randall as Montgomery Helmsworth, Librarian Jim as Roger Schindler, Alienist Rachael as Maude Throckmorton, Adventuress Download Subcription Options Podcast statistics
Mike Vetri, Sr. Director of Security Operations at Veeva Systems, reflects on transforming SOC investigations through AI-powered data aggregation and building threat operations teams with the analytical mindset required for proactive defense. Mike introduces the C3 Matrix framework for prioritizing security efforts across centers of gravity, crown jewels, and capability enablers, and explains the seven Ds of cyber defense from discovery through deception operations. Drawing from 10+ years of Air Force cyber intelligence experience, Mike details why threat operations requires fundamentally different system-two thinking than detection engineering, and how this discipline shift moves organizations from reactive firefighting to proactive threat anticipation. He covers practical examples of AI cutting investigation time by aggregating data from multiple tools, the importance of defense in personnel for operational resilience, and strategies for preventing analyst burnout while maintaining effective security operations. Topics discussed: How AI transforms insider threat investigations by aggregating workstation logs, browsing history, and DLP alerts into single queries The C3 Matrix framework prioritizes security controls across centers of gravity, crown jewels, and capability enablers based on organizational impact and recoverability Why threat operations requires system-two analytical thinking fundamentally different from the engineering mindset The seven Ds of cyber defense: discover, detect, deny, disrupt, degrade, destroy, and deception operations for comprehensive threat mitigation How deception operations provide the most accurate intelligence by studying adversary behavior in controlled environments The distinction between threat intelligence and threat operations, and why mature SOCs need teams focused on proactive defense strategies Defense in personnel ensures multiple team members can handle each security capability, preventing single points of failure Time-sensitive investigation scenarios where AI delivers maximum ROI by eliminating the need to manually query dozens of security tools The evolution of cyber threats from technical attacks to psychological warfare using AI to challenge human judgment and decision-making Why security culture must extend beyond traditional boundaries as AI-powered threats increasingly target HR processes, financial operations, and business functions Listen to more episodes: Apple Spotify YouTube Website
First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures every single episode will be about AI and nobody wants that. Least of all, me. If I have one more all-AI episode, my head is going to explode. With that said, most of what we talk about in this segment is AI (picard face palm.png). I think 2026 will be THE defining year for GenAI. Three years after the release of ChatGPT, I think we've hit peak GenAI hype and folks are ready for it to put up or shut up. We'll see winners grow and get acquired and losers pivot to something else. More than anything, I want to interview folks who have actually seen it work at scale, rather than just in a cool demo in a vendor sandbox. Also on the agenda for this year: The battle against infostealers and session hijacking: we didn't have a good answer in 2025. When is it coming? Will it include Macs, despite them not having a traditional TPM? The state of trust in outsourcing and third party use (Cloud, MSSPs, SaaS, contractors): 2025 was not a good year for third parties. Lots of them got breached and caused their customers a lot of pain. Also, there's the state of balkanization between the US and... the rest of the entire world. Everyone outside the US seems to be trying to derisk their companies and systems from the Cloud Act right now. Vulnerability management market disruption: there are half a dozen startups already plotting to disrupt the market, likely to come out of stealth in 2026 Future of the SOC: if it's not AI, what is it? What else??? What am I missing? What would you like to see us discuss? Please drop me a line and let me know: adrian.sanabria@cyberriskalliance.com Topic 2: The state of cybersecurity hiring This topic has been in the works for a while! Ayman had a whole podcast and book focused on all the paths people take to get into security. Jackie worked with WiSys on outlining pathways into a cybersecurity career. Whether you're already in cyber or looking for a way in, this segment crams a lot of great advice into just 15-20 minutes. Segment resources: Ayman's personal guide for getting into security https://www.wicys.org/wp-content/uploads/2025/10/WiCyS-Pathways-in-Cyber-PDF-9.24.25.pdf News Finally, in the enterprise security news, Fundings and acquisitions still strong in 2026! Santa might be done delivering gifts, but not protecting Macs! ClickFix attacks Weaponized Raspberry Pis MongoDB incidents for Christmas Top 10 Cyber attacks of 2025 US gets tough on nation state hackers? Brute force attacks on Banks An AI Vending Machine All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-441
First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures every single episode will be about AI and nobody wants that. Least of all, me. If I have one more all-AI episode, my head is going to explode. With that said, most of what we talk about in this segment is AI (picard face palm.png). I think 2026 will be THE defining year for GenAI. Three years after the release of ChatGPT, I think we've hit peak GenAI hype and folks are ready for it to put up or shut up. We'll see winners grow and get acquired and losers pivot to something else. More than anything, I want to interview folks who have actually seen it work at scale, rather than just in a cool demo in a vendor sandbox. Also on the agenda for this year: The battle against infostealers and session hijacking: we didn't have a good answer in 2025. When is it coming? Will it include Macs, despite them not having a traditional TPM? The state of trust in outsourcing and third party use (Cloud, MSSPs, SaaS, contractors): 2025 was not a good year for third parties. Lots of them got breached and caused their customers a lot of pain. Also, there's the state of balkanization between the US and... the rest of the entire world. Everyone outside the US seems to be trying to derisk their companies and systems from the Cloud Act right now. Vulnerability management market disruption: there are half a dozen startups already plotting to disrupt the market, likely to come out of stealth in 2026 Future of the SOC: if it's not AI, what is it? What else??? What am I missing? What would you like to see us discuss? Please drop me a line and let me know: adrian.sanabria@cyberriskalliance.com Topic 2: The state of cybersecurity hiring This topic has been in the works for a while! Ayman had a whole podcast and book focused on all the paths people take to get into security. Jackie worked with WiSys on outlining pathways into a cybersecurity career. Whether you're already in cyber or looking for a way in, this segment crams a lot of great advice into just 15-20 minutes. Segment resources: Ayman's personal guide for getting into security https://www.wicys.org/wp-content/uploads/2025/10/WiCyS-Pathways-in-Cyber-PDF-9.24.25.pdf News Finally, in the enterprise security news, Fundings and acquisitions still strong in 2026! Santa might be done delivering gifts, but not protecting Macs! ClickFix attacks Weaponized Raspberry Pis MongoDB incidents for Christmas Top 10 Cyber attacks of 2025 US gets tough on nation state hackers? Brute force attacks on Banks An AI Vending Machine All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-441
First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures every single episode will be about AI and nobody wants that. Least of all, me. If I have one more all-AI episode, my head is going to explode. With that said, most of what we talk about in this segment is AI (picard face palm.png). I think 2026 will be THE defining year for GenAI. Three years after the release of ChatGPT, I think we've hit peak GenAI hype and folks are ready for it to put up or shut up. We'll see winners grow and get acquired and losers pivot to something else. More than anything, I want to interview folks who have actually seen it work at scale, rather than just in a cool demo in a vendor sandbox. Also on the agenda for this year: The battle against infostealers and session hijacking: we didn't have a good answer in 2025. When is it coming? Will it include Macs, despite them not having a traditional TPM? The state of trust in outsourcing and third party use (Cloud, MSSPs, SaaS, contractors): 2025 was not a good year for third parties. Lots of them got breached and caused their customers a lot of pain. Also, there's the state of balkanization between the US and... the rest of the entire world. Everyone outside the US seems to be trying to derisk their companies and systems from the Cloud Act right now. Vulnerability management market disruption: there are half a dozen startups already plotting to disrupt the market, likely to come out of stealth in 2026 Future of the SOC: if it's not AI, what is it? What else??? What am I missing? What would you like to see us discuss? Please drop me a line and let me know: adrian.sanabria@cyberriskalliance.com Topic 2: The state of cybersecurity hiring This topic has been in the works for a while! Ayman had a whole podcast and book focused on all the paths people take to get into security. Jackie worked with WiSys on outlining pathways into a cybersecurity career. Whether you're already in cyber or looking for a way in, this segment crams a lot of great advice into just 15-20 minutes. Segment resources: Ayman's personal guide for getting into security https://www.wicys.org/wp-content/uploads/2025/10/WiCyS-Pathways-in-Cyber-PDF-9.24.25.pdf News Finally, in the enterprise security news, Fundings and acquisitions still strong in 2026! Santa might be done delivering gifts, but not protecting Macs! ClickFix attacks Weaponized Raspberry Pis MongoDB incidents for Christmas Top 10 Cyber attacks of 2025 US gets tough on nation state hackers? Brute force attacks on Banks An AI Vending Machine All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-441
Skype of Cthulhu presents a Call of Cthulhu scenario. Curse of Nineveh by Mike Mason, Mark Latham, Scott Dorward, Paul Fricker, and Andrew Kenrick Switchboard. October, 1925 London The investigators uncover the reason for the crimes but the shadows are closing in around them. Dramatis Persone: Sean as the Keeper Edwin as Dame Agatha, Authoress Jonathan as Katherine "Kitty" Hall, Dilettante Steve as Connor Shaw, Archivist Max as Oswald Nickels, Big Game Hunter Gary as Heathcliff Hamilton, Military Officer Randall as Montgomery Helmsworth, Librarian Jim as Roger Schindler, Alienist Rachael as Maude Throckmorton, Adventuress Download Subcription Options Podcast statistics
In this episode of Reboot IT, host Dave Coriale sits down with Mike Robichaud, IT Director at the Brewers Association, to explore how his organization is embracing AI to enhance staff productivity and deliver greater value to members. Mike shares insights on their two-pronged AI strategy, internal adoption challenges, and how they're building trust and security around proprietary data. This conversation is packed with practical ideas for associations looking to move beyond AI experimentation and into meaningful implementation.Themes and Topics:Crafting an AI StrategyTwo-pronged approach: internal staff tools and member-facing AI agent. Focus on augmentation, not job replacement. Aligning AI initiatives with organizational goals and member success.Driving Staff Adoption71% of staff were already using AI before rollout; 66% used ChatGPT. Use cases include brainstorming, data analysis, and document creation. Idea-sharing through informal showcases to inspire broader adoption.Enhancing Member ValueAI agent trained on proprietary “BAMO” data for personalized support. Enables conversational access to complex resources like regulations. Goal: make finding information easier and more intuitive for members.Building Trust and SecurityStrong vetting of platforms for data privacy and compliance (GDPR, SOC 2). Clear boundaries: proprietary data stays internal and is not used to train external models. Legal review and communication plan to address staff concerns.Tools and Technology ChoicesInternal: ChatGPT Enterprise for staff workflows. Member-facing: Chatbase integrated with ChatGPT-5 for custom training. Features like SSO, connectors, and compliance were key selection criteria.Looking AheadSoft launch internally; member-facing tool in testing phase. Refining tone and personality of AI agent for better engagement. Marketing plans and use cases to drive member adoption.
Skype of Cthulhu presents a Call of Cthulhu scenario. This is Our Home by Jim Phillips. September 25, 1976 Staten Island, New York City, New York The residents meet some of their neighbors and an unusual journal is discovered. Dramatis Persone: Jim as the Keeper of Arcane Lore Randall as Frank Romero, Electrical Engineer Meredith as Marsha Janelle, Waitress Steve as Trae Grier, Gas Station Attendant Edwin as Kevin Mazer, Chemistry Teacher Gary as Peter Michale, Ex Pro Quarterback Sean as Kirk Griffin, Actor Download Subcription Options Podcast statistics
Welcome to episode 335 of The Cloud Pod, where the forecast is always cloudy! Welcome to the first show of 2026, and it's a full house, too! Justin, Jonathan, Ryan, and Matt are all here to reflect on 2025, plus bring you their predictions for 2026. Let's get started! Titles we almost went with this week SQL Me Maybe: AlloyDB Gets Chatty With Your Database **OpenAI SELECT * FROM natural_language WHERE accuracy LIKE ‘100%’ **Anthropic etcd You Were Worried About Database Limits: CloudWatch Has Your Back CSV You Later: Looker Adds Drag-and-Drop Data Uploads AWS Spots an Opportunity to Manage Your Container Costs EKS Network Policies: No More IP Address Whack-a-Mole AWS Security Hub Splits: It’s Not You, It’s CSPM Spot On: ECS Finally Manages Your Cheapest Compute TOON Squad: DigitalOcean’s New Format Makes JSON Look Bloated The Price is Wrong: AWS Breaks Two Decades of Downward Pricing Tradition Show Your Work: Why AI-Generated Code Without Tests is Just Expensive Spam No More Agent Orange: Google Simplifies VM Extension Deployment AWS Discovers Prices Can Go Both Ways, Raises GPU Costs 15 Percent Sovereignty Washing: When Your European Cloud Still Answers to Uncle Sam Agent Builder Gets a Memory Upgrade: Google’s AI Finally Remembers Where It Put Its Keys Ctrl+F for the Future: A year-end Scorecard & Next-Gen Bets AI Agents, GPU Prices, and The best of the Cloud Pod 2025 Beyond the Hype: The Cloud Pods Definitive 2025 Year in Review Apocalypse Now… What? Our 2026 Forecast Follow Up 01:27 RYAN’S PREDICTIONS Prediction Status Notes Quick LLM models for individuals ACCURATE Meta-Llama-3.1-8B-Instruct, GLM-4-9B-0414, and Qwen2.5-VL-7B-Instruct—each chosen for an outstanding balance of performance and computational efficiency, making them ideal for edge AI deployment. A new AI inference application called Inferencer allows even modest Apple Mac computers to run the largest open-source LLMs. AI at the edge natively (Lambda-esque) ACCURATE Akamai launched a new Inference Cloud product for edge AI using Nvidia’s Blackwell 6000 GPUs in 17 cities. AWS IoT Greengrass with Lambda functions for edge logic. “Edge AI allows for instant decision-making where it matters most—close to the data source.” Cloud native security mesh multi-cloud UNCLEAR Service mesh technologies continue to evolve (Istio, Linkerd), but I didn’t find a breakthrough “app-to-app at the edge” security mesh product announcement in 2025. This one needs more specific evidence. Ryan Score: 2/3 02:25 MATTHEW’S PREDICTIONS Prediction Status Notes FOCUS adopted by Snowflake or Databricks ACCURATE FOCUS version 1.2 was ratified on May 29, 2025. Three new providers announced support: Alibaba Cloud, Databricks, and Grafana. Databricks officially adopted FOCUS! AI security/ethical standard (SOC or ISO) ACCURATE ISO 42001 is the first international standard outlining requirements for AI governance. Major companies achieving certification in 2025: Automation Anywhere is among the first 100 companies worldwide to earn ISO/IEC 42001:2023 certification. Anthropic also achieved ISO 42001 certification. Amazon deprecates 5+ services (WorkMail bonus) ACCURATE (no bonus) 19 services are mothballed, four are being sunset, and one is end of its supported life. Deprecated services include CodeCommit, Cloud9, S3 Select, CloudSearch, SimpleDB, Forecast, Data Pipeline, QLDB, Snowball Edge, and more. WorkMail NOT deprecated – WorkDocs was (April 2025), but WorkMail remains active. Matthew Score: 3/3 03:22 JONATHAN’S PREDICTIONS Prediction Status Notes Company claims AGI achieved ACC
Skype of Cthulhu presents a Call of Cthulhu scenario. Curse of Nineveh by Mike Mason, Mark Latham, Scott Dorward, Paul Fricker, and Andrew Kenrick Switchboard. October, 1925 London The investigators continue to learn more about the recent crimes when they met a most unusual man. Dramatis Persone: Sean as the Keeper Edwin as Dame Agatha, Authoress Jonathan as Katherine "Kitty" Hall, Dilettante Steve as Connor Shaw, Archivist Max as Oswald Nickels, Big Game Hunter Gary as Heathcliff Hamilton, Military Officer Randall as Montgomery Helmsworth, Librarian Jim as Roger Schindler, Alienist Rachael as Maude Throckmorton, Adventuress Download Subcription Options Podcast statistics
How does $95 million go missing at a bank—and still get a clean audit? Blake and David unpack the Evolve Bank/Synapse meltdown, what auditors missed, and how SOC reports fall short. Plus: the penny shortage pushing cash rounding at the register, the shocking stat that even 29% of partners don't know partner pay, and the case for semiannual reporting. Walk away with practical takeaways for clients, staff, and your own firm.SponsorsCloud Accountant Staffing - http://accountingpodcast.promo/casOnPay - http://accountingpodcast.promo/onpayChapters(00:44) - The Penny Shortage Crisis (03:52) - Evolve Bank's $95 Million Scandal (17:12) - Earmark CPE and Other Podcast Recommendations (22:00) - Partner Salaries and Compensation Transparency (28:27) - Data Breach at SAX Accounting Firm (33:28) - Semi-Annual Reporting Debate (36:25) - Debating Semi-Annual Reporting (37:38) - Quarterly Reporting Games (38:25) - LinkedIn Comment: The Case for Quarterly Reports (39:11) - The Value of Financial Statements (39:58) - Challenges in Modern Accounting (46:57) - 2026 Accounting Predictions (52:01) - AI's Impact on Bookkeeping (01:09:08) - Closing Thoughts and Farewell Show NotesSquare Enables Penny Rounding https://squareup.com/us/en/press/penny-rounding CFPB Allocates $46 Million To Synapse/Evolve Victims In First-Ever Fintech Bailout https://fintechbusinessweekly.substack.com/p/cfpb-allocates-46-million-to-synapseevolve The 2025 Accounting Today Salary Survey https://www.accountingtoday.com/list/the-2025-accounting-today-salary-survey The Ultimate 2026 Accounting Salary Guide https://blog.workday.com/en-us/ultimate-2026-accounting-salary-guide.html Deloitte's CTO: companies are spending 93% on tech and only 7% on people and that has to change https://fortune.com/2025/12/15/deloitte-cto-bill-briggs-what-really-scares-ceos-about-ai-human-resources/ Accounting firm waited 18 months to announce breach https://cybernews.com/security/sax-data-breach-quarter-million-exposed/ Should Public Companies Move to Semi-Annual Reporting? https://www.cpajournal.com/2025/12/19/should-public-companies-move-to-semi-annual-reporting/ United States Mint Hosts Historic Ceremonial Strike for Final Production of the Circulating One-Cent Coin https://www.usmint.gov/news/press-releases/united-states-mint-hosts-historic-ceremonial-strike-for-final-production-of-the-circulating-one-cent-coinNeed CPE?Get CPE for listening to podcasts with Earmark: https://earmarkcpe.comSubscribe to the Earmark Podcast: https://podcast.earmarkcpe.comGet in TouchThanks for listening and the great reviews! We appreciate you! Follow and tweet @BlakeTOliver and @DavidLeary. Find us on Facebook and Instagram. If you like what you hear, please do us a favor and write a review on Apple Podcasts or Podchaser. Call us and leave a voicemail; maybe we'll play it on the show. DIAL (202) 695-1040.SponsorshipsAre you interested in sponsoring The Accounting Podcast? For details, read the prospectus.Need Accounting Conference Info? Check out our new website - accountingconferences.comLimited edition shirts, stickers, and other necessitiesTeePublic Store: http://cloudacctpod.link/merchSubscribeApple Podcasts: http://cloudacctpod.link/ApplePodcastsYouTube: https://www.youtube.com/@TheAccountingPodcastSpotify: http://cloudacctpod.link/SpotifyPodchaser: http://cloudacctpod.link/podchaserStitcher: http://cloudacctpod.link/StitcherOvercast: http://cloudacctpod.link/OvercastClassifiedsWant to get the word out about your newsletter, webinar, party, Facebook group, podcast, e-book, job posting, or that fancy Excel macro you just created? Let the listeners of The Accounting Podcast know by running a classified ad. Go here to create your classified ad: https://cloudacctpod.link/RunClassifiedAdTranscriptsThe full transcript for this episode is available by clicking on the Transcript tab at the top of this page
Skype of Cthulhu presents a Call of Cthulhu scenario. This is Our Home by Jim Phillips. September 25, 1976 Staten Island, New York City, New York The residents conduct more research and confront some City employees. Dramatis Persone: Jim as the Keeper of Arcane Lore Randall as Frank Romero, Electrical Engineer Meredith as Marsha Janelle, Waitress Steve as Trae Grier, Gas Station Attendant Edwin as Kevin Mazer, Chemistry Teacher Gary as Peter Michale, Ex Pro Quarterback Sean as Kirk Griffin, Actor Download Subcription Options Podcast statistics
Recruiting on social sounds easy… until you try it. In this episode of HR Famous, Tim Sackett sits down with Sean Worden (CEO/Founder) and Katy Schuck (Co-Founder/COO) of Reelist to unpack why most TA teams struggle to hire through Facebook, Instagram, TikTok, and beyond, and what it actually takes to make social recruiting work in the real world. Sean starts with the big picture: Reelist makes it “ridiculously easy” to recruit off social by automating creative, running paid + organic campaigns, handling brand safety and compliance, messaging and screening candidates, and tying it all back to your ATS with real-time optimization. Then the conversation gets fun: Reelist didn't start there. It began as a “TikTok for jobs” concept (think video-based matching)… until they realized it was turning into a job board with extra steps. The pivot? Build the infrastructure that helps employers recruit where people already are on their phones while scrolling. Tim pushes into the questions every TA leader asks: Which channel works best for in-person roles? The answer isn't a generic “TikTok!” It depends on geography and density. For rural and small-town hiring, Sean breaks down why Facebook and Instagram often outperform, while TikTok targeting can fall apart when it forces broad DMA-level reach that doesn't match “I need someone to drive 15 minutes to this plant.” Katy brings the strategy home with two essentials: awareness and action. Social ads aren't meant to impress your C-suite, they're meant to hit candidates with what they care about (pay, conditions, location) in a tight message, then make it frictionless to apply now. That “instant gratification” moment matters because speed matters. Tim shares a Marriott story that proves it: the advantage often goes to whoever responds first, not to whoever has the prettiest employer-brand deck. They also dig into what “viral” means for recruiting content (including share-to-view ratios and platform-specific behavior), why the best videos qualify and disqualify quickly, and how social can reduce junk and bot applications by capturing real intent. Finally, the crew gets into agentic AI vs. traditional GenAI, API-driven automation, real-time ATS integrations, and why security/compliance (SOC 2 Type II and more) isn't optional anymore. If you've ever said, “We've tried social… it didn't work,” this episode might change your mind and your playbook.
Skype of Cthulhu presents a Call of Cthulhu scenario. Curse of Nineveh by Mike Mason, Mark Latham, Scott Dorward, Paul Fricker, and Andrew Kenrick. October, 1925 London Some investigators learn more about the recent robberies while others speak with a victim of an attack. Dramatis Persone: Sean as the Keeper Edwin as Dame Agatha, Authoress Jonathan as Katherine "Kitty" Hall, Dilettante Steve as Connor Shaw, Archivist Max as Oswald Nickels, Big Game Hunter Gary as Heathcliff Hamilton, Military Officer Randall as Montgomery Helmsworth, Librarian Jim as Roger Schindler, Alienist Rachael as Maude Throckmorton, Adventuress Download Subcription Options Podcast statistics
Shares of Sable Offshore Corp. (SOC) slipped nearly 50% year-over-year, but the stock started 2026 right with a 30% rally. George Tsilis talks about the court ruling that reignited a bull run for the energy company. ======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about
Skype of Cthulhu presents a Call of Cthulhu scenario. This is Our Home by Jim Phillips. September 24, 1976 Staten Island, New York City, New York Some of the residents meet an usual man while others do a little breaking and entering. Dramatis Persone: Jim as the Keeper of Arcane Lore Randall as Frank Romero, Electrical Engineer Meredith as Marsha Janelle, Waitress Steve as Trae Grier, Gas Station Attendant Edwin as Kevin Mazer, Chemistry Teacher Gary as Peter Michale, Ex Pro Quarterback Sean as Kirk Griffin, Actor Download Subcription Options Podcast statistics
Send us a textReady to turn CISSP Domain 3.5 into practical moves you can deploy on Monday? We unpack how real SOC teams apply microsegmentation, identity-aware controls, and targeted inspection to crush lateral movement without dragging performance. Along the way, we demystify AI's role: where detection engineering benefits from crisp use cases, how Tier 1 triage speeds up, and why models still need human oversight and rigorous validation to stay trustworthy.We also step through common network design traps that drain budgets and weaken defenses. VLAN sprawl looks tidy on paper but collapses under hybrid cloud dynamics. Central chokepoints promise control yet introduce latency and single failure domains. The smarter path is selective inline inspection where risk is highest, strong encryption everywhere else, and host-based enforcement that understands identity and context after decryption. If you've been tempted to collapse controls into one “do-everything” appliance, we lay out the hidden cost: a fragile core that turns into a single point of failure when you need it most.To ground the theory, we walk through scenario-style questions that mirror real decisions security leaders face: stopping east-west movement, balancing HA with inspection, drawing zero trust boundaries that don't assume implicit trust, and enforcing policy on encrypted traffic. You'll leave with patterns you can adapt immediately: start small, define use cases, validate outputs like code, and iterate with tight feedback loops. Whether you run a SOC, partner with an MSP, or are targeting a first-time CISSP pass, this conversation gives you a clear map from concept to control. If this helped, follow the show, share it with a teammate, and leave a quick review so others can find it too.Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Skype of Cthulhu presents a Call of Cthulhu scenario. Curse of Nineveh by Mike Mason, Mark Latham, Scott Dorward, Paul Fricker, and Andrew Kenrick. October, 1925 London Theodore Price comes to the investigators with a mysterious crime wave while Agatha experiences strange dreams. Dramatis Persone: Sean as the Keeper Edwin as Dame Agatha, Authoress Jonathan as Katherine "Kitty" Hall, Dilettante Steve as Connor Shaw, Archivist Max as Oswald Nickels, Big Game Hunter Gary as Heathcliff Hamilton, Military Officer Randall as Montgomery Helmsworth, Librarian Jim as Roger Schindler, Alienist Rachael as Maude Throckmorton, Adventuress Download Subcription Options Podcast statistics
Lynn & Carl talk with Mark Doyle who is starring in The Outsiders next week at the Fabulous Fox as Bob the "Soc." Then PopLifeStL's Alex McPherson joins to discuss the Best of 2025.
Skype of Cthulhu presents a Call of Cthulhu scenario. This is Our Home by Jim Phillips. September 23, 1976 Staten Island, New York City, New York Trying to piece together the clues, the residents reach out to public officials. Dramatis Persone: Jim as the Keeper of Arcane Lore Randall as Frank Romero, Electrical Engineer Meredith as Marsha Janelle, Waitress Steve as Trae Grier, Gas Station Attendant Edwin as Kevin Mazer, Chemistry Teacher Gary as Peter Michale, Ex Pro Quarterback Sean as Kirk Griffin, Actor Download Subcription Options Podcast statistics
This Week In Startups is made possible by:Northwest Registered Agent- https://www.northwestregisteredagent.com/twistVanta - http://www.vanta.com/twistLemon IO - https://lemon.io/twistToday's show: Jason's already a millionaire many times over… but what are the huge, blockbuster, dream purchases that he's still holding off on? BESIDES the private jet we all know he wants? The Noti Gang has asked, and JCal finally answers, on a holiday TWiST where we're taking questions from viewers and fans.Check out the episode for lots more intriguing queries, like how to push forward and glean useful information when your first customers aren't using your product the way you'd envisioned. Plus, is there room for both AI agents and great SaaS startups in the coming years? Hear why Jason thinks there IS.AND we've got the very last Gamma Pitch Deck Competition entry before we announce our winner in the new year. Check out AskHumans, an innovative approach to improving market research.Timestamps: (00:00) On a special holiday TWiST, we're answering YOUR pressing Founder Questions!(8:35) Northwest Registered Agent - Form your entire business identity in just 10 clicks and 10 minutes. Get more privacy, more options, and more done—visit https://www.northwestregisteredagent.com/twist today!(09:35) What should a founder do when a VC reaches out cold?(13:37) The importance of maintaining “ball control”(15:35) A European founder asks: Should I take European investments if they're targeting American customers?(19:47) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(20:51) A member of the Noti gang asks for JCal's dream mega-purchases(24:12) Why Jason thinks there's room for BOTH AI agents and great SaaS companies(27:18) Lemon.io - Get 15% off your first 4 weeks of developer time at https://lemon.io/twist(28:23) It's our final Gamma pitch with Zak from AskHumans!(29:24) How AskHumans uses AI to improve on marketing surveys and research(34:33) Management and measurement were designed before computers could understand language… why this matters.(35:48) Why no one ever wants to give feedback in a video(39:01) Why Zak's pitch is “two chapters of the same story”… and was this a pivot?(44:14) Why founders need to assume LLMs are going to get exponentially better*Subscribe to the TWiST500 newsletter: https://ticker.thisweekinstartups.com/Check out the TWIST500: https://twist500.comSubscribe to This Week in Startups on Apple: https://rb.gy/v19fcp*Follow Lon:X: https://x.com/lons*Follow Alex:X: https://x.com/alexLinkedIn: https://www.linkedin.com/in/alexwilhelm/*Follow Jason:X: https://twitter.com/JasonLinkedIn: https://www.linkedin.com/in/jasoncalacanis/*Thank you to our partners:(8:35) Northwest Registered Agent - Form your entire business identity in just 10 clicks and 10 minutes. Get more privacy, more options, and more done—visit https://www.northwestregisteredagent.com/twist today!(19:47) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(27:18) Lemon.io - Get 15% off your first 4 weeks of developer time at https://lemon.io/twistGreat TWIST interviews: Will Guidarahttps://youtu.be/pvJa2pzuXWQEoghan McCabehttps://youtu.be/9dHN4YFkgv4Steve Huffmanhttps://podcasts.apple.com/us/podcast/reddit-ceo-steve-huffman-on-mod-revolt-building-a/id315114957?i=1000617333424Brian Cheskyhttps://podcasts.apple.com/ca/podcast/airbnb-ceo-brian-chesky-on-early-rejection-customer/id315114957?i=1000611761112Bob Moestahttps://youtu.be/y2UMzSqX94QAaron Leviehttps://podcasts.apple.com/ca/podcast/box-ceo-aaron-levie-breaks-down-box-ai-and-generative/id315114957?i=1000612384545Sophia Amorusohttps://podcasts.apple.com/ca/podcast/sophia-amoruso-on-branding-raising-a-fund-portfolio/id315114957?i=1000601352978
Skype of Cthulhu presents a Call of Cthulhu scenario. Curse of Nineveh by Mike Mason, Mark Latham, Scott Dorward, Paul Fricker, and Andrew Kenrick. July, 1925 London The investigators learn more about the recenter murders and manage to turn the tables on their shadows. Dramatis Persone: Sean as the Keeper Edwin as Dame Agatha, Authoress Jonathan as Katherine "Kitty" Hall, Dilettante Steve as Connor Shaw, Archivist Max as Oswald Nickels, Big Game Hunter Gary as Heathcliff Hamilton, Military Officer Randall as Montgomery Helmsworth, Librarian Jim as Roger Schindler, Alienist Rachael as Maude Throckmorton, Adventuress Download Subcription Options Podcast statistics
Skype of Cthulhu presents a Call of Cthulhu scenario. This is Our Home by Jim Phillips. September 23, 1976 Staten Island, New York City, New York The residents of the Hoffman Building try to understand what happened in Apartment 1. Dramatis Persone: Jim as the Keeper of Arcane Lore Randall as Frank Romero, Electrical Engineer Meredith as Marsha Janelle, Waitress Steve as Trae Grier, Gas Station Attendant Edwin as Kevin Mazer, Chemistry Teacher Gary as Peter Michale, Ex Pro Quarterback Sean as Kirk Griffin, Actor Download Subcription Options Podcast statistics
In this episode, James sits down with Silas Cutler, Principal Security Researcher at Census and founding member of Oni Scans, to explore his unconventional journey through threat intelligence and malware analysis. What happens when your first day as a SOC analyst takes down a Fortune 500 company—and Anonymous gets the credit? From accidentally causing international headlines to going undercover in ransomware gangs, Silas has built a career on creative problem-solving and community building. He's become Facebook friends with hackers he investigates, created Malshare (a community malware repository), and founded B-Sides Pyongyang—a security conference celebrating "Missile Industry Day" that started as a joke but attracted 490 attendees.
Show Notes: Isa D'Elia, co-founder of GoalBridge, an AI startup in stealth mode opens the conversation with a brief overview of her background, mentioning she was at Amazon for five years and her co-founder, Vedant, was a software engineer at a financial institution in India. The Origin Story of GoalBridge Isa met her business partner in Berkeley Haas Business school. Through many discussions, they identified a problem in the consulting industry where consultants spent too much time on admin and manual work. They saw an opportunity to use AI to automate these tasks, leading to the creation of GoalBridge. Isa describes how they started working on GoalBridge, entering accelerators, and doing pivots. GoalBridge Iterations They found a design partner who needed a solution to discover their work within SharePoint, Google Drive, CRM, and email. GoalBridge's first iteration was a search AI agent that taps into various platforms to understand the context of engagements. The tool is called "building the brain of a firm" and has been tested with clients, leading to the development of additional agents. Isa introduces the first agent they built, a proposal building agent, which focuses on storyboarding proposals. Dealing with Non-billable Work Streams Consultants often complain about the tediousness of writing proposals, which are non-billable work streams. The agent helps create cohesive stories for proposals by using information from various sources and allowing iterations. They have a roadmap of additional agents to help consultants focus on strategy work rather than manual tasks. GoalBridge's Ideal Customer Profile When asked about the ideal customer profile for GoalBridge, Isa confirms they are targeting SMBs and tier two consulting firms, as larger firms have the resources to build their own tools. Currently, they have signed letters of intent with larger firms, indicating interest in their solution. The tool is designed to help consultants tap into strategy more effectively by automating manual tasks. Goalbridge's Access to Data The conversation turns to the limitations of GoalBridge in terms of access to data. Isa explains that the tool only accesses data that the user has access to, such as their email and specific folders in Google Drive or SharePoint. The tool acts as an AI agent that can quickly scan and understand the context of the data the user has access to. She talks about the challenges of accessing data that is not organized in SharePoint or Google Drive, such as emails. AI Agent that Writes Case Studies and Compendiums Isa introduces the project closeout agent, which helps partners extract and share information, write case studies and compendiums for projects. The agent anonymizes data and creates a cohesive story from various sources, including emails. This agent addresses the issue of knowledge management being left to good intentions and helps capture project context. The closeout agent can also be used for older projects. Demonstrating GoalBridge Isa shows the tool's interface, which includes a project creation feature, a chat dialog box for queries, and a files tab for uploading documents. The tool can tap into various platforms like SharePoint, Google Drive, and CRM systems, with current integrations for HubSpot and Salesforce. They talk about the tool's ability to find examples of old projects and provide feedback on proposals. Isa explains the limitations of GoalBridge in terms of access to data. The tool only accesses data that the user has access to, such as their email and specific folders in Google Drive or SharePoint. The tool acts as an AI agent that can quickly scan and understand the context of the data the user has access to. She also talks about the challenges of accessing data that is not organized in SharePoint or Google Drive, such as emails. Primary Use Cases for GoalBridge Isa outlines the primary use cases for GoalBridge, including partners finding examples of old projects, engagement managers leveraging formatting, and associates copying slides. They discuss the potential for the tool to create PowerPoint presentations and provide feedback on them. Isa mentions future agents in the roadmap, such as a case study writing agent and a pricing strategy agent. The tool is designed to help consultants at all levels by automating manual tasks and improving the quality of their work. Security Concerns and Data Privacy On the issue of security and data privacy when giving external firms access to sensitive data, Isa explains that they have a separate server hosting client data, ensuring it is secure and not accessible by other clients. They are working on SOC 2 certification to further assure clients of their security measures. The tool does not train on client data, ensuring IP is protected and not used for other purposes. When it comes to pricing, Isa mentions their willingness to discuss pricing on a case-by-case basis. Timestamps: 00:02: GoalBridge AI Startup Introduction 02:19: Development and Initial Success of GoalBridge 03:36: Proposal Building Agent and Future Plans 05:59: Target Market and Ideal Customer Profile 09:20:Privacy and Access Limitations 11:25: Project Closeout Agent and Additional Use Cases 15:58: Demonstration of GoalBridge Tool 21:57: Primary Use Cases and Future Agents 22:55: Security and Data Privacy Links: Website: www.GoalBridge.ai Email: isa@GoalBridge.ai This episode on Umbrex: https://umbrex.com/unleashed/episode-629-isa-deila-co-founder-of-goalbridge/ Unleashed is produced by Umbrex, which has a mission of connecting independent management consultants with one another, creating opportunities for members to meet, build relationships, and share lessons learned. Learn more at www.umbrex.com. *AI generated timestamps and show notes.
Studying bats' hearing can be tricky due to their small size, making certain styles of measurement used for larger echolocating mammals unavailable to researchers. In this episode, we talk to Victoria Fouhy and Michael Smotherman (Texas A&M University) about their work to develop a noninvasive method to study cortical auditory evoked potentials in bats, thereby allowing scientists to better understand how these animals process echolocation information.Associated paper:- Victoria Fouhy, Sam Ellis, and Michael Smotherman. "Subcutaneous cortical auditory evoked potentials in echolocating bats." J. Acoust. Soc. Am. 158, 3390-3399 (2025). https://doi.org/10.1121/10.0039659.Read more from The Journal of the Acoustical Society of America (JASA).Learn more about Acoustical Society of America Publications.Music Credit: Min 2019 by minwbu from Pixabay.
In this episode of JacquesTalk we take a deep dive on DeSoto, Duncanville and SOC and the high school playoffs. Then we talk about whether Schotty's culture will show up Sunday after being eliminated from the playoffs. Finally, we discuss a bad experience at a local steakhouse.
Doug Green, Publisher of Technology Reseller News, spoke with Josh Flinn, Director of Product, Cloud Software at Digi International, about the company's achievement of SOC 2 Type 2 compliance and what it means for channel partners building secure, cloud-based IoT solutions. Digi International is a global leader in cellular connectivity for IoT, delivering secure, reliable connectivity for distributed devices such as remote sensors, smart city infrastructure, vehicles, and industrial systems. Operating as a channel-first company, Digi focuses on helping partners deploy and manage IoT solutions at scale through cloud-based platforms like Digi Remote Manager and Digi Ventus. During the discussion, Flinn explained that SOC 2 Type 2 is a significant milestone because it validates not only Digi's security controls but also the ongoing execution of secure development, auditing, and change management practices over time. For channel partners, this reduces friction in the sales cycle, simplifies security questionnaires, and provides confidence that core components of their solutions already meet rigorous security standards. As Flinn noted, “SOC 2 is not a one-time event—it's an ongoing commitment to secure operations.” The compliance attestation currently covers Digi Remote Manager for Digi 360 router and gateway platforms, as well as Digi Ventus, Digi's managed services cloud platform. Looking ahead, Digi is continuing to invest in security enhancements such as long-term support firmware, eSIM security capabilities, and automated compliance controls, reinforcing its cloud-first approach as partners and customers move toward increasingly distributed, IoT-driven environments. Learn more about Digi International at https://www.digi.com/. Software Mind Telco Days 2025: On-demand online conference Engaging Customers, Harnessing Data
Send Bidemi a Text Message!In this episode, host Bidemi Ologunde spoke with Bruce Johnson of TekStream Solutions to unpack how the Whole of State initiative—with the Louisiana State University, Splunk, and Amazon Web Services—is turning classrooms into 24/7, student-powered SOCs that launch graduates into mid-level roles. With nearly four decades in IT security, Bruce shares how opening the door to any discipline builds stronger teams and real-world readiness. How do these student SOCs keep organizations safe while students learn? What does a typical shift and escalation look like? Can a philosophy or nursing major really become an analyst? How is success measured—placements, detection speed, or something else? Where does AI help without replacing humans? And what changed as the model expanded to New Jersey Institute of Technology and Louisiana Tech University?Support for The Bid Picture Podcast comes from Black Rifle Coffee Company, a veteran-founded coffee brand roasting premium beans for people who love a strong start to the day. From bold blends to convenient ready-to-drink cans, Black Rifle Coffee keeps you fueled for whatever's ahead. Check them out at blackriflecoffee.com.Support for The Bid Picture Podcast comes from GymShark, performance apparel designed for people who take their training seriously. With gym-ready fits that move with you, GymShark helps you stay focused from warm-up to cooldown. Explore their latest drops at gymshark.com.Support for The Bid Picture Podcast comes from Uncommon Goods, an online marketplace filled with unique, independently made gifts. From clever gadgets to handcrafted home goods, Uncommon Goods helps you find something thoughtful for everyone on your list. Learn more at uncommongoods.com.Support the show
professorjrod@gmail.comIn this episode of Technology Tap: CompTIA Study Guide, we dive deep into incident response, forensics, and monitoring essentials crucial for your tech exam prep. Learn the full incident response lifecycle—preparation, detection, analysis, containment, eradication, recovery, and lessons learned—to develop your IT skills and master concepts important for the CompTIA exam. We discuss how having a solid plan, defined roles, and effective communication helps IT teams maintain clarity when systems fail. Tune in for real-world examples showing how SOC analysts escalate brute force attacks, how teams preserve evidence for forensics, and how incident debriefs lead to stronger security measures like multi-factor authentication. This episode is an essential part of your CompTIA study guide and technology education journey.We then turn to digital forensics and make it concrete. Legal hold, due process, and chain of custody aren't buzzwords—they're the difference between actionable findings and inadmissible claims. We break down the order of volatility, memory and disk acquisition, hashing, and write blockers, plus the reporting and e‑discovery steps that transform artifacts into a defensible narrative. If you've ever wondered when to pull the plug or why RAM matters, this segment gives you the why and the how.Finally, we zoom out to monitoring and the tools that power modern security operations. From Windows logs and Syslog to IDS, IPS, NetFlow, and packet capture with Wireshark, we show how each source fits the puzzle. We unpack SIEM fundamentals—log aggregation, normalization, correlation, alert tuning—and share strategies to beat alert fatigue without missing true positives. To round it out, we offer certification guidance across A+, Network+, Security+, and Tech+, helping you choose the right path whether you're SOC-bound or supporting compliance from another business unit.Subscribe for more practical cybersecurity breakdowns, share this with a teammate who needs a stronger IR playbook, and leave a review with your biggest monitoring or forensics question—we may feature it next time.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Researchers detail a years-long Russian state-sponsored cyber espionage campaign. Israel's cyber chief warns against complacency. Vulnerabilities affect products from Fortinet and Hitachi Energy. Studies show AI models are rapidly improving at offensive cyber tasks. MITRE expands its D3FEND cybersecurity ontology to cover operational technology. Texas sues smart TV manufacturers, alleging illegal surveillance. A fraudulent gift card locks an Apple user out of their digital life. Our guest is Doron Davidson from CyberProof Israel discussing agentic SOCs and agentic transformation of an MDR. Fat racks crack the stacks. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment, we are joined by Doron Davidson, GM at CyberProof Israel, MD Security Operations, discussing agentic SOC and agentic transformation of an MDR. If you'd like to learn more be sure to check out CyberProof. Tune into the full conversation here. Selected Reading Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure (Live Threat Intelligence) IDF warns future cyberattacks may dwarf past threats (The Jerusalem Post) CISA reports active exploitation of critical Fortinet authentication bypass flaw (Beyond Machines) Hitachi Energy reports BlastRADIUS flaw in AFS, AFR and AFF Series product families (Beyond Machines) AI models are perfecting their hacking skills (Axios) AI Hackers Are Coming Dangerously Close to Beating Humans (WSJ) MITRE Extends D3FEND Ontology to Operational Technology Cybersecurity (Mitre) Texas sues biggest TV makers, alleging smart TVs spy on users without consent (Ars Technica) Locked out: How a gift card purchase destroyed an Apple account (Apple Insider) Racks of AI chips are too damn heavy (The Verge) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
This Week In Startups is made possible by:Vanta - https://www.vanta.com/twistNetSuite - https://www.netsuite.com/twistLemon.io - https://lemon.io/twist*Today's show: Domestic robots have never been hotter… so why is iRobot in so much trouble?!On TWiST, we're investigating the recent troubles facing the automated vacuum robot, Roomba. We've all seen these little discs sweeping up our friends' floors… but now the company behind them is running out of cash.What happened to iRobot, and would things have turned out differently if they had been sold to Amazon back in 2022?PLUS why Jason thinks you should spend your disposable income on investing… Is Alex still a journalist, and what does that actually mean for his portfolio?… Are founders and investors too cautious when it comes to signaling risk?… Why did all those internal Pipe documents leak online?… And MUCH MORE!Timestamps:(00:00) Why Jason loves Incentivizing New Ventures and Economic Strength Through Capital Formation!(09:48) Jason warns “no one is coming to help you with your job loss”; you're on your own!(10:21) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(13:05) Why Jason thinks laid-off HR folks should be starting their own “micro-funds"(14:13) Does Alex consider himself a journalist? Is it unethical for him to invest in companies? (Let's get INTO IT.)(16:02) You can't become complacent when you're in the lead!(20:03) Why you should use disposable “entertainment” income on investing(22:32) Netsuite - Get the free business guide Demystifying AI at https://www.netsuite.com/twist(23:36) $9B in new funds?! What is Lightspeed up to?(26:10) Is everyone too cautious about “signaling risk”?(28:39) Lemon.io - Get 15% off your first 4 weeks of developer time at https://Lemon.io/twist(31:21) How does Jason think those Pipe documents leaked? And WHY?(38:15) The critical importance of diversification(39:35) iRobot went BANKRUPT! Who killed the Roomba?(44:47) Are there ANY potential deals that would bother Jason? It's all about market share.(48:18) HuggingFace is moving major Reachy Minis! How open source turns everything upside down.(53:22) How Polymarket will decide when/if the AI bubble “bursts.”*Subscribe to the TWiST500 newsletter: https://ticker.thisweekinstartups.com/Check out the TWIST500: https://twist500.comSubscribe to This Week in Startups on Apple: https://rb.gy/v19fcp*Follow Lon:X: https://x.com/lons*Follow Alex:X: https://x.com/alexLinkedIn: https://www.linkedin.com/in/alexwilhelm/*Follow Jason:X: https://twitter.com/JasonLinkedIn: https://www.linkedin.com/in/jasoncalacanis/*Thank you to our partners:(10:21) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(22:32) Netsuite - Get the free business guide Demystifying AI at https://www.netsuite.com/twist(28:39) Lemon.io - Get 15% off your first 4 weeks of developer time at https://Lemon.io/twistGreat TWIST interviews: Will Guidarahttps://youtu.be/pvJa2pzuXWQEoghan McCabehttps://youtu.be/9dHN4YFkgv4Steve Huffmanhttps://podcasts.apple.com/us/podcast/reddit-ceo-steve-huffman-on-mod-revolt-building-a/id315114957?i=1000617333424Brian Cheskyhttps://podcasts.apple.com/ca/podcast/airbnb-ceo-brian-chesky-on-early-rejection-customer/id315114957?i=1000611761112Bob Moestahttps://youtu.be/y2UMzSqX94QAaron Leviehttps://podcasts.apple.com/ca/podcast/box-ceo-aaron-levie-breaks-down-box-ai-and-generative/id315114957?i=1000612384545Sophia Amorusohttps://podcasts.apple.com/ca/podcast/sophia-amoruso-on-branding-raising-a-fund-portfolio/id315114957?i=1000601352978Reid Hoffmanhttps://podcasts.apple.com/ca/podcast/reid-hoffman-on-ais-crescendo-moment-regulation-and/id315114957?i=1000612548498Frank Slootmanhttps://podcasts.apple.com/ca/podcast/snowflake-ceo-frank-slootman-on-moving-the-needle-win/id315114957?i=1000602560622
Skype of Cthulhu presents a Call of Cthulhu scenario. Curse of Nineveh by Mike Mason, Mark Latham, Scott Dorward, Paul Fricker, and Andrew Kenrick. July, 1925 London A visit to the British Museum yields new clues while an interview with a surviving member of the expedition suggests danger is shadowing the team. Dramatis Persone: Sean as the Keeper Edwin as Dame Agatha, Authoress Jonathan as Katherine "Kitty" Hall, Dilettante Steve as Connor Shaw, Archivist Max as Oswald Nickels, Big Game Hunter Gary as Heathcliff Hamilton, Military Officer Randall as Montgomery Helmsworth, Librarian Jim as Roger Schindler, Alienist Rachael as Maude Throckmorton, Adventuress Download Subcription Options Podcast statistics
Four enterprise AI leaders from Box, Snorkel AI, Sumo Logic, and Talkdesk peel away the hype and share battle-tested strategies for implementing agentic AI at scale.Topics Include:Carol Potts introduces panel featuring AI leaders from Box, Snorkel AI, Sumo Logic, and TalkdeskDiego Dugatkin explains Box serves 120,000 enterprise customers with 1.5 exabytes of secure cloud contentKui Jia shares Sumo Logic processes petabytes daily across 10 AWS regions for intelligent operationsYunjing Ma describes Talkdesk's evolution from contact center to customer experience automation through agentic AIDennis Panos positions Snorkel AI as leader in embedding human knowledge into data-centric applicationsDiego reveals Box uses AI internally for faster development and externally for metadata extraction automationKui explains security teams face overwhelming volumes, sometimes 1,000 signals daily, many AI-generated attacksSumo Logic announces SOC analyst agent in customer beta and query agent in general availabilityYunjing details Talkdesk's multi-agent hierarchy architecture powered by unified TalkDesk Data Cloud platformFour key areas identified: discovery of opportunities, building knowledge-powered agents, optimization, and measurementDennis emphasizes starting with trusted data foundation before adding generative AI capabilities to avoid hallucinationsDiego stresses governance importance: AI guardrails plus traditional data security create comprehensive protection frameworkKui warns POC-to-production gap requires intentional design: different latency, accuracy, and security requirements at scaleYunjing shares customer success: 80,000 daily calls, 11,000 documents, 97% accuracy despite complex compliance rulesKey success factors include prompt engineering optimization and real-time data processing mechanism improvementsDiego advises learning AI tools end-to-end: from ideation through functional demos without traditional prototyping delaysDennis recommends robust evaluation frameworks across system components, similar to software unit testing approachesYunjing reinforces data processing optimization and governance remain essential alongside exciting agentic AI capabilitiesKui urges immediate action: technology evolves rapidly, perfect solutions don't exist, customer focus builds trustFinal advice centers on treating AI as digital teammate, not replacement, enhancing productivity and creativityPlatform partnerships like AWS Bedrock solve heavy lifting, allowing teams to focus on core differentiatorsParticipants:Diego Dugatkin - Chief Product Officer, BoxDennis Panos - Head of Enterprise AI, SnorkelAIKui Jia - VP AI Engineering, Sumo LogicYunjing Ma - VP of Engineering, AI, TalkdeskModerator: Carol Potts - General Manager, ISV Sales Segment, North America, Amazon Web ServicesSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon.com/isv/
Got a question or comment? Message us here!Get an inside look at how weekly threat-intel briefings really work in a mature security program.
What if you could hire an army of AI security analysts that work 24/7 investigating alerts so your human team can focus on what actually matters? Edward Wu, founder and CEO of DropZone AI, joins The Audit crew to reveal how large language models are transforming security operations—and why the future of cyber defense looks more like a drone war than traditional SOC work. From his eight years at AttackIQ generating millions of security alerts (and the fatigue that came with them), Edward built DropZone to solve the problem he helped create: alert overload. This conversation goes deep on AI agents specializing in different security domains, the asymmetry problem between attackers and defenders, and why deepfakes might require us to use "safe words" before every Zoom call. What You'll Learn: How AI tier-1 analysts automate 90% of alert triage to find real threats faster Why attackers only need to be right once, but AI can level the playing field Real-world deepfake attacks hitting finance teams right now The societal implications of AI-driven social engineering at scale Whether superintelligence will unlock warp engines or just better spreadsheets If alert fatigue is crushing your security team, this episode delivers the blueprint for fighting back with AI. Hit subscribe for more conversations with security leaders who are actually building the future—not just talking about it. #cybersecurity #AIforCybersecurity #SOC #SecurityOperations #AlertFatigue #DropZoneAI #ThreatDetection #IncidentResponse #CyberDefense #SecurityAutomation
IonQ Vice President and GM of Quantum Platform Matthew Keesan joins BioTalk for a clear look at how they are advancing quantum computing from its home base in the BioHealth Capital Region. He shares the story of IonQ's Maryland roots and explains quantum computing in straightforward terms for listeners seeking a high-level understanding. The conversation moves into why biohealth leaders should track the hardware race, what distinguishes IonQ's approach, and how quantum is already being paired with AI to strengthen modeling and analysis. Keesan walks through early use cases showing traction today, challenges common myths about timelines, and shares which biohealth applications he expects to gain mainstream momentum by 2030. Editing and post-production work for this episode was provided by The Podcast Consultant (https://thepodcastconsultant.com). Matthew Keesan is Vice President and GM of Quantum Platform at IonQ and a member of the BHI Board. He joined IonQ in 2017 to lead the development of the company's Quantum OS, the software stack that controls IonQ's quantum computers. In 2021, he oversaw the launch of IonQ's Harmony systems on Amazon Braket, Microsoft Azure Quantum, and Google Cloud, making IonQ the first quantum hardware provider available across all three hyperscalers. He built IonQ's security function to meet commercial and government frameworks, including SOC 2, NIST 800-171, NIST 800-53, and ISO 27001, and established a globally distributed operations team managing IonQ's fleet of quantum computers across the United States and Europe. Before joining IonQ, Keesan served as CTO of the restaurant technology company Ando, which was acquired by Uber, and advised startups in manufacturing, e-commerce, and identity-as-a-service. He also helped create the technology behind the interactive HBO series Mosaic with Steven Soderbergh. He holds patents in quantum compilation, hybrid quantum computation, and quantum control automation, and has co-authored papers published in Nature and Physical Review A.
It's YOUR time to #EdUp with France Hoang, Founder & CEO, BoodleBoxIn this episode, sponsored by the 2026 InsightsEDU Conference in Fort Lauderdale, Florida, February 17-19,YOUR cohost is Dr. Susan Ray, Associate Professor of English, Delaware County Community CollegeYOUR host is Elvin FreytesHow does an AI platform resolve the tension between productivity & productive struggle by making human to AI collaboration transparent while keeping student work private?What happens when you build infrastructure with unlimited access to ChatGPT, Claude, Gemini & Perplexity with FERPA, SOC 2, GDPR & HIPAA certifications that anonymizes prompts & deletes data after 30 days?How does a portable AI toolkit allow students to build skills across courses & take their entire personalized system with them into their careers as a lifelong learning platform?Listen in to #EdUpThank YOU so much for tuning in. Join us on the next episode for YOUR time to EdUp!Connect with YOUR EdUp Team - Elvin Freytes & Dr. Joe Sallustio● Join YOUR EdUp community at The EdUp ExperienceWe make education YOUR business!P.S. Want to get early, ad-free access & exclusive leadership content to help support the show? Then subscribe today to lock in YOUR $5.99/m lifetime supporters rate! This offer ends December 31, 2025!
On this episode of The Cybersecurity Defenders Podcast we speak with Alec Fenton, VP of Security Operations at Foresite Cybersecurity about his journey from SOC analyst to security leader.Alec Fenton is a seasoned Cyber Security professional with over 15 years of extensive experience across many IT domains. With a career spanning more than a decade, Alec has honed his expertise in addressing a broad spectrum of cybersecurity challenges, leveraging his analytical prowess and hands-on approach to leadership.Throughout his career, Alec has navigated the intricate landscape of IT security, working across various sectors including managed service providers and private companies. His tenure as an analyst in the cybersecurity space has not only equipped him with a deep understanding of emerging threats and vulnerabilities but has also shaped his leadership philosophy of "lead from the front."Alec's commitment to excellence and his unwavering dedication to staying ahead of the curve in the ever-evolving field of cybersecurity have earned him recognition as a trusted advisor and thought leader in the industry. When he's not immersed in the world of IT security, Alec enjoys spending time outdoors, and help coach his son's baseball/basketball teams.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
Skype of Cthulhu presents a Call of Cthulhu scenario. This is Our Home by Jim Phillips. September 22, 1976 Staten Island, New York City, New York Six strangers who reside at the same building are drawn together on one horrible night. Dramatis Persone: Jim as the Keeper of Arcane Lore Randall as Frank Romero, Electrical Engineer Meredith as Marsha Janelle, Waitress Steve as Trae Grier, Gas Station Attendant Edwin as Kevin Mazer, Chemistry Teacher Gary as Peter Michale, Ex Pro Quarterback Sean as Kirk Griffin, Actor Download Subcription Options Podcast statistics
This Week In Startups is made possible by:LinkedIn Ads - http://linkedin.com/thisweekinstartupsVanta - https://www.vanta.com/twistPilot - https://pilot.com/twistToday's show: Did you know there's actually a shortage of US bricklayers? It's TRUE! So feel free to marvel at Monumental's brick-laying robots. They're not putting anyone out of work, but filling a much-needed gap.Join Alex and Monumental founder/CEO Salar al Khafaji for a deep-dive on how the startup is making construction robots play nice together by maintaining separate “zones” of operation, why Salar thinks startups need to focus on truly complex, real-world problems to truly blossom, and the secrets of fundraising in Europe.PLUS Alex chats with Seasats CEO Mike Flanigan about designing the next generation of autonomous marine crafts. (That is to say, ocean drones.) From their home base in San Diego, the company is trying to get completely independent of all Chinese parts. Find out how it's going, how they're overcoming the “wildly negative” ROI on maritime tech, and why we have so few defenses against tiny, agile drones.All that AND Jason takes some of YOUR Founder Questions.Timestamps:(03:23) How Monumental determined what kinds of robots construction sites need the most(06:49) How maintaining “zones” ensure that the robots all play nice with one another(07:52) There's a shortage of bricklayers, so Monumental's NOT taking anyone's job(9:16) LinkedIn Ads: Start converting your B2B audience into high quality leads today. Launch your first campaign and get $250 FREE when you spend at least $250. Go to http://linkedin.com/thisweekinstartups to claim your credit.(13:21) Why startups need to tackle large-scale, complex, real-world problems to really grow(15:44) Why Monumental is building in The Netherlands, and running pilots in the UK(19:07) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(20:44) Why construction is unique among applications for automation and robots(26:01) Salar argues that fundraising in Europe is not as hard as you may have heard(27:55) We don't just need housing, we need BEAUTIFUL housing(31:11) Pilot - Visit https://www.pilot.com/twist and get $1,200 off your first year. (33:25) How the Scout autonomous boat challenge inspired Seasats(35:28) Trying to make drones into an “iPhone Style” project(37:39) Why Seasats is focused on endurance and staying power more than launches(39:15) The complexities of working with fuel cells(42:27) The importance of beautiful design even when working on government technology(45:51) Why they're building Seasats in beautiful San Diego, CA(47:29) The challenge of getting entirely free from Chinese components(53:52) “The Power of Small Things Has Changed”(55:18) The “wildly negative” ROI on most humanoid robotics companies also applies to maritime tech(59:09) Why there are so few defense nets against people with tiny but agile drones(01:02:32) FOUNDER Q's: Is a founder working 24/7 a red flag?(01:10:11) How bad is it to use VC money to pay off credit cards?(01:12:49) A look at Cursor's unique recruitment strategy.(01:19:57) Should young VCs go to startup conferences?Subscribe to the TWiST500 newsletter: https://ticker.thisweekinstartups.com/Check out the TWIST500: https://twist500.comSubscribe to This Week in Startups on Apple: https://rb.gy/v19fcp*Follow Lon:X: https://x.com/lons*Follow Alex:X: https://x.com/alexLinkedIn: https://www.linkedin.com/in/alexwilhelm/*Thank you to our partners:(9:16) LinkedIn Ads: Start converting your B2B audience into high quality leads today. Launch your first campaign and get $250 FREE when you spend at least $250. Go to http://linkedin.com/thisweekinstartups to claim your credit.(19:07) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(31:11) Pilot - Visit https://www.pilot.com/twist and get $1,200 off your first year.